Vulnerability in Linux kernel could let hackers remotely take over systems
Heap overflow attacks can exploit TIPC module in all common Linux distributions
Security researchers have discovered a heap overflow vulnerability in the Transparent Inter-Process Communication (TIPC) module of the kernel of Linux operating systems. Hackers could exploit the vulnerability locally or remotely within a network to gain kernel privileges.
Researchers at SentinelLabs said the vulnerable TIPC module is included in all common Linux distributions but the user must load it to activate the protocol. By exploiting the vulnerability, attackers can compromise the entire system, potentially leading to grave consequences.
TIPC is a protocol that enables the nodes in a cluster to communicate efficiently while remaining fault-tolerant. The protocol is implemented in a kernel module that is included in all common Linux distributions. When loaded by a user, it can be used as a socket and configured as an unprivileged user on an interface with netlink (or with the userspace tool tipc, which makes these netlink calls).
In September 2020, a new user message type called MSG_CRYPTO was introduced. This enables the sending and exchanging of cryptographic keys, which is the origin of the flaw.
The possibility of configuration starting from an unprivileged local level and the risk of exploitation from a distance make this a hazardous weak point for all those who use affected systems in their networks. It is particularly worrying that an attacker who exploited this vulnerability could execute arbitrary code within the kernel, potentially resulting in outsiders completely compromising the system.
RELATED RESOURCE
ITSM workflow handbook: No more "If only IT could do X"
What you need to deliver resilient AI-powered service operations that delight employees
“As for the data being overwritten, at first glance it may look like the overflow will have uncontrolled data, since the actual message size used to allocate the heap location is verified,” said researchers.
“However, a second look at the message validation function shows that it only checks that the message size in the header is within the bounds of the actual packet. That means that an attacker could create a 20-byte packet and set the message size to 10 bytes without failing the check.”
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
On October 19, SentinelLabs reported the findings. In cooperation with the Linux Foundation and one of the TIPC managers, the security researchers created a patch that has been available since October 29th and has been available in current Linux versions (after 5.15) since October 31st.
As the vulnerability was discovered within a year of its introduction to the code base, TIPC users should check whether their Linux kernel version is between 5.10-rc1 and 5.15 and, if necessary, update it.
As of this writing, SentinelOne has not found any evidence of cyber criminals’ successful misuse of the protocol.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Anthropic targets vulnerability detection gains with Claude Security public beta — here's what users can expectNews The Claude Mythos developer is aiming for a more limited approach to cyber tooling for public consumption
-
Researchers warn millions of RDP and VNC servers are wide open to exploitationNews Researchers at Forescout spotted millions of RDP and VNC servers exposed online
-
Brace yourselves for a vulnerability explosion, Forescout warnsNews AI advances are helping identify software flaws at record pace and scale, but that's not the good news some would think
-
Ubuntu vulnerability exposes enterprises to root escalation, complete system compromiseNews The high-severity Ubuntu vulnerability allows an unprivileged local attacker to escalate privileges through the interaction of two standard system components
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers


