Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. A remote user could use this falw to cause kernel panic by sending maliciously crafted packets to a server that has GRO enabled. Additional requirement for attacking VLAN is to have 8021q module loaded. Additional requirement for attacking TEB is to have increased MTU. Upstream patch --------------- -> https://patchwork.ozlabs.org/patch/680412/
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1383476]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:2047 https://rhn.redhat.com/errata/RHSA-2016-2047.html
This issue has been addressed in the following products: MRG for RHEL-6 v.2 Via RHSA-2016:2107 https://rhn.redhat.com/errata/RHSA-2016-2107.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:2110 https://rhn.redhat.com/errata/RHSA-2016-2110.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:0372 https://rhn.redhat.com/errata/RHSA-2017-0372.html