In the Linux kernel, the following vulnerability has been resolved:
mm: hugememory: use !CONFIG64BIT to relax huge page alignment on 32 bit machines
Yves-Alexis Perez reported commit 4ef9ad19e176 ("mm: hugememory: don't force huge page alignment on 32 bit") didn't work for x8632 [1]. It is because x8632 uses CONFIGX8632 instead of CONFIG32BIT.
!CONFIG_64BIT should cover all 32 bit machines.
[1] https://lore.kernel.org/linux-mm/CAHbLzkr1LwH3pcTgM+aGQ31ip2bKqiqEQ8=FQB+t2c3dhNKNHA@mail.gmail.com/
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/ee626f5d79d5817bb21d6f048dc0da4c4e383443/cves/2024/42xxx/CVE-2024-42258.json"
}[
{
"signature_type": "Line",
"id": "CVE-2024-42258-07f34245",
"digest": {
"line_hashes": [
"272915170980474091033656261636021116894",
"301180348339178714860508803578691511093",
"205036475036725084672243603994755752288",
"56123587842785387226213463007513364461"
],
"threshold": 0.9
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e1f4efb8d6140b2ec79bf760c43e1fc186e8dfc",
"target": {
"file": "mm/huge_memory.c"
},
"signature_version": "v1"
},
{
"signature_type": "Function",
"id": "CVE-2024-42258-1aa198b5",
"digest": {
"function_hash": "69699614471690302734700065526137004446",
"length": 787.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e1f4efb8d6140b2ec79bf760c43e1fc186e8dfc",
"target": {
"file": "mm/huge_memory.c",
"function": "__thp_get_unmapped_area"
},
"signature_version": "v1"
},
{
"signature_type": "Line",
"id": "CVE-2024-42258-6a664165",
"digest": {
"line_hashes": [
"272915170980474091033656261636021116894",
"301180348339178714860508803578691511093",
"205036475036725084672243603994755752288",
"56123587842785387226213463007513364461"
],
"threshold": 0.9
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d9592025000b3cf26c742f3505da7b83aedc26d5",
"target": {
"file": "mm/huge_memory.c"
},
"signature_version": "v1"
},
{
"signature_type": "Line",
"id": "CVE-2024-42258-99aecc60",
"digest": {
"line_hashes": [
"198376484843542454004464314399714042006",
"336969898481248725348669151778835698581",
"81607508113338561571191460946729391916",
"56123587842785387226213463007513364461"
],
"threshold": 0.9
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a5c399fe433a115e9d3693169b5f357f3194af0a",
"target": {
"file": "mm/huge_memory.c"
},
"signature_version": "v1"
},
{
"signature_type": "Function",
"id": "CVE-2024-42258-9bcbc343",
"digest": {
"function_hash": "69699614471690302734700065526137004446",
"length": 787.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d9592025000b3cf26c742f3505da7b83aedc26d5",
"target": {
"file": "mm/huge_memory.c",
"function": "__thp_get_unmapped_area"
},
"signature_version": "v1"
},
{
"signature_type": "Line",
"id": "CVE-2024-42258-bfeafd78",
"digest": {
"line_hashes": [
"198376484843542454004464314399714042006",
"336969898481248725348669151778835698581",
"81607508113338561571191460946729391916",
"56123587842785387226213463007513364461"
],
"threshold": 0.9
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@89f2914dd4b47d2fad3deef0d700f9526d98d11f",
"target": {
"file": "mm/huge_memory.c"
},
"signature_version": "v1"
},
{
"signature_type": "Function",
"id": "CVE-2024-42258-d4c4f32d",
"digest": {
"function_hash": "156137035939073214647084893142172979570",
"length": 668.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a5c399fe433a115e9d3693169b5f357f3194af0a",
"target": {
"file": "mm/huge_memory.c",
"function": "__thp_get_unmapped_area"
},
"signature_version": "v1"
},
{
"signature_type": "Function",
"id": "CVE-2024-42258-ec33f218",
"digest": {
"function_hash": "156137035939073214647084893142172979570",
"length": 668.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@89f2914dd4b47d2fad3deef0d700f9526d98d11f",
"target": {
"file": "mm/huge_memory.c",
"function": "__thp_get_unmapped_area"
},
"signature_version": "v1"
}
]