Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-8632

Опубликовано: 28 нояб. 2016
Источник: debian
EPSS Низкий

Описание

The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.8.15-1package
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage

Примечания

  • https://www.mail-archive.com/netdev@vger.kernel.org/msg133205.html

  • Fixed by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3de81b758853f0b29c61e246679d20b513c4cfec (v4.9-rc8)

EPSS

Процентиль: 29%
0.00101
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

redhat
больше 8 лет назад

The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

CVSS3: 7.8
nvd
больше 8 лет назад

The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

CVSS3: 7.8
github
около 3 лет назад

The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

suse-cvrf
больше 8 лет назад

Security update for Linux Kernel Live Patch 8 for SLE 12 SP1

EPSS

Процентиль: 29%
0.00101
Низкий