HIGH · 8.8

CVE-2022-0435

A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 ...

Vulnerability Description

A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
LinuxLinux Kernel>= 4.8, < 4.9.301
RedhatCodeready Linux Builder8.0
RedhatCodeready Linux Builder Eus8.2
RedhatCodeready Linux Builder Eus For Power Little Endian8.2
RedhatCodeready Linux Builder For Power Little Endian Eus8.0
RedhatEnterprise Linux8.0
RedhatEnterprise Linux Eus8.2
RedhatEnterprise Linux For Ibm Z Systems8.0
RedhatEnterprise Linux For Ibm Z Systems Eus8.2
RedhatEnterprise Linux For Power Little Endian8.0
RedhatEnterprise Linux For Power Little Endian Eus8.2
RedhatEnterprise Linux For Real Time8
RedhatEnterprise Linux For Real Time For Nfv8
RedhatEnterprise Linux For Real Time For Nfv Tus8.2
RedhatEnterprise Linux For Real Time Tus8.2
RedhatEnterprise Linux Server Aus8.2
RedhatEnterprise Linux Server For Power Little Endian Update Services For Sap Solutions8.2
RedhatEnterprise Linux Server Tus8.2
RedhatEnterprise Linux Server Update Services For Sap Solutions8.2
RedhatVirtualization4.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-0435?

CVE-2022-0435 is a vulnerability with a CVSS score of 8.8 (HIGH). A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 ...

How severe is CVE-2022-0435?

CVE-2022-0435 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-0435?

Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Codeready Linux Builder, Redhat Codeready Linux Builder Eus, Redhat Codeready Linux Builder Eus For Power Little Endian, Redhat Codeready Linux Builder For Power Little Endian Eus.