Buffer Overflow Affecting torvalds/linux package, versions [4.8-rc1,5.17-rc4)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
54.32% (98th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Buffer Overflow vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-2934400
  • published23 Jun 2022
  • disclosed23 Jun 2022
  • creditEric Dumazet

Introduced: 23 Jun 2022

CVE-2022-0435  (opens in a new tab)
CWE-119  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade torvalds/linux to version 5.17-rc4 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Overflow via the TIPC protocol functionality due to a lack of size validation of the amount of domain members in a received domain record. Exploiting this vulnerability allows an attacker to send a packet with malicious content where the number of domain member nodes is higher than the 64 allowed.

CVSS Base Scores

version 3.1