ACK: [PATCH 0/2][Bionic/Groovy] CVE-2021-29264: gianfar negative fragment size
Krzysztof Kozlowski
krzysztof.kozlowski at canonical.com
Tue Apr 6 07:16:54 UTC 2021
On 06/04/2021 09:14, Krzysztof Kozlowski wrote:
> On 02/04/2021 20:08, Tim Gardner wrote:
>> [SRU Justification]
>>
>> An issue was discovered in the Linux kernel through 5.11.10.
>> drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet
>> driver allows attackers to cause a system crash because a negative fragment size
>> is calculated in situations involving an rx queue overrun when jumbo packets are
>> used and NAPI is enabled, aka CID-d8861bab48b6.
>>
>> Introduced by 6c389fc931bcda88940c809f752ada6d7799482c (v4.8)
>>
>> [Test Plan]
>>
>> [Where problems could occur]
>> Released in stable kernels:
>> linux-4.19.y
>> linux-5.10.y
>> linux-5.11.y
>> linux-5.4.y
>
Srsly, what's wrong with me...
Acked-by: Krzysztof Kozlowski <krzysztof.kozlowski at canonical.com>
> Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski at canonical.com>
>
Best regards,
Krzysztof
More information about the kernel-team
mailing list