ASA-201905-2 generated external raw

[ASA-201905-2] linux: arbitrary code execution
Arch <a href="/package/linux">Linux</a> Security Advisory ASA-201905-2 ========================================= Severity: High Date : 2019-05-06 CVE-ID : CVE-2019-11683 Package : linux Type : arbitrary code execution Remote : Yes Link : https://security.archlinux.org/AVG-955 Summary ======= The package <a href="/package/linux">linux</a> before version 5.0.12.arch2-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 5.0.12.arch2-1. # pacman -Syu "linux>=5.0.12.arch2-1" The problem has been fixed upstream in version 5.0.12.arch2. Workaround ========== None. Description =========== udp_gro_receive_segment in net/ipv4/udp_offload.c in the <a href="/package/linux">Linux</a> kernel 5.x through 5.0.11 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of death" issue. Impact ====== A remote attacker is able to cause a denial of service possibly leading to remote code execution by sending UDP packets with a special payload. References ========== https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=4dd2b82d5adfbe0b1587ccad7a8f76d826120f37 http://www.securityfocus.com/bid/108142 http://www.openwall.com/lists/oss-security/2019/05/05/4 http://www.openwall.com/lists/oss-security/2019/05/02/1 https://security.archlinux.org/CVE-2019-11683