CVE-2024-47658: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: crypto: stm32/cryp - call finalize with bh disabled The finalize operation in interrupt mode produce a produces a spinlock recursion warning. The reason is the fact that BH must be disabled during this process.
AI Analysis
Technical Summary
CVE-2024-47658 is a vulnerability identified in the Linux kernel specifically within the cryptographic subsystem for the STM32 platform (crypto: stm32/cryp). The issue arises during the finalize operation of cryptographic processing when executed in interrupt context. The vulnerability manifests as a spinlock recursion warning caused by improper handling of bottom halves (BH) during the finalize call. In Linux kernel programming, bottom halves represent deferred work that must be disabled to prevent concurrency issues during critical sections. The finalize operation in this case is called without disabling BH, leading to potential recursive locking of spinlocks. This can cause kernel warnings and may lead to deadlocks or system instability. The vulnerability is rooted in kernel synchronization mechanisms and interrupt handling, which are critical for maintaining kernel integrity and performance. Although no known exploits are currently reported in the wild, the flaw could be triggered by crafted kernel operations or malicious code running with sufficient privileges to invoke the affected cryptographic finalize function. The affected versions are identified by specific commit hashes, indicating the vulnerability is present in certain Linux kernel builds prior to the patch. The issue was reserved on 2024-09-30 and published on 2024-10-09, with no CVSS score assigned yet. The fix involves ensuring BH is disabled during the finalize call to prevent spinlock recursion warnings and maintain proper kernel synchronization.
Potential Impact
For European organizations, the impact of CVE-2024-47658 primarily concerns systems running Linux kernels with the affected STM32 cryptographic module, which is common in embedded devices and IoT platforms. Organizations relying on Linux-based embedded systems for industrial control, telecommunications, or critical infrastructure could face system instability or kernel panics if the vulnerability is triggered. While the vulnerability does not directly lead to privilege escalation or data leakage, the potential for kernel deadlocks or crashes can disrupt services, leading to availability issues. This is particularly significant for sectors such as manufacturing, energy, and transportation, where embedded Linux devices are prevalent. Additionally, the cryptographic nature of the module suggests that secure communications or data protection functions could be impaired, indirectly affecting confidentiality and integrity if systems become unreliable or require emergency reboots. Given the absence of known exploits, the immediate risk is moderate; however, the vulnerability should be addressed promptly to prevent future exploitation or accidental system failures.
Mitigation Recommendations
To mitigate CVE-2024-47658, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability, ensuring the finalize operation disables bottom halves as required. 2) Identify and inventory all embedded and IoT devices running affected Linux kernel versions, particularly those using STM32 cryptographic modules. 3) For devices where patching is not immediately feasible, consider isolating them from critical networks or limiting their exposure to untrusted inputs to reduce risk. 4) Monitor kernel logs for spinlock recursion warnings or related kernel messages that may indicate attempts to trigger the vulnerability. 5) Collaborate with device vendors and maintainers to ensure firmware updates incorporate the fix. 6) Implement robust incident response plans for embedded device failures to minimize downtime. These steps go beyond generic advice by focusing on embedded Linux environments and the specific cryptographic module affected.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland
CVE-2024-47658: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: crypto: stm32/cryp - call finalize with bh disabled The finalize operation in interrupt mode produce a produces a spinlock recursion warning. The reason is the fact that BH must be disabled during this process.
AI-Powered Analysis
Technical Analysis
CVE-2024-47658 is a vulnerability identified in the Linux kernel specifically within the cryptographic subsystem for the STM32 platform (crypto: stm32/cryp). The issue arises during the finalize operation of cryptographic processing when executed in interrupt context. The vulnerability manifests as a spinlock recursion warning caused by improper handling of bottom halves (BH) during the finalize call. In Linux kernel programming, bottom halves represent deferred work that must be disabled to prevent concurrency issues during critical sections. The finalize operation in this case is called without disabling BH, leading to potential recursive locking of spinlocks. This can cause kernel warnings and may lead to deadlocks or system instability. The vulnerability is rooted in kernel synchronization mechanisms and interrupt handling, which are critical for maintaining kernel integrity and performance. Although no known exploits are currently reported in the wild, the flaw could be triggered by crafted kernel operations or malicious code running with sufficient privileges to invoke the affected cryptographic finalize function. The affected versions are identified by specific commit hashes, indicating the vulnerability is present in certain Linux kernel builds prior to the patch. The issue was reserved on 2024-09-30 and published on 2024-10-09, with no CVSS score assigned yet. The fix involves ensuring BH is disabled during the finalize call to prevent spinlock recursion warnings and maintain proper kernel synchronization.
Potential Impact
For European organizations, the impact of CVE-2024-47658 primarily concerns systems running Linux kernels with the affected STM32 cryptographic module, which is common in embedded devices and IoT platforms. Organizations relying on Linux-based embedded systems for industrial control, telecommunications, or critical infrastructure could face system instability or kernel panics if the vulnerability is triggered. While the vulnerability does not directly lead to privilege escalation or data leakage, the potential for kernel deadlocks or crashes can disrupt services, leading to availability issues. This is particularly significant for sectors such as manufacturing, energy, and transportation, where embedded Linux devices are prevalent. Additionally, the cryptographic nature of the module suggests that secure communications or data protection functions could be impaired, indirectly affecting confidentiality and integrity if systems become unreliable or require emergency reboots. Given the absence of known exploits, the immediate risk is moderate; however, the vulnerability should be addressed promptly to prevent future exploitation or accidental system failures.
Mitigation Recommendations
To mitigate CVE-2024-47658, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability, ensuring the finalize operation disables bottom halves as required. 2) Identify and inventory all embedded and IoT devices running affected Linux kernel versions, particularly those using STM32 cryptographic modules. 3) For devices where patching is not immediately feasible, consider isolating them from critical networks or limiting their exposure to untrusted inputs to reduce risk. 4) Monitor kernel logs for spinlock recursion warnings or related kernel messages that may indicate attempts to trigger the vulnerability. 5) Collaborate with device vendors and maintainers to ensure firmware updates incorporate the fix. 6) Implement robust incident response plans for embedded device failures to minimize downtime. These steps go beyond generic advice by focusing on embedded Linux environments and the specific cryptographic module affected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-09-30T16:00:12.935Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9825c4522896dcbe0409
Added to database: 5/21/2025, 9:08:53 AM
Last enriched: 6/28/2025, 7:10:55 PM
Last updated: 8/13/2025, 6:53:08 AM
Views: 16
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.