๐Ÿ” CVE Alert

CVE-2024-47743

UNKNOWN 0.0

KEYS: prevent NULL pointer dereference in find_asymmetric_key()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: KEYS: prevent NULL pointer dereference in find_asymmetric_key() In find_asymmetric_key(), if all NULLs are passed in the id_{0,1,2} arguments, the kernel will first emit WARN but then have an oops because id_2 gets dereferenced anyway. Add the missing id_2 check and move WARN_ON() to the final else branch to avoid duplicate NULL checks. Found by Linux Verification Center (linuxtesting.org) with Svace static analysis tool.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7d30198ee24f2ddcc4fefcd38a9b76bd8ab31360 < 3322fa8f2aa40b0b3651034cd541647a600cc6c0 7d30198ee24f2ddcc4fefcd38a9b76bd8ab31360 < a3765b497a4f5224cb2f7a6a2d3357d3066214ee 7d30198ee24f2ddcc4fefcd38a9b76bd8ab31360 < 13b5b401ead95b5d8266f64904086c55b6024900 7d30198ee24f2ddcc4fefcd38a9b76bd8ab31360 < 0d3b0706ada15c333e6f9faf19590ff715e45d1e 7d30198ee24f2ddcc4fefcd38a9b76bd8ab31360 < 70fd1966c93bf3bfe3fe6d753eb3d83a76597eef
Linux / Linux
5.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3322fa8f2aa40b0b3651034cd541647a600cc6c0 git.kernel.org: https://git.kernel.org/stable/c/a3765b497a4f5224cb2f7a6a2d3357d3066214ee git.kernel.org: https://git.kernel.org/stable/c/13b5b401ead95b5d8266f64904086c55b6024900 git.kernel.org: https://git.kernel.org/stable/c/0d3b0706ada15c333e6f9faf19590ff715e45d1e git.kernel.org: https://git.kernel.org/stable/c/70fd1966c93bf3bfe3fe6d753eb3d83a76597eef lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html