Linux devs fix nasty vulnerability dating back half a decade

The Linux penguin.
Image Credit: Pixabay (Image credit: Image Credit: Pixabay)

An exploitable bug sitting in a popular Linux kernel module, has been found after five years, researchers have claimed. 

Detailing the findings in a blog post, researcher Samuel Page from cybersecurity firm Appgate said the flaw was a stack buffer overflow, found in the kernel networking module for the Transparent Inter-Process Communication (TIPC) protocol.

Page describes TIPC as an IPC mechanism designed for intra-cluster communication.  “Cluster topology is managed around the concept of nodes and the links between these nodes,” he says.

Denial of service and code execution attacks

TIPC communications go over a “bearer”, a TIPC abstraction of a network interface. A “media” is a bearer type, with the protocol currently supporting Ethernet, Infiniband, UDP/IPv4 and UDP/IPv6.

The flaw allows the attacker to engage in a denial-of-service attacks and, sometimes, remote code execution. 

“Exploitation is trivial and can lead to denial of service via kernel panic. In the absence, or bypass, of stack canaries/KASLR the vulnerability can lead to control flow hijacking with an arbitrary payload,” the blog says.

Those running versions 4.8 - 5.17-rc3 of the Linux kernel should make sure to patch to the latest version, as they’re vulnerable to the flaw. Those that are unable to patch their systems up immediately should enforce a configuration that prevents an attacker from impersonating a node in their clusters, for example by using TIPC-level encryption.

“The vulnerability lies in the fact that during the initial sanity checks, the function doesn't check that member_cnt is below MAX_MON_DOMAIN which defines the maximum size of the members array. By pretending to be a peer node and establishing a link with the target, locally or remotely, we're able to first submit a malicious domain record containing an arbitrary payload; so long as the len/member_cnt fields match up for the sanity checks, this will be kmallocated fine,” it is explained in the blog post.

“Next, we can send a newer domain record which will cause the previous malicious record to be memcpy'd into a 272 bytes local struct tipc_mon_domain &dom_bef triggering a stack overflow.”

But there are some caveats to the flaw, Page adds. The attacker is restricted by the TIPC media types that are set up on the target endpoint. “Locally, if the module is loaded, an attacker can use the underlying netlink communications to configure a bearer (credit to bl@sty for his work on CVE-2021-43267). They won’t, however, have permissions to send raw ethernet frames, leaving a UDP bearer the likely option,” the blog post concludes.

  • You might also want to check out our list of the best firewalls right now
TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Digital image of a lock.
Nvidia systems could be facing another worrying security flaw
Flag of the People's Republic of China overlaid with a technological network of wires and circuits.
One of the biggest flaws exploited by Salt Typhoon hackers has had a patch available for years
A VPN runs on a mobile phone placed on a laptop keyboard
SonicWall firewalls hit by worrying cyberattack
China
Juniper patches security flaws which could have let hackers take over your router
Best free Linux firewalls
Fortinet warns a critical vulnerability in its systems could let attackers breach company networks
Best free Linux firewalls
SonicWall tells admins to patch worrying SSLVPN flaw immediately
Latest in Software & Services
TinEye website
I like this reverse image search service the most
A person in a wheelchair working at a computer.
Here’s a free way to find long lost relatives and friends
A white woman with long brown hair in a ponytail looks down at her computer in a distressed manner. She is holding her forehead with one hand and a credit card with the other
This people search finder covers all the bases, but it's not perfect
That's Them home page
Is That's Them worth it? My honest review
woman listening to computer
AWS vs Azure: choosing the right platform to maximize your company's investment
A person at a desktop computer working on spreadsheet tables.
Trello vs Jira: which project management solution is best for you?
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring