{"id":"CVE-2022-0435","details":"A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.","aliases":["A-228560328","PUB-A-228560328"],"modified":"2026-03-13T05:23:56.292250Z","published":"2022-03-25T19:15:10.100Z","related":["ALSA-2022:0825","MGASA-2022-0062","MGASA-2022-0063","SUSE-SU-2022:0363-1","SUSE-SU-2022:0364-1","SUSE-SU-2022:0365-1","SUSE-SU-2022:0367-1","SUSE-SU-2022:0370-1","SUSE-SU-2022:0371-1","SUSE-SU-2022:0372-1","SUSE-SU-2022:0418-1","SUSE-SU-2022:0429-1","SUSE-SU-2022:0436-1","SUSE-SU-2022:0463-1","SUSE-SU-2022:0555-1","SUSE-SU-2024:2360-1","SUSE-SU-2024:2362-1","SUSE-SU-2024:2365-1","SUSE-SU-2024:2561-1","openSUSE-SU-2022:0363-1","openSUSE-SU-2022:0370-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220602-0001/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2048738"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2022/02/10/1"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0435.json","unresolved_ranges":[{"events":[{"introduced":"4.8"},{"fixed":"4.9.301"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.266"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.229"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.179"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.100"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.23"}]},{"events":[{"introduced":"5.16"},{"fixed":"5.16.9"}]},{"events":[{"introduced":"0"},{"last_affected":"5.17-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"5.17-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.17-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.17-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8"}]},{"events":[{"introduced":"0"},{"last_affected":"8"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.4.10"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}