hshivhare67 / Kernel_4.1.15_CVE-2023-4206_CVE-2023-4207_CVE-2023-4208

Other
0 stars 0 forks source link

CVE-2016-8632 (High) detected in multiple libraries #31

Open mend-bolt-for-github[bot] opened 11 months ago

mend-bolt-for-github[bot] commented 11 months ago

CVE-2016-8632 - High Severity Vulnerability

Vulnerable Libraries - linuxlinux-4.1.18, linuxlinux-4.1.18, linuxlinux-4.1.18

Vulnerability Details

The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

Publish Date: 2016-11-28

URL: CVE-2016-8632

CVSS 3 Score Details (7.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.linuxkernelcves.com/cves/CVE-2016-8632

Release Date: 2016-11-28

Fix Resolution: v4.9-rc8,v3.16.40,v3.2.85,v4.1.37,v4.4.65,v4.8.14


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 6 months ago

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.