On November 24, 2021, the POC of Linux Kernel TIPC remote code execution (CVE-2021-43267) vulnerability has been
disclosed, the vulnerability level is serious.
TIPC (Transparent Inter-Process Communication) is a protocol designed for communication within a cluster. It can be configured to transmit messages via UDP or directly via Ethernet. Message delivery is sequence guaranteed, no loss, and flow control.
Vulnerability Detail
A vulnerability was found in net/tipc/crypto.c in the Linux kernel before 5.14.16. The transparent inter-process communication (TIPC) feature allows remote attackers to take advantage of the insufficient verification of the MSG_CRYPTO message type provided by the user. This vulnerability is a heap overflow vulnerability. Attackers can remotely or locally use this
vulnerability to execute arbitrary code, gain kernel permissions, and attack the entire system.
Affected version
- Linux kernel 5.10-rc1 – 5.14.15
Unaffected version
Solution
In this regard, we recommend that users upgrade the Linux Kernel to the latest version in time.