ACK: [PATCH 0/2][Bionic/Groovy] CVE-2021-29264: gianfar negative fragment size

Krzysztof Kozlowski krzysztof.kozlowski at canonical.com
Tue Apr 6 07:14:43 UTC 2021


On 02/04/2021 20:08, Tim Gardner wrote:
> [SRU Justification]
> 
> An issue was discovered in the Linux kernel through 5.11.10.
> drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet
> driver allows attackers to cause a system crash because a negative fragment size
> is calculated in situations involving an rx queue overrun when jumbo packets are
> used and NAPI is enabled, aka CID-d8861bab48b6.
> 
> Introduced by 6c389fc931bcda88940c809f752ada6d7799482c (v4.8)
> 
> [Test Plan]
> 
> [Where problems could occur]
> Released in stable kernels:
> linux-4.19.y
> linux-5.10.y
> linux-5.11.y
> linux-5.4.y


Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski at canonical.com>


Best regards,
Krzysztof



More information about the kernel-team mailing list