{"uuid": "7bb5ce4c-dd49-4162-bf26-29009c8953ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57839", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1331", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57839\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"readahead: properly shorten readahead when falling back to do_page_cache_ra()\"\n\nThis reverts commit 7c877586da3178974a8a94577b6045a48377ff25.\n\nAnders and Philippe have reported that recent kernels occasionally hang\nwhen used with NFS in readahead code.  The problem has been bisected to\n7c877586da3 (\"readahead: properly shorten readahead when falling back to\ndo_page_cache_ra()\").  The cause of the problem is that ra-&gt;size can be\nshrunk by read_pages() call and subsequently we end up calling\ndo_page_cache_ra() with negative (read huge positive) number of pages. \nLet's revert 7c877586da3 for now until we can find a proper way how the\nlogic in read_pages() and page_cache_ra_order() can coexist.  This can\nlead to reduced readahead throughput due to readahead window confusion but\nthat's better than outright hangs.\n\ud83d\udccf Published: 2025-01-11T14:30:56.149Z\n\ud83d\udccf Modified: 2025-01-11T14:30:56.149Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/85351e4941a253e4c50fb7048bfc19b60b4ec44b\n2. https://git.kernel.org/stable/c/a220d6b95b1ae12c7626283d7609f0a1438e6437", "creation_timestamp": "2025-01-11T15:05:26.000000Z"}