Arch Linux Security Advisory ASA-201905-2
========================================
Severity: High
Date    : 2019-05-06
CVE-ID  : CVE-2019-11683
Package : linux
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-955

Summary
======
The package linux before version 5.0.12.arch2-1 is vulnerable to
arbitrary code execution.

Resolution
=========
Upgrade to 5.0.12.arch2-1.

# pacman -Syu "linux>=5.0.12.arch2-1"

The problem has been fixed upstream in version 5.0.12.arch2.

Workaround
=========
None.

Description
==========
udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel
5.x through 5.0.11 allows remote attackers to cause a denial of service
(slab-out-of-bounds memory corruption) or possibly have unspecified
other impact via UDP packets with a 0 payload, because of mishandling
of padded packets, aka the "GRO packet of death" issue.

Impact
=====
A remote attacker is able to cause a denial of service possibly leading
to remote code execution by sending UDP packets with a special payload.

References
=========
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/
https://www.openwall.com/lists/oss-security/2019/05/05/4
https://www.openwall.com/lists/oss-security/2019/05/02/1
https://security.archlinux.org/CVE-2019-11683

ArchLinux: 201905-2: linux: arbitrary code execution

May 7, 2019

Summary

udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x through 5.0.11 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of death" issue.

Resolution

Upgrade to 5.0.12.arch2-1. # pacman -Syu "linux>=5.0.12.arch2-1"
The problem has been fixed upstream in version 5.0.12.arch2.

References

https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/ https://www.openwall.com/lists/oss-security/2019/05/05/4 https://www.openwall.com/lists/oss-security/2019/05/02/1 https://security.archlinux.org/CVE-2019-11683

Severity
Package : linux
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-955

Workaround

None.

Related News