In the Linux kernel, the following vulnerability has been resolved:
nouveau/uvmm: fix addr/range calcs for remap operations
dEQP-VK.sparseresources.imagerebind.2darray.r64i.128128_8 was causing a remap operation like the below.
opremap: prev: 0000003fffed0000 00000000000f0000 00000000a5abd18a 0000000000000000 opremap: next: opremap: unmap: 0000003fffed0000 0000000000100000 0 opmap: map: 0000003ffffc0000 0000000000010000 000000005b1ba33c 00000000000e0000
This was resulting in an unmap operation from 0x3fffed0000+0xf0000, 0x100000 which was corrupting the pagetables and oopsing the kernel.
Fixes the prev + unmap range calcs to use start/end and map back to addr/range.
[ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c16020d2b69a602c8ae6a1dd2aac9a3023249d6", "signature_version": "v1", "target": { "file": "drivers/gpu/drm/nouveau/nouveau_uvmm.c" }, "digest": { "line_hashes": [ "30533978220419342389093878513314807048", "87151622145012051207763263066482291026", "53912690167726442221876815430034837757", "45647324585837311624075191471654822177", "86092553353695879718254959290277816083", "203854916431530561231187830788564997741", "48390605593514241356615008574515551468", "50770395516395054621763659702625530992", "123905375275611731316717070908407515777" ], "threshold": 0.9 }, "deprecated": false, "signature_type": "Line", "id": "CVE-2024-36018-27637f74" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@be141849ec00ef39935bf169c0f194ac70bf85ce", "signature_version": "v1", "target": { "file": "drivers/gpu/drm/nouveau/nouveau_uvmm.c" }, "digest": { "line_hashes": [ "30533978220419342389093878513314807048", "87151622145012051207763263066482291026", "53912690167726442221876815430034837757", "45647324585837311624075191471654822177", "86092553353695879718254959290277816083", "203854916431530561231187830788564997741", "48390605593514241356615008574515551468", "50770395516395054621763659702625530992", "123905375275611731316717070908407515777" ], "threshold": 0.9 }, "deprecated": false, "signature_type": "Line", "id": "CVE-2024-36018-8b97d39a" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@692a51bebf4552bdf0a79ccd68d291182a26a569", "signature_version": "v1", "target": { "file": "drivers/gpu/drm/nouveau/nouveau_uvmm.c" }, "digest": { "line_hashes": [ "30533978220419342389093878513314807048", "87151622145012051207763263066482291026", "53912690167726442221876815430034837757", "45647324585837311624075191471654822177", "86092553353695879718254959290277816083", "203854916431530561231187830788564997741", "48390605593514241356615008574515551468", "50770395516395054621763659702625530992", "123905375275611731316717070908407515777" ], "threshold": 0.9 }, "deprecated": false, "signature_type": "Line", "id": "CVE-2024-36018-a169c606" } ]