CVE-2026-29646
Summary
| CVE | CVE-2026-29646 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-20 21:16:19 UTC |
| Updated | 2026-04-20 21:16:19 UTC |
| Description | In OpenXiangShan NEMU prior to 55295c4, when running with RVH (Hypervisor extension) enabled, a VS-mode guest write to the supervisor interrupt-enable CSR (sie) may be handled incorrectly and can influence machine-level interrupt enable state (mie). This breaks privilege/virtualization isolation and can lead to denial of service or privilege-boundary violation in environments relying on NEMU for correct interrupt virtualization. |
Risk And Classification
Problem Types: n/a
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| docs.riscv.org/reference/isa/priv/hypervisor.html | [email protected] | docs.riscv.org | |
| docs.riscv.org/reference/isa/priv/supervisor.html | [email protected] | docs.riscv.org | |
| github.com/OpenXiangShan/NEMU/pull/938 | [email protected] | github.com | |
| github.com/OpenXiangShan/NEMU/pull/938/commits/55295c46580456d8d5a9d5736... | [email protected] | github.com | |
| docs.riscv.org/reference/isa/unpriv/zicsr.html | [email protected] | docs.riscv.org | |
| docs.riscv.org/reference/isa/priv/machine.html | [email protected] | docs.riscv.org | |
| github.com/OpenXiangShan/NEMU/issues/951 | [email protected] | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.