Skip to main content

CVE-2021-47223: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47223cvecve-2021-47223
Published: Tue May 21 2024 (05/21/2024, 14:19:28 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: bridge: fix vlan tunnel dst null pointer dereference This patch fixes a tunnel_dst null pointer dereference due to lockless access in the tunnel egress path. When deleting a vlan tunnel the tunnel_dst pointer is set to NULL without waiting a grace period (i.e. while it's still usable) and packets egressing are dereferencing it without checking. Use READ/WRITE_ONCE to annotate the lockless use of tunnel_id, use RCU for accessing tunnel_dst and make sure it is read only once and checked in the egress path. The dst is already properly RCU protected so we don't need to do anything fancy than to make sure tunnel_id and tunnel_dst are read only once and checked in the egress path.

AI-Powered Analysis

AILast updated: 06/26/2025, 15:07:26 UTC

Technical Analysis

CVE-2021-47223 is a vulnerability identified in the Linux kernel's network bridge component, specifically related to VLAN tunnel handling. The issue arises from a null pointer dereference in the tunnel destination (tunnel_dst) pointer during the tunnel egress path. The root cause is a race condition where the tunnel_dst pointer is set to NULL prematurely when deleting a VLAN tunnel, without waiting for a grace period to ensure that the pointer is no longer in use. Consequently, packets egressing through the tunnel may dereference this NULL pointer without proper validation, leading to a kernel crash or denial of service. The vulnerability stems from lockless access to tunnel_dst and tunnel_id variables, which are not properly synchronized. The patch resolves this by using READ/WRITE_ONCE annotations to enforce single read/write operations on tunnel_id, employing Read-Copy-Update (RCU) mechanisms to safely access tunnel_dst, and ensuring that tunnel_dst is read only once and checked before use in the egress path. This fix leverages existing RCU protections to prevent the race condition and null pointer dereference, thereby improving kernel stability and security. The vulnerability affects Linux kernel versions prior to the patch and is relevant to systems using VLAN tunnels in network bridging configurations.

Potential Impact

For European organizations, this vulnerability could lead to denial of service conditions on critical Linux-based network infrastructure that utilizes VLAN tunneling and bridging. Such infrastructure is common in data centers, cloud environments, and enterprise networks. An attacker capable of triggering this flaw could cause kernel panics or crashes, disrupting network connectivity and potentially impacting business operations, especially in sectors relying heavily on continuous network availability such as finance, telecommunications, and critical infrastructure. While no known exploits are currently reported in the wild, the vulnerability's nature as a kernel-level null pointer dereference means that exploitation could be straightforward if an attacker has access to the network path or the ability to send crafted packets. This could also facilitate further attacks if combined with other vulnerabilities. The impact on confidentiality and integrity is limited, as the vulnerability primarily causes availability issues. However, the disruption of network services could indirectly affect operational continuity and data access.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patch that addresses CVE-2021-47223 as soon as possible. Specifically, system administrators should: 1) Identify all Linux systems running vulnerable kernel versions that handle VLAN tunnels and bridging; 2) Schedule and deploy kernel updates that include the fix for this vulnerability, ensuring minimal downtime; 3) Where immediate patching is not feasible, consider temporarily disabling VLAN tunneling or bridging features if they are not essential, to reduce exposure; 4) Monitor network traffic for unusual patterns that might indicate attempts to exploit this vulnerability; 5) Employ kernel hardening techniques such as enabling kernel lockdown features and using security modules (e.g., SELinux, AppArmor) to limit the impact of potential crashes; 6) Maintain robust incident response plans to quickly recover from potential denial of service events; 7) Engage with Linux distribution vendors for backported patches if using long-term support kernels; and 8) Conduct thorough testing of patches in staging environments to ensure compatibility and stability before production deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-04-10T18:59:19.529Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea0cb

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 3:07:26 PM

Last updated: 8/12/2025, 6:10:16 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats