{"id":"CVE-2016-8632","details":"The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.","modified":"2026-03-14T09:20:42.593243Z","published":"2016-11-28T03:59:04.920Z","related":["MGASA-2017-0136","MGASA-2017-0147","MGASA-2017-0148","SUSE-SU-2016:3039-1","SUSE-SU-2016:3049-1","SUSE-SU-2016:3063-1","SUSE-SU-2017:0226-1","SUSE-SU-2017:0227-1","SUSE-SU-2017:0228-1","SUSE-SU-2017:0229-1","SUSE-SU-2017:0230-1","SUSE-SU-2017:0231-1","SUSE-SU-2017:0233-1","SUSE-SU-2017:0234-1","SUSE-SU-2017:0235-1","SUSE-SU-2017:0244-1","SUSE-SU-2017:0245-1","SUSE-SU-2017:0246-1","SUSE-SU-2017:0247-1","SUSE-SU-2017:0248-1","SUSE-SU-2017:0249-1","SUSE-SU-2017:0268-1","SUSE-SU-2017:0278-1","SUSE-SU-2017:0333-1","SUSE-SU-2017:0407-1","SUSE-SU-2017:0437-1","SUSE-SU-2017:0494-1","SUSE-SU-2017:1102-1"],"references":[{"type":"WEB","url":"https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/11/08/5"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94211"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1390832"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-8632.json","unresolved_ranges":[{"events":[{"introduced":"2.6.16"},{"fixed":"3.2.85"}]},{"events":[{"introduced":"3.3"},{"fixed":"3.16.40"}]},{"events":[{"introduced":"3.17"},{"fixed":"4.1.37"}]},{"events":[{"introduced":"4.2"},{"fixed":"4.4.65"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.8.14"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}