The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
https://bugzilla.redhat.com/show_bug.cgi?id=1375944
https://patchwork.ozlabs.org/patch/680412/
http://www.openwall.com/lists/oss-security/2016/10/10/15
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93476
https://bto.bluecoat.com/security-advisory/sa134
https://access.redhat.com/errata/RHSA-2017:0372
http://rhn.redhat.com/errata/RHSA-2016-2110.html
Source: MITRE
Published: 2016-10-16
Updated: 2023-01-17
Type: CWE-399
Base Score: 7.8
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact Score: 6.9
Exploitability Score: 10
Severity: HIGH
Base Score: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 3.9
Severity: HIGH