CVE-2022-49093
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49093 is a use-after-free vulnerability discovered in the Linux kernel's network stack, specifically in the skbuff (socket buffer) subsystem when using page_pool with page fragments. The vulnerability was identified in the hns3 network driver implementation and affects the Linux kernel's memory management for network packets (Kernel Git). The issue has been assigned a CVSS v3.1 base score of 7.8 (HIGH) by CISA-ADP, indicating significant potential impact (NVD).

Technical details

The vulnerability occurs during the packet coalescing process in the network stack. When handling RX (receive) operations, the issue manifests in the skbtrycoalesce() function where _skbfragref() incorrectly takes a page reference to PAGE2 instead of increasing the pagepool fragment reference (ppfragcount). This leads to inconsistent reference counting when dealing with cloned SKBs (socket buffers) that use page_pool fragment references. The vulnerability can result in a use-after-free condition when PAGE2 is freed while still being used by an RX descriptor (Kernel Git).

Impact

The vulnerability can lead to memory corruption if exploited. In systems with IOMMU enabled, it results in IOMMU faults. However, in systems where IOMMU is disabled, it can silently corrupt memory, potentially leading to system instability or unauthorized access. The high CVSS score of 7.8 indicates potential for significant impact on system confidentiality, integrity, and availability (NVD).

Mitigation and workarounds

The vulnerability has been patched in the Linux kernel by modifying the logic that checks whether pprecycle SKBs can be coalesced. The fix rejects coalescing when both 'from' and 'to' SKBs are pprecycled and 'from' is cloned. The patch allows coalescing a cloned pp_recycle SKB into a page refcounted one, ensuring proper reference counting (Kernel Git).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40258HIGH7
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-devel-matched
NoNoDec 04, 2025
CVE-2025-40259MEDIUM6.2
  • Linux KernelLinux Kernel
  • kernel-64k-devel
NoNoDec 04, 2025
CVE-2025-40264MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-kvm
NoNoDec 04, 2025
CVE-2025-40254MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-modules-partner
NoNoDec 04, 2025
CVE-2025-40253MEDIUM5.5
  • Linux KernelLinux Kernel
  • python3-perf
NoNoDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management