![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2016-8632 |
Description: | The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability. |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-8632 94211 http://www.securityfocus.com/bid/94211 [netdev] 20161018 [PATCH net] tipc: Guard against tiny MTU in tipc_msg_build() https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html [oss-security] 20161108 CVE-2016-8632 -- Linux kernel: tipc_msg_build() doesn't validate MTU that can trigger heap overflow http://www.openwall.com/lists/oss-security/2016/11/08/5 https://bugzilla.redhat.com/show_bug.cgi?id=1390832 https://bugzilla.redhat.com/show_bug.cgi?id=1390832 |