CVE-2024-35987: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: riscv: Fix loading 64-bit NOMMU kernels past the start of RAM commit 3335068f8721 ("riscv: Use PUD/P4D/PGD pages for the linear mapping") added logic to allow using RAM below the kernel load address. However, this does not work for NOMMU, where PAGE_OFFSET is fixed to the kernel load address. Since that range of memory corresponds to PFNs below ARCH_PFN_OFFSET, mm initialization runs off the beginning of mem_map and corrupts adjacent kernel memory. Fix this by restoring the previous behavior for NOMMU kernels.
AI Analysis
Technical Summary
CVE-2024-35987 is a vulnerability identified in the Linux kernel specifically affecting the RISC-V architecture when running 64-bit NOMMU (no memory management unit) kernels. The issue stems from a recent kernel commit (3335068f8721) that introduced logic to allow the use of RAM below the kernel load address by employing PUD/P4D/PGD pages for linear memory mapping. However, this logic does not properly apply to NOMMU kernels because the PAGE_OFFSET is fixed to the kernel load address in such configurations. Consequently, the memory range below the kernel load address corresponds to page frame numbers (PFNs) below ARCH_PFN_OFFSET, causing the memory management (mm) initialization process to operate incorrectly. This results in the mm initialization running off the beginning of the mem_map array, which leads to corruption of adjacent kernel memory. The vulnerability is addressed by restoring the previous behavior for NOMMU kernels, effectively preventing the mm initialization from corrupting kernel memory. This flaw is a memory corruption issue at the kernel level, which could potentially lead to system instability or crashes. However, it is important to note that this vulnerability specifically affects 64-bit NOMMU kernels on RISC-V architectures, which are less common compared to traditional Linux deployments on x86 or ARM architectures. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2024-35987 is likely limited due to the niche nature of the affected environment—64-bit NOMMU Linux kernels on RISC-V architectures. Most enterprise Linux deployments in Europe run on x86_64 or ARM architectures with MMU enabled, making this vulnerability less relevant to mainstream server or desktop environments. However, organizations involved in embedded systems, IoT devices, or specialized industrial applications using RISC-V NOMMU kernels could be at risk. Exploitation could lead to kernel memory corruption, causing system crashes, denial of service, or potentially enabling privilege escalation if attackers can leverage the memory corruption to execute arbitrary code. Given the absence of known exploits and the technical complexity of the environment, the immediate risk is low for most European enterprises. Nonetheless, sectors such as manufacturing, automotive, or telecommunications that are early adopters of RISC-V embedded Linux systems should be vigilant. Additionally, research institutions or companies developing RISC-V based hardware and software in Europe may need to prioritize patching to maintain system integrity and stability.
Mitigation Recommendations
To mitigate CVE-2024-35987, organizations using affected Linux kernels on RISC-V NOMMU platforms should apply the patch that restores the previous memory mapping behavior for NOMMU kernels as soon as it becomes available. Since this vulnerability arises from a specific kernel commit, ensuring that kernel versions are updated to include the fix is critical. For embedded and IoT device manufacturers, integrating the patched kernel into firmware updates and pushing these updates to deployed devices is essential. Additionally, organizations should audit their use of RISC-V NOMMU kernels to identify affected systems. Employing kernel integrity monitoring and system stability checks can help detect early signs of exploitation or memory corruption. Where possible, consider migrating to kernel configurations with MMU enabled or architectures less susceptible to this issue. Finally, maintain close communication with Linux kernel maintainers and security advisories to stay informed about any emerging exploits or additional patches related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2024-35987: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: riscv: Fix loading 64-bit NOMMU kernels past the start of RAM commit 3335068f8721 ("riscv: Use PUD/P4D/PGD pages for the linear mapping") added logic to allow using RAM below the kernel load address. However, this does not work for NOMMU, where PAGE_OFFSET is fixed to the kernel load address. Since that range of memory corresponds to PFNs below ARCH_PFN_OFFSET, mm initialization runs off the beginning of mem_map and corrupts adjacent kernel memory. Fix this by restoring the previous behavior for NOMMU kernels.
AI-Powered Analysis
Technical Analysis
CVE-2024-35987 is a vulnerability identified in the Linux kernel specifically affecting the RISC-V architecture when running 64-bit NOMMU (no memory management unit) kernels. The issue stems from a recent kernel commit (3335068f8721) that introduced logic to allow the use of RAM below the kernel load address by employing PUD/P4D/PGD pages for linear memory mapping. However, this logic does not properly apply to NOMMU kernels because the PAGE_OFFSET is fixed to the kernel load address in such configurations. Consequently, the memory range below the kernel load address corresponds to page frame numbers (PFNs) below ARCH_PFN_OFFSET, causing the memory management (mm) initialization process to operate incorrectly. This results in the mm initialization running off the beginning of the mem_map array, which leads to corruption of adjacent kernel memory. The vulnerability is addressed by restoring the previous behavior for NOMMU kernels, effectively preventing the mm initialization from corrupting kernel memory. This flaw is a memory corruption issue at the kernel level, which could potentially lead to system instability or crashes. However, it is important to note that this vulnerability specifically affects 64-bit NOMMU kernels on RISC-V architectures, which are less common compared to traditional Linux deployments on x86 or ARM architectures. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2024-35987 is likely limited due to the niche nature of the affected environment—64-bit NOMMU Linux kernels on RISC-V architectures. Most enterprise Linux deployments in Europe run on x86_64 or ARM architectures with MMU enabled, making this vulnerability less relevant to mainstream server or desktop environments. However, organizations involved in embedded systems, IoT devices, or specialized industrial applications using RISC-V NOMMU kernels could be at risk. Exploitation could lead to kernel memory corruption, causing system crashes, denial of service, or potentially enabling privilege escalation if attackers can leverage the memory corruption to execute arbitrary code. Given the absence of known exploits and the technical complexity of the environment, the immediate risk is low for most European enterprises. Nonetheless, sectors such as manufacturing, automotive, or telecommunications that are early adopters of RISC-V embedded Linux systems should be vigilant. Additionally, research institutions or companies developing RISC-V based hardware and software in Europe may need to prioritize patching to maintain system integrity and stability.
Mitigation Recommendations
To mitigate CVE-2024-35987, organizations using affected Linux kernels on RISC-V NOMMU platforms should apply the patch that restores the previous memory mapping behavior for NOMMU kernels as soon as it becomes available. Since this vulnerability arises from a specific kernel commit, ensuring that kernel versions are updated to include the fix is critical. For embedded and IoT device manufacturers, integrating the patched kernel into firmware updates and pushing these updates to deployed devices is essential. Additionally, organizations should audit their use of RISC-V NOMMU kernels to identify affected systems. Employing kernel integrity monitoring and system stability checks can help detect early signs of exploitation or memory corruption. Where possible, consider migrating to kernel configurations with MMU enabled or architectures less susceptible to this issue. Finally, maintain close communication with Linux kernel maintainers and security advisories to stay informed about any emerging exploits or additional patches related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T13:50:33.145Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe23a8
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 8:56:43 AM
Last updated: 8/1/2025, 3:58:03 PM
Views: 11
Related Threats
CVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57702: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57701: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57700: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
HighCVE-2025-9109: Observable Response Discrepancy in Portabilis i-Diario
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.