Description
An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-5165-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5207-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5208-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5218-1 | Linux kernel (OEM) vulnerabilities |
References
History
No history.
Subscriptions
Fedoraproject
Subscribe
Fedora
Subscribe
Linux
Subscribe
Linux Kernel
Subscribe
Netapp
Subscribe
H300e
Subscribe
H300e Firmware
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500e
Subscribe
H500e Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700e
Subscribe
H700e Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Eus
Subscribe
Rhev Hypervisor
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T03:55:27.952Z
Reserved: 2021-11-02T00:00:00.000Z
Link: CVE-2021-43267
No data.
Status : Modified
Published: 2021-11-02T23:15:07.487
Modified: 2024-11-21T06:28:57.330
Link: CVE-2021-43267
OpenCVE Enrichment
No data.
Ubuntu USN