CVE-2021-47309: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: validate lwtstate->data before returning from skb_tunnel_info() skb_tunnel_info() returns pointer of lwtstate->data as ip_tunnel_info type without validation. lwtstate->data can have various types such as mpls_iptunnel_encap, etc and these are not compatible. So skb_tunnel_info() should validate before returning that pointer. Splat looks like: BUG: KASAN: slab-out-of-bounds in vxlan_get_route+0x418/0x4b0 [vxlan] Read of size 2 at addr ffff888106ec2698 by task ping/811 CPU: 1 PID: 811 Comm: ping Not tainted 5.13.0+ #1195 Call Trace: dump_stack_lvl+0x56/0x7b print_address_description.constprop.8.cold.13+0x13/0x2ee ? vxlan_get_route+0x418/0x4b0 [vxlan] ? vxlan_get_route+0x418/0x4b0 [vxlan] kasan_report.cold.14+0x83/0xdf ? vxlan_get_route+0x418/0x4b0 [vxlan] vxlan_get_route+0x418/0x4b0 [vxlan] [ ... ] vxlan_xmit_one+0x148b/0x32b0 [vxlan] [ ... ] vxlan_xmit+0x25c5/0x4780 [vxlan] [ ... ] dev_hard_start_xmit+0x1ae/0x6e0 __dev_queue_xmit+0x1f39/0x31a0 [ ... ] neigh_xmit+0x2f9/0x940 mpls_xmit+0x911/0x1600 [mpls_iptunnel] lwtunnel_xmit+0x18f/0x450 ip_finish_output2+0x867/0x2040 [ ... ]
AI Analysis
Technical Summary
CVE-2021-47309 is a vulnerability identified in the Linux kernel networking subsystem, specifically related to the handling of lightweight tunnel (lwtstate) data within the skb_tunnel_info() function. The vulnerability arises because skb_tunnel_info() returns a pointer to lwtstate->data as an ip_tunnel_info type without validating the actual data type. Since lwtstate->data can represent various encapsulation types such as mpls_iptunnel_encap and others, which are not compatible with ip_tunnel_info, this lack of validation can lead to improper memory access. The issue manifests as a slab-out-of-bounds read detected by Kernel Address Sanitizer (KASAN), causing a kernel crash (BUG) in the vxlan_get_route function. This crash occurs when the kernel attempts to read memory beyond the allocated buffer, triggered by network operations involving VXLAN or MPLS tunnels. The stack trace indicates that the problem occurs during packet transmission routines (vxlan_xmit_one, vxlan_xmit) and routing functions (mpls_xmit, lwtunnel_xmit), potentially leading to denial of service (DoS) conditions. The vulnerability affects Linux kernel versions prior to the patch that introduced validation checks in skb_tunnel_info(), ensuring that the returned pointer corresponds to the correct tunnel encapsulation type. No known exploits in the wild have been reported yet, but the vulnerability is significant due to its kernel-level impact and the critical role of networking in Linux systems. The vulnerability was published on May 21, 2024, and no CVSS score has been assigned.
Potential Impact
For European organizations, the impact of CVE-2021-47309 can be substantial, especially for those relying heavily on Linux-based infrastructure for networking, cloud services, and virtualization. The vulnerability can cause kernel crashes leading to denial of service, disrupting critical network functions such as VXLAN and MPLS tunneling, which are widely used in data centers and enterprise networks for network segmentation and traffic engineering. This disruption can affect availability of services, potentially impacting business continuity. Additionally, while no direct privilege escalation or remote code execution has been reported, kernel crashes can be leveraged by attackers to cause persistent outages or to facilitate further attacks by destabilizing systems. Organizations in sectors such as finance, telecommunications, and critical infrastructure, which depend on stable and secure Linux networking stacks, may face operational risks. The lack of known exploits reduces immediate risk, but the widespread use of Linux kernels in European IT environments means that unpatched systems remain vulnerable to accidental or malicious triggering of this flaw.
