CVE-2022-0435

Updated: 2025-08-20 02:24:56.544744

Description:

A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x HIGH 9.0
CVSS Version 3.x HIGH 8.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 8.8 HIGH Already Fixed 2024-01-20 04:10:32
CentOS 6 ELS kernel 2.6.32 8.8 HIGH Not Vulnerable 2022-04-13 09:59:54
CentOS 8.4 ELS kernel 4.18.0 8.8 HIGH Released CLSA-2022:1644933991 2022-04-07 18:56:18
CentOS 8.5 ELS kernel 4.18.0 8.8 HIGH Released CLSA-2022:1651146021 2022-04-07 18:56:18
CloudLinux 6 ELS kernel 2.6.32 8.8 HIGH Not Vulnerable 2022-04-13 09:59:54
Oracle Linux 6 ELS kernel 2.6.32 8.8 HIGH Not Vulnerable 2022-04-13 09:59:54
Ubuntu 16.04 ELS linux-hwe 4.15.0 8.8 HIGH Released CLSA-2022:1664906081 2022-10-04 14:02:46
Ubuntu 16.04 ELS linux 4.4.0 8.8 HIGH Not Vulnerable 2022-04-11 16:02:39
Ubuntu 18.04 ELS linux 4.15.0 8.8 HIGH Already Fixed 2023-06-02 09:10:32