CVE-2021-47363

5.5 MEDIUM

📋 TL;DR

A division by zero vulnerability in the Linux kernel's nexthop resilient group replacement feature can cause kernel panics and system crashes. This affects Linux systems using resilient nexthop groups for network routing. The vulnerability is triggered when replacing resilient nexthop groups while traffic is being forwarded through them.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only affects systems using resilient nexthop groups (nexthop objects with resilient buckets). Requires specific configuration and replacement operations during traffic flow.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially disrupting network connectivity and requiring system reboot.

🟠

Likely Case

System crash or kernel panic when resilient nexthop groups are replaced during active traffic forwarding, causing temporary service disruption.

🟢

If Mitigated

No impact if resilient nexthop groups are not used or if patched kernel is deployed.

🌐 Internet-Facing: MEDIUM - Could affect routers or systems performing network routing exposed to the internet, but requires specific configuration.
🏢 Internal Only: LOW - Requires resilient nexthop group configuration and replacement during traffic flow, which is less common in typical internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to configure resilient nexthop groups and trigger replacement operations. Discovered through torture tests rather than real-world exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits 563f23b002534176f49524b5ca0e1d94d8906c40 and e9d32ec26e7f01d1af13bdc687f586362546aa25

Vendor Advisory: https://git.kernel.org/stable/c/563f23b002534176f49524b5ca0e1d94d8906c40

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check your distribution's security advisories for specific patched versions. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Avoid resilient nexthop group replacement

linux

Do not replace resilient nexthop groups while traffic is being forwarded through them

Disable resilient nexthop groups

linux

Avoid using resilient nexthop group feature if not required

🧯 If You Can't Patch

  • Avoid using resilient nexthop groups in network configuration
  • Schedule maintenance windows for nexthop group changes when minimal traffic is present

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if resilient nexthop groups are configured: 'ip nexthop list' and 'uname -r'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or is newer than vulnerable versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • divide error messages in system logs
  • nexthop-related crash dumps

Network Indicators:

  • Sudden loss of routing functionality
  • Network connectivity disruptions

SIEM Query:

Search for 'divide error' OR 'nexthop' OR 'kernel panic' in system logs

🔗 References

📤 Share & Export