In the Linux kernel, the following vulnerability has been resolved:
riscv: Fix TASK_SIZE on 64-bit NOMMU
On NOMMU, userspace memory can come from anywhere in physical RAM. The
current definition of TASK_SIZE is wrong if any RAM exists above 4G,
causing spurious failures in the userspace access routines.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 03:36
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/04bf2e5f95c1a52e28a7567a507f926efe31c3b6 - Patch | |
| References | () https://git.kernel.org/stable/c/4201b8c8f2c32af321fb50867e68ac6c1cbed4be - Patch | |
| References | () https://git.kernel.org/stable/c/52e8a42b11078d2aad4b9ba96503d77c7299168b - Patch | |
| References | () https://git.kernel.org/stable/c/6065e736f82c817c9a597a31ee67f0ce4628e948 - Patch | |
| References | () https://git.kernel.org/stable/c/a0f0dbbb1bc49fa0de18e92c36492ff6d804cdaa - Patch | |
| References | () https://git.kernel.org/stable/c/efdcfa554b6eb228943ef1dd4d023c606be647d2 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory, Mailing List | |
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
21 Nov 2024, 09:21
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/04bf2e5f95c1a52e28a7567a507f926efe31c3b6 - | |
| References | () https://git.kernel.org/stable/c/4201b8c8f2c32af321fb50867e68ac6c1cbed4be - | |
| References | () https://git.kernel.org/stable/c/52e8a42b11078d2aad4b9ba96503d77c7299168b - | |
| References | () https://git.kernel.org/stable/c/6065e736f82c817c9a597a31ee67f0ce4628e948 - | |
| References | () https://git.kernel.org/stable/c/a0f0dbbb1bc49fa0de18e92c36492ff6d804cdaa - | |
| References | () https://git.kernel.org/stable/c/efdcfa554b6eb228943ef1dd4d023c606be647d2 - |
05 Nov 2024, 10:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
20 May 2024, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-20 10:15
Updated : 2025-12-17 03:36
NVD link : CVE-2024-35988
Mitre link : CVE-2024-35988
CVE.ORG link : CVE-2024-35988
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
