CVE-2021-47064: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: mt76: fix potential DMA mapping leak With buf uninitialized in mt76_dma_tx_queue_skb_raw, its field skip_unmap could potentially inherit a non-zero value from stack garbage. If this happens, it will cause DMA mappings for MCU command frames to not be unmapped after completion
AI Analysis
Technical Summary
CVE-2021-47064 is a medium-severity vulnerability identified in the Linux kernel's mt76 wireless driver, which handles MediaTek 802.11 wireless chipsets. The flaw arises from improper initialization of a buffer in the function mt76_dma_tx_queue_skb_raw. Specifically, the field skip_unmap within this buffer can inherit a non-zero value from uninitialized stack memory (stack garbage). This causes a logic error where DMA (Direct Memory Access) mappings for MCU (Microcontroller Unit) command frames are not properly unmapped after their completion. DMA mapping is critical for ensuring that memory regions used for device communication are correctly managed and released. Failure to unmap these mappings can lead to resource leaks, potentially exhausting DMA mapping resources over time. While this vulnerability does not directly compromise confidentiality or integrity, it impacts availability by causing resource leakage that could degrade system performance or lead to denial of service conditions. The vulnerability is exploitable remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). However, no known exploits are currently reported in the wild. The affected versions correspond to specific Linux kernel commits prior to the patch. The issue was resolved by properly initializing the buffer to ensure skip_unmap is set correctly, preventing the leak. This vulnerability is relevant to systems running Linux kernels with the affected mt76 driver versions, particularly those using MediaTek wireless chipsets.
Potential Impact
For European organizations, the impact of CVE-2021-47064 primarily concerns systems relying on Linux-based infrastructure with MediaTek wireless hardware using the mt76 driver. This includes servers, embedded devices, and network equipment that utilize these chipsets. The resource leak caused by improper DMA unmapping can lead to gradual degradation of wireless communication performance or system instability, potentially resulting in denial of service. In critical environments such as telecommunications, industrial control systems, or enterprise networks, this could disrupt operations or reduce network reliability. Although the vulnerability does not allow direct code execution or data compromise, the availability impact can affect service continuity. Organizations with large-scale deployments of Linux-based wireless devices or embedded systems are at higher risk. Given the widespread use of Linux in European IT infrastructure and the presence of MediaTek chipsets in various devices, the vulnerability warrants attention to prevent potential service interruptions.
Mitigation Recommendations
To mitigate CVE-2021-47064, European organizations should: 1) Identify and inventory all Linux systems using the mt76 driver with MediaTek wireless chipsets. 2) Apply the official Linux kernel patches that address this vulnerability as soon as possible. If using distribution kernels, update to the latest kernel versions provided by the vendor that include the fix. 3) For embedded or custom Linux systems, rebuild the kernel with the patched mt76 driver. 4) Monitor system logs and wireless device performance for signs of resource exhaustion or instability that could indicate the presence of this issue. 5) Implement proactive resource monitoring for DMA mappings and wireless subsystem health to detect anomalies early. 6) Where feasible, isolate critical wireless systems or implement redundancy to minimize impact from potential service degradation. 7) Engage with hardware vendors to confirm chipset firmware updates or mitigations if applicable. These steps go beyond generic advice by focusing on targeted patching, inventory management, and operational monitoring specific to the mt76 driver and DMA resource management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2021-47064: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: mt76: fix potential DMA mapping leak With buf uninitialized in mt76_dma_tx_queue_skb_raw, its field skip_unmap could potentially inherit a non-zero value from stack garbage. If this happens, it will cause DMA mappings for MCU command frames to not be unmapped after completion
AI-Powered Analysis
Technical Analysis
CVE-2021-47064 is a medium-severity vulnerability identified in the Linux kernel's mt76 wireless driver, which handles MediaTek 802.11 wireless chipsets. The flaw arises from improper initialization of a buffer in the function mt76_dma_tx_queue_skb_raw. Specifically, the field skip_unmap within this buffer can inherit a non-zero value from uninitialized stack memory (stack garbage). This causes a logic error where DMA (Direct Memory Access) mappings for MCU (Microcontroller Unit) command frames are not properly unmapped after their completion. DMA mapping is critical for ensuring that memory regions used for device communication are correctly managed and released. Failure to unmap these mappings can lead to resource leaks, potentially exhausting DMA mapping resources over time. While this vulnerability does not directly compromise confidentiality or integrity, it impacts availability by causing resource leakage that could degrade system performance or lead to denial of service conditions. The vulnerability is exploitable remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). However, no known exploits are currently reported in the wild. The affected versions correspond to specific Linux kernel commits prior to the patch. The issue was resolved by properly initializing the buffer to ensure skip_unmap is set correctly, preventing the leak. This vulnerability is relevant to systems running Linux kernels with the affected mt76 driver versions, particularly those using MediaTek wireless chipsets.
Potential Impact
For European organizations, the impact of CVE-2021-47064 primarily concerns systems relying on Linux-based infrastructure with MediaTek wireless hardware using the mt76 driver. This includes servers, embedded devices, and network equipment that utilize these chipsets. The resource leak caused by improper DMA unmapping can lead to gradual degradation of wireless communication performance or system instability, potentially resulting in denial of service. In critical environments such as telecommunications, industrial control systems, or enterprise networks, this could disrupt operations or reduce network reliability. Although the vulnerability does not allow direct code execution or data compromise, the availability impact can affect service continuity. Organizations with large-scale deployments of Linux-based wireless devices or embedded systems are at higher risk. Given the widespread use of Linux in European IT infrastructure and the presence of MediaTek chipsets in various devices, the vulnerability warrants attention to prevent potential service interruptions.
Mitigation Recommendations
To mitigate CVE-2021-47064, European organizations should: 1) Identify and inventory all Linux systems using the mt76 driver with MediaTek wireless chipsets. 2) Apply the official Linux kernel patches that address this vulnerability as soon as possible. If using distribution kernels, update to the latest kernel versions provided by the vendor that include the fix. 3) For embedded or custom Linux systems, rebuild the kernel with the patched mt76 driver. 4) Monitor system logs and wireless device performance for signs of resource exhaustion or instability that could indicate the presence of this issue. 5) Implement proactive resource monitoring for DMA mappings and wireless subsystem health to detect anomalies early. 6) Where feasible, isolate critical wireless systems or implement redundancy to minimize impact from potential service degradation. 7) Engage with hardware vendors to confirm chipset firmware updates or mitigations if applicable. These steps go beyond generic advice by focusing on targeted patching, inventory management, and operational monitoring specific to the mt76 driver and DMA resource management.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-29T22:33:44.295Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe9bf5
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 8:41:08 PM
Last updated: 8/16/2025, 2:14:04 AM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.