Updated: 2025-08-20 02:24:56.544744
Description:
A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | HIGH | 9.0 |
| CVSS Version 3.x | HIGH | 8.8 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 8.8 | HIGH | Already Fixed | 2024-01-20 04:10:32 | ||
| CentOS 6 ELS | kernel | 2.6.32 | 8.8 | HIGH | Not Vulnerable | 2022-04-13 09:59:54 | ||
| CentOS 8.4 ELS | kernel | 4.18.0 | 8.8 | HIGH | Released | CLSA-2022:1644933991 | 2022-04-07 18:56:18 | |
| CentOS 8.5 ELS | kernel | 4.18.0 | 8.8 | HIGH | Released | CLSA-2022:1651146021 | 2022-04-07 18:56:18 | |
| CloudLinux 6 ELS | kernel | 2.6.32 | 8.8 | HIGH | Not Vulnerable | 2022-04-13 09:59:54 | ||
| Oracle Linux 6 ELS | kernel | 2.6.32 | 8.8 | HIGH | Not Vulnerable | 2022-04-13 09:59:54 | ||
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 8.8 | HIGH | Released | CLSA-2022:1664906081 | 2022-10-04 14:02:46 | |
| Ubuntu 16.04 ELS | linux | 4.4.0 | 8.8 | HIGH | Not Vulnerable | 2022-04-11 16:02:39 | ||
| Ubuntu 18.04 ELS | linux | 4.15.0 | 8.8 | HIGH | Already Fixed | 2023-06-02 09:10:32 |