CVE-2021-47293: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_skbmod: Skip non-Ethernet packets Currently tcf_skbmod_act() assumes that packets use Ethernet as their L2 protocol, which is not always the case. As an example, for CAN devices: $ ip link add dev vcan0 type vcan $ ip link set up vcan0 $ tc qdisc add dev vcan0 root handle 1: htb $ tc filter add dev vcan0 parent 1: protocol ip prio 10 \ matchall action skbmod swap mac Doing the above silently corrupts all the packets. Do not perform skbmod actions for non-Ethernet packets.
AI Analysis
Technical Summary
CVE-2021-47293 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically within the act_skbmod module. The vulnerability arises because the function tcf_skbmod_act() incorrectly assumes that all packets it processes use Ethernet as their Layer 2 (L2) protocol. However, this assumption is invalid for certain network device types such as CAN (Controller Area Network) devices, which use different L2 protocols. When skbmod actions like 'swap mac' are applied to non-Ethernet packets, such as those on virtual CAN devices (vcan0), the packets become silently corrupted. This occurs because the skbmod module attempts to modify Ethernet-specific header fields that do not exist or are structured differently in non-Ethernet packets, leading to data corruption and potential disruption of network communication. The vulnerability was addressed by updating the kernel to skip skbmod actions on non-Ethernet packets, preventing unintended packet corruption. This flaw does not appear to enable direct remote code execution or privilege escalation but can cause network reliability issues or data integrity problems in environments utilizing non-Ethernet network interfaces.
Potential Impact
For European organizations, the impact of CVE-2021-47293 primarily concerns environments using Linux systems with network configurations involving non-Ethernet interfaces, such as CAN devices commonly found in automotive, industrial control, and embedded systems sectors. Packet corruption caused by this vulnerability can lead to network communication failures, degraded service availability, and potential data loss or misrouting in critical control networks. Organizations relying on Linux-based infrastructure for industrial automation, automotive telematics, or IoT deployments may experience operational disruptions. While this vulnerability does not directly compromise confidentiality or enable remote exploitation, the integrity and availability of network traffic in affected systems can be compromised, potentially impacting safety-critical applications and real-time control systems prevalent in European manufacturing and automotive industries.
Mitigation Recommendations
To mitigate this vulnerability, organizations should ensure that their Linux kernel versions are updated to include the patch that prevents skbmod actions on non-Ethernet packets. Specifically, system administrators should: 1) Identify Linux systems using non-Ethernet network interfaces such as CAN or virtual CAN devices; 2) Apply the latest kernel updates from trusted Linux distributions that address CVE-2021-47293; 3) Review and audit traffic control (tc) configurations to avoid applying skbmod actions indiscriminately on all interfaces without protocol checks; 4) Implement monitoring to detect unusual packet corruption or network errors on affected interfaces; 5) For embedded or specialized devices where kernel updates are delayed, consider disabling skbmod actions on non-Ethernet interfaces as a temporary workaround; 6) Engage with device vendors to ensure timely firmware or kernel patches are applied in industrial or automotive environments. These steps go beyond generic patching by focusing on protocol-aware configuration and targeted monitoring in environments where non-Ethernet protocols are in use.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Sweden, Finland
CVE-2021-47293: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_skbmod: Skip non-Ethernet packets Currently tcf_skbmod_act() assumes that packets use Ethernet as their L2 protocol, which is not always the case. As an example, for CAN devices: $ ip link add dev vcan0 type vcan $ ip link set up vcan0 $ tc qdisc add dev vcan0 root handle 1: htb $ tc filter add dev vcan0 parent 1: protocol ip prio 10 \ matchall action skbmod swap mac Doing the above silently corrupts all the packets. Do not perform skbmod actions for non-Ethernet packets.
AI-Powered Analysis
Technical Analysis
CVE-2021-47293 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically within the act_skbmod module. The vulnerability arises because the function tcf_skbmod_act() incorrectly assumes that all packets it processes use Ethernet as their Layer 2 (L2) protocol. However, this assumption is invalid for certain network device types such as CAN (Controller Area Network) devices, which use different L2 protocols. When skbmod actions like 'swap mac' are applied to non-Ethernet packets, such as those on virtual CAN devices (vcan0), the packets become silently corrupted. This occurs because the skbmod module attempts to modify Ethernet-specific header fields that do not exist or are structured differently in non-Ethernet packets, leading to data corruption and potential disruption of network communication. The vulnerability was addressed by updating the kernel to skip skbmod actions on non-Ethernet packets, preventing unintended packet corruption. This flaw does not appear to enable direct remote code execution or privilege escalation but can cause network reliability issues or data integrity problems in environments utilizing non-Ethernet network interfaces.
Potential Impact
For European organizations, the impact of CVE-2021-47293 primarily concerns environments using Linux systems with network configurations involving non-Ethernet interfaces, such as CAN devices commonly found in automotive, industrial control, and embedded systems sectors. Packet corruption caused by this vulnerability can lead to network communication failures, degraded service availability, and potential data loss or misrouting in critical control networks. Organizations relying on Linux-based infrastructure for industrial automation, automotive telematics, or IoT deployments may experience operational disruptions. While this vulnerability does not directly compromise confidentiality or enable remote exploitation, the integrity and availability of network traffic in affected systems can be compromised, potentially impacting safety-critical applications and real-time control systems prevalent in European manufacturing and automotive industries.
Mitigation Recommendations
To mitigate this vulnerability, organizations should ensure that their Linux kernel versions are updated to include the patch that prevents skbmod actions on non-Ethernet packets. Specifically, system administrators should: 1) Identify Linux systems using non-Ethernet network interfaces such as CAN or virtual CAN devices; 2) Apply the latest kernel updates from trusted Linux distributions that address CVE-2021-47293; 3) Review and audit traffic control (tc) configurations to avoid applying skbmod actions indiscriminately on all interfaces without protocol checks; 4) Implement monitoring to detect unusual packet corruption or network errors on affected interfaces; 5) For embedded or specialized devices where kernel updates are delayed, consider disabling skbmod actions on non-Ethernet interfaces as a temporary workaround; 6) Engage with device vendors to ensure timely firmware or kernel patches are applied in industrial or automotive environments. These steps go beyond generic patching by focusing on protocol-aware configuration and targeted monitoring in environments where non-Ethernet protocols are in use.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T13:27:52.130Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea33e
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 11:20:15 AM
Last updated: 8/11/2025, 6:30:15 AM
Views: 15
Related Threats
CVE-2025-36613: CWE-266: Incorrect Privilege Assignment in Dell SupportAssist for Home PCs
LowCVE-2025-27845: n/a
UnknownCVE-2025-7972: CWE-286: Incorrect User Management in Rockwell Automation FactoryTalk® Linx
HighCVE-2025-8876: CWE-20 Improper Input Validation in N-able N-central
CriticalCVE-2025-8875: CWE-502 Deserialization of Untrusted Data in N-able N-central
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.