{"id":"CVE-2024-52319","summary":"mm: use aligned address in clear_gigantic_page()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm: use aligned address in clear_gigantic_page()\n\nIn current kernel, hugetlb_no_page() calls folio_zero_user() with the\nfault address.  Where the fault address may be not aligned with the huge\npage size.  Then, folio_zero_user() may call clear_gigantic_page() with\nthe address, while clear_gigantic_page() requires the address to be huge\npage size aligned.  So, this may cause memory corruption or information\nleak, addtional, use more obvious naming 'addr_hint' instead of 'addr' for\nclear_gigantic_page().","modified":"2026-04-02T12:21:31.364010Z","published":"2025-01-11T12:35:39.280Z","related":["USN-7379-2","USN-7380-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/52xxx/CVE-2024-52319.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/8aca2bc96c833ba695ede7a45ad7784c836a262e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b79b6fe0737f233f0be1465052b7f0e75f324735"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/52xxx/CVE-2024-52319.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-52319"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"78fefd04c123493bbf28434768fa577b2153c79b"},{"fixed":"b79b6fe0737f233f0be1465052b7f0e75f324735"},{"fixed":"8aca2bc96c833ba695ede7a45ad7784c836a262e"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-52319.json"}}],"schema_version":"1.7.5"}