Buffer Overflow Affecting torvalds/linux package, versions [4.9-rc1,5.17-rc6)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Attacked
EPSS
83.44% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Buffer Overflow vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-2935957
  • published28 Jun 2022
  • disclosed27 Jun 2022
  • creditUnknown

Introduced: 27 Jun 2022

CVE-2022-0847  (opens in a new tab)
CWE-119  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade torvalds/linux to version 5.17-rc6 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Overflow due to the copy_page_to_iter_pipe function is lacking proper initialization. An unprivileged local user could use this vulnerability to write to pages in the page cache backed by read-only files and as such escalate their privileges.

CVSS Base Scores

version 3.1