CVE-2024-26795

Source
https://cve.org/CVERecord?id=CVE-2024-26795
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26795.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26795
Downstream
Published
2024-04-04T08:20:25.063Z
Modified
2026-03-13T07:53:40.306627Z
Summary
riscv: Sparse-Memory/vmemmap out-of-bounds fix
Details

In the Linux kernel, the following vulnerability has been resolved:

riscv: Sparse-Memory/vmemmap out-of-bounds fix

Offset vmemmap so that the first page of vmemmap will be mapped to the first page of physical memory in order to ensure that vmemmap’s bounds will be respected during pfntopage()/pagetopfn() operations. The conversion macros will produce correct SV39/48/57 addresses for every possible/valid DRAM_BASE inside the physical memory limits.

v2:Address Alex's comments

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26795.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d95f1a542c3df396137afa217ef9bd39cb8931ca
Fixed
8af1c121b0102041809bc137ec600d1865eaeedd
Fixed
5941a90c55d3bfba732b32208d58d997600b44ef
Fixed
8310080799b40fd9f2a8b808c657269678c149af
Fixed
a278d5c60f21aa15d540abb2f2da6e6d795c3e6e
Fixed
2a1728c15ec4f45ed9248ae22f626541c179bfbe
Fixed
a11dd49dcb9376776193e15641f84fcc1e5980c9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26795.json"