{"id":"CVE-2021-43267","details":"An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.","aliases":["A-205243414","PUB-A-205243414"],"modified":"2026-04-16T04:32:06.926900111Z","published":"2021-11-02T23:15:07.487Z","related":["ALSA-2021:4647"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVWL7HZV5T5OEKJPO2D67RMFMKBBXGGB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/"},{"type":"ADVISORY","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20211125-0002/"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2022/02/10/1"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.10"},{"fixed":"5.10.77"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.14.16"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-43267.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}