8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
0.01 Low
EPSS
Percentile
83.8%
A stack overflow flaw was found in the Linux kernel’s TIPC protocol
functionality in the way a user sends a packet with malicious content where
the number of domain member nodes is higher than the 64 allowed. This flaw
allows a remote user to crash the system or possibly escalate their
privileges if they have access to the TIPC network.
Author | Note |
---|---|
sbeattie | introduced in v4.8 mitigated by CONFIG_FORTIFY_SOURCE, enabled in Ubuntu kernels since v4.18 kernels (Ubuntu 18.10 and newer, as well as HWE kernels for 18.04 LTS), mitigates this into a DoS. for 4.15 kernels as used in 18.04 LTS and HWE for 16.04 ESM, kernels are built with stack-protector, which makes this more difficult to exploit. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-173.182 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-105.119 | UNKNOWN |
ubuntu | 21.10 | noarch | linux | < 5.13.0-37.42 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1124.133 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1069.73 | UNKNOWN |
ubuntu | 21.10 | noarch | linux-aws | < 5.13.0-1019.21 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.13 | < 5.13.0-1019.21~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1069.73~18.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < 4.15.0-1124.133~16.04.1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1073.76 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2022-0435
nvd.nist.gov/vuln/detail/CVE-2022-0435
security-tracker.debian.org/tracker/CVE-2022-0435
ubuntu.com/security/notices/USN-5302-1
ubuntu.com/security/notices/USN-5337-1
ubuntu.com/security/notices/USN-5338-1
ubuntu.com/security/notices/USN-5339-1
ubuntu.com/security/notices/USN-5362-1
ubuntu.com/security/notices/USN-5368-1
ubuntu.com/security/notices/USN-5377-1
www.cve.org/CVERecord?id=CVE-2022-0435
www.openwall.com/lists/oss-security/2022/02/10/1
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
0.01 Low
EPSS
Percentile
83.8%