ACK: [PATCH 0/2][Bionic/Groovy] CVE-2021-29264: gianfar negative fragment size
Krzysztof Kozlowski
krzysztof.kozlowski at canonical.com
Tue Apr 6 07:14:43 UTC 2021
On 02/04/2021 20:08, Tim Gardner wrote:
> [SRU Justification]
>
> An issue was discovered in the Linux kernel through 5.11.10.
> drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet
> driver allows attackers to cause a system crash because a negative fragment size
> is calculated in situations involving an rx queue overrun when jumbo packets are
> used and NAPI is enabled, aka CID-d8861bab48b6.
>
> Introduced by 6c389fc931bcda88940c809f752ada6d7799482c (v4.8)
>
> [Test Plan]
>
> [Where problems could occur]
> Released in stable kernels:
> linux-4.19.y
> linux-5.10.y
> linux-5.11.y
> linux-5.4.y
Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski at canonical.com>
Best regards,
Krzysztof
More information about the kernel-team
mailing list