9

CVE-2022-0435

Exploit

A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 4.8 < 4.9.301
LinuxLinux Kernel Version >= 4.10 < 4.14.266
LinuxLinux Kernel Version >= 4.15 < 4.19.229
LinuxLinux Kernel Version >= 4.20 < 5.4.179
LinuxLinux Kernel Version >= 5.5 < 5.10.100
LinuxLinux Kernel Version >= 5.11 < 5.15.23
LinuxLinux Kernel Version >= 5.16 < 5.16.9
LinuxLinux Kernel Version5.17 Update-
LinuxLinux Kernel Version5.17 Updaterc1
LinuxLinux Kernel Version5.17 Updaterc2
LinuxLinux Kernel Version5.17 Updaterc3
RedhatEnterprise Linux Version8.0
RedhatEnterprise Linux Eus Version8.2
RedhatEnterprise Linux Eus Version8.4
RedhatVirtualization Version4.0
   RedhatEnterprise Linux Version8.0
RedhatVirtualization Host Version4.0
   RedhatEnterprise Linux Version8.0
OvirtNode Version4.4.10
FedoraprojectFedora Version34
FedoraprojectFedora Version35
NetappH300e Firmware Version-
   NetappH300e Version-
NetappH300s Firmware Version-
   NetappH300s Version-
NetappH410s Firmware Version-
   NetappH410s Version-
NetappH500e Firmware Version-
   NetappH500e Version-
NetappH500s Firmware Version-
   NetappH500s Version-
NetappH700e Firmware Version-
   NetappH700e Version-
NetappH700s Firmware Version-
   NetappH700s Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 54.32% 0.98
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9 8 10
AV:N/AC:L/Au:S/C:C/I:C/A:C
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.