Back to bug 1384991

Who When What Removed Added
Adam Mariš 2016-10-14 14:03:03 UTC Depends On 1384995
Adam Mariš 2016-10-14 14:07:48 UTC Whiteboard impact=important,public=20161013,reported=20161013,source=oss-security,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cvss3=5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-674,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected impact=important,public=20161013,reported=20161013,source=oss-security,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cvss3=5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-674,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=notaffected
Adam Mariš 2016-10-14 14:09:50 UTC Blocks 1384998
Vladis Dronov 2016-10-17 14:36:30 UTC Whiteboard impact=important,public=20161013,reported=20161013,source=oss-security,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cvss3=5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-674,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=notaffected impact=important,public=20161013,reported=20161013,source=oss-security,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cvss3=7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-674,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=notaffected
Vladis Dronov 2016-10-17 14:47:28 UTC CC vdronov
Doc Text The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.
Doc Type If docs needed, set a value Bug Fix
Whiteboard impact=important,public=20161013,reported=20161013,source=oss-security,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cvss3=7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-674,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=notaffected impact=important,public=20161013,reported=20161013,source=oss-security,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cvss3=7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-674,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=affected,fedora-all/kernel=notaffected
Vladis Dronov 2016-10-17 14:49:35 UTC Depends On 1385715
Vladis Dronov 2016-10-17 14:49:45 UTC Depends On 1385716
Vladis Dronov 2016-10-17 14:54:37 UTC Depends On 1297504
Apurbita Mukherjee 2016-10-25 06:39:29 UTC CC apmukher
Vladis Dronov 2016-11-03 09:54:33 UTC Whiteboard impact=important,public=20161013,reported=20161013,source=oss-security,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cvss3=7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-674,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=affected,fedora-all/kernel=notaffected impact=important,public=20161013,reported=20161013,source=oss-security,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cvss3=7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-674,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7.1.z/kernel=affected,rhel-7.2.z/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=affected,fedora-all/kernel=notaffected
Vladis Dronov 2016-11-03 09:55:59 UTC Depends On 1391425
Martin Prpič 2017-01-03 11:55:13 UTC Doc Text The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039. A flaw was found in the way the Linux kernel's networking subsystem handled offloaded packets with multiple layers of encapsulation in the GRO (Generic Receive Offload) code path. A remote attacker could use this flaw to trigger unbounded recursion in the kernel that could lead to stack corruption, resulting in a system crash.
Petr Matousek 2017-10-10 13:59:53 UTC CC pmatouse
Whiteboard impact=important,public=20161013,reported=20161013,source=oss-security,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cvss3=7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-674,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7.1.z/kernel=affected,rhel-7.2.z/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=affected,fedora-all/kernel=notaffected impact=important,public=20161013,reported=20161013,source=oss-security,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cvss3=7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-674,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7.1.z/kernel=affected,rhel-7.2.z/kernel=affected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=affected,fedora-all/kernel=notaffected
PnT Account Manager 2018-02-07 23:18:53 UTC CC agordeev
PnT Account Manager 2018-07-19 06:20:39 UTC CC mguzik
PnT Account Manager 2018-08-28 22:08:38 UTC CC lwang
Eric Sammons 2019-02-08 15:03:06 UTC CC esammons
Product Security DevOps Team 2019-06-08 03:00:15 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2019-06-08 03:00:15 UTC
Product Security DevOps Team 2019-09-29 13:57:57 UTC Whiteboard impact=important,public=20161013,reported=20161013,source=oss-security,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cvss3=7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-674,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7.1.z/kernel=affected,rhel-7.2.z/kernel=affected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=affected,fedora-all/kernel=notaffected

Back to bug 1384991