vulnerability
Amazon Linux AMI 2: CVE-2024-50199: Security patch for kernel (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Nov 8, 2024 | Mar 14, 2025 | May 20, 2026 |
Description
In the Linux kernel, the following vulnerability has been resolved:
mm/swapfile: skip HugeTLB pages for unuse_vma
I got a bad pud error and lost a 1GB HugeTLB when calling swapoff. The
problem can be reproduced by the following steps:
1. Allocate an anonymous 1GB HugeTLB and some other anonymous memory.
2. Swapout the above anonymous memory.
3. run swapoff and we will get a bad pud error in kernel message:
mm/pgtable-generic.c:42: bad pud 00000000743d215d(84000001400000e7)
We can tell that pud_clear_bad is called by pud_none_or_clear_bad in
unuse_pud_range() by ftrace. And therefore the HugeTLB pages will never
be freed because we lost it from page table. We can skip HugeTLB pages
for unuse_vma to fix it.
Solutions
References
- AMAZON-AL2/ALAS2KERNEL-5.10-2025-077
- AMAZON-AL2/ALAS2KERNEL-5.15-2025-060
- AMAZON-AL2/ALAS2KERNEL-5.4-2025-090
- AMAZON-AL2/ALASKERNEL-5.10-2025-077
- AMAZON-AL2/ALASKERNEL-5.15-2025-060
- AMAZON-AL2/ALASKERNEL-5.4-2025-090
- CVE-2024-50199
- https://attackerkb.com/topics/CVE-2024-50199
- EUVD-EUVD-2024-44701
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-44701
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.