Skip to main content

CVE-2021-47291: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47291cvecve-2021-47291
Published: Tue May 21 2024 (05/21/2024, 14:35:16 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions While running the self-tests on a KASAN enabled kernel, I observed a slab-out-of-bounds splat very similar to the one reported in commit 821bbf79fe46 ("ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions"). We additionally need to take care of fib6_metrics initialization failure when the caller provides an nh. The fix is similar, explicitly free the route instead of calling fib6_info_release on a half-initialized object.

AI-Powered Analysis

AILast updated: 06/26/2025, 11:20:53 UTC

Technical Analysis

CVE-2021-47291 is a vulnerability identified in the Linux kernel's IPv6 networking stack, specifically within the function fib6_nh_flush_exceptions. The issue relates to a slab-out-of-bounds memory access error, which was detected during kernel self-tests with Kernel Address Sanitizer (KASAN) enabled. This vulnerability is similar to a previously fixed issue (commit 821bbf79fe46) involving slab-out-of-bounds reads in the same function. The root cause involves improper handling of fib6_metrics initialization failures when a next-hop (nh) object is provided by the caller. The flawed code path leads to the use of a half-initialized object, which can cause out-of-bounds memory access when fib6_info_release is called. The fix implemented explicitly frees the route object instead of relying on fib6_info_release, preventing the out-of-bounds access. This vulnerability affects certain versions of the Linux kernel identified by the commit hash f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. Although no known exploits are currently reported in the wild, the vulnerability could potentially be triggered by specially crafted IPv6 routing operations that manipulate the fib6_nh_flush_exceptions function. Since this vulnerability resides in the kernel's networking code, exploitation could lead to memory corruption, potentially causing system crashes (denial of service) or enabling privilege escalation if an attacker can execute arbitrary code in kernel space. The vulnerability does not require user interaction but would require the ability to send or manipulate IPv6 routing information, which might be limited to privileged users or network administrators.

Potential Impact

For European organizations, the impact of CVE-2021-47291 could be significant, especially for those relying heavily on Linux-based infrastructure and IPv6 networking. The vulnerability could lead to system instability or crashes, affecting availability of critical services. In environments where attackers have network access or administrative privileges, exploitation could result in privilege escalation, compromising confidentiality and integrity of systems. This is particularly concerning for sectors such as finance, telecommunications, government, and critical infrastructure, where Linux servers and routers are prevalent. Additionally, the increasing adoption of IPv6 in Europe means that more networks are potentially exposed to this vulnerability. Disruption of network services or compromise of kernel integrity could lead to data breaches, operational downtime, and regulatory compliance issues under GDPR and other European data protection laws.

Mitigation Recommendations

To mitigate CVE-2021-47291, European organizations should prioritize updating their Linux kernel to the patched version that includes the fix for this vulnerability. Since the issue is in the kernel's IPv6 routing code, kernel upgrades should be tested and deployed promptly on all affected systems, especially network routers, firewalls, and servers handling IPv6 traffic. Network administrators should audit and restrict access to IPv6 routing configuration interfaces to trusted personnel only, minimizing the risk of exploitation by unauthorized users. Employing network segmentation and strict firewall rules to limit IPv6 routing protocol traffic can reduce exposure. Additionally, enabling kernel hardening features such as KASAN in testing environments can help detect similar issues early. Organizations should monitor security advisories and Linux kernel mailing lists for any updates or exploit reports related to this vulnerability. Finally, implementing intrusion detection systems capable of monitoring unusual IPv6 routing activity can provide early warning of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T13:27:52.130Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea327

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 11:20:53 AM

Last updated: 8/14/2025, 6:05:31 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats