CVE-2022-0435
HIGHLinux kernel - Memory Corruption
Title source: llmDescription
A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
Exploits (3)
References (3)
Scores
CVSS v3
8.8
EPSS
0.5432
EPSS Percentile
98.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-787
Status
published
Affected Products (46)
linux/linux_kernel
< 4.9.301
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
redhat/codeready_linux_builder
redhat/codeready_linux_builder
redhat/codeready_linux_builder_eus
redhat/codeready_linux_builder_eus_for_power_little_endian
redhat/codeready_linux_builder_for_power_little_endian_eus
redhat/codeready_linux_builder_for_power_little_endian_eus
redhat/enterprise_linux
redhat/enterprise_linux_eus
redhat/enterprise_linux_eus
redhat/enterprise_linux_for_ibm_z_systems
... and 31 more
Timeline
Published
Mar 25, 2022
Tracked Since
Feb 18, 2026