Skip to main content

CVE-2021-47633: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47633cvecve-2021-47633
Published: Wed Feb 26 2025 (02/26/2025, 01:54:08 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 The bug was found during fuzzing. Stacktrace locates it in ath5k_eeprom_convert_pcal_info_5111. When none of the curve is selected in the loop, idx can go up to AR5K_EEPROM_N_PD_CURVES. The line makes pd out of bound. pd = &chinfo[pier].pd_curves[idx]; There are many OOB writes using pd later in the code. So I added a sanity check for idx. Checks for other loops involving AR5K_EEPROM_N_PD_CURVES are not needed as the loop index is not used outside the loops. The patch is NOT tested with real device. The following is the fuzzing report BUG: KASAN: slab-out-of-bounds in ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k] Write of size 1 at addr ffff8880174a4d60 by task modprobe/214 CPU: 0 PID: 214 Comm: modprobe Not tainted 5.6.0 #1 Call Trace: dump_stack+0x76/0xa0 print_address_description.constprop.0+0x16/0x200 ? ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k] ? ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k] __kasan_report.cold+0x37/0x7c ? ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k] kasan_report+0xe/0x20 ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k] ? apic_timer_interrupt+0xa/0x20 ? ath5k_eeprom_init_11a_pcal_freq+0xbc0/0xbc0 [ath5k] ? ath5k_pci_eeprom_read+0x228/0x3c0 [ath5k] ath5k_eeprom_init+0x2513/0x6290 [ath5k] ? ath5k_eeprom_init_11a_pcal_freq+0xbc0/0xbc0 [ath5k] ? usleep_range+0xb8/0x100 ? apic_timer_interrupt+0xa/0x20 ? ath5k_eeprom_read_pcal_info_2413+0x2f20/0x2f20 [ath5k] ath5k_hw_init+0xb60/0x1970 [ath5k] ath5k_init_ah+0x6fe/0x2530 [ath5k] ? kasprintf+0xa6/0xe0 ? ath5k_stop+0x140/0x140 [ath5k] ? _dev_notice+0xf6/0xf6 ? apic_timer_interrupt+0xa/0x20 ath5k_pci_probe.cold+0x29a/0x3d6 [ath5k] ? ath5k_pci_eeprom_read+0x3c0/0x3c0 [ath5k] ? mutex_lock+0x89/0xd0 ? ath5k_pci_eeprom_read+0x3c0/0x3c0 [ath5k] local_pci_probe+0xd3/0x160 pci_device_probe+0x23f/0x3e0 ? pci_device_remove+0x280/0x280 ? pci_device_remove+0x280/0x280 really_probe+0x209/0x5d0

AI-Powered Analysis

AILast updated: 07/04/2025, 06:42:42 UTC

Technical Analysis

CVE-2021-47633 is a vulnerability identified in the Linux kernel's ath5k wireless driver, specifically within the function ath5k_eeprom_read_pcal_info_5111. The flaw is an out-of-bounds (OOB) write caused by improper bounds checking on an index variable 'idx' when accessing an array of power calibration curves (pd_curves). During the execution of the function, if none of the expected curves are selected in a loop, 'idx' can increment to a value equal to AR5K_EEPROM_N_PD_CURVES, which is outside the valid range of the array indices. This leads to an out-of-bounds write operation to memory, potentially corrupting adjacent memory regions. The vulnerability was discovered through fuzz testing and is confirmed by a Kernel Address Sanitizer (KASAN) report indicating a slab-out-of-bounds write triggered by the modprobe process. The stack trace shows the issue occurs during the initialization of the ath5k PCI device, specifically in EEPROM reading and power calibration frequency initialization routines. Although the patch adds a sanity check to prevent the out-of-bounds access, it has not been tested on real hardware devices. The vulnerability affects Linux kernel versions containing the specified commit hash 8e218fb24faef0bfe95bc91b3c05261e20439527 and likely impacts all distributions using vulnerable kernel versions with the ath5k driver enabled. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the ath5k wireless driver enabled, which is common in devices using Atheros 5xxx series wireless chipsets. The out-of-bounds write could lead to kernel memory corruption, potentially causing system instability, crashes (denial of service), or in a worst-case scenario, privilege escalation if exploited by a local attacker. Since the flaw is triggered during device initialization (e.g., modprobe loading the driver), an attacker with local access could exploit this vulnerability to execute arbitrary code in kernel space or cause a denial of service. This is particularly concerning for critical infrastructure, enterprise servers, and embedded systems in sectors such as telecommunications, manufacturing, and government agencies across Europe that rely on Linux-based systems with wireless capabilities. The lack of remote exploitability reduces the risk from external attackers but does not eliminate the threat from insiders or compromised local users. The vulnerability's impact on confidentiality, integrity, and availability is significant if exploited, as kernel-level compromise can bypass most security controls.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions where this vulnerability is patched. Since the patch is not yet tested on real devices, thorough testing in controlled environments is recommended before wide deployment. Organizations should audit their systems to identify devices using the ath5k driver and assess whether they are running vulnerable kernel versions. If immediate patching is not feasible, disabling the ath5k driver or unloading the module where wireless connectivity is not required can mitigate exposure. Additionally, enforcing strict local user access controls and monitoring for unusual modprobe or kernel module loading activities can help detect exploitation attempts. Employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), and enabling kernel lockdown features where applicable, can reduce exploitation likelihood. Finally, organizations should maintain up-to-date intrusion detection and prevention systems capable of identifying anomalous kernel behavior or crashes related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:48:21.518Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aebf5a

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:42:42 AM

Last updated: 8/17/2025, 6:47:59 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats