The tipcmsgbuild function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAPNETADMIN capability.
[
{
"events": [
{
"introduced": "2.6.16"
},
{
"fixed": "3.2.85"
}
]
},
{
"events": [
{
"introduced": "3.3"
},
{
"fixed": "3.16.40"
}
]
},
{
"events": [
{
"introduced": "3.17"
},
{
"fixed": "4.1.37"
}
]
},
{
"events": [
{
"introduced": "4.2"
},
{
"fixed": "4.4.65"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.8.14"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-8632.json"