CVE-2021-47241: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ethtool: strset: fix message length calculation Outer nest for ETHTOOL_A_STRSET_STRINGSETS is not accounted for. This may result in ETHTOOL_MSG_STRSET_GET producing a warning like: calculated message payload length (684) not sufficient WARNING: CPU: 0 PID: 30967 at net/ethtool/netlink.c:369 ethnl_default_doit+0x87a/0xa20 and a splat. As usually with such warnings three conditions must be met for the warning to trigger: - there must be no skb size rounding up (e.g. reply_size of 684); - string set must be per-device (so that the header gets populated); - the device name must be at least 12 characters long. all in all with current user space it looks like reading priv flags is the only place this could potentially happen. Or with syzbot :)
AI Analysis
Technical Summary
CVE-2021-47241 is a high-severity vulnerability in the Linux kernel's ethtool component, specifically within the netlink interface handling string sets (ETHTOOL_A_STRSET_STRINGSETS). The issue arises from incorrect calculation of message payload length when processing nested string sets. The vulnerability manifests as a mismatch in the expected message length, leading to warnings such as "calculated message payload length (684) not sufficient" and kernel crashes (splats). The root cause is that the outer nesting for ETHTOOL_A_STRSET_STRINGSETS is not properly accounted for, causing the kernel to miscalculate buffer sizes during message processing. This can trigger under specific conditions: no skb (socket buffer) size rounding up, the string set being per-device (which populates the header), and the device name being at least 12 characters long. The vulnerability does not require privileges or user interaction to be triggered and can cause denial of service by crashing the kernel, impacting system availability. While no known exploits are reported in the wild, the vulnerability's nature and CVSS score of 7.5 (high) indicate a significant risk, especially for systems relying on affected Linux kernel versions. The vulnerability is related to CWE-266 (Incorrect Privilege Assignment), indicating improper handling of access or resource control within the kernel's ethtool netlink interface. The vulnerability was reserved in April 2024 and published in May 2024, with no patch links provided in the data, suggesting that mitigation requires kernel updates once available. The vulnerability is primarily a denial-of-service vector rather than confidentiality or integrity compromise.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of Linux-based systems, including servers, network appliances, and embedded devices that utilize the affected kernel versions. Given Linux's widespread use in enterprise environments, cloud infrastructure, and telecommunications across Europe, exploitation could lead to unexpected system crashes, service interruptions, and potential downtime. Critical infrastructure providers, financial institutions, and government agencies relying on Linux servers for networking and communication could experience operational disruptions. Although no direct confidentiality or integrity impact is indicated, denial of service in critical systems could indirectly affect business continuity and service delivery. The lack of required privileges or user interaction for exploitation increases the risk of automated or remote triggering, particularly in environments where ethtool commands or netlink interfaces are exposed or accessible. Organizations with long device names and per-device string sets in their network configurations are more susceptible. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the latest patched versions once available from their distribution vendors. Until patches are applied, organizations can mitigate risk by restricting access to the ethtool netlink interface, limiting which users or processes can issue ethtool commands, and monitoring for unusual kernel warnings or crashes related to ethtool. Network segmentation and strict access controls should be enforced to prevent unauthorized access to vulnerable systems. Additionally, auditing device names and configurations to avoid long device names (≥12 characters) where feasible may reduce triggering conditions. Employing kernel crash monitoring and automated recovery mechanisms can minimize downtime if exploitation occurs. Organizations should also maintain up-to-date intrusion detection systems capable of identifying abnormal netlink or ethtool activity. Collaboration with Linux distribution vendors to obtain timely patches and applying them in test environments before production deployment is critical. Finally, documenting and rehearsing incident response plans for denial-of-service events involving kernel crashes will improve resilience.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2021-47241: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ethtool: strset: fix message length calculation Outer nest for ETHTOOL_A_STRSET_STRINGSETS is not accounted for. This may result in ETHTOOL_MSG_STRSET_GET producing a warning like: calculated message payload length (684) not sufficient WARNING: CPU: 0 PID: 30967 at net/ethtool/netlink.c:369 ethnl_default_doit+0x87a/0xa20 and a splat. As usually with such warnings three conditions must be met for the warning to trigger: - there must be no skb size rounding up (e.g. reply_size of 684); - string set must be per-device (so that the header gets populated); - the device name must be at least 12 characters long. all in all with current user space it looks like reading priv flags is the only place this could potentially happen. Or with syzbot :)
AI-Powered Analysis
Technical Analysis
CVE-2021-47241 is a high-severity vulnerability in the Linux kernel's ethtool component, specifically within the netlink interface handling string sets (ETHTOOL_A_STRSET_STRINGSETS). The issue arises from incorrect calculation of message payload length when processing nested string sets. The vulnerability manifests as a mismatch in the expected message length, leading to warnings such as "calculated message payload length (684) not sufficient" and kernel crashes (splats). The root cause is that the outer nesting for ETHTOOL_A_STRSET_STRINGSETS is not properly accounted for, causing the kernel to miscalculate buffer sizes during message processing. This can trigger under specific conditions: no skb (socket buffer) size rounding up, the string set being per-device (which populates the header), and the device name being at least 12 characters long. The vulnerability does not require privileges or user interaction to be triggered and can cause denial of service by crashing the kernel, impacting system availability. While no known exploits are reported in the wild, the vulnerability's nature and CVSS score of 7.5 (high) indicate a significant risk, especially for systems relying on affected Linux kernel versions. The vulnerability is related to CWE-266 (Incorrect Privilege Assignment), indicating improper handling of access or resource control within the kernel's ethtool netlink interface. The vulnerability was reserved in April 2024 and published in May 2024, with no patch links provided in the data, suggesting that mitigation requires kernel updates once available. The vulnerability is primarily a denial-of-service vector rather than confidentiality or integrity compromise.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of Linux-based systems, including servers, network appliances, and embedded devices that utilize the affected kernel versions. Given Linux's widespread use in enterprise environments, cloud infrastructure, and telecommunications across Europe, exploitation could lead to unexpected system crashes, service interruptions, and potential downtime. Critical infrastructure providers, financial institutions, and government agencies relying on Linux servers for networking and communication could experience operational disruptions. Although no direct confidentiality or integrity impact is indicated, denial of service in critical systems could indirectly affect business continuity and service delivery. The lack of required privileges or user interaction for exploitation increases the risk of automated or remote triggering, particularly in environments where ethtool commands or netlink interfaces are exposed or accessible. Organizations with long device names and per-device string sets in their network configurations are more susceptible. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the latest patched versions once available from their distribution vendors. Until patches are applied, organizations can mitigate risk by restricting access to the ethtool netlink interface, limiting which users or processes can issue ethtool commands, and monitoring for unusual kernel warnings or crashes related to ethtool. Network segmentation and strict access controls should be enforced to prevent unauthorized access to vulnerable systems. Additionally, auditing device names and configurations to avoid long device names (≥12 characters) where feasible may reduce triggering conditions. Employing kernel crash monitoring and automated recovery mechanisms can minimize downtime if exploitation occurs. Organizations should also maintain up-to-date intrusion detection systems capable of identifying abnormal netlink or ethtool activity. Collaboration with Linux distribution vendors to obtain timely patches and applying them in test environments before production deployment is critical. Finally, documenting and rehearsing incident response plans for denial-of-service events involving kernel crashes will improve resilience.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-04-10T18:59:19.532Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea17f
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 7/3/2025, 6:09:32 AM
Last updated: 8/16/2025, 4:39:25 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.