CVE-2022-49803

5.5 MEDIUM

📋 TL;DR

This is a memory leak vulnerability in the Linux kernel's netdevsim driver where allocated memory for fa_cookie is not freed during device removal. It affects systems using the netdevsim driver, primarily developers and testers working with network device simulation. The vulnerability leads to gradual memory exhaustion over time.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel versions with netdevsim driver before the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only affects systems where netdevsim module is loaded and used. This is a testing/driver development module not typically present in production systems.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could lead to kernel memory exhaustion, causing system instability, crashes, or denial of service.

🟠

Likely Case

Gradual memory consumption over time during netdevsim testing or development, potentially leading to performance degradation.

🟢

If Mitigated

Minimal impact as netdevsim is typically used in controlled testing environments, not production systems.

🌐 Internet-Facing: LOW - netdevsim is a testing driver not typically exposed to external networks.
🏢 Internal Only: LOW - netdevsim is used for development/testing, not in production environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires loading and using the netdevsim driver, which is typically only done in development/testing environments. No public exploits exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in stable kernel commits 064bc7312bd09a48798418663090be0c776183db and 207edad5717e0a5709ce8467f0eff41c607835c9

Vendor Advisory: https://git.kernel.org/stable/c/064bc7312bd09a48798418663090be0c776183db

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify netdevsim module loads correctly if needed for testing.

🔧 Temporary Workarounds

Unload netdevsim module

linux

Remove the netdevsim kernel module to prevent the vulnerability from being triggered

sudo rmmod netdevsim

Blacklist netdevsim module

linux

Prevent netdevsim from loading automatically

echo 'blacklist netdevsim' | sudo tee /etc/modprobe.d/netdevsim-blacklist.conf
sudo update-initramfs -u

🧯 If You Can't Patch

  • Avoid loading or using the netdevsim kernel module
  • Monitor system memory usage for unusual consumption patterns

🔍 How to Verify

Check if Vulnerable:

Check if netdevsim module is loaded: lsmod | grep netdevsim. If loaded and kernel version is before fix commits, system is vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Check kernel version includes fix commits: uname -r and verify against patched kernel versions. Also verify netdevsim module can be loaded/unloaded without memory leaks.

📡 Detection & Monitoring

Log Indicators:

  • Kernel oom-killer messages
  • System memory exhaustion warnings in dmesg
  • kmemleak reports of unreferenced objects from netdevsim

Network Indicators:

  • None - this is a local kernel memory issue

SIEM Query:

Search for kernel logs containing 'oom-killer' or memory allocation failures when netdevsim is in use

🔗 References

📤 Share & Export