Bug 1386646 (CVE-2016-8106)

Summary: CVE-2016-8106 kernel: DoS of Intel Ethernet controllers after a period of IPv6 fragment flood
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: agordeev, aquini, bhu, dhoward, esammons, fhrbata, iboverma, jkacur, joelsmith, jross, kernel-mgr, lgoncalv, lwang, matt, mcressma, mguzik, nmurray, pholasek, plougher, pmatouse, rvrbovsk, security-response-team, vdronov, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
It was found that Intel® Ethernet Controller X710 family and Intel® Ethernet Controller XL710 family of products (aka Fortville) can possibly lock up and not receive any packets after a period of IPv6 fragment flood.
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-04-10 12:05:30 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1370029    
Bug Blocks: 1386648    

Description Adam Mariš 2016-10-19 11:39:10 UTC
It was found that Intel® Ethernet Controller X710 family and Intel® Ethernet Controller XL710 family of products (aka Fortville) can possibly lock up and not receive any packets after a period of IPv6 fragment flood.

Product bug:

https://bugzilla.redhat.com/show_bug.cgi?id=1370029

References:

https://nvd.nist.gov/vuln/detail/CVE-2016-8106

https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063&languageid=en-fr

Comment 1 Vladis Dronov 2017-04-10 12:02:47 UTC
Statement:

None of the Red Hat's products are affected as the flaw was found in the Intel network card Non-Volatile Flash Memory (NVM) image (firmware).