Linux Kernel TIPC Module Security Update Advisory (CVE-2022-0435)

Overview

 

An update has been made available to address a vulnerability in the Linux Kernel TIPC module. users of affected versions are encouraged to update to the latest version.

 

Affected Products

 

  • Linux Kernel prior to 4.9.301
  • Linux Kernel prior to 4.14.266
  • Linux Kernel prior to 4.19.229
  • Linux Kernel prior to 5.4.179
  • Linux Kernel prior to 5.10.100
  • Linux Kernel prior to 5.15.23
  • Linux Kernel prior to 5.16.9
  • Linux Kernel versions 5.17, 5.17-rc1, 5.17-rc2, 5.17-rc3

 

Resolved Vulnerabilities

 

Stack buffer overflow vulnerability in the Linux Kernel TIPC module (CVE-2022-0435)

 

Vulnerability Patches

 

A vulnerability patch was made available in the February 10, 2022 update. please follow the instructions on the reference site to update to the latest vulnerability patch version.

Linux Kernel version 5.17-rc4

 

Reference Site

 

[1] CVE-2022-0435 Detail
https://nvd.nist.gov/vuln/detail/cve-2022-0435#match-8956242
[2] Bug 2048738 (CVE-2022-0435) – CVE-2022-0435 kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS
https://bugzilla.redhat.com/show_bug.cgi?id=2048738
[3] CVE-2022-0435: Remote Stack Overflow in Linux Kernel TIPC Module
https://www.openwall.com/lists/oss-security/2022/02/10/1