[ASA-201905-2] linux: arbitrary code execution
santiago at archlinux.org
Tue May 7 20:52:48 UTC 2019
Arch Linux Security Advisory ASA-201905-2
Date : 2019-05-06
CVE-ID : CVE-2019-11683
Package : linux
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-955
The package linux before version 5.0.12.arch2-1 is vulnerable to
arbitrary code execution.
Upgrade to 5.0.12.arch2-1.
# pacman -Syu "linux>=5.0.12.arch2-1"
The problem has been fixed upstream in version 5.0.12.arch2.
udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel
5.x through 5.0.11 allows remote attackers to cause a denial of service
(slab-out-of-bounds memory corruption) or possibly have unspecified
other impact via UDP packets with a 0 payload, because of mishandling
of padded packets, aka the "GRO packet of death" issue.
A remote attacker is able to cause a denial of service possibly leading
to remote code execution by sending UDP packets with a special payload.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: not available
More information about the arch-security