Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-5332

Опубликовано: 11 янв. 2018
Источник: debian
EPSS Низкий

Описание

In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.14.17-1package
linuxfixed4.9.80-1stretchpackage

Примечания

  • Fixed by: https://git.kernel.org/linus/c095508770aebf1b9218e77026e48345d719b17c

EPSS

Процентиль: 24%
0.00079
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 7 лет назад

In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).

CVSS3: 5.5
redhat
больше 7 лет назад

In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).

CVSS3: 7.8
nvd
больше 7 лет назад

In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).

CVSS3: 7.8
github
около 3 лет назад

In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).

CVSS3: 7.8
fstec
больше 7 лет назад

Уязвимость функции rds_message_alloc_sgs() ядра операционной системы Linux, позволяющая нарушителю осуществить запись за границами буфера в памяти

EPSS

Процентиль: 24%
0.00079
Низкий