CVE-2021-47479: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8712: fix use-after-free in rtl8712_dl_fw Syzbot reported use-after-free in rtl8712_dl_fw(). The problem was in race condition between r871xu_dev_remove() ->ndo_open() callback. It's easy to see from crash log, that driver accesses released firmware in ->ndo_open() callback. It may happen, since driver was releasing firmware _before_ unregistering netdev. Fix it by moving unregister_netdev() before cleaning up resources. Call Trace: ... rtl871x_open_fw drivers/staging/rtl8712/hal_init.c:83 [inline] rtl8712_dl_fw+0xd95/0xe10 drivers/staging/rtl8712/hal_init.c:170 rtl8712_hal_init drivers/staging/rtl8712/hal_init.c:330 [inline] rtl871x_hal_init+0xae/0x180 drivers/staging/rtl8712/hal_init.c:394 netdev_open+0xe6/0x6c0 drivers/staging/rtl8712/os_intfs.c:380 __dev_open+0x2bc/0x4d0 net/core/dev.c:1484 Freed by task 1306: ... release_firmware+0x1b/0x30 drivers/base/firmware_loader/main.c:1053 r871xu_dev_remove+0xcc/0x2c0 drivers/staging/rtl8712/usb_intf.c:599 usb_unbind_interface+0x1d8/0x8d0 drivers/usb/core/driver.c:458
AI Analysis
Technical Summary
CVE-2021-47479 is a use-after-free vulnerability identified in the Linux kernel's staging driver rtl8712, which supports certain Realtek wireless USB devices. The flaw arises from a race condition between the device removal function (r871xu_dev_remove) and the network device open callback (ndo_open). Specifically, the driver releases firmware resources before unregistering the network device, leading to a scenario where the ndo_open callback accesses firmware memory that has already been freed. This improper ordering of resource cleanup and device unregistration can cause the kernel to dereference invalid memory, potentially resulting in system crashes or undefined behavior. The vulnerability was reported by Syzbot, an automated kernel fuzzing tool, and fixed by reordering the cleanup sequence to unregister the network device before releasing firmware resources. The issue affects Linux kernel versions containing the vulnerable staging rtl8712 driver code, which is typically used for Realtek 8712 wireless USB chipsets. No public exploits are known at this time, and no CVSS score has been assigned yet. The vulnerability is technical in nature, involving kernel memory management and device driver lifecycle handling, and could be triggered by operations involving the affected wireless USB device, such as unplugging or reinitializing the device while the driver is active.
Potential Impact
For European organizations, the impact of CVE-2021-47479 depends largely on the deployment of Linux systems using the vulnerable rtl8712 wireless USB driver. If exploited, the use-after-free can lead to kernel crashes (denial of service) or potentially enable privilege escalation or arbitrary code execution within the kernel context, although no public exploits currently demonstrate this. Organizations relying on Linux servers or endpoints with Realtek 8712-based wireless USB devices could experience system instability or outages, affecting availability. Confidentiality and integrity impacts are less certain but cannot be ruled out given the kernel-level nature of the flaw. The vulnerability could be exploited locally or via device manipulation, requiring physical or logical access to the affected hardware. Given the widespread use of Linux in European enterprises, especially in IT infrastructure and embedded systems, this vulnerability poses a moderate risk if the affected hardware is present. However, the staging driver status and limited affected hardware reduce the overall exposure compared to more broadly deployed kernel components.
