CVE-2022-0435
Public on 2022-03-07
Modified on 2022-03-07
Description
A stack overflow flaw was found in the Linux kernel’s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | kernel | 2022-03-07 | ALAS-2022-1571 | Fixed |
Amazon Linux 2 - Core | kernel | 2022-03-07 | ALAS2-2022-1761 | Fixed |
Amazon Linux 2 - Kernel-5.10 Extra | kernel | 2022-03-07 | ALAS2KERNEL-5.10-2022-011 | Fixed |
Amazon Linux 2 - Kernel-5.4 Extra | kernel | 2022-03-07 | ALAS2KERNEL-5.4-2022-023 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.1 | CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
NVD | CVSSv2 | 9.0 | AV:N/AC:L/Au:S/C:C/I:C/A:C |
NVD | CVSSv3 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |