First published: Thu Jan 11 2018(Updated: )
In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.2.99 | |
Linux Kernel | >=3.3<3.16.54 | |
Linux Kernel | >=3.17<3.18.92 | |
Linux Kernel | >=3.19<4.1.50 | |
Linux Kernel | >=4.2<4.4.112 | |
Linux Kernel | >=4.5<4.9.77 | |
Linux Kernel | >=4.10<4.14.44 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5332 has a medium severity rating due to the potential for heap-based out-of-bounds writes.
To fix CVE-2018-5332, update your Linux kernel to the latest patched version such as 5.10.223-1 or 6.1.123-1.
CVE-2018-5332 affects various versions of the Linux kernel including versions 3.2 through 4.14.13.
CVE-2018-5332 is a heap-based out-of-bounds write vulnerability related to insufficient validation in the rds_message_alloc_sgs function.
CVE-2018-5332 is relevant to multiple Linux distributions, including Debian and Ubuntu, impacting various kernel versions.