Описание
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Not affected | ||
Red Hat Enterprise Linux 6 | kernel | Not affected | ||
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2016:2110 | 26.10.2016 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2016:2047 | 10.10.2016 |
Red Hat Enterprise Linux 7 | kernel-aarch64 | Fixed | RHSA-2017:0372 | 02.03.2017 |
Red Hat Enterprise MRG 2 | kernel-rt | Fixed | RHSA-2016:2107 | 26.10.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
7.1 High
CVSS2
Связанные уязвимости
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
The IP stack in the Linux kernel through 4.8.2 allows remote attackers ...
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
ELSA-2016-3626: Unbreakable Enterprise kernel security update (IMPORTANT)
EPSS
7.5 High
CVSS3
7.1 High
CVSS2