POC of Linux Kernel TIPC remote code execution (CVE-2021-43267) flaw has been disclosed

On November 24, 2021, the POC of Linux Kernel TIPC remote code execution (CVE-2021-43267) vulnerability has been disclosed, the vulnerability level is serious.
TIPC (Transparent Inter-Process Communication) is a protocol designed for communication within a cluster. It can be configured to transmit messages via UDP or directly via Ethernet. Message delivery is sequence guaranteed, no loss, and flow control.

Vulnerability Detail

A vulnerability was found in net/tipc/crypto.c in the Linux kernel before 5.14.16. The transparent inter-process communication (TIPC) feature allows remote attackers to take advantage of the insufficient verification of the MSG_CRYPTO message type provided by the user. This vulnerability is a heap overflow vulnerability. Attackers can remotely or locally use this vulnerability to execute arbitrary code, gain kernel permissions, and attack the entire system.

Affected version

  • Linux kernel 5.10-rc1 – 5.14.15

Unaffected version

  • Linux kernel 5.14.16


In this regard, we recommend that users upgrade the Linux Kernel to the latest version in time.