Stack-based Buffer Overflow Affecting torvalds/linux package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-6241902
  • published12 Feb 2024
  • disclosed11 Feb 2024
  • creditUnknown

Introduced: 11 Feb 2024

CVE-2024-1151  (opens in a new tab)
CWE-121  (opens in a new tab)

How to fix?

There is no fixed version for torvalds/linux.

Overview

Affected versions of this package are vulnerable to Stack-based Buffer Overflow due to a recursive operation of code that push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.

Workaround

This vulnerability can be mitigated by preventing the openvswitch module from being loaded.

CVSS Base Scores

version 3.1