Linux Kernel TIPC Module Security Update Advisory (CVE-2022-0435)
Overview
An update has been made available to address a vulnerability in the Linux Kernel TIPC module. users of affected versions are encouraged to update to the latest version.
Affected Products
- Linux Kernel prior to 4.9.301
- Linux Kernel prior to 4.14.266
- Linux Kernel prior to 4.19.229
- Linux Kernel prior to 5.4.179
- Linux Kernel prior to 5.10.100
- Linux Kernel prior to 5.15.23
- Linux Kernel prior to 5.16.9
- Linux Kernel versions 5.17, 5.17-rc1, 5.17-rc2, 5.17-rc3
Resolved Vulnerabilities
Stack buffer overflow vulnerability in the Linux Kernel TIPC module (CVE-2022-0435)
Vulnerability Patches
A vulnerability patch was made available in the February 10, 2022 update. please follow the instructions on the reference site to update to the latest vulnerability patch version.
Linux Kernel version 5.17-rc4
Reference Site
[1] CVE-2022-0435 Detail
https://nvd.nist.gov/vuln/detail/cve-2022-0435#match-8956242
[2] Bug 2048738 (CVE-2022-0435) – CVE-2022-0435 kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS
https://bugzilla.redhat.com/show_bug.cgi?id=2048738
[3] CVE-2022-0435: Remote Stack Overflow in Linux Kernel TIPC Module
https://www.openwall.com/lists/oss-security/2022/02/10/1