In the Linux kernel, the following vulnerability has been resolved:
mm: huge_memory: don't force huge page alignment on 32 bit
commit efa7df3e3bb5 ("mm: align larger anonymous mappings on THP
boundaries") caused two issues [1] [2] reported on 32 bit system or compat
userspace.
It doesn't make too much sense to force huge page alignment on 32 bit
system due to the constrained virtual address space.
[1] https://lore.kernel.org/linux-mm/d0a136a0-4a31-46bc-adf4-2db109a61672@kernel.org/
[2] https://lore.kernel.org/linux-mm/CAJuCfpHXLdQy1a2B6xN2d7quTYwg2OoZseYPZTRpU0eHHKD-sQ@mail.gmail.com/
References
Configurations
Configuration 1 (hide)
|
History
16 Jan 2025, 17:11
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/4ef9ad19e17676b9ef071309bc62020e2373705d - Patch | |
References | () https://git.kernel.org/stable/c/6ea9aa8d97e6563676094cb35755884173269555 - Patch | |
References | () https://git.kernel.org/stable/c/7432376c913381c5f24d373a87ff629bbde94b47 - Patch | |
References | () https://git.kernel.org/stable/c/87632bc9ecff5ded93433bc0fca428019bdd1cfe - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/08/3 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/08/4 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/08/5 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/08/6 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/08/7 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/08/8 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/09/1 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/5 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/7 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/8 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/11/4 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/11/5 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/11/7 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/12/3 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/13/2 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/13/7 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/15/1 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/15/2 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/16/1 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/16/2 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/29/2 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/30/2 - Patch | |
References | () https://zolutal.github.io/aslrnt/ - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo |
Information
Published : 2024-03-02 22:15
Updated : 2025-01-16 17:11
NVD link : CVE-2024-26621
Mitre link : CVE-2024-26621
CVE.ORG link : CVE-2024-26621
JSON object : View
Products Affected
linux
- linux_kernel
CWE