CVE-2026-29645

NEMU (OpenXiangShan/NEMU) before v2025.12.r2 contains an improper instruction-validation flaw in its RISC-V Vector (RVV) decoder. The decoder does not correctly validate the funct3 field when decoding vsetvli/vsetivli/vsetvl, allowing certain invalid OP-V instruction encodings to be misinterpreted and executed as vset* configuration instructions rather than raising an illegal-instruction exception. This can be exploited by providing crafted RISC-V binaries to cause incorrect trap behavior, architectural state corruption/divergence, and potential denial of service in systems that rely on NEMU for correct execution or sandboxing.
Configurations

Configuration 1 (hide)

cpe:2.3:a:xiangshan:nemu:2025.12:r1:*:*:*:*:*:*

History

24 Apr 2026, 19:25

Type Values Removed Values Added
CPE cpe:2.3:a:xiangshan:nemu:2025.12:r1:*:*:*:*:*:*
First Time Xiangshan nemu
Xiangshan
References () https://docs.riscv.org/reference/isa/unpriv/v-st-ext.html - () https://docs.riscv.org/reference/isa/unpriv/v-st-ext.html - Product
References () https://github.com/OpenXiangShan/NEMU/commit/481de637d5fc5838356caee80a79e56a33754039 - () https://github.com/OpenXiangShan/NEMU/commit/481de637d5fc5838356caee80a79e56a33754039 - Patch
References () https://github.com/OpenXiangShan/NEMU/issues/952 - () https://github.com/OpenXiangShan/NEMU/issues/952 - Issue Tracking
References () https://github.com/OpenXiangShan/NEMU/pull/958 - () https://github.com/OpenXiangShan/NEMU/pull/958 - Issue Tracking

21 Apr 2026, 20:16

Type Values Removed Values Added
CWE CWE-1287
CWE-131
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

20 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-20 20:16

Updated : 2026-04-24 19:25


NVD link : CVE-2026-29645

Mitre link : CVE-2026-29645

CVE.ORG link : CVE-2026-29645


JSON object : View

Products Affected

xiangshan

  • nemu
CWE
CWE-131

Incorrect Calculation of Buffer Size

CWE-1287

Improper Validation of Specified Type of Input