CVE-2021-47223: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: bridge: fix vlan tunnel dst null pointer dereference This patch fixes a tunnel_dst null pointer dereference due to lockless access in the tunnel egress path. When deleting a vlan tunnel the tunnel_dst pointer is set to NULL without waiting a grace period (i.e. while it's still usable) and packets egressing are dereferencing it without checking. Use READ/WRITE_ONCE to annotate the lockless use of tunnel_id, use RCU for accessing tunnel_dst and make sure it is read only once and checked in the egress path. The dst is already properly RCU protected so we don't need to do anything fancy than to make sure tunnel_id and tunnel_dst are read only once and checked in the egress path.
AI Analysis
Technical Summary
CVE-2021-47223 is a vulnerability identified in the Linux kernel's network bridge component, specifically related to VLAN tunnel handling. The issue arises from a null pointer dereference in the tunnel destination (tunnel_dst) pointer during the tunnel egress path. The root cause is a race condition where the tunnel_dst pointer is set to NULL prematurely when deleting a VLAN tunnel, without waiting for a grace period to ensure that the pointer is no longer in use. Consequently, packets egressing through the tunnel may dereference this NULL pointer without proper validation, leading to a kernel crash or denial of service. The vulnerability stems from lockless access to tunnel_dst and tunnel_id variables, which are not properly synchronized. The patch resolves this by using READ/WRITE_ONCE annotations to enforce single read/write operations on tunnel_id, employing Read-Copy-Update (RCU) mechanisms to safely access tunnel_dst, and ensuring that tunnel_dst is read only once and checked before use in the egress path. This fix leverages existing RCU protections to prevent the race condition and null pointer dereference, thereby improving kernel stability and security. The vulnerability affects Linux kernel versions prior to the patch and is relevant to systems using VLAN tunnels in network bridging configurations.
Potential Impact
For European organizations, this vulnerability could lead to denial of service conditions on critical Linux-based network infrastructure that utilizes VLAN tunneling and bridging. Such infrastructure is common in data centers, cloud environments, and enterprise networks. An attacker capable of triggering this flaw could cause kernel panics or crashes, disrupting network connectivity and potentially impacting business operations, especially in sectors relying heavily on continuous network availability such as finance, telecommunications, and critical infrastructure. While no known exploits are currently reported in the wild, the vulnerability's nature as a kernel-level null pointer dereference means that exploitation could be straightforward if an attacker has access to the network path or the ability to send crafted packets. This could also facilitate further attacks if combined with other vulnerabilities. The impact on confidentiality and integrity is limited, as the vulnerability primarily causes availability issues. However, the disruption of network services could indirectly affect operational continuity and data access.
Mitigation Recommendations
European organizations should prioritize applying the official Linux kernel patch that addresses CVE-2021-47223 as soon as possible. Specifically, system administrators should: 1) Identify all Linux systems running vulnerable kernel versions that handle VLAN tunnels and bridging; 2) Schedule and deploy kernel updates that include the fix for this vulnerability, ensuring minimal downtime; 3) Where immediate patching is not feasible, consider temporarily disabling VLAN tunneling or bridging features if they are not essential, to reduce exposure; 4) Monitor network traffic for unusual patterns that might indicate attempts to exploit this vulnerability; 5) Employ kernel hardening techniques such as enabling kernel lockdown features and using security modules (e.g., SELinux, AppArmor) to limit the impact of potential crashes; 6) Maintain robust incident response plans to quickly recover from potential denial of service events; 7) Engage with Linux distribution vendors for backported patches if using long-term support kernels; and 8) Conduct thorough testing of patches in staging environments to ensure compatibility and stability before production deployment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2021-47223: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: bridge: fix vlan tunnel dst null pointer dereference This patch fixes a tunnel_dst null pointer dereference due to lockless access in the tunnel egress path. When deleting a vlan tunnel the tunnel_dst pointer is set to NULL without waiting a grace period (i.e. while it's still usable) and packets egressing are dereferencing it without checking. Use READ/WRITE_ONCE to annotate the lockless use of tunnel_id, use RCU for accessing tunnel_dst and make sure it is read only once and checked in the egress path. The dst is already properly RCU protected so we don't need to do anything fancy than to make sure tunnel_id and tunnel_dst are read only once and checked in the egress path.
AI-Powered Analysis
Technical Analysis
CVE-2021-47223 is a vulnerability identified in the Linux kernel's network bridge component, specifically related to VLAN tunnel handling. The issue arises from a null pointer dereference in the tunnel destination (tunnel_dst) pointer during the tunnel egress path. The root cause is a race condition where the tunnel_dst pointer is set to NULL prematurely when deleting a VLAN tunnel, without waiting for a grace period to ensure that the pointer is no longer in use. Consequently, packets egressing through the tunnel may dereference this NULL pointer without proper validation, leading to a kernel crash or denial of service. The vulnerability stems from lockless access to tunnel_dst and tunnel_id variables, which are not properly synchronized. The patch resolves this by using READ/WRITE_ONCE annotations to enforce single read/write operations on tunnel_id, employing Read-Copy-Update (RCU) mechanisms to safely access tunnel_dst, and ensuring that tunnel_dst is read only once and checked before use in the egress path. This fix leverages existing RCU protections to prevent the race condition and null pointer dereference, thereby improving kernel stability and security. The vulnerability affects Linux kernel versions prior to the patch and is relevant to systems using VLAN tunnels in network bridging configurations.
Potential Impact
For European organizations, this vulnerability could lead to denial of service conditions on critical Linux-based network infrastructure that utilizes VLAN tunneling and bridging. Such infrastructure is common in data centers, cloud environments, and enterprise networks. An attacker capable of triggering this flaw could cause kernel panics or crashes, disrupting network connectivity and potentially impacting business operations, especially in sectors relying heavily on continuous network availability such as finance, telecommunications, and critical infrastructure. While no known exploits are currently reported in the wild, the vulnerability's nature as a kernel-level null pointer dereference means that exploitation could be straightforward if an attacker has access to the network path or the ability to send crafted packets. This could also facilitate further attacks if combined with other vulnerabilities. The impact on confidentiality and integrity is limited, as the vulnerability primarily causes availability issues. However, the disruption of network services could indirectly affect operational continuity and data access.
Mitigation Recommendations
European organizations should prioritize applying the official Linux kernel patch that addresses CVE-2021-47223 as soon as possible. Specifically, system administrators should: 1) Identify all Linux systems running vulnerable kernel versions that handle VLAN tunnels and bridging; 2) Schedule and deploy kernel updates that include the fix for this vulnerability, ensuring minimal downtime; 3) Where immediate patching is not feasible, consider temporarily disabling VLAN tunneling or bridging features if they are not essential, to reduce exposure; 4) Monitor network traffic for unusual patterns that might indicate attempts to exploit this vulnerability; 5) Employ kernel hardening techniques such as enabling kernel lockdown features and using security modules (e.g., SELinux, AppArmor) to limit the impact of potential crashes; 6) Maintain robust incident response plans to quickly recover from potential denial of service events; 7) Engage with Linux distribution vendors for backported patches if using long-term support kernels; and 8) Conduct thorough testing of patches in staging environments to ensure compatibility and stability before production deployment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-04-10T18:59:19.529Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea0cb
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 3:07:26 PM
Last updated: 8/12/2025, 6:10:16 PM
Views: 12
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.