Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openxiangshan
Openxiangshan nemu |
|
| Vendors & Products |
Openxiangshan
Openxiangshan nemu |
Fri, 24 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xiangshan
Xiangshan nemu |
|
| CPEs | cpe:2.3:a:xiangshan:nemu:2025.12:r1:*:*:*:*:*:* | |
| Vendors & Products |
Xiangshan
Xiangshan nemu |
Wed, 22 Apr 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Instruction Validation Flaw in NEMU's RISC-V Vector Decoder Allows Misinterpretation of Invalid Encodings | |
| Weaknesses | CWE-20 |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1287 CWE-131 |
|
| Metrics |
cvssV3_1
|
Mon, 20 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Instruction Validation Flaw in NEMU's RISC-V Vector Decoder Allows Misinterpretation of Invalid Encodings | |
| Weaknesses | CWE-20 |
Mon, 20 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NEMU (OpenXiangShan/NEMU) before v2025.12.r2 contains an improper instruction-validation flaw in its RISC-V Vector (RVV) decoder. The decoder does not correctly validate the funct3 field when decoding vsetvli/vsetivli/vsetvl, allowing certain invalid OP-V instruction encodings to be misinterpreted and executed as vset* configuration instructions rather than raising an illegal-instruction exception. This can be exploited by providing crafted RISC-V binaries to cause incorrect trap behavior, architectural state corruption/divergence, and potential denial of service in systems that rely on NEMU for correct execution or sandboxing. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-21T19:51:06.424Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-29645
Updated: 2026-04-21T13:32:16.123Z
Status : Analyzed
Published: 2026-04-20T20:16:48.303
Modified: 2026-04-24T19:25:35.653
Link: CVE-2026-29645
No data.
OpenCVE Enrichment
Updated: 2026-04-28T09:26:47Z