[ASA-201905-4] linux-zen: arbitrary code execution

Santiago Torres-Arias santiago at archlinux.org
Tue May 7 20:53:59 UTC 2019


Arch Linux Security Advisory ASA-201905-4
=========================================

Severity: High
Date    : 2019-05-06
CVE-ID  : CVE-2019-11683
Package : linux-zen
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-957

Summary
=======

The package linux-zen before version 5.0.12.zen2-1 is vulnerable to
arbitrary code execution.

Resolution
==========

Upgrade to 5.0.12.zen2-1.

# pacman -Syu "linux-zen>=5.0.12.zen2-1"

The problem has been fixed upstream in version 5.0.12.zen2.

Workaround
==========

None.

Description
===========

udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel
5.x through 5.0.11 allows remote attackers to cause a denial of service
(slab-out-of-bounds memory corruption) or possibly have unspecified
other impact via UDP packets with a 0 payload, because of mishandling
of padded packets, aka the "GRO packet of death" issue.

Impact
======

A remote attacker is able to cause a denial of service possibly leading
to remote code execution by sending UDP packets with a special payload.

References
==========

https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=4dd2b82d5adfbe0b1587ccad7a8f76d826120f37
http://www.securityfocus.com/bid/108142
http://www.openwall.com/lists/oss-security/2019/05/05/4
http://www.openwall.com/lists/oss-security/2019/05/02/1
https://security.archlinux.org/CVE-2019-11683
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190507/ba3ca5a4/attachment.sig>


More information about the arch-security mailing list