The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
Advisories
Source ID Title
EUVD EUVD EUVD-2016-7922 The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
Ubuntu USN Ubuntu USN USN-3098-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3098-2 Linux kernel (Trusty HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3099-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3099-2 Linux kernel (Xenial HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3099-3 Linux kernel (Raspberry Pi 2) vulnerabilities
Ubuntu USN Ubuntu USN USN-3099-4 Linux kernel (Qualcomm Snapdragon) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T01:50:46.861Z

Reserved: 2016-08-23T00:00:00

Link: CVE-2016-7039

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-10-16T21:59:09.130

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-7039

cve-icon Redhat

Severity : Important

Publid Date: 2016-10-10T00:00:00Z

Links: CVE-2016-7039 - Bugzilla

cve-icon OpenCVE Enrichment

No data.