In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 04:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c095508770aebf1b9218e77026e48345d719b17c - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/102507 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2018:0470 - Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=60daca9efbb3e4109ebc1f7069543e5573fc124e - Mailing List, Patch, Vendor Advisory | |
References | () https://github.com/torvalds/linux/commit/c095508770aebf1b9218e77026e48345d719b17c - Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html - Mailing List, Third Party Advisory | |
References | () https://usn.ubuntu.com/3617-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3617-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3617-3/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3619-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3619-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3620-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3620-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3632-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4187 - Third Party Advisory |
Information
Published : 2018-01-11 07:29
Updated : 2024-11-21 04:08
NVD link : CVE-2018-5332
Mitre link : CVE-2018-5332
CVE.ORG link : CVE-2018-5332
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
canonical
- ubuntu_linux
CWE
CWE-787
Out-of-bounds Write