CVE-2022-0435
Public on 2022-03-07
Modified on 2022-03-07
Description
A stack overflow flaw was found in the Linux kernel’s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
Severity
See what this means
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | kernel | 2022-03-08 | ALAS-2022-1571 | Fixed |
Amazon Linux 2 - Core | kernel | 2022-03-08 | ALAS2-2022-1761 | Fixed |
Amazon Linux 2 - Kernel-5.10 Extra | kernel | 2022-03-08 | ALAS2KERNEL-5.10-2022-011 | Fixed |
Amazon Linux 2 - Kernel-5.4 Extra | kernel | 2022-03-08 | ALAS2KERNEL-5.4-2022-023 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.1 | CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
NVD | CVSSv2 | 9.0 | AV:N/AC:L/Au:S/C:C/I:C/A:C |
NVD | CVSSv3 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |