Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-57945
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-21 Jan, 2025 | 12:18
Updated At-03 Nov, 2025 | 19:32
Rejected At-
▼CVE Numbering Authority (CNA)
riscv: mm: Fix the out of bound issue of vmemmap address

In the Linux kernel, the following vulnerability has been resolved: riscv: mm: Fix the out of bound issue of vmemmap address In sparse vmemmap model, the virtual address of vmemmap is calculated as: ((struct page *)VMEMMAP_START - (phys_ram_base >> PAGE_SHIFT)). And the struct page's va can be calculated with an offset: (vmemmap + (pfn)). However, when initializing struct pages, kernel actually starts from the first page from the same section that phys_ram_base belongs to. If the first page's physical address is not (phys_ram_base >> PAGE_SHIFT), then we get an va below VMEMMAP_START when calculating va for it's struct page. For example, if phys_ram_base starts from 0x82000000 with pfn 0x82000, the first page in the same section is actually pfn 0x80000. During init_unavailable_range(), we will initialize struct page for pfn 0x80000 with virtual address ((struct page *)VMEMMAP_START - 0x2000), which is below VMEMMAP_START as well as PCI_IO_END. This commit fixes this bug by introducing a new variable 'vmemmap_start_pfn' which is aligned with memory section size and using it to calculate vmemmap address instead of phys_ram_base.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/riscv/include/asm/page.h
  • arch/riscv/include/asm/pgtable.h
  • arch/riscv/mm/init.c
Default Status
unaffected
Versions
Affected
  • From 8310080799b40fd9f2a8b808c657269678c149af before 92f08673d3f1893191323572f60e3c62f2e57c2f (git)
  • From a278d5c60f21aa15d540abb2f2da6e6d795c3e6e before a4a7ac3d266008018f05fae53060fcb331151a14 (git)
  • From a11dd49dcb9376776193e15641f84fcc1e5980c9 before d2bd51954ac8377c2f1eb1813e694788998add66 (git)
  • From a11dd49dcb9376776193e15641f84fcc1e5980c9 before f754f27e98f88428aaf6be6e00f5cbce97f62d4b (git)
  • 8af1c121b0102041809bc137ec600d1865eaeedd (git)
  • 5941a90c55d3bfba732b32208d58d997600b44ef (git)
  • 2a1728c15ec4f45ed9248ae22f626541c179bfbe (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/riscv/include/asm/page.h
  • arch/riscv/include/asm/pgtable.h
  • arch/riscv/mm/init.c
Default Status
affected
Versions
Affected
  • 6.8
Unaffected
  • From 0 before 6.8 (semver)
  • From 6.1.140 through 6.1.* (semver)
  • From 6.6.72 through 6.6.* (semver)
  • From 6.12.10 through 6.12.* (semver)
  • From 6.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/92f08673d3f1893191323572f60e3c62f2e57c2f
N/A
https://git.kernel.org/stable/c/a4a7ac3d266008018f05fae53060fcb331151a14
N/A
https://git.kernel.org/stable/c/d2bd51954ac8377c2f1eb1813e694788998add66
N/A
https://git.kernel.org/stable/c/f754f27e98f88428aaf6be6e00f5cbce97f62d4b
N/A
Hyperlink: https://git.kernel.org/stable/c/92f08673d3f1893191323572f60e3c62f2e57c2f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a4a7ac3d266008018f05fae53060fcb331151a14
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d2bd51954ac8377c2f1eb1813e694788998add66
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f754f27e98f88428aaf6be6e00f5cbce97f62d4b
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html
Resource: N/A
Details not found