CVE-2019-11683
Publication date 2 May 2019
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x before 5.0.13 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of death" issue.
From the Ubuntu Security Team
It was discovered that the IPv4 generic receive offload (GRO) for UDP implementation in the Linux kernel did not properly handle padded packets. A remote attacker could use this to cause a denial of service (system crash).
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| linux | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-flo | ||
| 18.04 LTS bionic | Not in release | |
| linux-goldfish | ||
| 18.04 LTS bionic | Not in release | |
| linux-aws | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-azure | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-azure-edge | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-aws-hwe | ||
| 18.04 LTS bionic | Not in release | |
| linux-oracle | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-euclid | ||
| 18.04 LTS bionic | Not in release | |
| linux-gcp | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-gcp-edge | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-gke | ||
| 18.04 LTS bionic | Not in release | |
| linux-gke-4.15 | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-gke-5.0 | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-grouper | ||
| 18.04 LTS bionic | Not in release | |
| linux-hwe | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-hwe-edge | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-kvm | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-lts-trusty | ||
| 18.04 LTS bionic | Not in release | |
| linux-lts-utopic | ||
| 18.04 LTS bionic | Not in release | |
| linux-lts-vivid | ||
| 18.04 LTS bionic | Not in release | |
| linux-lts-wily | ||
| 18.04 LTS bionic | Not in release | |
| linux-lts-xenial | ||
| 18.04 LTS bionic | Not in release | |
| linux-maguro | ||
| 18.04 LTS bionic | Not in release | |
| linux-mako | ||
| 18.04 LTS bionic | Not in release | |
| linux-manta | ||
| 18.04 LTS bionic | Not in release | |
| linux-oem | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-raspi2 | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-snapdragon | ||
| 18.04 LTS bionic |
Not affected
|
|
Notes
tyhicks
The receiving socket has to have the UDP_GRO socket option explicitly enabled with a call to setsockopt(2). UDP sockets are not vulnerable to this attack by default.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3979-1
- Linux kernel vulnerabilities
- 14 May 2019