CVE-2024-26795

In the Linux kernel, the following vulnerability has been resolved: riscv: Sparse-Memory/vmemmap out-of-bounds fix Offset vmemmap so that the first page of vmemmap will be mapped to the first page of physical memory in order to ensure that vmemmap’s bounds will be respected during pfn_to_page()/page_to_pfn() operations. The conversion macros will produce correct SV39/48/57 addresses for every possible/valid DRAM_BASE inside the physical memory limits. v2:Address Alex's comments
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

19 Mar 2025, 11:42

Type Values Removed Values Added
First Time Debian
Linux linux Kernel
Linux
Debian debian Linux
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe - () https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe - Patch
References () https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef - () https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef - Patch
References () https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af - () https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af - Patch
References () https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd - () https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd - Patch
References () https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9 - () https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9 - Patch
References () https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e - () https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe - () https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe -
References () https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef - () https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef -
References () https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af - () https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af -
References () https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd - () https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd -
References () https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9 - () https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9 -
References () https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e - () https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e -

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 22:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: riscv: Sparse-Memory/vmemmap fuera de los límites corrige Offset vmemmap para que la primera página de vmemmap se asigne a la primera página de la memoria física para garantizar que vmemmap Los límites se respetarán durante las operaciones pfn_to_page()/page_to_pfn(). Las macros de conversión producirán direcciones SV39/48/57 correctas para cada DRAM_BASE posible/válida dentro de los límites de la memoria física. v2: Abordar los comentarios de Alex
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

04 Apr 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-04 09:15

Updated : 2025-03-19 11:42


NVD link : CVE-2024-26795

Mitre link : CVE-2024-26795

CVE.ORG link : CVE-2024-26795


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel