udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.
The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/97397 | vdb entry third party advisory |
http://source.android.com/security/bulletin/2017-04-01.html | third party advisory patch |
https://github.com/torvalds/linux/commit/197c949e7798fbf28cfadc69d9ca0c2abbf93191 | issue tracking third party advisory patch |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=197c949e7798fbf28cfadc69d9ca0c2abbf93191 | issue tracking third party advisory patch |
http://www.securitytracker.com/id/1038201 | vdb entry third party advisory |
https://security.paloaltonetworks.com/CVE-2016-10229 | third party advisory |
https://security.netapp.com/advisory/ntap-20250103-0008/ |