Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 684984 (CVE-2019-11683) - Linux Kernel Failed Exceptional Condition (CVE-2019-11683)
Summary: Linux Kernel Failed Exceptional Condition (CVE-2019-11683)
Status: RESOLVED FIXED
Alias: CVE-2019-11683
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL: https://www.spinics.net/lists/netdev/...
Whiteboard: B3 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2019-05-03 14:52 UTC by D'juan McDonald (domhnall)
Modified: 2022-03-26 01:01 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description D'juan McDonald (domhnall) 2019-05-03 14:52:58 UTC
(https://nvd.nist.gov/vuln/detail/CVE-2019-11683):

udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x through 5.0.11 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of death" issue.

Patch: https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/patch/?id=4dd2b82d5adfbe0b1587ccad7a8f76d826120f37

Gentoo Security Padawan
(domhnall)
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-26 01:01:21 UTC
No affected versions left