In the Linux kernel, the following vulnerability has been resolved:
riscv: Sparse-Memory/vmemmap out-of-bounds fix
Offset vmemmap so that the first page of vmemmap will be mapped
to the first page of physical memory in order to ensure that
vmemmap’s bounds will be respected during
pfn_to_page()/page_to_pfn() operations.
The conversion macros will produce correct SV39/48/57 addresses
for every possible/valid DRAM_BASE inside the physical memory limits.
v2:Address Alex’s comments
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
[
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "unaffected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"arch/riscv/include/asm/pgtable.h"
],
"versions": [
{
"version": "d95f1a542c3d",
"lessThan": "8af1c121b010",
"status": "affected",
"versionType": "git"
},
{
"version": "d95f1a542c3d",
"lessThan": "5941a90c55d3",
"status": "affected",
"versionType": "git"
},
{
"version": "d95f1a542c3d",
"lessThan": "8310080799b4",
"status": "affected",
"versionType": "git"
},
{
"version": "d95f1a542c3d",
"lessThan": "a278d5c60f21",
"status": "affected",
"versionType": "git"
},
{
"version": "d95f1a542c3d",
"lessThan": "2a1728c15ec4",
"status": "affected",
"versionType": "git"
},
{
"version": "d95f1a542c3d",
"lessThan": "a11dd49dcb93",
"status": "affected",
"versionType": "git"
}
]
},
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "affected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"arch/riscv/include/asm/pgtable.h"
],
"versions": [
{
"version": "5.4",
"status": "affected"
},
{
"version": "0",
"lessThan": "5.4",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.212",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15.151",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.81",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.21",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.7.9",
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
]
}
]
git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe
git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef
git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af
git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd
git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9
git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e
lists.debian.org/debian-lts-announce/2024/06/msg00017.html