CVE-2021-47291: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions While running the self-tests on a KASAN enabled kernel, I observed a slab-out-of-bounds splat very similar to the one reported in commit 821bbf79fe46 ("ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions"). We additionally need to take care of fib6_metrics initialization failure when the caller provides an nh. The fix is similar, explicitly free the route instead of calling fib6_info_release on a half-initialized object.
AI Analysis
Technical Summary
CVE-2021-47291 is a vulnerability identified in the Linux kernel's IPv6 networking stack, specifically within the function fib6_nh_flush_exceptions. The issue relates to a slab-out-of-bounds memory access error, which was detected during kernel self-tests with Kernel Address Sanitizer (KASAN) enabled. This vulnerability is similar to a previously fixed issue (commit 821bbf79fe46) involving slab-out-of-bounds reads in the same function. The root cause involves improper handling of fib6_metrics initialization failures when a next-hop (nh) object is provided by the caller. The flawed code path leads to the use of a half-initialized object, which can cause out-of-bounds memory access when fib6_info_release is called. The fix implemented explicitly frees the route object instead of relying on fib6_info_release, preventing the out-of-bounds access. This vulnerability affects certain versions of the Linux kernel identified by the commit hash f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. Although no known exploits are currently reported in the wild, the vulnerability could potentially be triggered by specially crafted IPv6 routing operations that manipulate the fib6_nh_flush_exceptions function. Since this vulnerability resides in the kernel's networking code, exploitation could lead to memory corruption, potentially causing system crashes (denial of service) or enabling privilege escalation if an attacker can execute arbitrary code in kernel space. The vulnerability does not require user interaction but would require the ability to send or manipulate IPv6 routing information, which might be limited to privileged users or network administrators.
Potential Impact
For European organizations, the impact of CVE-2021-47291 could be significant, especially for those relying heavily on Linux-based infrastructure and IPv6 networking. The vulnerability could lead to system instability or crashes, affecting availability of critical services. In environments where attackers have network access or administrative privileges, exploitation could result in privilege escalation, compromising confidentiality and integrity of systems. This is particularly concerning for sectors such as finance, telecommunications, government, and critical infrastructure, where Linux servers and routers are prevalent. Additionally, the increasing adoption of IPv6 in Europe means that more networks are potentially exposed to this vulnerability. Disruption of network services or compromise of kernel integrity could lead to data breaches, operational downtime, and regulatory compliance issues under GDPR and other European data protection laws.
Mitigation Recommendations
To mitigate CVE-2021-47291, European organizations should prioritize updating their Linux kernel to the patched version that includes the fix for this vulnerability. Since the issue is in the kernel's IPv6 routing code, kernel upgrades should be tested and deployed promptly on all affected systems, especially network routers, firewalls, and servers handling IPv6 traffic. Network administrators should audit and restrict access to IPv6 routing configuration interfaces to trusted personnel only, minimizing the risk of exploitation by unauthorized users. Employing network segmentation and strict firewall rules to limit IPv6 routing protocol traffic can reduce exposure. Additionally, enabling kernel hardening features such as KASAN in testing environments can help detect similar issues early. Organizations should monitor security advisories and Linux kernel mailing lists for any updates or exploit reports related to this vulnerability. Finally, implementing intrusion detection systems capable of monitoring unusual IPv6 routing activity can provide early warning of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark, Italy, Spain
CVE-2021-47291: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions While running the self-tests on a KASAN enabled kernel, I observed a slab-out-of-bounds splat very similar to the one reported in commit 821bbf79fe46 ("ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions"). We additionally need to take care of fib6_metrics initialization failure when the caller provides an nh. The fix is similar, explicitly free the route instead of calling fib6_info_release on a half-initialized object.
AI-Powered Analysis
Technical Analysis
CVE-2021-47291 is a vulnerability identified in the Linux kernel's IPv6 networking stack, specifically within the function fib6_nh_flush_exceptions. The issue relates to a slab-out-of-bounds memory access error, which was detected during kernel self-tests with Kernel Address Sanitizer (KASAN) enabled. This vulnerability is similar to a previously fixed issue (commit 821bbf79fe46) involving slab-out-of-bounds reads in the same function. The root cause involves improper handling of fib6_metrics initialization failures when a next-hop (nh) object is provided by the caller. The flawed code path leads to the use of a half-initialized object, which can cause out-of-bounds memory access when fib6_info_release is called. The fix implemented explicitly frees the route object instead of relying on fib6_info_release, preventing the out-of-bounds access. This vulnerability affects certain versions of the Linux kernel identified by the commit hash f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. Although no known exploits are currently reported in the wild, the vulnerability could potentially be triggered by specially crafted IPv6 routing operations that manipulate the fib6_nh_flush_exceptions function. Since this vulnerability resides in the kernel's networking code, exploitation could lead to memory corruption, potentially causing system crashes (denial of service) or enabling privilege escalation if an attacker can execute arbitrary code in kernel space. The vulnerability does not require user interaction but would require the ability to send or manipulate IPv6 routing information, which might be limited to privileged users or network administrators.
Potential Impact
For European organizations, the impact of CVE-2021-47291 could be significant, especially for those relying heavily on Linux-based infrastructure and IPv6 networking. The vulnerability could lead to system instability or crashes, affecting availability of critical services. In environments where attackers have network access or administrative privileges, exploitation could result in privilege escalation, compromising confidentiality and integrity of systems. This is particularly concerning for sectors such as finance, telecommunications, government, and critical infrastructure, where Linux servers and routers are prevalent. Additionally, the increasing adoption of IPv6 in Europe means that more networks are potentially exposed to this vulnerability. Disruption of network services or compromise of kernel integrity could lead to data breaches, operational downtime, and regulatory compliance issues under GDPR and other European data protection laws.
Mitigation Recommendations
To mitigate CVE-2021-47291, European organizations should prioritize updating their Linux kernel to the patched version that includes the fix for this vulnerability. Since the issue is in the kernel's IPv6 routing code, kernel upgrades should be tested and deployed promptly on all affected systems, especially network routers, firewalls, and servers handling IPv6 traffic. Network administrators should audit and restrict access to IPv6 routing configuration interfaces to trusted personnel only, minimizing the risk of exploitation by unauthorized users. Employing network segmentation and strict firewall rules to limit IPv6 routing protocol traffic can reduce exposure. Additionally, enabling kernel hardening features such as KASAN in testing environments can help detect similar issues early. Organizations should monitor security advisories and Linux kernel mailing lists for any updates or exploit reports related to this vulnerability. Finally, implementing intrusion detection systems capable of monitoring unusual IPv6 routing activity can provide early warning of exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T13:27:52.130Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea327
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 11:20:53 AM
Last updated: 8/14/2025, 6:05:31 AM
Views: 14
Related Threats
CVE-2025-8959: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Shared library
HighCVE-2025-44201
LowCVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumCVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.