CVE-2022-0742

9.1 CRITICAL

📋 TL;DR

A memory leak vulnerability in the Linux kernel's ICMPv6 implementation allows remote attackers to cause denial-of-service by sending crafted ICMPv6 packets (types 130 or 131), leading to system memory exhaustion. This affects Linux kernel versions 5.13 and later. Any system running affected kernel versions with IPv6 enabled is vulnerable.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: 5.13 and later versions before fix
Operating Systems: Linux distributions using kernel 5.13+
Default Config Vulnerable: ⚠️ Yes
Notes: Requires IPv6 to be enabled and ICMPv6 packets to be processed. Most modern Linux systems have IPv6 enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash due to memory exhaustion, requiring physical reboot and potentially causing data loss or service disruption.

🟠

Likely Case

System becomes unresponsive or crashes under sustained attack, requiring reboot to restore functionality.

🟢

If Mitigated

With proper network controls, impact is limited to potential performance degradation if packets bypass filters.

🌐 Internet-Facing: HIGH - Remote unauthenticated attackers can exploit this from anywhere on the internet.
🏢 Internal Only: HIGH - Internal attackers or compromised systems can also exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward - sending crafted ICMPv6 packets to trigger the memory leak. Public proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commit 2d3916f3189172d5c69d33065c3c21119fe539fc or later

Vendor Advisory: https://security.netapp.com/advisory/ntap-20220425-0001/

Restart Required: Yes

Instructions:

1. Update kernel to version containing the fix commit 2d3916f3189172d5c69d33065c3c21119fe539fc. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Block ICMPv6 types 130 and 131

linux

Use firewall rules to block the specific ICMPv6 packet types that trigger the vulnerability

iptables -A INPUT -p ipv6-icmp --icmpv6-type 130 -j DROP
iptables -A INPUT -p ipv6-icmp --icmpv6-type 131 -j DROP
ip6tables -A INPUT -p ipv6-icmp --icmpv6-type 130 -j DROP
ip6tables -A INPUT -p ipv6-icmp --icmpv6-type 131 -j DROP

Disable IPv6

linux

Temporarily disable IPv6 if not required for system functionality

sysctl -w net.ipv6.conf.all.disable_ipv6=1
sysctl -w net.ipv6.conf.default.disable_ipv6=1

🧯 If You Can't Patch

  • Implement strict firewall rules to block ICMPv6 types 130 and 131 at network perimeter
  • Monitor system memory usage and implement alerting for abnormal memory consumption patterns

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r. If version is 5.13 or higher and doesn't contain the fix commit, system is vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Check if kernel contains the fix: grep -q '2d3916f3189172d5c69d33065c3c21119fe539fc' /proc/version || echo 'Check kernel source/git log'

📡 Detection & Monitoring

Log Indicators:

  • Kernel OOM (Out of Memory) messages in /var/log/kern.log or dmesg
  • Abnormal memory consumption in system logs
  • ICMPv6 packet drops in firewall logs

Network Indicators:

  • High volume of ICMPv6 type 130/131 packets
  • Unusual ICMPv6 traffic patterns from single sources

SIEM Query:

source="kernel" AND ("out of memory" OR "OOM" OR "memory exhaustion") OR (protocol="ICMPv6" AND (type=130 OR type=131) AND count>threshold)

🔗 References

📤 Share & Export