NVD Vulnerability Detail
Search Exploit, PoC
CVE-2022-0435
Summary

A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.

Publication Date March 26, 2022, 4:15 a.m.
Registration Date March 26, 2022, 10 a.m.
Last Update Nov. 21, 2024, 3:38 p.m.
CVSS3.1 : HIGH
スコア 8.8
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR)
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
CVSS2.0 : HIGH
Score 9.0
Vector AV:N/AC:L/Au:S/C:C/I:C/A:C
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 単一
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.8 4.9.301
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 4.14.266
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 4.19.229
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 5.4.179
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 5.10.100
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 5.15.23
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 5.16.9
Configuration2 or higher or less more than less than
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_eus:8.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian:8.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder:8.4:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:o:ovirt:node:4.4.10:*:*:*:*:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
Configuration6 or higher or less more than less than
cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*
Configuration7 or higher or less more than less than
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
Configuration8 or higher or less more than less than
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
Configuration9 or higher or less more than less than
cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*
Configuration10 or higher or less more than less than
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
Configuration11 or higher or less more than less than
cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*
Configuration12 or higher or less more than less than
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
Linux Kernel における境界外書き込みに関する脆弱性
Title Linux Kernel における境界外書き込みに関する脆弱性
Summary

Linux Kernel には、境界外書き込みに関する脆弱性が存在します。

Possible impacts 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Jan. 31, 2022, midnight
Registration Date Aug. 17, 2023, 12:05 p.m.
Last Update Dec. 15, 2025, 2:32 p.m.
Affected System
レッドハット
codeready linux builder 
codeready linux builder for power little endian eus 
Red Hat Enterprise Linux 
Red Hat Virtualization 
Fedora Project
Fedora 
NetApp
H300E ファームウェア 
H410S ファームウェア 
H500E ファームウェア 
Linux
Linux Kernel 
oVirt
Node 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
1 [2023年08月17日]
  掲載
Aug. 17, 2023, 12:05 p.m.
2 [2025年12月15日]
  参考情報:JVN (JVNVU#99514792) を追加
Dec. 15, 2025, 12:12 p.m.