CVE-2021-47014: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_ct: fix wild memory access when clearing fragments while testing re-assembly/re-fragmentation using act_ct, it's possible to observe a crash like the following one: KASAN: maybe wild-memory-access in range [0x0001000000000448-0x000100000000044f] CPU: 50 PID: 0 Comm: swapper/50 Tainted: G S 5.12.0-rc7+ #424 Hardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.4.3 01/17/2017 RIP: 0010:inet_frag_rbtree_purge+0x50/0xc0 Code: 00 fc ff df 48 89 c3 31 ed 48 89 df e8 a9 7a 38 ff 4c 89 fe 48 89 df 49 89 c6 e8 5b 3a 38 ff 48 8d 7b 40 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 75 59 48 8d bb d0 00 00 00 4c 8b 6b 40 48 89 f8 48 RSP: 0018:ffff888c31449db8 EFLAGS: 00010203 RAX: 0000200000000089 RBX: 000100000000040e RCX: ffffffff989eb960 RDX: 0000000000000140 RSI: ffffffff97cfb977 RDI: 000100000000044e RBP: 0000000000000900 R08: 0000000000000000 R09: ffffed1186289350 R10: 0000000000000003 R11: ffffed1186289350 R12: dffffc0000000000 R13: 000100000000040e R14: 0000000000000000 R15: ffff888155e02160 FS: 0000000000000000(0000) GS:ffff888c31440000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005600cb70a5b8 CR3: 0000000a2c014005 CR4: 00000000003706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <IRQ> inet_frag_destroy+0xa9/0x150 call_timer_fn+0x2d/0x180 run_timer_softirq+0x4fe/0xe70 __do_softirq+0x197/0x5a0 irq_exit_rcu+0x1de/0x200 sysvec_apic_timer_interrupt+0x6b/0x80 </IRQ> when act_ct temporarily stores an IP fragment, restoring the skb qdisc cb results in putting random data in FRAG_CB(), and this causes those "wild" memory accesses later, when the rbtree is purged. Never overwrite the skb cb in case tcf_ct_handle_fragments() returns -EINPROGRESS.
AI Analysis
Technical Summary
CVE-2021-47014 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically within the act_ct (connection tracking action) module. The flaw arises during the handling of IP packet fragments when using act_ct for re-assembly and re-fragmentation. The vulnerability manifests as a wild memory access caused by improper clearing of fragment data structures. More precisely, when act_ct temporarily stores an IP fragment, it incorrectly restores the socket buffer's (skb) queueing discipline control block (qdisc cb), leading to random data being placed in the fragment control block (FRAG_CB()). This improper memory handling results in out-of-bounds or wild memory accesses during the purging of the red-black tree (rbtree) that manages IP fragments, causing kernel crashes or potential memory corruption. The issue was observed in Linux kernel version 5.12.0-rc7+ and is triggered when tcf_ct_handle_fragments() returns -EINPROGRESS, indicating that fragment processing is incomplete. The root cause is the overwriting of skb control block data when it should be preserved, leading to use-after-free or invalid pointer dereferences. Although no public exploits are currently known, the vulnerability can cause system instability or denial of service (DoS) due to kernel panics. The flaw affects specific Linux kernel commits identified by their hashes, indicating it impacts certain kernel versions prior to the fix. The vulnerability was addressed by ensuring the skb control block is not overwritten when fragment processing is incomplete, preventing wild memory accesses during fragment purging.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions with act_ct enabled, especially those handling fragmented IP traffic in network-intensive environments such as data centers, cloud infrastructures, and telecommunications. Exploitation could lead to kernel crashes resulting in denial of service, disrupting critical services and operations. In environments where Linux servers act as routers, firewalls, or perform network packet inspection, this vulnerability could be triggered by crafted fragmented packets, potentially from internal or external sources. While no direct evidence of privilege escalation or remote code execution exists, the instability caused could be leveraged as part of a broader attack chain. Disruptions in critical infrastructure, financial services, or government networks relying on Linux-based systems could have cascading effects. Additionally, the vulnerability could be exploited to degrade service availability or cause unexpected reboots, impacting compliance with European regulations on service continuity and data protection. The lack of known exploits reduces immediate risk, but the potential for denial of service in key network components remains a concern.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched, ensuring that the fix preventing skb control block overwrites during fragment handling is applied. Network administrators should audit systems to identify kernels with the affected commit hashes and schedule timely upgrades. For environments where immediate patching is not feasible, implementing network-level controls to filter or drop suspicious fragmented IP packets can reduce exposure. Monitoring kernel logs for KASAN (Kernel Address Sanitizer) warnings or unusual crashes related to inet_frag or act_ct modules can help detect attempts to trigger the vulnerability. Additionally, disabling or limiting the use of act_ct in network scheduling configurations where it is not essential can reduce the attack surface. Organizations should also review firewall and intrusion detection system rules to detect anomalous fragmented packet patterns. Finally, maintaining robust incident response plans to quickly address potential denial of service incidents caused by kernel crashes is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2021-47014: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_ct: fix wild memory access when clearing fragments while testing re-assembly/re-fragmentation using act_ct, it's possible to observe a crash like the following one: KASAN: maybe wild-memory-access in range [0x0001000000000448-0x000100000000044f] CPU: 50 PID: 