Skip to main content

CVE-2021-46913: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-46913cvecve-2021-46913
Published: Tue Feb 27 2024 (02/27/2024, 06:53:52 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: clone set element expression template memcpy() breaks when using connlimit in set elements. Use nft_expr_clone() to initialize the connlimit expression list, otherwise connlimit garbage collector crashes when walking on the list head copy. [ 493.064656] Workqueue: events_power_efficient nft_rhash_gc [nf_tables] [ 493.064685] RIP: 0010:find_or_evict+0x5a/0x90 [nf_conncount] [ 493.064694] Code: 2b 43 40 83 f8 01 77 0d 48 c7 c0 f5 ff ff ff 44 39 63 3c 75 df 83 6d 18 01 48 8b 43 08 48 89 de 48 8b 13 48 8b 3d ee 2f 00 00 <48> 89 42 08 48 89 10 48 b8 00 01 00 00 00 00 ad de 48 89 03 48 83 [ 493.064699] RSP: 0018:ffffc90000417dc0 EFLAGS: 00010297 [ 493.064704] RAX: 0000000000000000 RBX: ffff888134f38410 RCX: 0000000000000000 [ 493.064708] RDX: 0000000000000000 RSI: ffff888134f38410 RDI: ffff888100060cc0 [ 493.064711] RBP: ffff88812ce594a8 R08: ffff888134f38438 R09: 00000000ebb9025c [ 493.064714] R10: ffffffff8219f838 R11: 0000000000000017 R12: 0000000000000001 [ 493.064718] R13: ffffffff82146740 R14: ffff888134f38410 R15: 0000000000000000 [ 493.064721] FS: 0000000000000000(0000) GS:ffff88840e440000(0000) knlGS:0000000000000000 [ 493.064725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 493.064729] CR2: 0000000000000008 CR3: 00000001330aa002 CR4: 00000000001706e0 [ 493.064733] Call Trace: [ 493.064737] nf_conncount_gc_list+0x8f/0x150 [nf_conncount] [ 493.064746] nft_rhash_gc+0x106/0x390 [nf_tables]

AI-Powered Analysis

AILast updated: 06/26/2025, 10:07:03 UTC

Technical Analysis

CVE-2021-46913 is a vulnerability identified in the Linux kernel's netfilter nftables subsystem, specifically related to the handling of connlimit expressions within set elements. The issue arises because the memcpy() function is improperly used when cloning set element expression templates for connlimit, instead of using the correct nft_expr_clone() function. This improper cloning leads to corruption or invalid memory references when the connlimit garbage collector attempts to traverse the copied list head, resulting in kernel crashes (as evidenced by the kernel panic and stack trace logs). The vulnerability affects the nf_conncount and nf_tables kernel modules, which are responsible for connection counting and packet filtering respectively. The root cause is a logic error in the kernel code that mishandles the cloning of expression templates, leading to use-after-free or invalid pointer dereferences during garbage collection of connection limit expressions. Although no known exploits are reported in the wild, the vulnerability can cause denial of service (DoS) conditions by crashing the kernel, potentially impacting system availability. The affected Linux kernel versions are not explicitly detailed beyond a hash, but the vulnerability is relevant to systems using nftables with connlimit expressions. No CVSS score has been assigned yet, and no patches or exploit code are currently publicly available. The vulnerability was published on 2024-02-27 and is recognized by CISA as enriched data, indicating its importance for security monitoring and mitigation.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability and stability of Linux-based systems that utilize nftables with connlimit expressions for network filtering and connection limiting. Many European enterprises, government agencies, and critical infrastructure providers rely on Linux servers and network appliances for firewalling and traffic control. An attacker able to trigger this vulnerability could cause kernel panics leading to system crashes and service interruptions, resulting in denial of service. This could disrupt business operations, especially for organizations running critical network services or hosting public-facing applications. While there is no evidence of privilege escalation or data confidentiality compromise, the loss of availability could have cascading effects on dependent services and compliance with regulatory uptime requirements. Additionally, the complexity of the vulnerability means that accidental misconfiguration or malformed traffic could inadvertently trigger the issue, increasing operational risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future exploitation once details become widely known.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is fixed once patches are released by the Linux kernel maintainers. Until patches are available, administrators should audit and potentially disable the use of connlimit expressions within nftables sets, especially in environments where stability and uptime are critical. Network administrators should monitor kernel logs for signs of nftables-related crashes or anomalies. Implementing strict input validation and filtering at perimeter devices can reduce the risk of malicious or malformed packets triggering the vulnerability. Additionally, organizations should employ robust system monitoring and automated reboot procedures to minimize downtime in case of kernel panics. For environments where immediate patching is not feasible, consider isolating vulnerable systems behind additional network layers or using alternative firewalling mechanisms that do not rely on the affected nftables features. Finally, maintain close communication with Linux distribution vendors and security advisories to apply updates promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-25T13:45:52.718Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea68f

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 10:07:03 AM

Last updated: 8/2/2025, 8:49:02 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats