CVE-2022-49471
📋 TL;DR
This CVE describes an array index out-of-bounds vulnerability in the Linux kernel's rtw89 Wi-Fi driver. The vulnerability allows hardware to report incorrect mac_id values, potentially leading to memory corruption. Systems using affected Linux kernel versions with rtw89 driver support are vulnerable.
💻 Affected Systems
- Linux kernel with rtw89 Wi-Fi driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel memory corruption leading to system crash, denial of service, or potential privilege escalation if combined with other vulnerabilities.
Likely Case
System instability, kernel panics, or denial of service affecting Wi-Fi functionality on devices using rtw89 drivers.
If Mitigated
Minor performance impact from bounds checking with no security consequences.
🎯 Exploit Status
Exploitation requires local access to trigger the hardware condition that causes incorrect mac_id reporting. No public exploits are known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel with commits 03ed236480ae, 97df85871a5b, or c32fafe68298 applied
Vendor Advisory: https://git.kernel.org/stable/c/03ed236480aeec8c2fd327a1ea6d711364c495e3
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load patched kernel.
🔧 Temporary Workarounds
Disable rtw89 driver
LinuxBlacklist or disable the rtw89 kernel module to prevent loading
echo 'blacklist rtw89_core' | sudo tee /etc/modprobe.d/blacklist-rtw89.conf
sudo rmmod rtw89_core rtw89_pci
sudo update-initramfs -u
🧯 If You Can't Patch
- Disable Wi-Fi functionality on affected systems
- Use alternative Wi-Fi hardware not requiring rtw89 driver
🔍 How to Verify
Check if Vulnerable:
Check if rtw89 driver is loaded: lsmod | grep rtw89. Check kernel version against distribution security advisories.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and rtw89 driver loads without errors in dmesg.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- UBSAN array-index-out-of-bounds errors in dmesg
- rtw89 driver crash logs
Network Indicators:
- Wi-Fi connectivity issues on affected hardware
SIEM Query:
kernel: *UBSAN*array-index-out-of-bounds*rtw89* OR kernel: *rtw89*panic*