Bug 2020362 (CVE-2021-43267)
Summary: | CVE-2021-43267 kernel: Insufficient validation of user-supplied sizes for the MSG_CRYPTO message type | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | Li Shuang <shuali> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | acaringi, adibrahi, adscvr, airlied, alciregi, asavkov, bdettelb, bhu, brdeoliv, bskeggs, chwhite, cperry, crwood, ctoe, dhoward, dvlasenk, fhrbata, fpacheco, hdegoede, hkrzesin, jarod, jarodwilson, jburrell, jeremy, jforbes, jglisse, jlelli, joe.lawrence, jonathan, josef, jpoimboe, jshortt, jstancek, jthierry, jwboyer, kcarcia, kernel-maint, kernel-mgr, kpatch-maint, lgoncalv, linville, masami256, mchehab, michal.skrivanek, mperina, mvanderw, nmurray, nobody, pmatouse, ptalbert, qzhao, rhandlin, rvandolson, rvrbovsk, sbonazzo, steved, vkumar, walters, williams, ycote, yozone, yuma |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was discovered in the cryptographic receive code in the Linux kernel's implementation of transparent interprocess communication. An attacker, with the ability to send TIPC messages to the target, can corrupt memory and escalate privileges on the target system.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-11-19 19:50:44 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2020493, 2020503, 2020504, 2020505, 2020506, 2020507, 2020508, 2020509, 2020510, 2020511, 2020512, 2020513, 2020561, 2020562, 2021785 | ||
Bug Blocks: | 2020364 |
Description
Pedro Sampaio
2021-11-04 16:37:27 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2020493] Per SRE, OSD is notaffected. "it isn't loaded by default and you'd need to run a priv'd container to get CAP_SYS_MODULE to be able to load it." This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4646 https://access.redhat.com/errata/RHSA-2021:4646 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2021:4648 https://access.redhat.com/errata/RHSA-2021:4648 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4645 https://access.redhat.com/errata/RHSA-2021:4645 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2021:4644 https://access.redhat.com/errata/RHSA-2021:4644 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2021:4650 https://access.redhat.com/errata/RHSA-2021:4650 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4647 https://access.redhat.com/errata/RHSA-2021:4647 This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2021:4750 https://access.redhat.com/errata/RHSA-2021:4750 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-43267 |