Lucene search

K
f5F5F5:K63687287
HistoryAug 07, 2017 - 12:00 a.m.

K63687287 : Linux kernel vulnerability CVE-2016-8632

2017-08-0700:00:00
my.f5.com
20

8.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Security Advisory Description

The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability. (CVE-2016-8632)
Impact
There is no impact; F5 products are not affected by this vulnerability.

8.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%