CVE-2024-26795

In the Linux kernel, the following vulnerability has been resolved: riscv: Sparse-Memory/vmemmap out-of-bounds fix Offset vmemmap so that the first page of vmemmap will be mapped to the first page of physical memory in order to ensure that vmemmap’s bounds will be respected during pfn_to_page()/page_to_pfn() operations. The conversion macros will produce correct SV39/48/57 addresses for every possible/valid DRAM_BASE inside the physical memory limits. v2:Address Alex's comments
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

19 Mar 2025, 11:42

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe - () https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe - Patch
References () https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef - () https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef - Patch
References () https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af - () https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af - Patch
References () https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd - () https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd - Patch
References () https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9 - () https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9 - Patch
References () https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e - () https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Debian debian Linux
Linux linux Kernel
Debian
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Information

Published : 2024-04-04 09:15

Updated : 2025-03-19 11:42


NVD link : CVE-2024-26795

Mitre link : CVE-2024-26795

CVE.ORG link : CVE-2024-26795


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux