{"id":"CVE-2024-44965","summary":"x86/mm: Fix pti_clone_pgtable() alignment assumption","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm: Fix pti_clone_pgtable() alignment assumption\n\nGuenter reported dodgy crashes on an i386-nosmp build using GCC-11\nthat had the form of endless traps until entry stack exhaust and then\n#DF from the stack guard.\n\nIt turned out that pti_clone_pgtable() had alignment assumptions on\nthe start address, notably it hard assumes start is PMD aligned. This\nis true on x86_64, but very much not true on i386.\n\nThese assumptions can cause the end condition to malfunction, leading\nto a 'short' clone. Guess what happens when the user mapping has a\nshort copy of the entry text?\n\nUse the correct increment form for addr to avoid alignment\nassumptions.","modified":"2026-04-02T12:18:33.423001Z","published":"2024-09-04T18:36:02.762Z","related":["MGASA-2024-0309","MGASA-2024-0310","SUSE-SU-2024:3551-1","SUSE-SU-2024:3553-1","SUSE-SU-2024:3561-1","SUSE-SU-2024:3564-1","SUSE-SU-2025:20073-1","SUSE-SU-2025:20077-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/44xxx/CVE-2024-44965.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/18da1b27ce16a14a9b636af9232acb4fb24f4c9e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/25a727233a40a9b33370eec9f0cad67d8fd312f8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/41e71dbb0e0a0fe214545fe64af031303a08524c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4d143ae782009b43b4f366402e5c37f59d4e4346"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5c580c1050bcbc15c3e78090859d798dcf8c9763"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ca07aab70dd3b5e7fddb62d7a6ecd7a7d6d0b2ed"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d00c9b4bbc442d99e1dafbdfdab848bc1ead73f6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/df3eecb5496f87263d171b254ca6e2758ab3c35c"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/44xxx/CVE-2024-44965.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44965"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"16a3fe634f6a568c6234b8747e5d50487fed3526"},{"fixed":"18da1b27ce16a14a9b636af9232acb4fb24f4c9e"},{"fixed":"25a727233a40a9b33370eec9f0cad67d8fd312f8"},{"fixed":"d00c9b4bbc442d99e1dafbdfdab848bc1ead73f6"},{"fixed":"4d143ae782009b43b4f366402e5c37f59d4e4346"},{"fixed":"5c580c1050bcbc15c3e78090859d798dcf8c9763"},{"fixed":"ca07aab70dd3b5e7fddb62d7a6ecd7a7d6d0b2ed"},{"fixed":"df3eecb5496f87263d171b254ca6e2758ab3c35c"},{"fixed":"41e71dbb0e0a0fe214545fe64af031303a08524c"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-44965.json"}}],"schema_version":"1.7.5"}