Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-47240: Vulnerability in Linux Linux

0
High
VulnerabilityCVE-2021-47240cvecve-2021-47240
Published: Tue May 21 2024 (05/21/2024, 14:19:40 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: qrtr: fix OOB Read in qrtr_endpoint_post Syzbot reported slab-out-of-bounds Read in qrtr_endpoint_post. The problem was in wrong _size_ type: if (len != ALIGN(size, 4) + hdrlen) goto err; If size from qrtr_hdr is 4294967293 (0xfffffffd), the result of ALIGN(size, 4) will be 0. In case of len == hdrlen and size == 4294967293 in header this check won't fail and skb_put_data(skb, data + hdrlen, size); will read out of bound from data, which is hdrlen allocated block.

AI-Powered Analysis

AILast updated: 06/26/2025, 14:37:35 UTC

Technical Analysis

CVE-2021-47240 is a vulnerability identified in the Linux kernel's QRTR (Qualcomm IPC Router) networking component. The flaw is an out-of-bounds (OOB) read occurring in the function qrtr_endpoint_post, triggered by improper handling of a size parameter in the QRTR header. Specifically, the vulnerability arises due to an incorrect size type and a faulty boundary check. When the size field in the QRTR header is set to a large value (0xfffffffd or 4294967293), the alignment macro ALIGN(size, 4) incorrectly evaluates to zero. Consequently, the conditional check intended to prevent out-of-bounds access does not fail as expected if the length equals the header length. This allows the function skb_put_data to read beyond the allocated memory buffer by reading 'size' bytes starting at an offset, leading to an out-of-bounds read. This memory safety issue can potentially expose kernel memory contents or cause kernel instability. The vulnerability was reported by Syzbot and has been addressed in recent Linux kernel updates. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions with QRTR enabled, which is common in embedded devices, IoT, and certain networking equipment using Qualcomm chipsets. Exploitation could lead to information disclosure through kernel memory leakage or cause denial of service by crashing the kernel. Confidentiality could be compromised if sensitive kernel memory is exposed. Integrity and availability could also be affected if the system crashes or behaves unpredictably. Given the widespread use of Linux in servers, industrial control systems, and telecommunications infrastructure across Europe, this vulnerability could impact critical infrastructure and enterprise environments. However, exploitation requires crafted packets targeting the QRTR interface, which may limit the attack surface to local or network-adjacent attackers with access to the vulnerable subsystem.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the vulnerability is in the QRTR component, organizations should audit their systems to identify if QRTR is in use, especially on devices with Qualcomm chipsets or embedded Linux systems. If QRTR is not required, disabling or unloading the QRTR kernel module can reduce exposure. Network segmentation and strict access controls should be enforced to limit access to vulnerable devices. Monitoring for unusual kernel crashes or anomalous network traffic targeting QRTR endpoints can help detect exploitation attempts. Additionally, organizations should maintain an inventory of embedded and IoT devices running Linux to ensure timely patching and mitigate risks from less visible endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-04-10T18:59:19.532Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea177

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 2:37:35 PM

Last updated: 11/24/2025, 2:17:29 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats