First published: Wed Nov 02 2016(Updated: )
A flaw was found in the TIPC networking subsystem which could allow for memory corruption and possible priveledge escalation. The flaw involves a system with an unusually low MTU (60) on networking devices configured as bearers for the TIPC protocol. Not all devices support or allow MTU's below 68 octets. An attacker can create a packet which will overwrite memory outside of allocated space and this can allow for priveledge escalation. The affected code is not enabled on Red Hat Enterprise Linux 6 and 7. The affected code was not included in Red Hat Enterprise Linux 5. Initial patch: <a href="https://www.mail-archive.com/netdev@vger.kernel.org/msg133205.html">https://www.mail-archive.com/netdev@vger.kernel.org/msg133205.html</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=2.6.16<3.2.85 | |
Linux Linux kernel | >=3.3<3.16.40 | |
Linux Linux kernel | >=3.17<4.1.37 | |
Linux Linux kernel | >=4.2<4.4.65 | |
Linux Linux kernel | >=4.5<4.8.14 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.7-1 6.11.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2016-8632.
The severity of CVE-2016-8632 is medium.
The affected software for CVE-2016-8632 includes various Ubuntu packages, Linux kernel versions, and Debian Linux.
A local user can exploit CVE-2016-8632 to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the vulnerability.
More information about CVE-2016-8632 can be found at the following references: [1][2][3].