{"id":"CVE-2018-5333","details":"In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.","modified":"2026-03-15T22:26:18.608335Z","published":"2018-01-11T07:29:00.263Z","related":["SUSE-SU-2018:0383-1","SUSE-SU-2018:0416-1","SUSE-SU-2018:0482-1","SUSE-SU-2018:0555-1","SUSE-SU-2018:0660-1","SUSE-SU-2018:0834-1","SUSE-SU-2018:0841-1","SUSE-SU-2018:0848-1","SUSE-SU-2018:0986-1","openSUSE-SU-2024:10728-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3617-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3619-1/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/102510"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3617-3/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0470"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3617-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3619-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4187"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3583-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3583-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3632-1/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"},{"type":"FIX","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d11f77f84b27cef452cee332f4e469503084737"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.14.13"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-5333.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}