Skip to main content

CVE-2021-47602: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47602cvecve-2021-47602
Published: Wed Jun 19 2024 (06/19/2024, 14:54:02 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: mac80211: track only QoS data frames for admission control For admission control, obviously all of that only works for QoS data frames, otherwise we cannot even access the QoS field in the header. Syzbot reported (see below) an uninitialized value here due to a status of a non-QoS nullfunc packet, which isn't even long enough to contain the QoS header. Fix this to only do anything for QoS data packets.

AI-Powered Analysis

AILast updated: 06/30/2025, 15:24:46 UTC

Technical Analysis

CVE-2021-47602 is a vulnerability identified in the Linux kernel's mac80211 subsystem, which is responsible for handling wireless networking functions. The vulnerability arises from improper handling of non-QoS (Quality of Service) data frames during admission control processes. Specifically, the kernel code attempted to access the QoS field in the header of all frames, but non-QoS null function packets do not contain this field and are shorter than expected. This leads to the use of uninitialized values, which can cause undefined behavior or potential security issues. The root cause is that admission control logic was not properly restricted to only QoS data frames, resulting in attempts to process frames that lack the necessary QoS header. The fix involves modifying the admission control code to only operate on QoS data packets, thereby preventing access to invalid memory regions or uninitialized data. This vulnerability was reported by Syzbot, an automated kernel fuzzer, and has been addressed in recent Linux kernel updates. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The affected versions are identified by specific kernel commit hashes, indicating that the issue is present in certain development or stable branches prior to patching. This vulnerability is technical in nature and relates to the internal packet processing logic of the Linux wireless stack, which could potentially be triggered by crafted wireless frames.

Potential Impact

For European organizations, the impact of CVE-2021-47602 depends largely on their use of Linux-based systems with wireless networking capabilities, particularly those relying on the mac80211 subsystem. Since Linux is widely used in servers, embedded devices, IoT, and networking equipment, any device that processes wireless frames using the vulnerable kernel versions could be affected. Potential impacts include system instability, crashes, or denial of service due to the kernel accessing uninitialized memory. Although no direct remote code execution or privilege escalation has been reported, the undefined behavior could be leveraged in complex attack scenarios to disrupt wireless communications or degrade network reliability. This is particularly relevant for critical infrastructure, telecommunications providers, and enterprises with large Linux deployments. The vulnerability could also affect embedded Linux devices used in industrial control systems or smart city applications across Europe. Given the absence of known exploits, the immediate risk is moderate, but organizations should remain vigilant and prioritize patching to prevent future exploitation attempts.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify all Linux systems using the mac80211 wireless stack, especially those running kernel versions prior to the patch commit referenced in CVE-2021-47602. 2) Apply the latest Linux kernel updates that include the fix restricting admission control to QoS data frames only. 3) For embedded or IoT devices where kernel updates are not straightforward, coordinate with device vendors to obtain patched firmware or consider network segmentation to isolate vulnerable devices. 4) Monitor wireless network traffic for unusual or malformed frames that could attempt to trigger the vulnerability. 5) Implement strict wireless network access controls and use strong authentication to limit exposure to potentially malicious wireless frames. 6) Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely remediation. 7) For critical systems, consider deploying kernel hardening techniques or additional runtime protections to mitigate risks from memory corruption issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-24T15:11:00.736Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe958f

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 3:24:46 PM

Last updated: 8/17/2025, 9:18:30 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats