High severity7.8NVD Advisory· Published Nov 28, 2016· Updated May 6, 2026
CVE-2016-8632
CVE-2016-8632
Description
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.openwall.com/lists/oss-security/2016/11/08/5nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/94211nvdThird Party AdvisoryVDB Entry
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
- www.mail-archive.com/netdev%40vger.kernel.org/msg133205.htmlnvd
News mentions
0No linked articles in our index yet.