A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=2048738 Issue Tracking Patch Third Party Advisory
https://security.netapp.com/advisory/ntap-20220602-0001/ Third Party Advisory
https://www.openwall.com/lists/oss-security/2022/02/10/1 Exploit Mailing List Mitigation Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2022-03-25T00:00:00

Updated: 2022-10-07T00:00:00

Reserved: 2022-01-31T00:00:00


Link: CVE-2022-0435

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-03-25T19:15:10.100

Modified: 2023-02-14T19:36:46.570


Link: CVE-2022-0435

JSON object: View

cve-icon Redhat Information

No data.

CWE