In Linux ontdekt kernel kwetsbaarheid CVE-2019-11.683.ikt enables remotely cause denial in service through sending specially designed UDP-packets (packet-of-death).
Problem hides in the error of handler udp_gro_receive_segment (net / ipv4 / udp_offload.c) with realization of GRO (Generic Ontvang offload) technologie en kan leiden tot beschadiging van de kern geheugengebieden bij het verwerken UDP-pakketten met nul vulling (lege payload).
“Het verkeerd gewatteerde pakketten, aka de “GRO pakket van de dood” issue found in Linux kernel”, — reported researchers on seclists.org forum.
Problem involves 5.0 kernel only as GRO support for UDP-sockets was realized in Novemebr 2018 and got in the last stable core release only. GRO technology allows speeding up processing of large quantities of incoming packets due aggregation of packets in larger blocks that does not demand processing of every packet solely.
For TCP problem does not arise, as for this protocol aggregation of packets without payload is not supported.
Vulnerability is fixed in the form of the patch; correcting update is not published yet. Among distributives core 5.0 managed to get in parts of Fedora 30, Ubuntu 19.04, Arch Linux, Gentoo and other permanently updated distributives.
Problem does not affect Debian, Ubuntu 18.10 and younger, RHEL/CentOS and SUSE/openSUSE.
Problem was discovered as a result of syzbot usage that is Google-created automatized fuzzing-testing system, En KASAN(KernelAddressSanitizer) analyzer that aims detection of errors while working with the memory and facts of incorrect turns to memory, zoals, Bijvoorbeeld, calls to freed memory areas and code placement in memory areas that are not designed for such manipulations.