#VU91430 Race condition within a thread in Linux kernel - CVE-2022-48689
Published: June 8, 2024 / Updated: May 13, 2025
Vulnerability identifier: #VU91430
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-48689
CWE-ID: CWE-366
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to a data race within the skb_frag_size_add() function in net/ipv4/tcp.c, within the __zerocopy_sg_from_iter() function in net/core/datagram.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's website.
External links
- https://git.kernel.org/stable/c/8527c9a6bf8e54fef0a8d3d7d8874a48c725c915
- https://git.kernel.org/stable/c/6730c48ed6b0cd939fc9b30b2d621ce0b89bea83
- https://git.kernel.org/stable/c/3261400639463a853ba2b3be8bd009c2a8089775
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.68
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.9
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0