CVE-2022-50042

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's generic netlink (genl) subsystem when dumping policy information. If an error occurs during policy array construction for non-first policies, the kernel fails to properly free allocated memory, leading to resource exhaustion. This affects all Linux systems using the affected kernel versions.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE description; typically affects multiple stable kernel versions before fixes were applied
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in core kernel netlink functionality; no special configuration required to be vulnerable

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could repeatedly trigger the memory leak to cause kernel memory exhaustion, leading to system instability, denial of service, or potential kernel panic/crash.

🟠

Likely Case

Local or remote attackers could cause gradual memory consumption, potentially degrading system performance or causing denial of service over time.

🟢

If Mitigated

With proper memory limits and monitoring, the impact would be limited to temporary performance degradation before detection and remediation.

🌐 Internet-Facing: LOW - This requires specific netlink operations and is not directly exploitable via typical internet-facing services.
🏢 Internal Only: MEDIUM - Local users or processes with appropriate permissions could exploit this to cause denial of service on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to trigger netlink policy dumping operations; typically requires local access or specific network services

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits: 249801360db3, 26b6acd36582, 83411c9f05d5, b0672895d8be

Vendor Advisory: https://git.kernel.org/stable/c/249801360db3dec4f73768c502192020bfddeacc

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits
2. Reboot system to load new kernel
3. Verify kernel version after reboot

🔧 Temporary Workarounds

Restrict netlink access

linux

Limit access to netlink sockets to prevent unauthorized users from triggering the vulnerability

Use Linux security modules (SELinux/AppArmor) to restrict netlink operations
Implement network namespaces to isolate netlink traffic

🧯 If You Can't Patch

  • Implement strict memory limits using cgroups to contain potential memory exhaustion
  • Monitor kernel memory usage and netlink activity for abnormal patterns

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with patched versions containing the fix commits

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits: 249801360db3, 26b6acd36582, 83411c9f05d5, or b0672895d8be

📡 Detection & Monitoring

Log Indicators:

  • Kernel oom-killer messages
  • Abnormal memory consumption in kernel logs
  • Repeated netlink policy dump operations

Network Indicators:

  • Unusual netlink socket activity
  • Excessive netlink traffic from single source

SIEM Query:

source="kernel" AND ("oom" OR "out of memory" OR "netlink")

🔗 References

📤 Share & Export