CVE-2022-49230

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's MediaTek MT7915 Wi-Fi driver. When the mt7915_mcu_add_sta function fails, it doesn't properly free allocated socket buffers (skbs), leading to gradual memory exhaustion. This affects systems using MediaTek MT7915 Wi-Fi chipsets with vulnerable kernel versions.

💻 Affected Systems

Products:
  • Linux kernel with MediaTek MT7915 Wi-Fi driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with MediaTek MT7915 Wi-Fi hardware. The vulnerability is triggered during station association/disassociation operations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could cause kernel memory exhaustion leading to system instability, crashes, or denial of service requiring physical reboot.

🟠

Likely Case

Gradual memory consumption over time causing performance degradation and eventual system instability in affected Wi-Fi devices.

🟢

If Mitigated

Minimal impact with proper monitoring and memory limits in place, though still represents resource waste.

🌐 Internet-Facing: LOW - Requires local access to trigger the vulnerable code path through Wi-Fi station management operations.
🏢 Internal Only: MEDIUM - Could be triggered by connecting/disconnecting Wi-Fi clients on affected systems, potentially leading to service disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to trigger Wi-Fi station management operations, typically requiring network access or ability to connect/disconnect as a Wi-Fi client.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits a43736cd12d82913102eb49cb56787a5553e028f, b334a245ff1d76b1e97af8cea648ea6798b9eb87, daf02c7e3c3dc82ffa925999597bd455cf799551

Vendor Advisory: https://git.kernel.org/stable/c/a43736cd12d82913102eb49cb56787a5553e028f

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable MT7915 Wi-Fi

linux

Temporarily disable the vulnerable Wi-Fi hardware if not required

sudo modprobe -r mt7915e
echo 'blacklist mt7915e' | sudo tee /etc/modprobe.d/blacklist-mt7915.conf

🧯 If You Can't Patch

  • Monitor system memory usage closely for abnormal consumption patterns
  • Implement connection rate limiting for Wi-Fi clients to reduce trigger frequency

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if mt7915 module is loaded: lsmod | grep mt7915 && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits and test Wi-Fi station operations while monitoring memory

📡 Detection & Monitoring

Log Indicators:

  • Kernel oom-killer messages
  • Abnormal memory consumption in /var/log/syslog
  • Wi-Fi driver error messages

Network Indicators:

  • Increased Wi-Fi disconnection/reconnection events

SIEM Query:

source="kernel" AND ("out of memory" OR "oom-killer") AND process="mt7915"

🔗 References

📤 Share & Export