In the Linux kernel, the following vulnerability has been resolved: mm: huge_memory: don't force huge page alignment on 32 bit commit efa7df3e3bb5 ("mm: align larger anonymous mappings on THP boundaries") caused two issues [1] [2] reported on 32 bit system or compat userspace. It doesn't make too much sense to force huge page alignment on 32 bit system due to the constrained virtual address space. [1] https://lore.kernel.org/linux-mm/[email protected]/ [2] https://lore.kernel.org/linux-mm/CAJuCfpHXLdQy1a2B6xN2d7quTYwg2OoZseYPZTRpU0eHHKD-sQ@mail.gmail.com/
https://zolutal.github.io/aslrnt/
https://git.kernel.org/stable/c/87632bc9ecff5ded93433bc0fca428019bdd1cfe
https://git.kernel.org/stable/c/7432376c913381c5f24d373a87ff629bbde94b47
https://git.kernel.org/stable/c/6ea9aa8d97e6563676094cb35755884173269555
https://git.kernel.org/stable/c/4ef9ad19e17676b9ef071309bc62020e2373705d
http://www.openwall.com/lists/oss-security/2024/07/30/2
http://www.openwall.com/lists/oss-security/2024/07/29/2
http://www.openwall.com/lists/oss-security/2024/07/16/2
http://www.openwall.com/lists/oss-security/2024/07/16/1
http://www.openwall.com/lists/oss-security/2024/07/15/2
http://www.openwall.com/lists/oss-security/2024/07/15/1
http://www.openwall.com/lists/oss-security/2024/07/13/7
http://www.openwall.com/lists/oss-security/2024/07/13/2
http://www.openwall.com/lists/oss-security/2024/07/12/3
http://www.openwall.com/lists/oss-security/2024/07/11/7
http://www.openwall.com/lists/oss-security/2024/07/11/5
http://www.openwall.com/lists/oss-security/2024/07/11/4
http://www.openwall.com/lists/oss-security/2024/07/10/8
http://www.openwall.com/lists/oss-security/2024/07/10/7
http://www.openwall.com/lists/oss-security/2024/07/10/5
http://www.openwall.com/lists/oss-security/2024/07/09/1
http://www.openwall.com/lists/oss-security/2024/07/08/8
http://www.openwall.com/lists/oss-security/2024/07/08/7
http://www.openwall.com/lists/oss-security/2024/07/08/6
http://www.openwall.com/lists/oss-security/2024/07/08/5