Mitigation Recommendations
To mitigate CVE-2021-47479, European organizations should: 1) Apply the latest Linux kernel updates that include the fix for this vulnerability, ensuring the rtl8712 staging driver is updated to the patched version where unregister_netdev() is called before releasing firmware. 2) Identify and inventory systems using Realtek 8712 wireless USB devices and assess their exposure. 3) Where possible, disable or remove the vulnerable rtl8712 driver if the hardware is not in use or replace affected wireless USB devices with supported, non-vulnerable alternatives. 4) Implement strict physical and logical access controls to prevent unauthorized manipulation of USB devices on critical systems. 5) Monitor system logs for kernel crashes or unusual behavior related to USB device operations that could indicate attempted exploitation. 6) For embedded or specialized Linux deployments, coordinate with vendors to obtain patched firmware or kernel versions. These steps go beyond generic advice by focusing on hardware inventory, driver management, and operational controls specific to the vulnerable component.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2021-47479: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8712: fix use-after-free in rtl8712_dl_fw Syzbot reported use-after-free in rtl8712_dl_fw(). The problem was in race condition between r871xu_dev_remove() ->ndo_open() callback. It's easy to see from crash log, that driver accesses released firmware in ->ndo_open() callback. It may happen, since driver was releasing firmware _before_ unregistering netdev. Fix it by moving unregister_netdev() before cleaning up resources. Call Trace: ... rtl871x_open_fw drivers/staging/rtl8712/hal_init.c:83 [inline] rtl8712_dl_fw+0xd95/0xe10 drivers/staging/rtl8712/hal_init.c:170 rtl8712_hal_init drivers/staging/rtl8712/hal_init.c:330 [inline] rtl871x_hal_init+0xae/0x180 drivers/staging/rtl8712/hal_init.c:394 netdev_open+0xe6/0x6c0 drivers/staging/rtl8712/os_intfs.c:380 __dev_open+0x2bc/0x4d0 net/core/dev.c:1484 Freed by task 1306: ... release_firmware+0x1b/0x30 drivers/base/firmware_loader/main.c:1053 r871xu_dev_remove+0xcc/0x2c0 drivers/staging/rtl8712/usb_intf.c:599 usb_unbind_interface+0x1d8/0x8d0 drivers/usb/core/driver.c:458
AI-Powered Analysis
Technical Analysis
CVE-2021-47479 is a use-after-free vulnerability identified in the Linux kernel's staging driver rtl8712, which supports certain Realtek wireless USB devices. The flaw arises from a race condition between the device removal function (r871xu_dev_remove) and the network device open callback (ndo_open). Specifically, the driver releases firmware resources before unregistering the network device, leading to a scenario where the ndo_open callback accesses firmware memory that has already been freed. This improper ordering of resource cleanup and device unregistration can cause the kernel to dereference invalid memory, potentially resulting in system crashes or undefined behavior. The vulnerability was reported by Syzbot, an automated kernel fuzzing tool, and fixed by reordering the cleanup sequence to unregister the network device before releasing firmware resources. The issue affects Linux kernel versions containing the vulnerable staging rtl8712 driver code, which is typically used for Realtek 8712 wireless USB chipsets. No public exploits are known at this time, and no CVSS score has been assigned yet. The vulnerability is technical in nature, involving kernel memory management and device driver lifecycle handling, and could be triggered by operations involving the affected wireless USB device, such as unplugging or reinitializing the device while the driver is active.
Potential Impact
For European organizations, the impact of CVE-2021-47479 depends largely on the deployment of Linux systems using the vulnerable rtl8712 wireless USB driver. If exploited, the use-after-free can lead to kernel crashes (denial of service) or potentially enable privilege escalation or arbitrary code execution within the kernel context, although no public exploits currently demonstrate this. Organizations relying on Linux servers or endpoints with Realtek 8712-based wireless USB devices could experience system instability or outages, affecting availability. Confidentiality and integrity impacts are less certain but cannot be ruled out given the kernel-level nature of the flaw. The vulnerability could be exploited locally or via device manipulation, requiring physical or logical access to the affected hardware. Given the widespread use of Linux in European enterprises, especially in IT infrastructure and embedded systems, this vulnerability poses a moderate risk if the affected hardware is present. However, the staging driver status and limited affected hardware reduce the overall exposure compared to more broadly deployed kernel components.
Mitigation Recommendations
To mitigate CVE-2021-47479, European organizations should: 1) Apply the latest Linux kernel updates that include the fix for this vulnerability, ensuring the rtl8712 staging driver is updated to the patched version where unregister_netdev() is called before releasing firmware. 2) Identify and inventory systems using Realtek 8712 wireless USB devices and assess their exposure. 3) Where possible, disable or remove the vulnerable rtl8712 driver if the hardware is not in use or replace affected wireless USB devices with supported, non-vulnerable alternatives. 4) Implement strict physical and logical access controls to prevent unauthorized manipulation of USB devices on critical systems. 5) Monitor system logs for kernel crashes or unusual behavior related to USB device operations that could indicate attempted exploitation. 6) For embedded or specialized Linux deployments, coordinate with vendors to obtain patched firmware or kernel versions. These steps go beyond generic advice by focusing on hardware inventory, driver management, and operational controls specific to the vulnerable component.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-22T06:20:56.200Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9822c4522896dcbde10a
Added to database: 5/21/2025, 9:08:50 AM
Last enriched: 6/28/2025, 5:11:50 AM
Last updated: 7/30/2025, 8:12:45 PM
Views: 8
Related Threats
CVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.