Skip to main content

CVE-2021-47240: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47240cvecve-2021-47240
Published: Tue May 21 2024 (05/21/2024, 14:19:40 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: qrtr: fix OOB Read in qrtr_endpoint_post Syzbot reported slab-out-of-bounds Read in qrtr_endpoint_post. The problem was in wrong _size_ type: if (len != ALIGN(size, 4) + hdrlen) goto err; If size from qrtr_hdr is 4294967293 (0xfffffffd), the result of ALIGN(size, 4) will be 0. In case of len == hdrlen and size == 4294967293 in header this check won't fail and skb_put_data(skb, data + hdrlen, size); will read out of bound from data, which is hdrlen allocated block.

AI-Powered Analysis

AILast updated: 06/26/2025, 14:37:35 UTC

Technical Analysis

CVE-2021-47240 is a vulnerability identified in the Linux kernel's QRTR (Qualcomm IPC Router) networking component. The flaw is an out-of-bounds (OOB) read occurring in the function qrtr_endpoint_post, triggered by improper handling of a size parameter in the QRTR header. Specifically, the vulnerability arises due to an incorrect size type and a faulty boundary check. When the size field in the QRTR header is set to a large value (0xfffffffd or 4294967293), the alignment macro ALIGN(size, 4) incorrectly evaluates to zero. Consequently, the conditional check intended to prevent out-of-bounds access does not fail as expected if the length equals the header length. This allows the function skb_put_data to read beyond the allocated memory buffer by reading 'size' bytes starting at an offset, leading to an out-of-bounds read. This memory safety issue can potentially expose kernel memory contents or cause kernel instability. The vulnerability was reported by Syzbot and has been addressed in recent Linux kernel updates. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions with QRTR enabled, which is common in embedded devices, IoT, and certain networking equipment using Qualcomm chipsets. Exploitation could lead to information disclosure through kernel memory leakage or cause denial of service by crashing the kernel. Confidentiality could be compromised if sensitive kernel memory is exposed. Integrity and availability could also be affected if the system crashes or behaves unpredictably. Given the widespread use of Linux in servers, industrial control systems, and telecommunications infrastructure across Europe, this vulnerability could impact critical infrastructure and enterprise environments. However, exploitation requires crafted packets targeting the QRTR interface, which may limit the attack surface to local or network-adjacent attackers with access to the vulnerable subsystem.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the vulnerability is in the QRTR component, organizations should audit their systems to identify if QRTR is in use, especially on devices with Qualcomm chipsets or embedded Linux systems. If QRTR is not required, disabling or unloading the QRTR kernel module can reduce exposure. Network segmentation and strict access controls should be enforced to limit access to vulnerable devices. Monitoring for unusual kernel crashes or anomalous network traffic targeting QRTR endpoints can help detect exploitation attempts. Additionally, organizations should maintain an inventory of embedded and IoT devices running Linux to ensure timely patching and mitigate risks from less visible endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-04-10T18:59:19.532Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea177

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 2:37:35 PM

Last updated: 8/14/2025, 11:53:00 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats