First published: Wed Sep 14 2016(Updated: )
Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. A remote user could use this falw to cause kernel panic by sending maliciously crafted packets to a server that has GRO enabled. Additional requirement for attacking VLAN is to have 8021q module loaded. Additional requirement for attacking TEB is to have increased MTU. Upstream patch --------------- -> <a href="https://patchwork.ozlabs.org/patch/680412/">https://patchwork.ozlabs.org/patch/680412/</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Linux | =6 | |
Oracle Linux | =7 | |
Oracle VM Server | =3.4 | |
Linux Linux kernel | >=4.0<4.1.37 | |
Linux Linux kernel | >=4.2<4.4.32 | |
Linux Linux kernel | >=4.5<4.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.