U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2021-47309 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: net: validate lwtstate->data before returning from skb_tunnel_info() skb_tunnel_info() returns pointer of lwtstate->data as ip_tunnel_info type without validation. lwtstate->data can have various types such as mpls_iptunnel_encap, etc and these are not compatible. So skb_tunnel_info() should validate before returning that pointer. Splat looks like: BUG: KASAN: slab-out-of-bounds in vxlan_get_route+0x418/0x4b0 [vxlan] Read of size 2 at addr ffff888106ec2698 by task ping/811 CPU: 1 PID: 811 Comm: ping Not tainted 5.13.0+ #1195 Call Trace: dump_stack_lvl+0x56/0x7b print_address_description.constprop.8.cold.13+0x13/0x2ee ? vxlan_get_route+0x418/0x4b0 [vxlan] ? vxlan_get_route+0x418/0x4b0 [vxlan] kasan_report.cold.14+0x83/0xdf ? vxlan_get_route+0x418/0x4b0 [vxlan] vxlan_get_route+0x418/0x4b0 [vxlan] [ ... ] vxlan_xmit_one+0x148b/0x32b0 [vxlan] [ ... ] vxlan_xmit+0x25c5/0x4780 [vxlan] [ ... ] dev_hard_start_xmit+0x1ae/0x6e0 __dev_queue_xmit+0x1f39/0x31a0 [ ... ] neigh_xmit+0x2f9/0x940 mpls_xmit+0x911/0x1600 [mpls_iptunnel] lwtunnel_xmit+0x18f/0x450 ip_finish_output2+0x867/0x2040 [ ... ]


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/2179d96ec702cc33ead02a9ce40ece599b8538c5
https://git.kernel.org/stable/c/2179d96ec702cc33ead02a9ce40ece599b8538c5
https://git.kernel.org/stable/c/67a9c94317402b826fc3db32afc8f39336803d97
https://git.kernel.org/stable/c/67a9c94317402b826fc3db32afc8f39336803d97
https://git.kernel.org/stable/c/83bdcfbd968bcc91a0632b7b625e4a9b0cba5e0d
https://git.kernel.org/stable/c/83bdcfbd968bcc91a0632b7b625e4a9b0cba5e0d
https://git.kernel.org/stable/c/8aa13a86964cdec4fd969ef677c6614ff068641a
https://git.kernel.org/stable/c/8aa13a86964cdec4fd969ef677c6614ff068641a
https://git.kernel.org/stable/c/8bb1589c89e61e3b182dd546f1021928ebb5c2a6
https://git.kernel.org/stable/c/8bb1589c89e61e3b182dd546f1021928ebb5c2a6
https://git.kernel.org/stable/c/a915379594f1e045421635c6316d8f3ffa018c58
https://git.kernel.org/stable/c/a915379594f1e045421635c6316d8f3ffa018c58
https://git.kernel.org/stable/c/b61d327cd3cc5ea591f3bf751dd11e034f388bb5
https://git.kernel.org/stable/c/b61d327cd3cc5ea591f3bf751dd11e034f388bb5
https://git.kernel.org/stable/c/e7f3c9df40515a6c6b46f36c4c94cf48a043f887
https://git.kernel.org/stable/c/e7f3c9df40515a6c6b46f36c4c94cf48a043f887

Weakness Enumeration

CWE-ID CWE Name Source

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2021-47309
NVD Published Date:
05/21/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org