Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2016-8632
Description:The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
Test IDs: None available
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2016-8632
94211
http://www.securityfocus.com/bid/94211
[netdev] 20161018 [PATCH net] tipc: Guard against tiny MTU in tipc_msg_build()
https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html
[oss-security] 20161108 CVE-2016-8632 -- Linux kernel: tipc_msg_build() doesn't validate MTU that can trigger heap overflow
http://www.openwall.com/lists/oss-security/2016/11/08/5
https://bugzilla.redhat.com/show_bug.cgi?id=1390832
https://bugzilla.redhat.com/show_bug.cgi?id=1390832




© 1998-2025 E-Soft Inc. All rights reserved.