CVE-2022-0435

HIGH

Linux kernel - Memory Corruption

Title source: llm

Description

A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.

Exploits (3)

nomisec WORKING POC 1 stars
by wlswotmd · poc
https://github.com/wlswotmd/CVE-2022-0435
nomisec WORKING POC 1 stars
by Spydomain · poc
https://github.com/Spydomain/CVE-2022-0435-Poc
nomisec WORKING POC
by sandesh9978 · poc
https://github.com/sandesh9978/CVE-2022-0435

Scores

CVSS v3 8.8
EPSS 0.5432
EPSS Percentile 98.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-787
Status published

Affected Products (46)

linux/linux_kernel < 4.9.301
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
redhat/codeready_linux_builder
redhat/codeready_linux_builder
redhat/codeready_linux_builder_eus
redhat/codeready_linux_builder_eus_for_power_little_endian
redhat/codeready_linux_builder_for_power_little_endian_eus
redhat/codeready_linux_builder_for_power_little_endian_eus
redhat/enterprise_linux
redhat/enterprise_linux_eus
redhat/enterprise_linux_eus
redhat/enterprise_linux_for_ibm_z_systems
... and 31 more

Timeline

Published Mar 25, 2022
Tracked Since Feb 18, 2026