CVE-2024-57881
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-57881 affects the Linux kernel's memory management subsystem, specifically in the page allocation functionality. The vulnerability was discovered in December 2024 and involves a potential NULL pointer dereference in the splitlargebuddy() function when calling pfntopage() on possibly non-existent Page Frame Numbers (PFNs). This issue affects Linux kernel versions from 6.10 up to (excluding) 6.12.7, and release candidates 6.13-rc1 through 6.13-rc3 (NVD).

Technical details

The vulnerability occurs in the splitlargebuddy() function where pfntopage() might be called on a PFN that doesn't exist. In specific corner cases, such as when freeing the highest pageblock in the last memory section with CONFIGSPARSEMEM && !CONFIGSPARSEMEMEXTREME configurations, this results in _pfntosection() returning NULL and _sectionmemmapaddr() dereferencing that NULL pointer. The CVSS v3.1 base score is 5.5 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD, Kernel Patch).

Impact

The vulnerability can lead to system instability through NULL pointer dereference, potentially causing kernel crashes. The impact is primarily on system availability, with no direct impact on confidentiality or integrity. The CVSS scoring indicates high impact on availability but requires local access and low privileges to exploit (NVD).

Mitigation and workarounds

A fix has been developed and committed to the Linux kernel that modifies the splitlargebuddy() function to avoid calling pfntopage() for the first iteration where the page is already available. The patch has been merged into the mainline kernel and is being backported to affected stable versions. Users should update to Linux kernel version 6.12.7 or later to address this vulnerability (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40343MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-rt-modules-internal
NoYesDec 09, 2025
CVE-2025-40342MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-debug-modules-extra
NoYesDec 09, 2025
CVE-2025-40341MEDIUM5.1
  • Linux KernelLinux Kernel
  • linux-nvidia-tegra
NoYesDec 09, 2025
CVE-2025-40345N/AN/A
  • Linux KernelLinux Kernel
  • kernel-headers
NoYesDec 12, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management