CVE-2022-48711

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
20/06/2024
Last modified:
17/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tipc: improve size validations for received domain records<br /> <br /> The function tipc_mon_rcv() allows a node to receive and process<br /> domain_record structs from peer nodes to track their views of the<br /> network topology.<br /> <br /> This patch verifies that the number of members in a received domain<br /> record does not exceed the limit defined by MAX_MON_DOMAIN, something<br /> that may otherwise lead to a stack overflow.<br /> <br /> tipc_mon_rcv() is called from the function tipc_link_proto_rcv(), where<br /> we are reading a 32 bit message data length field into a uint16. To<br /> avert any risk of bit overflow, we add an extra sanity check for this in<br /> that function. We cannot see that happen with the current code, but<br /> future designers being unaware of this risk, may introduce it by<br /> allowing delivery of very large (&gt; 64k) sk buffers from the bearer<br /> layer. This potential problem was identified by Eric Dumazet.<br /> <br /> This fixes CVE-2022-0435

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.8 (including) 4.9.301 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.266 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.229 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.179 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.100 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.23 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.9 (excluding)
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*