CVE-2022-49206
📋 TL;DR
This CVE describes a memory leak vulnerability in the Linux kernel's RDMA/mlx5 driver. When the second xa_insert() operation fails during event subscription, the system fails to release allocated memory, causing a resource leak. This affects systems using RDMA with mlx5 hardware.
💻 Affected Systems
- Linux kernel with RDMA/mlx5 driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Sustained exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or potential kernel crashes.
Likely Case
Gradual memory consumption over time leading to performance degradation and eventual system instability requiring reboot.
If Mitigated
Minimal impact with proper monitoring and memory limits in place; system remains functional but may require periodic maintenance.
🎯 Exploit Status
Requires ability to trigger the specific error condition in RDMA event subscription; typically requires local access or RDMA network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits: 0174a89663a5ef83617da15bf24c0af2f62b6c7f and related stable backports
Vendor Advisory: https://git.kernel.org/stable/c/0174a89663a5ef83617da15bf24c0af2f62b6c7f
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable RDMA if not needed
linuxDisable RDMA functionality to prevent triggering the vulnerable code path
modprobe -r mlx5_ib
echo 'blacklist mlx5_ib' > /etc/modprobe.d/disable-mlx5.conf
Monitor memory usage
linuxImplement monitoring for abnormal memory consumption in RDMA processes
watch -n 60 'cat /proc/meminfo | grep -E "MemFree|MemAvailable"'
systemctl status rdma.service
🧯 If You Can't Patch
- Implement strict memory limits using cgroups for RDMA-related processes
- Monitor system logs for RDMA error messages and restart services if memory leaks are detected
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if RDMA/mlx5 is loaded: uname -r && lsmod | grep mlx5
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is after fix commits and test RDMA functionality remains working
📡 Detection & Monitoring
Log Indicators:
- Kernel oom-killer messages
- RDMA subsystem error logs
- Abnormal memory consumption in /proc/meminfo
Network Indicators:
- RDMA connection failures
- Increased retransmissions on RDMA networks
SIEM Query:
source="kernel" AND ("oom" OR "out of memory") AND process="rdma"
🔗 References
- https://git.kernel.org/stable/c/0174a89663a5ef83617da15bf24c0af2f62b6c7f
- https://git.kernel.org/stable/c/087f9c3f2309ed183f7e4b85ae57121d8663224d
- https://git.kernel.org/stable/c/414b4e8738484379f18d6c4e780787c80dbf8a2c
- https://git.kernel.org/stable/c/8dd392e352d3269938fea32061a74655a613f929
- https://git.kernel.org/stable/c/c98d903ff9e79c210beddea4e6bc15ac38e25aa5
- https://git.kernel.org/stable/c/d66498507801fd9a20307a15a0814a0a016c3cde