The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-2107.html | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2017:0372 | third party advisory vendor advisory |
https://bto.bluecoat.com/security-advisory/sa134 | third party advisory |
http://www.openwall.com/lists/oss-security/2016/10/10/15 | patch mailing list third party advisory |
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1375944 | third party advisory issue tracking |
https://patchwork.ozlabs.org/patch/680412/ | patch issue tracking |
http://rhn.redhat.com/errata/RHSA-2016-2047.html | third party advisory vendor advisory |
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html | third party advisory |
http://rhn.redhat.com/errata/RHSA-2016-2110.html | third party advisory vendor advisory |
http://www.securityfocus.com/bid/93476 | third party advisory vdb entry |