CVE-2024-26621

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26621
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26621.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26621
Downstream
Published
2024-03-02T21:31:49Z
Modified
2025-10-14T12:46:23.890568Z
Summary
mm: huge_memory: don't force huge page alignment on 32 bit
Details

In the Linux kernel, the following vulnerability has been resolved:

mm: huge_memory: don't force huge page alignment on 32 bit

commit efa7df3e3bb5 ("mm: align larger anonymous mappings on THP boundaries") caused two issues [1] [2] reported on 32 bit system or compat userspace.

It doesn't make too much sense to force huge page alignment on 32 bit system due to the constrained virtual address space.

[1] https://lore.kernel.org/linux-mm/d0a136a0-4a31-46bc-adf4-2db109a61672@kernel.org/ [2] https://lore.kernel.org/linux-mm/CAJuCfpHXLdQy1a2B6xN2d7quTYwg2OoZseYPZTRpU0eHHKD-sQ@mail.gmail.com/

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1854bc6e2420472676c5c90d3d6b15f6cd640e40
Fixed
87632bc9ecff5ded93433bc0fca428019bdd1cfe
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1854bc6e2420472676c5c90d3d6b15f6cd640e40
Fixed
6ea9aa8d97e6563676094cb35755884173269555
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1854bc6e2420472676c5c90d3d6b15f6cd640e40
Fixed
7432376c913381c5f24d373a87ff629bbde94b47
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1854bc6e2420472676c5c90d3d6b15f6cd640e40
Fixed
4ef9ad19e17676b9ef071309bc62020e2373705d

Affected versions

v5.*

v5.17
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.21
v6.1.22
v6.1.23
v6.1.24
v6.1.25
v6.1.26
v6.1.27
v6.1.28
v6.1.29
v6.1.3
v6.1.30
v6.1.31
v6.1.32
v6.1.33
v6.1.34
v6.1.35
v6.1.36
v6.1.37
v6.1.38
v6.1.39
v6.1.4
v6.1.40
v6.1.41
v6.1.42
v6.1.43
v6.1.44
v6.1.45
v6.1.46
v6.1.47
v6.1.48
v6.1.49
v6.1.5
v6.1.50
v6.1.51
v6.1.52
v6.1.53
v6.1.54
v6.1.55
v6.1.56
v6.1.57
v6.1.58
v6.1.59
v6.1.6
v6.1.60
v6.1.61
v6.1.62
v6.1.63
v6.1.64
v6.1.65
v6.1.66
v6.1.67
v6.1.68
v6.1.69
v6.1.7
v6.1.70
v6.1.71
v6.1.72
v6.1.73
v6.1.74
v6.1.75
v6.1.76
v6.1.77
v6.1.78
v6.1.79
v6.1.8
v6.1.80
v6.1.9
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.3
v6.6.30
v6.6.31
v6.6.32
v6.6.33
v6.6.34
v6.6.35
v6.6.36
v6.6.37
v6.6.38
v6.6.39
v6.6.4
v6.6.40
v6.6.41
v6.6.42
v6.6.43
v6.6.44
v6.6.45
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.7.1
v6.7.2
v6.7.3
v6.7.4
v6.7.5
v6.8-rc1

Database specific

{
    "vanir_signatures": [
        {
            "target": {
                "function": "__thp_get_unmapped_area",
                "file": "mm/huge_memory.c"
            },
            "deprecated": false,
            "id": "CVE-2024-26621-059c7f6a",
            "digest": {
                "length": 608.0,
                "function_hash": "212364191967115171204154609842311597584"
            },
            "signature_version": "v1",
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4ef9ad19e17676b9ef071309bc62020e2373705d"
        },
        {
            "target": {
                "function": "__thp_get_unmapped_area",
                "file": "mm/huge_memory.c"
            },
            "deprecated": false,
            "id": "CVE-2024-26621-0d49e68c",
            "digest": {
                "length": 608.0,
                "function_hash": "212364191967115171204154609842311597584"
            },
            "signature_version": "v1",
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7432376c913381c5f24d373a87ff629bbde94b47"
        },
        {
            "target": {
                "file": "mm/huge_memory.c"
            },
            "deprecated": false,
            "id": "CVE-2024-26621-6ae70ea9",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "115692672156462162365985194683078228329",
                    "226982690462883740562783420837847445633",
                    "98797082203304043341397341320943251485",
                    "228031903051429799711023656095558141437",
                    "136825271428783206591839695091514250988",
                    "27402879687756670818056527989800676957",
                    "102743563795159333310252840108069690457"
                ]
            },
            "signature_version": "v1",
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87632bc9ecff5ded93433bc0fca428019bdd1cfe"
        },
        {
            "target": {
                "function": "__thp_get_unmapped_area",
                "file": "mm/huge_memory.c"
            },
            "deprecated": false,
            "id": "CVE-2024-26621-856d6200",
            "digest": {
                "length": 608.0,
                "function_hash": "212364191967115171204154609842311597584"
            },
            "signature_version": "v1",
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87632bc9ecff5ded93433bc0fca428019bdd1cfe"
        },
        {
            "target": {
                "function": "__thp_get_unmapped_area",
                "file": "mm/huge_memory.c"
            },
            "deprecated": false,
            "id": "CVE-2024-26621-a4da4a4c",
            "digest": {
                "length": 608.0,
                "function_hash": "212364191967115171204154609842311597584"
            },
            "signature_version": "v1",
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6ea9aa8d97e6563676094cb35755884173269555"
        },
        {
            "target": {
                "file": "mm/huge_memory.c"
            },
            "deprecated": false,
            "id": "CVE-2024-26621-b98b4930",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "115692672156462162365985194683078228329",
                    "226982690462883740562783420837847445633",
                    "98797082203304043341397341320943251485",
                    "228031903051429799711023656095558141437",
                    "136825271428783206591839695091514250988",
                    "27402879687756670818056527989800676957",
                    "102743563795159333310252840108069690457"
                ]
            },
            "signature_version": "v1",
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4ef9ad19e17676b9ef071309bc62020e2373705d"
        },
        {
            "target": {
                "file": "mm/huge_memory.c"
            },
            "deprecated": false,
            "id": "CVE-2024-26621-e1d88104",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "115692672156462162365985194683078228329",
                    "226982690462883740562783420837847445633",
                    "98797082203304043341397341320943251485",
                    "228031903051429799711023656095558141437",
                    "136825271428783206591839695091514250988",
                    "27402879687756670818056527989800676957",
                    "102743563795159333310252840108069690457"
                ]
            },
            "signature_version": "v1",
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7432376c913381c5f24d373a87ff629bbde94b47"
        },
        {
            "target": {
                "file": "mm/huge_memory.c"
            },
            "deprecated": false,
            "id": "CVE-2024-26621-ee9417cb",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "115692672156462162365985194683078228329",
                    "226982690462883740562783420837847445633",
                    "98797082203304043341397341320943251485",
                    "228031903051429799711023656095558141437",
                    "136825271428783206591839695091514250988",
                    "27402879687756670818056527989800676957",
                    "102743563795159333310252840108069690457"
                ]
            },
            "signature_version": "v1",
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6ea9aa8d97e6563676094cb35755884173269555"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
6.1.81
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.46
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.6