CVE-2021-43267 log

Source
Severity High
Remote Yes
Type Arbitrary code execution
Description
An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.
Group Package Affected Fixed Severity Status Ticket
AVG-2515 linux-lts 5.10.76-1 5.10.77-1 High Fixed
AVG-2514 linux-zen 5.14.15.zen1-1 5.14.16.zen1-1 High Fixed
AVG-2513 linux 5.14.15.arch1-1 5.14.16.arch1-1 High Fixed
AVG-2499 linux-hardened 5.14.14.hardened1-1 5.14.16.hardened1-1 High Fixed
References
https://www.sentinelone.com/labs/tipc-remote-linux-kernel-heap-overflow-allows-arbitrary-code-execution/
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.14.16&id=e029c9828c5b503b11a609fcc7c5840de2db3fb4
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.77&id=0b1b3e086b0af2c2faa9938c4db956fe6ce5c965