cve/2024/CVE-2024-26795.md
2025-09-29 21:09:30 +02:00

20 lines
1.1 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-26795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=d95f1a542c3df396137afa217ef9bd39cb8931ca%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
In the Linux kernel, the following vulnerability has been resolved:riscv: Sparse-Memory/vmemmap out-of-bounds fixOffset vmemmap so that the first page of vmemmap will be mappedto the first page of physical memory in order to ensure thatvmemmaps bounds will be respected duringpfn_to_page()/page_to_pfn() operations.The conversion macros will produce correct SV39/48/57 addressesfor every possible/valid DRAM_BASE inside the physical memory limits.v2:Address Alex's comments
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds