CVE-2022-50046

5.5 MEDIUM

📋 TL;DR

A memory leak vulnerability in the Linux kernel's RPC subsystem could allow local attackers to cause kernel memory exhaustion or trigger NULL pointer dereferences. This affects Linux systems using the sunrpc module, primarily servers with RPC services enabled.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Versions containing the vulnerable code before fixes were applied (specific commit ranges vary by kernel version)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if sunrpc module is loaded and RPC services are used. Many systems may not have this enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel panic or denial of service through memory exhaustion, potentially leading to system instability or crash.

🟠

Likely Case

Local denial of service through memory leaks causing gradual performance degradation or kernel panic in specific error conditions.

🟢

If Mitigated

Minimal impact with proper access controls preventing local attackers from triggering the vulnerable code path.

🌐 Internet-Facing: LOW - Requires local access to trigger the vulnerable function.
🏢 Internal Only: MEDIUM - Local users or compromised services could exploit this to cause system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger specific error conditions in the RPC subsystem. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 76fbeb1662b1c56514325118a07fba74dc4c79fe, bfc48f1b0505ffcb03a6d749139b7577d6b81ae0, c0434f0e058648649250b8ed6078b66d773de723

Vendor Advisory: https://git.kernel.org/stable/c/76fbeb1662b1c56514325118a07fba74dc4c79fe

Restart Required: Yes

Instructions:

1. Update to a kernel version containing the fix. 2. Check your distribution's security advisories for backported patches. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Disable sunrpc module

linux

Unload the vulnerable sunrpc module if not required

modprobe -r sunrpc
echo 'blacklist sunrpc' > /etc/modprobe.d/blacklist-sunrpc.conf

🧯 If You Can't Patch

  • Restrict local user access to prevent untrusted users from triggering the vulnerability
  • Monitor system memory usage and kernel logs for signs of memory leaks or crashes

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if sunrpc module is loaded: lsmod | grep sunrpc

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and check dmesg for any sunrpc-related errors after testing RPC functionality

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • Memory allocation failures in kernel logs
  • RPC subsystem errors

Network Indicators:

  • Unusual RPC traffic patterns if exploited

SIEM Query:

source="kernel" AND ("sunrpc" OR "rpc_sysfs" OR "xprt_state_change")

🔗 References

📤 Share & Export