Skip to main content

CVE-2024-42247: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-42247cvecve-2024-42247
Published: Wed Aug 07 2024 (08/07/2024, 15:14:32 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wireguard: allowedips: avoid unaligned 64-bit memory accesses On the parisc platform, the kernel issues kernel warnings because swap_endian() tries to load a 128-bit IPv6 address from an unaligned memory location: Kernel: unaligned access to 0x55f4688c in wg_allowedips_insert_v6+0x2c/0x80 [wireguard] (iir 0xf3010df) Kernel: unaligned access to 0x55f46884 in wg_allowedips_insert_v6+0x38/0x80 [wireguard] (iir 0xf2010dc) Avoid such unaligned memory accesses by instead using the get_unaligned_be64() helper macro. [Jason: replace src[8] in original patch with src+8]

AI-Powered Analysis

AILast updated: 06/29/2025, 06:12:04 UTC

Technical Analysis

CVE-2024-42247 is a vulnerability identified in the Linux kernel specifically affecting the WireGuard VPN implementation on the parisc (PA-RISC) platform. The issue arises from unaligned 64-bit memory accesses when handling IPv6 addresses in the allowedips component of WireGuard. On parisc architectures, which require aligned memory accesses, the kernel attempts to load a 128-bit IPv6 address from an unaligned memory location, triggering kernel warnings and potentially leading to undefined behavior. The root cause is that the swap_endian() function tries to load data without ensuring proper alignment, which is problematic on architectures like parisc that do not support unaligned memory access natively. The fix involves replacing the direct memory access with the get_unaligned_be64() helper macro, which safely handles unaligned 64-bit big-endian loads. This vulnerability is limited to a specific hardware architecture (parisc) and affects the WireGuard allowedips insertion code path in the Linux kernel. No known exploits are reported in the wild, and the vulnerability does not appear to allow direct privilege escalation or remote code execution but could cause kernel warnings or crashes due to improper memory access. The affected versions are specific Linux kernel commits identified by their hashes, indicating this is a recent and targeted fix. The vulnerability was published on August 7, 2024, and is currently in a published state without an assigned CVSS score.

Potential Impact

For European organizations, the impact of CVE-2024-42247 is generally low to medium, primarily depending on the use of the parisc platform and WireGuard VPN. The parisc architecture is relatively niche and uncommon in modern European IT infrastructures, which predominantly use x86_64 or ARM architectures. However, organizations that maintain legacy systems or specialized hardware running parisc Linux kernels with WireGuard enabled could experience kernel instability, warnings, or crashes, potentially leading to denial of service conditions on affected systems. This could disrupt VPN connectivity and impact secure communications. Since WireGuard is widely adopted for secure VPN tunnels, any instability in its kernel module could affect remote access and secure communications for affected systems. The vulnerability does not appear to allow privilege escalation or remote code execution, so confidentiality and integrity impacts are minimal. The main risk is availability degradation due to kernel faults. Given the lack of known exploits and the limited affected architecture, the threat to the broader European enterprise landscape is limited but should not be ignored in environments where parisc hardware is still in use.

Mitigation Recommendations

1. Apply the official Linux kernel patch that replaces unaligned memory accesses with the get_unaligned_be64() helper macro to ensure safe handling of IPv6 addresses in WireGuard on parisc platforms. 2. For organizations using parisc hardware, prioritize upgrading to the latest stable Linux kernel versions that include this fix. 3. Conduct an inventory to identify any legacy parisc systems running WireGuard and assess their exposure. 4. Implement kernel crash monitoring and alerting to detect any instability related to WireGuard allowedips processing. 5. If immediate patching is not feasible, consider disabling WireGuard on parisc systems temporarily to avoid kernel warnings and potential crashes. 6. Engage with hardware and OS vendors for support and guidance on maintaining secure and stable kernel versions on parisc platforms. 7. Regularly review kernel logs for unaligned access warnings that may indicate unpatched systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-30T07:40:12.254Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe1ce2

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 6:12:04 AM

Last updated: 8/16/2025, 4:14:22 PM

Views: 43

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats