First published: Wed Sep 04 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix pti_clone_pgtable() alignment assumption Guenter reported dodgy crashes on an i386-nosmp build using GCC-11 that had the form of endless traps until entry stack exhaust and then #DF from the stack guard. It turned out that pti_clone_pgtable() had alignment assumptions on the start address, notably it hard assumes start is PMD aligned. This is true on x86_64, but very much not true on i386. These assumptions can cause the end condition to malfunction, leading to a 'short' clone. Guess what happens when the user mapping has a short copy of the entry text? Use the correct increment form for addr to avoid alignment assumptions.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.19<4.19.320 | |
Linux Kernel | >=4.20<5.4.282 | |
Linux Kernel | >=5.5<5.10.224 | |
Linux Kernel | >=5.11<5.15.165 | |
Linux Kernel | >=5.16<6.1.105 | |
Linux Kernel | >=6.2<6.6.46 | |
Linux Kernel | >=6.7<6.10.5 | |
Linux Kernel | =6.11-rc1 | |
debian/linux | <=5.10.223-1 | 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44965 has a medium severity rating due to potential crashes in affected systems.
To fix CVE-2024-44965, update your Linux kernel to versions 5.10.226-1, 6.1.119-1~deb11u1, or any version newer than 6.12.11-1.
CVE-2024-44965 affects Linux kernel versions from 4.19 to 6.11-rc1, excluding patched versions.
CVE-2024-44965 addresses alignment issues in the x86 memory management of the Linux kernel.
Guenter reported the dodgy crashes that led to the identification of CVE-2024-44965.