CVE-2021-47293

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
07/05/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/sched: act_skbmod: Skip non-Ethernet packets<br /> <br /> Currently tcf_skbmod_act() assumes that packets use Ethernet as their L2<br /> protocol, which is not always the case. As an example, for CAN devices:<br /> <br /> $ ip link add dev vcan0 type vcan<br /> $ ip link set up vcan0<br /> $ tc qdisc add dev vcan0 root handle 1: htb<br /> $ tc filter add dev vcan0 parent 1: protocol ip prio 10 \<br /> matchall action skbmod swap mac<br /> <br /> Doing the above silently corrupts all the packets. Do not perform skbmod<br /> actions for non-Ethernet packets.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.9 (including) 4.19.199 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.136 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.54 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.13.6 (excluding)
cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*