CVE-2024-47705
📋 TL;DR
This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's block subsystem. If exploited, it could cause a kernel panic leading to denial of service. The vulnerability affects Linux systems with block device partitioning functionality.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially requiring physical access to restart affected systems.
Likely Case
System instability or crash when specific block device operations are performed, resulting in temporary denial of service.
If Mitigated
No impact if the vulnerable code path is not triggered during normal operations.
🎯 Exploit Status
Exploitation requires triggering specific error conditions in block device partitioning operations, which may require local access and specific permissions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple stable kernel versions referenced in git commits
Vendor Advisory: https://git.kernel.org/stable/c/26e197b7f9240a4ac301dd0ad520c0c697c2ea7d
Restart Required: Yes
Instructions:
1. Update to a patched Linux kernel version from your distribution's repositories. 2. Reboot the system to load the new kernel. 3. Verify the kernel version after reboot.
🔧 Temporary Workarounds
Restrict block device operations
linuxLimit access to block device management operations to trusted users only
Use appropriate file permissions and access controls on /dev/block devices
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized users from performing block device operations
- Monitor system logs for kernel panic events and implement automated alerting
🔍 How to Verify
Check if Vulnerable:
Check kernel version against patched versions in distribution advisories
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version matches or exceeds patched version after update
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/messages or dmesg output
- NULL pointer dereference errors in kernel logs
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
Search for 'kernel panic' or 'NULL pointer dereference' in system logs
🔗 References
- https://git.kernel.org/stable/c/26e197b7f9240a4ac301dd0ad520c0c697c2ea7d
- https://git.kernel.org/stable/c/4bc4272e2506941c3f3d4fb8b0c659ee814dcf6f
- https://git.kernel.org/stable/c/64cf2a39202ca2d9df5ee70eb310b6141ce2b8ed
- https://git.kernel.org/stable/c/652039ba477c9a4ab43740cf2cb0d068d53508c2
- https://git.kernel.org/stable/c/80f5bfbb80ea1615290dbc24f49d3d8c86db58fe
- https://git.kernel.org/stable/c/afe53ea9b378c376101d99d216f13b6256f75189
- https://git.kernel.org/stable/c/cc4d21d9492db4e534d3e01253cf885c90dd2a8b
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html