CVE-2022-49358
📋 TL;DR
This CVE describes a memory leak vulnerability in the Linux kernel's netfilter nf_tables subsystem. When flow rule objects aren't properly destroyed during transaction commits, it allows attackers to cause memory exhaustion over time. This affects all Linux systems using nf_tables with the vulnerable kernel versions.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
An attacker could repeatedly trigger the memory leak to exhaust system memory, leading to denial of service, system instability, or kernel crashes.
Likely Case
Memory exhaustion over time causing performance degradation and potential system instability requiring reboots.
If Mitigated
Minimal impact with proper monitoring and memory limits in place, though still represents resource waste.
🎯 Exploit Status
Exploitation requires ability to trigger nf_tables operations. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple stable kernel versions with fixes available (see git.kernel.org references)
Vendor Advisory: https://git.kernel.org/stable/c/330c0c6cd2150a2d7f47af16aa590078b0d2f736
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable nf_tables if not needed
linuxRemove nf_tables kernel module if not required for system functionality
modprobe -r nf_tables
echo 'blacklist nf_tables' >> /etc/modprobe.d/blacklist.conf
🧯 If You Can't Patch
- Monitor system memory usage and implement alerts for unusual memory consumption patterns
- Restrict access to nf_tables functionality to trusted users only
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if nf_tables module is loaded: lsmod | grep nf_tables
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated to patched version and monitor for memory leaks after applying patch
📡 Detection & Monitoring
Log Indicators:
- Kernel oom-killer messages
- System memory exhaustion warnings
- nf_tables related errors in dmesg
Network Indicators:
- Unusual nf_tables rule creation patterns
SIEM Query:
source="kernel" AND ("Out of memory" OR "oom-killer" OR "nf_tables")
🔗 References
- https://git.kernel.org/stable/c/330c0c6cd2150a2d7f47af16aa590078b0d2f736
- https://git.kernel.org/stable/c/5b8d63489c3b701eb2a76f848ec94d8cbc9373b9
- https://git.kernel.org/stable/c/80de9ea1f5b808a6601e91111fae601df2b26369
- https://git.kernel.org/stable/c/9dd732e0bdf538b1b76dc7c157e2b5e560ff30d3
- https://git.kernel.org/stable/c/ab9f34a30c23f656e76f4c5b83125a4e7b53c86e
- https://git.kernel.org/stable/c/e33d9bd563e71f6c6528b96008d65524a459c4dc