{"uuid": "dc493a37-67ca-4559-ac68-a2829d162235", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43868", "type": "seen", "source": "https://t.me/cvedetector/3695", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43868 - RISC-V Purgatory Unaligned Memory Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43868 \nPublished : Aug. 21, 2024, 12:15 a.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nriscv/purgatory: align riscv_kernel_entry  \n  \nWhen alignment handling is delegated to the kernel, everything must be  \nword-aligned in purgatory, since the trap handler is then set to the  \nkexec one. Without the alignment, hitting the exception would  \nultimately crash. On other occasions, the kernel's handler would take  \ncare of exceptions.  \nThis has been tested on a JH7110 SoC with oreboot and its SBI delegating  \nunaligned access exceptions and the kernel configured to handle them. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-21T03:10:10.000000Z"}