
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48819 is a vulnerability in the Linux kernel's TCP implementation that was discovered by syzbot. The issue occurs when mixing sendpage() and sendmsg(MSGZEROCOPY) calls over the same TCP socket, which triggers a warning in inetsock_destruct() function. The vulnerability was disclosed in July 2024 and affects the Linux kernel's networking stack (Kernel Git).
The vulnerability stems from a memory accounting issue in the TCP stack where the sendpage() path was not properly handling the downgrading of pure zerocopy status. When mixing sendpage() and sendmsg(MSGZEROCOPY) calls, the system would trigger a WARNON(skforwardallocget(sk)) warning due to improper synchronization of skforwardalloc. The fix involved adding a tcpdowngradezcopypure() helper function to ensure proper charging happens for sendpage() operations, particularly when pages could be coming from a pipe (Kernel Git).
The vulnerability could lead to memory accounting inconsistencies in the Linux kernel's TCP stack when using zero-copy operations. This could potentially affect system stability and networking performance when using specific TCP socket operations (NVD).
The issue has been fixed in the Linux kernel through a patch that implements proper memory accounting for mixed zero-copy operations. The fix involves adding the tcpdowngradezcopy_pure() helper function to handle the transition from pure zero-copy to mixed operations (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."