CVE-2022-0435
Severity
8.8HIGH
EPSS
54.3%
top 1.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Latest updateApr 13
Description
A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages9 packages
▶CVEListV5linux/linux35c55c9877f8de0ab129fa1a309271d0ecc868b9 — 175db196e45d6f0e6047eccd09c8ba55465eb131+8
Also affects: Enterprise Linux 8.0, 8.2, 8.4, 8, Fedora 34, 35
Patches
🔴Vulnerability Details
3CVEList▶
CVE-2022-0435: A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the nu↗2022-03-25
OSV▶
CVE-2022-0435: A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the nu↗2022-03-25