CVE-2024-44965

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/09/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> x86/mm: Fix pti_clone_pgtable() alignment assumption<br /> <br /> Guenter reported dodgy crashes on an i386-nosmp build using GCC-11<br /> that had the form of endless traps until entry stack exhaust and then<br /> #DF from the stack guard.<br /> <br /> It turned out that pti_clone_pgtable() had alignment assumptions on<br /> the start address, notably it hard assumes start is PMD aligned. This<br /> is true on x86_64, but very much not true on i386.<br /> <br /> These assumptions can cause the end condition to malfunction, leading<br /> to a &amp;#39;short&amp;#39; clone. Guess what happens when the user mapping has a<br /> short copy of the entry text?<br /> <br /> Use the correct increment form for addr to avoid alignment<br /> assumptions.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19 (including) 4.19.320 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.282 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.224 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.165 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.105 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.46 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.5 (excluding)
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*