CVE-2016-8632 PUBLISHED

The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

EPSS 0.05% · 14.9th percentile

Risk Scores

EPSS Score
0.05%
14.9th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSlinux-aws4.4.0-1011.20, 4.4.0-1012.21, 4.4.0-1013.22
Ubuntu:18.04:LTSlinux-hwe-edge5.3.0-23.25~18.04.2, 5.3.0-24.26~18.04.2, 5.0.0-16.17~18.04.1
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1095.101+cvm1.1, 5.4.0-1098.104+cvm1.1, 5.4.0-1100.106+cvm1.1
Ubuntu:20.04:LTSlinux-riscv5.4.0-39.44, 5.4.0-37.42, 5.4.0-36.41
Ubuntu:18.04:LTSlinux-azure5.0.0-1016.17~18.04.1, 5.0.0-1020.21~18.04.1, 5.0.0-1022.23~18.04.1
Ubuntu:16.04:LTSlinux-raspi24.4.0-1029.36, 4.4.0-1027.33, 4.4.0-1023.29
Ubuntu:18.04:LTSlinux-gcp4.15.0-1008.8, 0, 4.15.0-1001.1
Ubuntu:18.04:LTSlinux-oem4.15.0-1063.72, 4.15.0-1090.100, 4.15.0-1087.97
Ubuntu:24.04:LTSlinux-raspi-realtime0, 6.8.0-2019.20
Ubuntu:14.04:LTSlinux-lts-xenial4.4.0-15.31~14.04.1, 4.4.0-31.50~14.04.1, 4.4.0-28.47~14.04.1
Ubuntu:20.04:LTSlinux-raspi25.3.0-1017.19, 5.4.0-1004.4, 5.4.0-1006.6
Ubuntu:14.04:LTSlinux3.13.0-65.105, 3.11.0-12.19, 3.12.0-1.3
Ubuntu:22.04:LTSlinux-riscv0, 5.13.0-1004.4, 5.13.0-1006.6+22.04.1
Ubuntu:16.04:LTSlinux-snapdragon4.4.0-1020.23, 4.4.0-1058.62, 4.4.0-1057.61
Ubuntu:20.04:LTSlinux-gke5.4.0-1049.52, 5.4.0-1046.48, 5.4.0-1044.46
Ubuntu:16.04:LTSlinux0, 4.4.0-78.99, 4.4.0-77.98
Ubuntu:22.04:LTSlinux-intel-iot-realtime0, 5.15.0-1073.75
Ubuntu:16.04:LTSlinux-gke4.4.0-1012.12, 4.4.0-1010.10, 4.4.0-1013.13
Ubuntu:22.04:LTSlinux-realtime5.15.0-1032.35, 0
Ubuntu:18.04:LTSlinux-hwe5.3.0-68.63, 5.3.0-67.61, 5.3.0-66.60

Timeline

References

Open in Interactive Console →