Skip to main content

CVE-2024-42235: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-42235cvecve-2024-42235
Published: Wed Aug 07 2024 (08/07/2024, 15:14:25 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: s390/mm: Add NULL pointer check to crst_table_free() base_crst_free() crst_table_free() used to work with NULL pointers before the conversion to ptdescs. Since crst_table_free() can be called with a NULL pointer (error handling in crst_table_upgrade() add an explicit check. Also add the same check to base_crst_free() for consistency reasons. In real life this should not happen, since order two GFP_KERNEL allocations will not fail, unless FAIL_PAGE_ALLOC is enabled and used.

AI-Powered Analysis

AILast updated: 06/29/2025, 06:10:06 UTC

Technical Analysis

CVE-2024-42235 addresses a vulnerability in the Linux kernel specifically related to the s390 architecture's memory management subsystem. The issue involves the functions crst_table_free() and base_crst_free(), which are responsible for freeing certain kernel resources. Historically, crst_table_free() could handle NULL pointers due to legacy behavior before a conversion to ptdescs (page table descriptors). However, after this conversion, the function lacked explicit NULL pointer checks, which could lead to undefined behavior or kernel crashes if called with a NULL pointer. The vulnerability arises because error handling in crst_table_upgrade() might call crst_table_free() with a NULL pointer, a scenario not properly guarded against. The patch introduces explicit NULL pointer checks in both crst_table_free() and base_crst_free() to prevent dereferencing NULL pointers, thereby improving kernel stability and security. The vulnerability is unlikely to be triggered under normal operation since the involved memory allocations (two GFP_KERNEL allocations) are expected not to fail unless a special kernel configuration (FAIL_PAGE_ALLOC) is enabled and actively used. No known exploits are reported in the wild, and the vulnerability is primarily a robustness issue that could lead to kernel crashes or denial of service on affected systems running the s390 architecture Linux kernel versions prior to the patch.

Potential Impact

For European organizations, the impact of CVE-2024-42235 is generally limited due to its specificity to the s390 architecture, which is IBM's mainframe platform. Organizations using Linux on s390 mainframes—typically large enterprises, financial institutions, or government agencies—could experience kernel panics or denial of service if this vulnerability is triggered. This could disrupt critical services, data processing, or transaction systems reliant on these mainframes. Although the vulnerability does not appear to allow privilege escalation or remote code execution, the potential for system instability or crashes can impact availability, leading to operational downtime and potential financial losses. Since the vulnerability requires a rare kernel configuration (FAIL_PAGE_ALLOC) to be exploitable, the risk is lower for most standard deployments. However, organizations with customized kernel builds or those performing advanced memory management testing might be more exposed. The lack of known exploits reduces immediate threat but does not eliminate the need for patching to maintain system integrity and reliability.

Mitigation Recommendations

European organizations using Linux on s390 architecture should prioritize applying the patch that adds NULL pointer checks to crst_table_free() and base_crst_free(). System administrators should verify kernel versions and update to the fixed release as soon as possible. Additionally, organizations should audit their kernel configurations to check if FAIL_PAGE_ALLOC is enabled or used, as this increases exposure to the vulnerability. Disabling or avoiding the use of FAIL_PAGE_ALLOC unless necessary can reduce risk. Monitoring kernel logs for unusual crashes or memory allocation failures can help detect attempts to trigger this issue. For environments where patching is delayed, implementing strict access controls and limiting kernel-level testing or debugging activities can reduce the chance of accidental exploitation. Finally, maintaining up-to-date backups and recovery procedures for critical mainframe systems will mitigate operational impact in case of unexpected crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-30T07:40:12.252Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9827c4522896dcbe1c9e

Added to database: 5/21/2025, 9:08:55 AM

Last enriched: 6/29/2025, 6:10:06 AM

Last updated: 8/11/2025, 3:05:08 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats