CVE-2024-26795

In the Linux kernel, the following vulnerability has been resolved: riscv: Sparse-Memory/vmemmap out-of-bounds fix Offset vmemmap so that the first page of vmemmap will be mapped to the first page of physical memory in order to ensure that vmemmap’s bounds will be respected during pfn_to_page()/page_to_pfn() operations. The conversion macros will produce correct SV39/48/57 addresses for every possible/valid DRAM_BASE inside the physical memory limits. v2:Address Alex's comments
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

19 Mar 2025, 11:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
First Time Debian debian Linux
Debian
Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9 - () https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9 - Patch
References () https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef - () https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef - Patch
References () https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe - () https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe - Patch
References () https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af - () https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af - Patch
References () https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd - () https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd - Patch
References () https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e - () https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e - Patch

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'name': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'tags': [], 'refsource': ''}

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

04 Apr 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-04 09:15

Updated : 2025-03-19 11:42


NVD link : CVE-2024-26795

Mitre link : CVE-2024-26795


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux