Bugzilla – Bug 1222794
VUL-0: CVE-2024-26795: kernel: riscv: Sparse-Memory/vmemmap out-of-bounds fix
Last modified: 2024-05-28 09:59:11 UTC
In the Linux kernel, the following vulnerability has been resolved: riscv: Sparse-Memory/vmemmap out-of-bounds fix Offset vmemmap so that the first page of vmemmap will be mapped to the first page of physical memory in order to ensure that vmemmap’s bounds will be respected during pfn_to_page()/page_to_pfn() operations. The conversion macros will produce correct SV39/48/57 addresses for every possible/valid DRAM_BASE inside the physical memory limits. v2:Address Alex's comments References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-26795 https://www.cve.org/CVERecord?id=CVE-2024-26795 https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9 https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e https://bugzilla.redhat.com/show_bug.cgi?id=2273440 https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-26795.mbox
This is for riscv only, I think we can close this. Do you agree Vasant?
riscv unsupported, closing