A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2048738 | issue tracking third party advisory patch |
https://www.openwall.com/lists/oss-security/2022/02/10/1 | mailing list patch mitigation exploit third party advisory |
https://security.netapp.com/advisory/ntap-20220602-0001/ | third party advisory |