Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 605234 (CVE-2016-7039)

Summary: kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash
Product: Gentoo Security Reporter: Thomas Deutschmann <whissi>
Component: KernelAssignee: Gentoo Kernel Security <security-kernel>
Status: CONFIRMED ---    
Severity: normal CC: kernel
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
See Also:
Package list:
Runtime testing required: ---
Bug Depends on: 605360    
Bug Blocks:    

Description Thomas Deutschmann gentoo-dev Security 2017-01-10 01:47:31 UTC
Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel.
Comment 1 Thomas Deutschmann gentoo-dev Security 2017-01-10 01:52:43 UTC
Fixed by:

Introduced by: (v4.0-rc1)

Intorduced by: (v4.2-rc1)

sys-kernel/gentoo-sources overview:
4.4:  Fixed since 4.4.32 (3cb00b90e8b1bd59382f5e1304dd751f9674f027)
4.1:  Fixed since 4.1.37 (fabaaaa96d54077b4a9f2c811e55dc09ff2874db)
Comment 2 Alice Ferrazzi Gentoo Infrastructure gentoo-dev 2017-01-11 09:05:24 UTC
4.4.41 and 4.1.37 are commited wait for stabilize