CVE-2022-49086

5.5 MEDIUM

📋 TL;DR

A memory leak vulnerability in the Linux kernel's Open vSwitch module allows attackers to cause denial of service through resource exhaustion. When parsing nested actions in network flows, the module fails to properly free allocated memory, leading to gradual memory depletion. Systems using Open vSwitch for network virtualization are affected.

💻 Affected Systems

Products:
  • Linux kernel with Open vSwitch module
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Open vSwitch module loaded and in use. Cloud environments, virtualization platforms, and SDN deployments using OVS are particularly vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system memory exhaustion leading to kernel panic and system crash, disrupting all network traffic through Open vSwitch.

🟠

Likely Case

Gradual memory depletion causing performance degradation, packet loss, and eventual service disruption for Open vSwitch-managed networks.

🟢

If Mitigated

Minimal impact with proper monitoring and memory limits in place, though some performance degradation may still occur.

🌐 Internet-Facing: MEDIUM - Attackers could craft malicious flows to trigger the leak, but requires Open vSwitch exposure and flow manipulation capabilities.
🏢 Internal Only: MEDIUM - Internal attackers or misconfigured applications could trigger the leak, affecting network stability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to create or modify Open vSwitch flows with nested actions. Typically requires some level of access to the OVS control plane.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions containing commits 1f30fb9166d4f15a1aa19449b9da871fe0ed4796 or later

Vendor Advisory: https://git.kernel.org/stable/c/1f30fb9166d4f15a1aa19449b9da871fe0ed4796

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. For RHEL/CentOS: yum update kernel. 3. For Ubuntu/Debian: apt update && apt upgrade linux-image. 4. Reboot system to load new kernel.

🔧 Temporary Workarounds

Limit Open vSwitch flow creation

linux

Restrict who can create/modify Open vSwitch flows to prevent malicious flow injection

ovs-vsctl set-manager ptcp:6640 -- set-controller br0 tcp:127.0.0.1:6653
Configure OVS access controls via OpenFlow controllers

Monitor memory usage

linux

Implement aggressive memory monitoring and alerting for OVS processes

watch -n 5 'ps aux | grep ovs'
Configure monitoring for /proc/[ovs-pid]/status memory metrics

🧯 If You Can't Patch

  • Implement strict flow validation to reject nested actions in ct() and set() operations
  • Deploy memory cgroups with hard limits on OVS processes to contain memory leak impact

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if Open vSwitch module is loaded: lsmod | grep openvswitch && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is after fix commits and test with flow creation containing nested actions while monitoring memory usage

📡 Detection & Monitoring

Log Indicators:

  • Kernel OOM (Out of Memory) messages in dmesg
  • Rapid increase in OVS process memory usage in system logs
  • Failed flow creation attempts with nested actions

Network Indicators:

  • Unusual flow creation patterns in OVS
  • Increased packet loss in OVS-managed networks

SIEM Query:

process_name="ovs-vswitchd" AND memory_usage_increase_percent>50 AND time_window=5min

🔗 References

📤 Share & Export