CVE-2024-47743: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: KEYS: prevent NULL pointer dereference in find_asymmetric_key() In find_asymmetric_key(), if all NULLs are passed in the id_{0,1,2} arguments, the kernel will first emit WARN but then have an oops because id_2 gets dereferenced anyway. Add the missing id_2 check and move WARN_ON() to the final else branch to avoid duplicate NULL checks. Found by Linux Verification Center (linuxtesting.org) with Svace static analysis tool.
AI Analysis
Technical Summary
CVE-2024-47743 is a vulnerability identified in the Linux kernel, specifically within the find_asymmetric_key() function. This function is responsible for locating asymmetric keys based on provided identifiers id_0, id_1, and id_2. The vulnerability arises when all three id arguments are NULL. In this scenario, the kernel initially triggers a WARN message but subsequently dereferences id_2 without verifying if it is NULL, leading to a NULL pointer dereference and causing a kernel oops (crash). The root cause is the absence of a proper NULL check for id_2 before dereferencing it. The fix involves adding the missing NULL check for id_2 and restructuring the WARN_ON() call to avoid redundant NULL checks, thereby preventing the kernel from crashing under these conditions. This vulnerability was discovered by the Linux Verification Center using the Svace static analysis tool, highlighting the importance of static code analysis in identifying subtle kernel bugs. The vulnerability affects certain Linux kernel versions identified by the commit hash 7d30198ee24f2ddcc4fefcd38a9b76bd8ab31360. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The issue primarily impacts kernel stability and availability rather than confidentiality or integrity, as it leads to a denial-of-service condition through kernel crashes when triggered.
Potential Impact
For European organizations, the primary impact of CVE-2024-47743 is on system availability and reliability. Linux is widely used in servers, cloud infrastructure, embedded systems, and critical infrastructure across Europe. A kernel oops caused by this vulnerability can lead to system crashes, service interruptions, and potential downtime. While this vulnerability does not directly expose sensitive data or allow privilege escalation, repeated or targeted triggering could disrupt critical services, especially in environments where high availability is essential, such as financial institutions, healthcare providers, telecommunications, and government services. Systems running vulnerable Linux kernel versions could experience unexpected reboots or crashes, impacting business continuity and operational efficiency. Additionally, in environments where Linux is used in embedded or IoT devices, this vulnerability could cause device failures, affecting industrial control systems or network equipment. Although no exploits are known currently, the ease of triggering a NULL pointer dereference without authentication or complex conditions means that attackers or even accidental misconfigurations could cause denial-of-service conditions.
Mitigation Recommendations
To mitigate CVE-2024-47743, European organizations should prioritize updating their Linux kernels to the patched versions that include the fix for this vulnerability. Kernel updates should be tested in staging environments to ensure compatibility and stability before deployment in production. Organizations should implement rigorous patch management policies to ensure timely application of security updates. For environments where immediate patching is not feasible, monitoring kernel logs for WARN_ON messages related to find_asymmetric_key() and unexpected kernel oops can help detect attempts to trigger this vulnerability. Employing kernel crash dump analysis tools can assist in diagnosing and responding to crashes. Additionally, restricting access to systems running vulnerable kernels to trusted users and limiting the ability to invoke functions that could trigger this bug can reduce risk. In cloud or containerized environments, ensuring that base images use updated kernels and applying security hardening measures can further reduce exposure. Finally, organizations should maintain robust backup and recovery procedures to minimize downtime impact in case of crashes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-47743: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: KEYS: prevent NULL pointer dereference in find_asymmetric_key() In find_asymmetric_key(), if all NULLs are passed in the id_{0,1,2} arguments, the kernel will first emit WARN but then have an oops because id_2 gets dereferenced anyway. Add the missing id_2 check and move WARN_ON() to the final else branch to avoid duplicate NULL checks. Found by Linux Verification Center (linuxtesting.org) with Svace static analysis tool.
AI-Powered Analysis
Technical Analysis
CVE-2024-47743 is a vulnerability identified in the Linux kernel, specifically within the find_asymmetric_key() function. This function is responsible for locating asymmetric keys based on provided identifiers id_0, id_1, and id_2. The vulnerability arises when all three id arguments are NULL. In this scenario, the kernel initially triggers a WARN message but subsequently dereferences id_2 without verifying if it is NULL, leading to a NULL pointer dereference and causing a kernel oops (crash). The root cause is the absence of a proper NULL check for id_2 before dereferencing it. The fix involves adding the missing NULL check for id_2 and restructuring the WARN_ON() call to avoid redundant NULL checks, thereby preventing the kernel from crashing under these conditions. This vulnerability was discovered by the Linux Verification Center using the Svace static analysis tool, highlighting the importance of static code analysis in identifying subtle kernel bugs. The vulnerability affects certain Linux kernel versions identified by the commit hash 7d30198ee24f2ddcc4fefcd38a9b76bd8ab31360. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The issue primarily impacts kernel stability and availability rather than confidentiality or integrity, as it leads to a denial-of-service condition through kernel crashes when triggered.
Potential Impact
For European organizations, the primary impact of CVE-2024-47743 is on system availability and reliability. Linux is widely used in servers, cloud infrastructure, embedded systems, and critical infrastructure across Europe. A kernel oops caused by this vulnerability can lead to system crashes, service interruptions, and potential downtime. While this vulnerability does not directly expose sensitive data or allow privilege escalation, repeated or targeted triggering could disrupt critical services, especially in environments where high availability is essential, such as financial institutions, healthcare providers, telecommunications, and government services. Systems running vulnerable Linux kernel versions could experience unexpected reboots or crashes, impacting business continuity and operational efficiency. Additionally, in environments where Linux is used in embedded or IoT devices, this vulnerability could cause device failures, affecting industrial control systems or network equipment. Although no exploits are known currently, the ease of triggering a NULL pointer dereference without authentication or complex conditions means that attackers or even accidental misconfigurations could cause denial-of-service conditions.
Mitigation Recommendations
To mitigate CVE-2024-47743, European organizations should prioritize updating their Linux kernels to the patched versions that include the fix for this vulnerability. Kernel updates should be tested in staging environments to ensure compatibility and stability before deployment in production. Organizations should implement rigorous patch management policies to ensure timely application of security updates. For environments where immediate patching is not feasible, monitoring kernel logs for WARN_ON messages related to find_asymmetric_key() and unexpected kernel oops can help detect attempts to trigger this vulnerability. Employing kernel crash dump analysis tools can assist in diagnosing and responding to crashes. Additionally, restricting access to systems running vulnerable kernels to trusted users and limiting the ability to invoke functions that could trigger this bug can reduce risk. In cloud or containerized environments, ensuring that base images use updated kernels and applying security hardening measures can further reduce exposure. Finally, organizations should maintain robust backup and recovery procedures to minimize downtime impact in case of crashes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-09-30T16:00:12.960Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9825c4522896dcbe0687
Added to database: 5/21/2025, 9:08:53 AM
Last enriched: 6/28/2025, 8:24:49 PM
Last updated: 8/11/2025, 7:45:41 PM
Views: 11
Related Threats
CVE-2025-55345: CWE-61 UNIX Symbolic Link (Symlink) Following
HighCVE-2025-6184: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeum Tutor LMS Pro
HighCVE-2025-8762: Improper Physical Access Control in INSTAR 2K+
HighCVE-2025-8761: Denial of Service in INSTAR 2K+
HighCVE-2025-8760: Buffer Overflow in INSTAR 2K+
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.