Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-10229

Опубликовано: 04 апр. 2017
Источник: debian
EPSS Низкий

Описание

udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.5.1-1package
linuxfixed3.16.7-ckt20-1+deb8u2jessiepackage
linuxfixed3.2.73-2+deb7u2wheezypackage

Примечания

  • Fixed by: https://git.kernel.org/linus/197c949e7798fbf28cfadc69d9ca0c2abbf93191 (v4.5-rc1)

EPSS

Процентиль: 78%
0.01242
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.

CVSS3: 8.1
redhat
больше 9 лет назад

udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.

CVSS3: 9.8
nvd
больше 8 лет назад

udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.

CVSS3: 9.8
github
около 3 лет назад

udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.

CVSS3: 9.8
fstec
больше 9 лет назад

Уязвимость компонента udp.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 78%
0.01242
Низкий