“GRO pakke af død” sårbarhed er fundet i Linux-kernen

I Linux opdagede kernel sårbarhed CVE-2019-11.683.

jegt enables remotely cause denial in service through sending specially designed UDP-packets (pakke-of-død).

Problem hides in the error of handler udp_gro_receive_segment (net / IPv4 / udp_offload.c) with realization of GRO (Generisk Modtag aflastning) teknologi og kan føre til beskadigelse af centrale hukommelsesområder under behandling af UDP-pakker med nul fyldning (tom nyttelast).

”Forkert håndtering af polstrede pakker, aka “GRO pakke af død” issue found in Linux kernel”, — reported researchers on seclists.org forum.

Problem involves 5.0 kernel only as GRO support for UDP-sockets was realized in Novemebr 2018 and got in the last stable core release only. GRO technology allows speeding up processing of large quantities of incoming packets due aggregation of packets in larger blocks that does not demand processing of every packet solely.

For TCP problem does not arise, as for this protocol aggregation of packets without payload is not supported.

Vulnerability is fixed in the form of the patch; correcting update is not published yet. Among distributives core 5.0 managed to get in parts of Fedora 30, Ubuntu 19.04, Arch Linux, Gentoo and other permanently updated distributives.

Problem does not affect Debian, Ubuntu 18.10 and younger, RHEL/CentOS and SUSE/openSUSE.

Problem was discovered as a result of syzbot usage that is Google-created automatized fuzzing-testing system, og KASAN(KernelAddressSanitizer) analyzer that aims detection of errors while working with the memory and facts of incorrect turns to memory, som, For eksempel, calls to freed memory areas and code placement in memory areas that are not designed for such manipulations.

Kilde: https://seclists.org

Polina Lisovskaya

Jeg har arbejdet som marketingchef i årevis nu og elsker at søge efter interessante emner for dig

Efterlad et Svar

Tilbage til toppen knap