First published: Wed Sep 14 2016(Updated: )
Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. A remote user could use this falw to cause kernel panic by sending maliciously crafted packets to a server that has GRO enabled. Additional requirement for attacking VLAN is to have 8021q module loaded. Additional requirement for attacking TEB is to have increased MTU. Upstream patch --------------- -> <a href="https://patchwork.ozlabs.org/patch/680412/">https://patchwork.ozlabs.org/patch/680412/</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Linux | =6 | |
Oracle Linux | =7 | |
Oracle VM Server | =3.4 | |
Linux kernel | >=4.0<4.1.37 | |
Linux kernel | >=4.2<4.4.32 | |
Linux kernel | >=4.5<4.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7039 is classified as a high severity vulnerability due to the potential for stack overflow leading to system crashes.
CVE-2016-7039 affects the Linux kernel by allowing a stack overflow when large packets are received via the GRO path with TEB support.
Oracle Linux versions 6 and 7 are impacted by CVE-2016-7039.
Linux kernel versions 4.0 to 4.1.37, 4.2 to 4.4.32, and 4.5 to 4.8.8 are vulnerable to CVE-2016-7039.
Risks associated with CVE-2016-7039 can be mitigated by applying kernel patches or upgrading to versions that have addressed this vulnerability.