CVE-2021-47240: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: qrtr: fix OOB Read in qrtr_endpoint_post Syzbot reported slab-out-of-bounds Read in qrtr_endpoint_post. The problem was in wrong _size_ type: if (len != ALIGN(size, 4) + hdrlen) goto err; If size from qrtr_hdr is 4294967293 (0xfffffffd), the result of ALIGN(size, 4) will be 0. In case of len == hdrlen and size == 4294967293 in header this check won't fail and skb_put_data(skb, data + hdrlen, size); will read out of bound from data, which is hdrlen allocated block.
AI Analysis
Technical Summary
CVE-2021-47240 is a vulnerability identified in the Linux kernel's QRTR (Qualcomm IPC Router) networking component. The flaw is an out-of-bounds (OOB) read occurring in the function qrtr_endpoint_post, triggered by improper handling of a size parameter in the QRTR header. Specifically, the vulnerability arises due to an incorrect size type and a faulty boundary check. When the size field in the QRTR header is set to a large value (0xfffffffd or 4294967293), the alignment macro ALIGN(size, 4) incorrectly evaluates to zero. Consequently, the conditional check intended to prevent out-of-bounds access does not fail as expected if the length equals the header length. This allows the function skb_put_data to read beyond the allocated memory buffer by reading 'size' bytes starting at an offset, leading to an out-of-bounds read. This memory safety issue can potentially expose kernel memory contents or cause kernel instability. The vulnerability was reported by Syzbot and has been addressed in recent Linux kernel updates. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions with QRTR enabled, which is common in embedded devices, IoT, and certain networking equipment using Qualcomm chipsets. Exploitation could lead to information disclosure through kernel memory leakage or cause denial of service by crashing the kernel. Confidentiality could be compromised if sensitive kernel memory is exposed. Integrity and availability could also be affected if the system crashes or behaves unpredictably. Given the widespread use of Linux in servers, industrial control systems, and telecommunications infrastructure across Europe, this vulnerability could impact critical infrastructure and enterprise environments. However, exploitation requires crafted packets targeting the QRTR interface, which may limit the attack surface to local or network-adjacent attackers with access to the vulnerable subsystem.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the vulnerability is in the QRTR component, organizations should audit their systems to identify if QRTR is in use, especially on devices with Qualcomm chipsets or embedded Linux systems. If QRTR is not required, disabling or unloading the QRTR kernel module can reduce exposure. Network segmentation and strict access controls should be enforced to limit access to vulnerable devices. Monitoring for unusual kernel crashes or anomalous network traffic targeting QRTR endpoints can help detect exploitation attempts. Additionally, organizations should maintain an inventory of embedded and IoT devices running Linux to ensure timely patching and mitigate risks from less visible endpoints.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2021-47240: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: qrtr: fix OOB Read in qrtr_endpoint_post Syzbot reported slab-out-of-bounds Read in qrtr_endpoint_post. The problem was in wrong _size_ type: if (len != ALIGN(size, 4) + hdrlen) goto err; If size from qrtr_hdr is 4294967293 (0xfffffffd), the result of ALIGN(size, 4) will be 0. In case of len == hdrlen and size == 4294967293 in header this check won't fail and skb_put_data(skb, data + hdrlen, size); will read out of bound from data, which is hdrlen allocated block.
AI-Powered Analysis
Technical Analysis
CVE-2021-47240 is a vulnerability identified in the Linux kernel's QRTR (Qualcomm IPC Router) networking component. The flaw is an out-of-bounds (OOB) read occurring in the function qrtr_endpoint_post, triggered by improper handling of a size parameter in the QRTR header. Specifically, the vulnerability arises due to an incorrect size type and a faulty boundary check. When the size field in the QRTR header is set to a large value (0xfffffffd or 4294967293), the alignment macro ALIGN(size, 4) incorrectly evaluates to zero. Consequently, the conditional check intended to prevent out-of-bounds access does not fail as expected if the length equals the header length. This allows the function skb_put_data to read beyond the allocated memory buffer by reading 'size' bytes starting at an offset, leading to an out-of-bounds read. This memory safety issue can potentially expose kernel memory contents or cause kernel instability. The vulnerability was reported by Syzbot and has been addressed in recent Linux kernel updates. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions with QRTR enabled, which is common in embedded devices, IoT, and certain networking equipment using Qualcomm chipsets. Exploitation could lead to information disclosure through kernel memory leakage or cause denial of service by crashing the kernel. Confidentiality could be compromised if sensitive kernel memory is exposed. Integrity and availability could also be affected if the system crashes or behaves unpredictably. Given the widespread use of Linux in servers, industrial control systems, and telecommunications infrastructure across Europe, this vulnerability could impact critical infrastructure and enterprise environments. However, exploitation requires crafted packets targeting the QRTR interface, which may limit the attack surface to local or network-adjacent attackers with access to the vulnerable subsystem.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the vulnerability is in the QRTR component, organizations should audit their systems to identify if QRTR is in use, especially on devices with Qualcomm chipsets or embedded Linux systems. If QRTR is not required, disabling or unloading the QRTR kernel module can reduce exposure. Network segmentation and strict access controls should be enforced to limit access to vulnerable devices. Monitoring for unusual kernel crashes or anomalous network traffic targeting QRTR endpoints can help detect exploitation attempts. Additionally, organizations should maintain an inventory of embedded and IoT devices running Linux to ensure timely patching and mitigate risks from less visible endpoints.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-04-10T18:59:19.532Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea177
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 2:37:35 PM
Last updated: 8/14/2025, 11:53:00 PM
Views: 15
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.