CVE-2021-47022: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: mt76: mt7615: fix memleak when mt7615_unregister_device() mt7615_tx_token_put() should get call before mt76_free_pending_txwi().
AI Analysis
Technical Summary
CVE-2021-47022 is a vulnerability identified in the Linux kernel specifically related to the mt76 wireless driver, which supports MediaTek Wi-Fi chipsets, including the mt7615 device. The issue arises from improper memory management during the unregistration process of the mt7615 device. Specifically, the function mt7615_tx_token_put() should be called before mt76_free_pending_txwi() to correctly release allocated resources and avoid memory leaks. Failure to do so results in a memory leak when mt7615_unregister_device() is invoked. While the vulnerability is primarily a memory leak rather than a direct code execution or privilege escalation flaw, it can lead to resource exhaustion over time, potentially degrading system stability or causing denial of service (DoS) conditions. The vulnerability does not require user interaction or authentication to be triggered but depends on the presence and use of the affected wireless driver. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned. The fix involves correcting the order of function calls to ensure proper cleanup of transmission tokens before freeing pending transmission work items.
Potential Impact
For European organizations, the impact of CVE-2021-47022 is primarily related to system stability and availability. Organizations relying on Linux systems with MediaTek mt7615 wireless chipsets, especially in environments with high wireless traffic or frequent device unregistration events (such as dynamic network configurations or embedded systems), may experience gradual memory leaks leading to resource exhaustion. This can cause degraded network performance, system slowdowns, or crashes, impacting critical infrastructure, enterprise networks, or industrial control systems. Although the vulnerability does not directly compromise confidentiality or integrity, the resulting denial of service could disrupt business operations, particularly in sectors dependent on reliable wireless connectivity. Given the widespread use of Linux in servers, IoT devices, and networking equipment across Europe, the vulnerability could affect a broad range of systems if the affected driver is in use. However, the lack of known exploits and the technical nature of the flaw reduce the immediate risk of targeted attacks.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the latest patched versions that address CVE-2021-47022. Specifically, kernel versions incorporating the fix that ensures mt7615_tx_token_put() is called before mt76_free_pending_txwi() should be deployed. System administrators should audit their environments to identify devices using the mt7615 wireless chipset and verify the kernel versions in use. For embedded or specialized systems where kernel updates may be challenging, consider isolating or disabling the affected wireless interfaces if feasible. Monitoring system logs and resource usage for signs of memory leaks or abnormal behavior related to wireless device unregistration can provide early detection. Additionally, organizations should maintain robust patch management processes to promptly apply Linux kernel updates. Network segmentation and limiting exposure of affected devices to untrusted networks can further reduce risk. Finally, engaging with Linux distribution vendors and hardware manufacturers to confirm the availability and deployment of patches is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2021-47022: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: mt76: mt7615: fix memleak when mt7615_unregister_device() mt7615_tx_token_put() should get call before mt76_free_pending_txwi().
AI-Powered Analysis
Technical Analysis
CVE-2021-47022 is a vulnerability identified in the Linux kernel specifically related to the mt76 wireless driver, which supports MediaTek Wi-Fi chipsets, including the mt7615 device. The issue arises from improper memory management during the unregistration process of the mt7615 device. Specifically, the function mt7615_tx_token_put() should be called before mt76_free_pending_txwi() to correctly release allocated resources and avoid memory leaks. Failure to do so results in a memory leak when mt7615_unregister_device() is invoked. While the vulnerability is primarily a memory leak rather than a direct code execution or privilege escalation flaw, it can lead to resource exhaustion over time, potentially degrading system stability or causing denial of service (DoS) conditions. The vulnerability does not require user interaction or authentication to be triggered but depends on the presence and use of the affected wireless driver. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned. The fix involves correcting the order of function calls to ensure proper cleanup of transmission tokens before freeing pending transmission work items.
Potential Impact
For European organizations, the impact of CVE-2021-47022 is primarily related to system stability and availability. Organizations relying on Linux systems with MediaTek mt7615 wireless chipsets, especially in environments with high wireless traffic or frequent device unregistration events (such as dynamic network configurations or embedded systems), may experience gradual memory leaks leading to resource exhaustion. This can cause degraded network performance, system slowdowns, or crashes, impacting critical infrastructure, enterprise networks, or industrial control systems. Although the vulnerability does not directly compromise confidentiality or integrity, the resulting denial of service could disrupt business operations, particularly in sectors dependent on reliable wireless connectivity. Given the widespread use of Linux in servers, IoT devices, and networking equipment across Europe, the vulnerability could affect a broad range of systems if the affected driver is in use. However, the lack of known exploits and the technical nature of the flaw reduce the immediate risk of targeted attacks.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the latest patched versions that address CVE-2021-47022. Specifically, kernel versions incorporating the fix that ensures mt7615_tx_token_put() is called before mt76_free_pending_txwi() should be deployed. System administrators should audit their environments to identify devices using the mt7615 wireless chipset and verify the kernel versions in use. For embedded or specialized systems where kernel updates may be challenging, consider isolating or disabling the affected wireless interfaces if feasible. Monitoring system logs and resource usage for signs of memory leaks or abnormal behavior related to wireless device unregistration can provide early detection. Additionally, organizations should maintain robust patch management processes to promptly apply Linux kernel updates. Network segmentation and limiting exposure of affected devices to untrusted networks can further reduce risk. Finally, engaging with Linux distribution vendors and hardware manufacturers to confirm the availability and deployment of patches is recommended.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-27T18:42:55.954Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe9a90
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 7:27:34 PM
Last updated: 8/18/2025, 11:08:47 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.