0 Comm: swapper/50 Tainted: G S 5.12.0-rc7+ #424 Hardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.4.3 01/17/2017 RIP: 0010:inet_frag_rbtree_purge+0x50/0xc0 Code: 00 fc ff df 48 89 c3 31 ed 48 89 df e8 a9 7a 38 ff 4c 89 fe 48 89 df 49 89 c6 e8 5b 3a 38 ff 48 8d 7b 40 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 75 59 48 8d bb d0 00 00 00 4c 8b 6b 40 48 89 f8 48 RSP: 0018:ffff888c31449db8 EFLAGS: 00010203 RAX: 0000200000000089 RBX: 000100000000040e RCX: ffffffff989eb960 RDX: 0000000000000140 RSI: ffffffff97cfb977 RDI: 000100000000044e RBP: 0000000000000900 R08: 0000000000000000 R09: ffffed1186289350 R10: 0000000000000003 R11: ffffed1186289350 R12: dffffc0000000000 R13: 000100000000040e R14: 0000000000000000 R15: ffff888155e02160 FS: 0000000000000000(0000) GS:ffff888c31440000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005600cb70a5b8 CR3: 0000000a2c014005 CR4: 00000000003706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <IRQ> inet_frag_destroy+0xa9/0x150 call_timer_fn+0x2d/0x180 run_timer_softirq+0x4fe/0xe70 __do_softirq+0x197/0x5a0 irq_exit_rcu+0x1de/0x200 sysvec_apic_timer_interrupt+0x6b/0x80 </IRQ> when act_ct temporarily stores an IP fragment, restoring the skb qdisc cb results in putting random data in FRAG_CB(), and this causes those "wild" memory accesses later, when the rbtree is purged. Never overwrite the skb cb in case tcf_ct_handle_fragments() returns -EINPROGRESS.
AI-Powered Analysis
Technical Analysis
CVE-2021-47014 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically within the act_ct (connection tracking action) module. The flaw arises during the handling of IP packet fragments when using act_ct for re-assembly and re-fragmentation. The vulnerability manifests as a wild memory access caused by improper clearing of fragment data structures. More precisely, when act_ct temporarily stores an IP fragment, it incorrectly restores the socket buffer's (skb) queueing discipline control block (qdisc cb), leading to random data being placed in the fragment control block (FRAG_CB()). This improper memory handling results in out-of-bounds or wild memory accesses during the purging of the red-black tree (rbtree) that manages IP fragments, causing kernel crashes or potential memory corruption. The issue was observed in Linux kernel version 5.12.0-rc7+ and is triggered when tcf_ct_handle_fragments() returns -EINPROGRESS, indicating that fragment processing is incomplete. The root cause is the overwriting of skb control block data when it should be preserved, leading to use-after-free or invalid pointer dereferences. Although no public exploits are currently known, the vulnerability can cause system instability or denial of service (DoS) due to kernel panics. The flaw affects specific Linux kernel commits identified by their hashes, indicating it impacts certain kernel versions prior to the fix. The vulnerability was addressed by ensuring the skb control block is not overwritten when fragment processing is incomplete, preventing wild memory accesses during fragment purging.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions with act_ct enabled, especially those handling fragmented IP traffic in network-intensive environments such as data centers, cloud infrastructures, and telecommunications. Exploitation could lead to kernel crashes resulting in denial of service, disrupting critical services and operations. In environments where Linux servers act as routers, firewalls, or perform network packet inspection, this vulnerability could be triggered by crafted fragmented packets, potentially from internal or external sources. While no direct evidence of privilege escalation or remote code execution exists, the instability caused could be leveraged as part of a broader attack chain. Disruptions in critical infrastructure, financial services, or government networks relying on Linux-based systems could have cascading effects. Additionally, the vulnerability could be exploited to degrade service availability or cause unexpected reboots, impacting compliance with European regulations on service continuity and data protection. The lack of known exploits reduces immediate risk, but the potential for denial of service in key network components remains a concern.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched, ensuring that the fix preventing skb control block overwrites during fragment handling is applied. Network administrators should audit systems to identify kernels with the affected commit hashes and schedule timely upgrades. For environments where immediate patching is not feasible, implementing network-level controls to filter or drop suspicious fragmented IP packets can reduce exposure. Monitoring kernel logs for KASAN (Kernel Address Sanitizer) warnings or unusual crashes related to inet_frag or act_ct modules can help detect attempts to trigger the vulnerability. Additionally, disabling or limiting the use of act_ct in network scheduling configurations where it is not essential can reduce the attack surface. Organizations should also review firewall and intrusion detection system rules to detect anomalous fragmented packet patterns. Finally, maintaining robust incident response plans to quickly address potential denial of service incidents caused by kernel crashes is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-27T18:42:55.953Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9821c4522896dcbddff5
Added to database: 5/21/2025, 9:08:49 AM
Last enriched: 6/28/2025, 4:41:41 AM
Last updated: 8/12/2025, 6:21:55 AM
Views: 13
Related Threats
CVE-2025-5048: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk AutoCAD
HighCVE-2025-5047: CWE-457: Use of Uninitialized Variable in Autodesk AutoCAD
HighCVE-2025-5046: CWE-125 Out-of-Bounds Read in Autodesk AutoCAD
HighCVE-2025-54466: CWE-94 Improper Control of Generation of Code ('Code Injection') in Apache Software Foundation Apache OFBiz
CriticalCVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.