Improperly implemented security check for standard in Linux kernel - CVE-2016-10229
Published: April 4, 2017 / Updated: November 3, 2022
Linux kernel
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to improperly implemented security check for standard error within the udpv6_recvmsg() function in net/ipv6/udp.c, within the udp_recvmsg() function in net/ipv4/udp.c. A remote non-authenticated attacker can execute arbitrary code.
How to mitigate CVE-2016-10229
Sources
- https://github.com/torvalds/linux/commit/197c949e7798fbf28cfadc69d9ca0c2abbf93191
- http://source.android.com/security/bulletin/2017-04-01.html
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=197c949e7798fbf28cfadc69d9ca0c2abbf93191
- http://www.securityfocus.com/bid/97397
- http://www.securitytracker.com/id/1038201
- https://security.paloaltonetworks.com/CVE-2016-10229