Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-0435

Опубликовано: 10 фев. 2022
Источник: redhat
CVSS3: 7.1
EPSS Средний

Описание

A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.

A stack overflow flaw was found in the Linux kernel’s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.

Отчет

Red Hat recommends to use TIPC Encryption to secure TIPC procotol's payload or use transport level to separate and/or secure (by both encrypting and authenticating via eg. IPSec/MACSec) the communication between nodes.

Меры по смягчению последствий

The TIPC module will NOT be automatically loaded. When required, administrative action is needed to explicitly load this module. Loading the module can be prevented with the following instructions:

echo "install tipc /bin/true" >> /etc/modprobe.d/disable-tipc.conf

The system will need to be restarted if the tipc module is loaded. In most circumstances, the TIPC kernel module will be unable to be unloaded while any network interfaces are active and the protocol is in use. If the system requires this module to work correctly, this mitigation may not be suitable.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2022:081910.03.2022
Red Hat Enterprise Linux 8kernelFixedRHSA-2022:082510.03.2022
Red Hat Enterprise Linux 8kpatch-patchFixedRHSA-2022:084914.03.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionskernelFixedRHSA-2022:158926.04.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutionskpatch-patchFixedRHSA-2022:161927.04.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2048738kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS

EPSS

Процентиль: 98%
0.56593
Средний

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 3 лет назад

A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.

CVSS3: 8.8
nvd
около 3 лет назад

A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.

CVSS3: 8.8
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 8.8
debian
около 3 лет назад

A stack overflow flaw was found in the Linux kernel's TIPC protocol fu ...

suse-cvrf
больше 3 лет назад

Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP3)

EPSS

Процентиль: 98%
0.56593
Средний

7.1 High

CVSS3