A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
AV:N/AC:L/Au:S/C:C/I:C/A:C
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Fedoraproject |
|
Linux |
|
Netapp |
|
Ovirt |
|
Redhat |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Configuration 3 [-]
AND |
|
Configuration 4 [-]
|
Configuration 5 [-]
|
Configuration 6 [-]
AND |
|
Configuration 7 [-]
AND |
|
Configuration 8 [-]
AND |
|
Configuration 9 [-]
AND |
|
Configuration 10 [-]
AND |
|
Configuration 11 [-]
AND |
|
Configuration 12 [-]
AND |
|
Package | CPE | Advisory | Released Date |
---|---|---|---|
Red Hat Enterprise Linux 8 | |||
kernel-rt-0:4.18.0-348.20.1.rt7.150.el8_5 | cpe:/a:redhat:enterprise_linux:8::nfv | RHSA-2022:0819 | 2022-03-10T00:00:00Z |
kernel-0:4.18.0-348.20.1.el8_5 | cpe:/o:redhat:enterprise_linux:8 | RHSA-2022:0825 | 2022-03-10T00:00:00Z |
kpatch-patch | cpe:/o:redhat:enterprise_linux:8 | RHSA-2022:0849 | 2022-03-14T00:00:00Z |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | |||
kernel-0:4.18.0-147.65.1.el8_1 | cpe:/o:redhat:rhel_e4s:8.1 | RHSA-2022:1589 | 2022-04-26T00:00:00Z |
kpatch-patch | cpe:/o:redhat:rhel_e4s:8.1 | RHSA-2022:1619 | 2022-04-27T00:00:00Z |
Red Hat Enterprise Linux 8.2 Extended Update Support | |||
kernel-rt-0:4.18.0-193.80.1.rt13.130.el8_2 | cpe:/a:redhat:rhel_eus:8.2::nfv | RHSA-2022:1209 | 2022-04-05T00:00:00Z |
kpatch-patch | cpe:/o:redhat:rhel_eus:8.2 | RHSA-2022:1186 | 2022-04-05T00:00:00Z |
kernel-0:4.18.0-193.80.1.el8_2 | cpe:/o:redhat:rhel_eus:8.2 | RHSA-2022:1213 | 2022-04-05T00:00:00Z |
Red Hat Enterprise Linux 8.4 Extended Update Support | |||
kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4 | cpe:/a:redhat:rhel_eus:8.4::nfv | RHSA-2022:0771 | 2022-03-08T00:00:00Z |
kpatch-patch | cpe:/o:redhat:rhel_eus:8.4 | RHSA-2022:0772 | 2022-03-08T00:00:00Z |
kernel-0:4.18.0-305.40.1.el8_4 | cpe:/o:redhat:rhel_eus:8.4 | RHSA-2022:0777 | 2022-03-08T00:00:00Z |
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 | |||
redhat-virtualization-host-0:4.4.10-202203101736_8.5 | cpe:/o:redhat:rhev_hypervisor:4.4::el8 | RHSA-2022:0841 | 2022-03-14T00:00:00Z |
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2022-03-25T00:00:00
Updated: 2024-08-02T23:25:40.398Z
Reserved: 2022-01-31T00:00:00
Link: CVE-2022-0435
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2022-03-25T19:15:10.100
Modified: 2023-02-14T19:36:46.570
Link: CVE-2022-0435
Redhat