CVE-2016-10229

udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

History

03 Jan 2025, 12:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250103-0008/ -

Information

Published : 2017-04-04 05:59

Updated : 2025-04-20 01:37


NVD link : CVE-2016-10229

Mitre link : CVE-2016-10229

CVE.ORG link : CVE-2016-10229


JSON object : View

Products Affected

google

  • android

linux

  • linux_kernel
CWE
CWE-358

Improperly Implemented Security Check for Standard