Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2024-36018— nouveau/uvmm: fix addr/range calcs for remap operations

EPSS 0.03% · P10

Affected Version Matrix 8

VendorProductVersion RangeStatus
LinuxLinuxb88baab828713ce0b49b185444b2ee83bed373a8< 692a51bebf4552bdf0a79ccd68d291182a26a569affected
b88baab828713ce0b49b185444b2ee83bed373a8< 0c16020d2b69a602c8ae6a1dd2aac9a3023249d6affected
b88baab828713ce0b49b185444b2ee83bed373a8< be141849ec00ef39935bf169c0f194ac70bf85ceaffected
6.6affected
< 6.6unaffected
6.6.26≤ 6.6.*unaffected
6.8.5≤ 6.8.*unaffected
6.9≤ *unaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-36018

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
nouveau/uvmm: fix addr/range calcs for remap operations
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nouveau/uvmm: fix addr/range calcs for remap operations dEQP-VK.sparse_resources.image_rebind.2d_array.r64i.128_128_8 was causing a remap operation like the below. op_remap: prev: 0000003fffed0000 00000000000f0000 00000000a5abd18a 0000000000000000 op_remap: next: op_remap: unmap: 0000003fffed0000 0000000000100000 0 op_map: map: 0000003ffffc0000 0000000000010000 000000005b1ba33c 00000000000e0000 This was resulting in an unmap operation from 0x3fffed0000+0xf0000, 0x100000 which was corrupting the pagetables and oopsing the kernel. Fixes the prev + unmap range calcs to use start/end and map back to addr/range.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于 nouveau/uvmm 模块重新映射操作的地址/范围计算。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux b88baab828713ce0b49b185444b2ee83bed373a8 ~ 692a51bebf4552bdf0a79ccd68d291182a26a569 -
LinuxLinux 6.6 -

II. Public POCs for CVE-2024-36018

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-36018

登录查看更多情报信息。

Other References for CVE-2024-36018 (2)

Same Patch Batch · Linux · 2024-05-30 · 93 CVEs total

CVE-2024-36927ipv4: Fix uninit-value access in __ip_make_skb()
CVE-2024-36922wifi: iwlwifi: read txq->read_ptr under lock
CVE-2024-36920scsi: mpi3mr: Avoid memcpy field-spanning write WARNING
CVE-2024-36916blk-iocost: avoid out of bounds shift
CVE-2024-36917block: fix overflow in blk_ioctl_discard()
CVE-2024-36914drm/amd/display: Skip on writeback when it's not applicable
CVE-2024-36915nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
CVE-2024-36913Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails
CVE-2024-36919scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload
CVE-2024-36925swiotlb: initialise restricted pool list_head when SWIOTLB_DYNAMIC=y
CVE-2024-36924scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
CVE-2024-36926powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE
CVE-2024-36928s390/qeth: Fix kernel panic after setting hsuid
CVE-2024-36929net: core: reject skb_copy(_expand) for fraglist GSO skbs
CVE-2024-36930spi: fix null pointer dereference within spi_sync
CVE-2024-36932thermal/debugfs: Prevent use-after-free from occurring after cdev removal
CVE-2024-36931s390/cio: Ensure the copied buf is NUL terminated
CVE-2024-36933nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
CVE-2024-36934bna: ensure the copied buf is NUL terminated
CVE-2024-36935ice: ensure the copied buf is NUL terminated

Showing top 20 of 93 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-36018

No comments yet


Leave a comment