๐Ÿ” CVE Alert

CVE-2024-57945

UNKNOWN 0.0

riscv: mm: Fix the out of bound issue of vmemmap address

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: riscv: mm: Fix the out of bound issue of vmemmap address In sparse vmemmap model, the virtual address of vmemmap is calculated as: ((struct page *)VMEMMAP_START - (phys_ram_base >> PAGE_SHIFT)). And the struct page's va can be calculated with an offset: (vmemmap + (pfn)). However, when initializing struct pages, kernel actually starts from the first page from the same section that phys_ram_base belongs to. If the first page's physical address is not (phys_ram_base >> PAGE_SHIFT), then we get an va below VMEMMAP_START when calculating va for it's struct page. For example, if phys_ram_base starts from 0x82000000 with pfn 0x82000, the first page in the same section is actually pfn 0x80000. During init_unavailable_range(), we will initialize struct page for pfn 0x80000 with virtual address ((struct page *)VMEMMAP_START - 0x2000), which is below VMEMMAP_START as well as PCI_IO_END. This commit fixes this bug by introducing a new variable 'vmemmap_start_pfn' which is aligned with memory section size and using it to calculate vmemmap address instead of phys_ram_base.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 21, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8310080799b40fd9f2a8b808c657269678c149af < 92f08673d3f1893191323572f60e3c62f2e57c2f a278d5c60f21aa15d540abb2f2da6e6d795c3e6e < a4a7ac3d266008018f05fae53060fcb331151a14 a11dd49dcb9376776193e15641f84fcc1e5980c9 < d2bd51954ac8377c2f1eb1813e694788998add66 a11dd49dcb9376776193e15641f84fcc1e5980c9 < f754f27e98f88428aaf6be6e00f5cbce97f62d4b 8af1c121b0102041809bc137ec600d1865eaeedd 5941a90c55d3bfba732b32208d58d997600b44ef 2a1728c15ec4f45ed9248ae22f626541c179bfbe
Linux / Linux
6.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/92f08673d3f1893191323572f60e3c62f2e57c2f git.kernel.org: https://git.kernel.org/stable/c/a4a7ac3d266008018f05fae53060fcb331151a14 git.kernel.org: https://git.kernel.org/stable/c/d2bd51954ac8377c2f1eb1813e694788998add66 git.kernel.org: https://git.kernel.org/stable/c/f754f27e98f88428aaf6be6e00f5cbce97f62d4b lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html