Required CVE Record Information
Description
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
References 11 Total
- rhn.redhat.com: RHSA-2016:2107 vendor-advisory
- access.redhat.com: RHSA-2017:0372 vendor-advisory
- https://bto.bluecoat.com/security-advisory/sa134
- openwall.com: [oss-security] 20161010 CVE-2016-7039 Kernel: net: unbounded recursion in the vlan GRO processing mailing-list
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1375944
- https://patchwork.ozlabs.org/patch/680412/
- rhn.redhat.com: RHSA-2016:2047 vendor-advisory
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- rhn.redhat.com: RHSA-2016:2110 vendor-advisory
- securityfocus.com: 93476 vdb-entry
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 11 Total
- rhn.redhat.com: RHSA-2016:2107 vendor-advisoryx_transferred
- access.redhat.com: RHSA-2017:0372 vendor-advisoryx_transferred
- https://bto.bluecoat.com/security-advisory/sa134 x_transferred
- openwall.com: [oss-security] 20161010 CVE-2016-7039 Kernel: net: unbounded recursion in the vlan GRO processing mailing-listx_transferred
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html x_transferred
- https://bugzilla.redhat.com/show_bug.cgi?id=1375944 x_transferred
- https://patchwork.ozlabs.org/patch/680412/ x_transferred
- rhn.redhat.com: RHSA-2016:2047 vendor-advisoryx_transferred
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html x_transferred
- rhn.redhat.com: RHSA-2016:2110 vendor-advisoryx_transferred
- securityfocus.com: 93476 vdb-entryx_transferred