CVE-2022-50424

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the MediaTek MT7921 WiFi driver in the Linux kernel. When the mt7921_check_offload_capability() function fails to properly release memory allocated for firmware data, it can lead to gradual memory exhaustion. This affects Linux systems using the mt76 driver for MediaTek WiFi hardware.

💻 Affected Systems

Products:
  • Linux kernel with mt76 WiFi driver
Versions: Linux kernel versions with vulnerable mt76 driver before fixes in stable commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with MediaTek MT7921 WiFi hardware using the mt76 driver. Requires specific hardware to be vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could lead to kernel memory exhaustion, causing system instability, crashes, or denial of service on affected devices.

🟠

Likely Case

Gradual memory consumption over time leading to degraded system performance and potential service interruptions requiring reboots.

🟢

If Mitigated

Minimal impact with proper monitoring and memory management controls in place.

🌐 Internet-Facing: LOW - Requires local access or specific WiFi driver interaction, not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Affects internal systems with vulnerable WiFi hardware, could be triggered by normal WiFi operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering the specific code path in the WiFi driver, likely through WiFi operations. No known active exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in Linux kernel stable commits: 47180ecf4541146836c5307c1d5526f8ac6a5a6d and ead3cffd7510dc635d84cd4ea9dd1974fcb69a35

Vendor Advisory: https://git.kernel.org/stable/c/47180ecf4541146836c5307c1d5526f8ac6a5a6d

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable MT7921 WiFi

linux

Temporarily disable the vulnerable WiFi hardware if not required

sudo modprobe -r mt7921e
sudo modprobe -r mt7921s
sudo modprobe -r mt7921u

🧯 If You Can't Patch

  • Monitor system memory usage for abnormal consumption patterns
  • Implement regular system reboots to clear accumulated memory leaks

🔍 How to Verify

Check if Vulnerable:

Check if system has MT7921 WiFi hardware and vulnerable kernel version: lspci | grep -i mediatek && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond vulnerable commits and check dmesg for mt76 driver loading without errors

📡 Detection & Monitoring

Log Indicators:

  • Kernel oom-killer events
  • Increasing memory usage in /proc/meminfo
  • mt76 driver error messages in dmesg

Network Indicators:

  • WiFi connectivity issues on affected hardware

SIEM Query:

source="kernel" AND ("mt76" OR "mt7921") AND ("memory" OR "leak" OR "oom")

🔗 References

📤 Share & Export