Skip to main content

CVE-2024-35987: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35987cvecve-2024-35987
Published: Mon May 20 2024 (05/20/2024, 09:47:53 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: riscv: Fix loading 64-bit NOMMU kernels past the start of RAM commit 3335068f8721 ("riscv: Use PUD/P4D/PGD pages for the linear mapping") added logic to allow using RAM below the kernel load address. However, this does not work for NOMMU, where PAGE_OFFSET is fixed to the kernel load address. Since that range of memory corresponds to PFNs below ARCH_PFN_OFFSET, mm initialization runs off the beginning of mem_map and corrupts adjacent kernel memory. Fix this by restoring the previous behavior for NOMMU kernels.

AI-Powered Analysis

AILast updated: 06/29/2025, 08:56:43 UTC

Technical Analysis

CVE-2024-35987 is a vulnerability identified in the Linux kernel specifically affecting the RISC-V architecture when running 64-bit NOMMU (no memory management unit) kernels. The issue stems from a recent kernel commit (3335068f8721) that introduced logic to allow the use of RAM below the kernel load address by employing PUD/P4D/PGD pages for linear memory mapping. However, this logic does not properly apply to NOMMU kernels because the PAGE_OFFSET is fixed to the kernel load address in such configurations. Consequently, the memory range below the kernel load address corresponds to page frame numbers (PFNs) below ARCH_PFN_OFFSET, causing the memory management (mm) initialization process to operate incorrectly. This results in the mm initialization running off the beginning of the mem_map array, which leads to corruption of adjacent kernel memory. The vulnerability is addressed by restoring the previous behavior for NOMMU kernels, effectively preventing the mm initialization from corrupting kernel memory. This flaw is a memory corruption issue at the kernel level, which could potentially lead to system instability or crashes. However, it is important to note that this vulnerability specifically affects 64-bit NOMMU kernels on RISC-V architectures, which are less common compared to traditional Linux deployments on x86 or ARM architectures. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-35987 is likely limited due to the niche nature of the affected environment—64-bit NOMMU Linux kernels on RISC-V architectures. Most enterprise Linux deployments in Europe run on x86_64 or ARM architectures with MMU enabled, making this vulnerability less relevant to mainstream server or desktop environments. However, organizations involved in embedded systems, IoT devices, or specialized industrial applications using RISC-V NOMMU kernels could be at risk. Exploitation could lead to kernel memory corruption, causing system crashes, denial of service, or potentially enabling privilege escalation if attackers can leverage the memory corruption to execute arbitrary code. Given the absence of known exploits and the technical complexity of the environment, the immediate risk is low for most European enterprises. Nonetheless, sectors such as manufacturing, automotive, or telecommunications that are early adopters of RISC-V embedded Linux systems should be vigilant. Additionally, research institutions or companies developing RISC-V based hardware and software in Europe may need to prioritize patching to maintain system integrity and stability.

Mitigation Recommendations

To mitigate CVE-2024-35987, organizations using affected Linux kernels on RISC-V NOMMU platforms should apply the patch that restores the previous memory mapping behavior for NOMMU kernels as soon as it becomes available. Since this vulnerability arises from a specific kernel commit, ensuring that kernel versions are updated to include the fix is critical. For embedded and IoT device manufacturers, integrating the patched kernel into firmware updates and pushing these updates to deployed devices is essential. Additionally, organizations should audit their use of RISC-V NOMMU kernels to identify affected systems. Employing kernel integrity monitoring and system stability checks can help detect early signs of exploitation or memory corruption. Where possible, consider migrating to kernel configurations with MMU enabled or architectures less susceptible to this issue. Finally, maintain close communication with Linux kernel maintainers and security advisories to stay informed about any emerging exploits or additional patches related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.145Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe23a8

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 8:56:43 AM

Last updated: 8/1/2025, 3:58:03 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats