CVE-2016-8632
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
28/11/2016
Last modified:
12/04/2025
Description
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.16 (including) | 3.2.85 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.3 (including) | 3.16.40 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.17 (including) | 4.1.37 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.2 (including) | 4.4.65 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.8.14 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2016/11/08/5
- http://www.securityfocus.com/bid/94211
- https://bugzilla.redhat.com/show_bug.cgi?id=1390832
- https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html
- http://www.openwall.com/lists/oss-security/2016/11/08/5
- http://www.securityfocus.com/bid/94211
- https://bugzilla.redhat.com/show_bug.cgi?id=1390832
- https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html