Mitigation Recommendations
To mitigate CVE-2021-47309, European organizations should prioritize updating their Linux kernel to the latest patched versions that include the validation fix in skb_tunnel_info(). Kernel updates should be tested and deployed promptly, especially on systems handling VXLAN and MPLS tunnels. Network administrators should audit their use of lightweight tunnels and encapsulation protocols to identify potentially affected systems. Employing kernel hardening techniques such as enabling Kernel Address Sanitizer (KASAN) in testing environments can help detect similar issues proactively. Additionally, organizations should implement robust monitoring for kernel crashes and network anomalies that could indicate exploitation attempts or accidental triggering of the vulnerability. Where immediate patching is not feasible, temporarily disabling or limiting the use of affected tunneling protocols (VXLAN, MPLS) may reduce exposure. Finally, maintaining strict access controls and network segmentation can limit the ability of attackers to exploit this vulnerability remotely.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2021-47309: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: validate lwtstate->data before returning from skb_tunnel_info() skb_tunnel_info() returns pointer of lwtstate->data as ip_tunnel_info type without validation. lwtstate->data can have various types such as mpls_iptunnel_encap, etc and these are not compatible. So skb_tunnel_info() should validate before returning that pointer. Splat looks like: BUG: KASAN: slab-out-of-bounds in vxlan_get_route+0x418/0x4b0 [vxlan] Read of size 2 at addr ffff888106ec2698 by task ping/811 CPU: 1 PID: 811 Comm: ping Not tainted 5.13.0+ #1195 Call Trace: dump_stack_lvl+0x56/0x7b print_address_description.constprop.8.cold.13+0x13/0x2ee ? vxlan_get_route+0x418/0x4b0 [vxlan] ? vxlan_get_route+0x418/0x4b0 [vxlan] kasan_report.cold.14+0x83/0xdf ? vxlan_get_route+0x418/0x4b0 [vxlan] vxlan_get_route+0x418/0x4b0 [vxlan] [ ... ] vxlan_xmit_one+0x148b/0x32b0 [vxlan] [ ... ] vxlan_xmit+0x25c5/0x4780 [vxlan] [ ... ] dev_hard_start_xmit+0x1ae/0x6e0 __dev_queue_xmit+0x1f39/0x31a0 [ ... ] neigh_xmit+0x2f9/0x940 mpls_xmit+0x911/0x1600 [mpls_iptunnel] lwtunnel_xmit+0x18f/0x450 ip_finish_output2+0x867/0x2040 [ ... ]
AI-Powered Analysis
Technical Analysis
CVE-2021-47309 is a vulnerability identified in the Linux kernel networking subsystem, specifically related to the handling of lightweight tunnel (lwtstate) data within the skb_tunnel_info() function. The vulnerability arises because skb_tunnel_info() returns a pointer to lwtstate->data as an ip_tunnel_info type without validating the actual data type. Since lwtstate->data can represent various encapsulation types such as mpls_iptunnel_encap and others, which are not compatible with ip_tunnel_info, this lack of validation can lead to improper memory access. The issue manifests as a slab-out-of-bounds read detected by Kernel Address Sanitizer (KASAN), causing a kernel crash (BUG) in the vxlan_get_route function. This crash occurs when the kernel attempts to read memory beyond the allocated buffer, triggered by network operations involving VXLAN or MPLS tunnels. The stack trace indicates that the problem occurs during packet transmission routines (vxlan_xmit_one, vxlan_xmit) and routing functions (mpls_xmit, lwtunnel_xmit), potentially leading to denial of service (DoS) conditions. The vulnerability affects Linux kernel versions prior to the patch that introduced validation checks in skb_tunnel_info(), ensuring that the returned pointer corresponds to the correct tunnel encapsulation type. No known exploits in the wild have been reported yet, but the vulnerability is significant due to its kernel-level impact and the critical role of networking in Linux systems. The vulnerability was published on May 21, 2024, and no CVSS score has been assigned.
Potential Impact
For European organizations, the impact of CVE-2021-47309 can be substantial, especially for those relying heavily on Linux-based infrastructure for networking, cloud services, and virtualization. The vulnerability can cause kernel crashes leading to denial of service, disrupting critical network functions such as VXLAN and MPLS tunneling, which are widely used in data centers and enterprise networks for network segmentation and traffic engineering. This disruption can affect availability of services, potentially impacting business continuity. Additionally, while no direct privilege escalation or remote code execution has been reported, kernel crashes can be leveraged by attackers to cause persistent outages or to facilitate further attacks by destabilizing systems. Organizations in sectors such as finance, telecommunications, and critical infrastructure, which depend on stable and secure Linux networking stacks, may face operational risks. The lack of known exploits reduces immediate risk, but the widespread use of Linux kernels in European IT environments means that unpatched systems remain vulnerable to accidental or malicious triggering of this flaw.
Mitigation Recommendations
To mitigate CVE-2021-47309, European organizations should prioritize updating their Linux kernel to the latest patched versions that include the validation fix in skb_tunnel_info(). Kernel updates should be tested and deployed promptly, especially on systems handling VXLAN and MPLS tunnels. Network administrators should audit their use of lightweight tunnels and encapsulation protocols to identify potentially affected systems. Employing kernel hardening techniques such as enabling Kernel Address Sanitizer (KASAN) in testing environments can help detect similar issues proactively. Additionally, organizations should implement robust monitoring for kernel crashes and network anomalies that could indicate exploitation attempts or accidental triggering of the vulnerability. Where immediate patching is not feasible, temporarily disabling or limiting the use of affected tunneling protocols (VXLAN, MPLS) may reduce exposure. Finally, maintaining strict access controls and network segmentation can limit the ability of attackers to exploit this vulnerability remotely.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T14:28:16.972Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea3b1
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 11:06:08 AM
Last updated: 7/31/2025, 12:34:34 PM
Views: 13
Related Threats
CVE-2025-8985: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8984: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.