Integer Overflow or Wraparound Affecting torvalds/linux package, versions [,4.4.182)[4.5,4.9.182)[4.10,4.14.127)[4.15,4.19.52)[4.20,5.1.11)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
69.92% (99th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Integer Overflow or Wraparound vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-3004408
  • published26 Jan 2022
  • disclosed19 Jun 2019
  • creditUnknown

Introduced: 19 Jun 2019

CVE-2019-11477  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade torvalds/linux to version 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11 or higher.

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound. Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVSS Base Scores

version 3.1