Skip to main content

CVE-2021-47109: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47109cvecve-2021-47109
Published: Fri Mar 15 2024 (03/15/2024, 20:14:18 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: neighbour: allow NUD_NOARP entries to be forced GCed IFF_POINTOPOINT interfaces use NUD_NOARP entries for IPv6. It's possible to fill up the neighbour table with enough entries that it will overflow for valid connections after that. This behaviour is more prevalent after commit 58956317c8de ("neighbor: Improve garbage collection") is applied, as it prevents removal from entries that are not NUD_FAILED, unless they are more than 5s old.

AI-Powered Analysis

AILast updated: 06/30/2025, 21:54:48 UTC

Technical Analysis

CVE-2021-47109 is a vulnerability in the Linux kernel's neighbor subsystem, specifically related to the handling of neighbor table entries with the NUD_NOARP state. The neighbor table is a critical data structure used by the kernel to manage network layer to link layer address mappings, such as IPv6 addresses on point-to-point interfaces. The vulnerability arises because NUD_NOARP entries, which are used by IFF_POINTOPOINT interfaces for IPv6, can be forced to remain in the neighbor table without timely garbage collection. After the kernel commit 58956317c8de ("neighbor: Improve garbage collection"), the garbage collection mechanism was changed to prevent removal of entries unless they are marked NUD_FAILED or older than 5 seconds. This change inadvertently allows an attacker to fill the neighbor table with many NUD_NOARP entries, causing the table to overflow and preventing valid connections from being established. This can lead to denial of service conditions where legitimate network traffic is dropped or delayed due to neighbor table exhaustion. The vulnerability does not require user interaction or authentication, as it can be triggered by sending crafted network packets to the affected system. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The issue affects Linux kernel versions containing the specified commit and likely subsequent versions until patched.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to network infrastructure devices and servers running Linux kernels with the affected neighbor table garbage collection logic. The exhaustion of the neighbor table can cause denial of service by disrupting IPv6 connectivity on point-to-point interfaces, which may be used in VPNs, WAN links, or other critical network segments. This can impact availability of services, internal communications, and remote access solutions. Organizations relying on Linux-based routers, firewalls, or network appliances are particularly at risk. Given the increasing adoption of IPv6 in Europe and the widespread use of Linux in enterprise and governmental infrastructure, the potential for disruption is significant. While no data confidentiality or integrity compromise is directly indicated, the denial of service impact can affect business continuity and operational resilience. The lack of known exploits suggests the threat is currently theoretical, but the ease of triggering neighbor table exhaustion means attackers with network access could exploit this vulnerability to degrade or disrupt services.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems running kernels with the affected commit (58956317c8de) or versions released after it. 2) Apply vendor-provided patches or kernel updates that address the neighbor table garbage collection issue as soon as they become available. 3) Implement network segmentation and access controls to limit exposure of vulnerable systems to untrusted networks, reducing the attack surface. 4) Monitor neighbor table usage and network interface statistics for abnormal growth in NUD_NOARP entries, which may indicate exploitation attempts. 5) Consider deploying rate limiting or filtering on network traffic that can generate excessive neighbor entries, especially on point-to-point IPv6 interfaces. 6) Engage with Linux distribution security advisories and maintain up-to-date kernel versions to benefit from ongoing security improvements. 7) For critical infrastructure, plan for fallback or redundancy to maintain availability in case of neighbor table exhaustion attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-04T18:12:48.836Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9d53

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 9:54:48 PM

Last updated: 8/4/2025, 2:56:46 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats