CVE-2024-36018

Source
https://cve.org/CVERecord?id=CVE-2024-36018
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36018.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-36018
Downstream
Related
Published
2024-05-30T14:59:42.091Z
Modified
2026-03-23T05:00:01.609727811Z
Summary
nouveau/uvmm: fix addr/range calcs for remap operations
Details

In the Linux kernel, the following vulnerability has been resolved:

nouveau/uvmm: fix addr/range calcs for remap operations

dEQP-VK.sparseresources.imagerebind.2darray.r64i.128128_8 was causing a remap operation like the below.

opremap: prev: 0000003fffed0000 00000000000f0000 00000000a5abd18a 0000000000000000 opremap: next: opremap: unmap: 0000003fffed0000 0000000000100000 0 opmap: map: 0000003ffffc0000 0000000000010000 000000005b1ba33c 00000000000e0000

This was resulting in an unmap operation from 0x3fffed0000+0xf0000, 0x100000 which was corrupting the pagetables and oopsing the kernel.

Fixes the prev + unmap range calcs to use start/end and map back to addr/range.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36018.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b88baab828713ce0b49b185444b2ee83bed373a8
Fixed
692a51bebf4552bdf0a79ccd68d291182a26a569
Fixed
0c16020d2b69a602c8ae6a1dd2aac9a3023249d6
Fixed
be141849ec00ef39935bf169c0f194ac70bf85ce

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36018.json"