Vulnerability Description
A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.8, < 4.9.301 |
| Redhat | Codeready Linux Builder | 8.0 |
| Redhat | Codeready Linux Builder Eus | 8.2 |
| Redhat | Codeready Linux Builder Eus For Power Little Endian | 8.2 |
| Redhat | Codeready Linux Builder For Power Little Endian Eus | 8.0 |
| Redhat | Enterprise Linux | 8.0 |
| Redhat | Enterprise Linux Eus | 8.2 |
| Redhat | Enterprise Linux For Ibm Z Systems | 8.0 |
| Redhat | Enterprise Linux For Ibm Z Systems Eus | 8.2 |
| Redhat | Enterprise Linux For Power Little Endian | 8.0 |
| Redhat | Enterprise Linux For Power Little Endian Eus | 8.2 |
| Redhat | Enterprise Linux For Real Time | 8 |
| Redhat | Enterprise Linux For Real Time For Nfv | 8 |
| Redhat | Enterprise Linux For Real Time For Nfv Tus | 8.2 |
| Redhat | Enterprise Linux For Real Time Tus | 8.2 |
| Redhat | Enterprise Linux Server Aus | 8.2 |
| Redhat | Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | 8.2 |
| Redhat | Enterprise Linux Server Tus | 8.2 |
| Redhat | Enterprise Linux Server Update Services For Sap Solutions | 8.2 |
| Redhat | Virtualization | 4.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2048738Issue TrackingPatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20220602-0001/Third Party Advisory
- https://www.openwall.com/lists/oss-security/2022/02/10/1ExploitMailing ListMitigation
- https://bugzilla.redhat.com/show_bug.cgi?id=2048738Issue TrackingPatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20220602-0001/Third Party Advisory
- https://www.openwall.com/lists/oss-security/2022/02/10/1ExploitMailing ListMitigation
FAQ
What is CVE-2022-0435?
CVE-2022-0435 is a vulnerability with a CVSS score of 8.8 (HIGH). A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 ...
How severe is CVE-2022-0435?
CVE-2022-0435 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0435?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Codeready Linux Builder, Redhat Codeready Linux Builder Eus, Redhat Codeready Linux Builder Eus For Power Little Endian, Redhat Codeready Linux Builder For Power Little Endian Eus.