Buffer Overflow Affecting torvalds/linux package, versions [,5.15.3)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.11% (45th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-TORVALDSLINUX-3006722
- published 18 Mar 2022
- disclosed 18 Mar 2022
- credit Jan Kara
How to fix?
Upgrade torvalds/linux
to version 5.15.3 or higher.
Overview
Affected versions of this package are vulnerable to Buffer Overflow due to the fs/quota/quota_tree.c
function that does not validate the block number in the quota tree (on disk). Exploiting this vulnerability can, for example, lead to a kernel/locking/rwsem.c
use-after-free if there is a corrupted quota file.
References
CVSS Scores
version 3.1