APPLIED: [PATCH 0/2][Bionic/Groovy] CVE-2021-29264: gianfar negative fragment size

Kleber Souza kleber.souza at canonical.com
Fri Apr 9 11:02:29 UTC 2021


On 02.04.21 20:08, Tim Gardner wrote:
> [SRU Justification]
> 
> An issue was discovered in the Linux kernel through 5.11.10.
> drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet
> driver allows attackers to cause a system crash because a negative fragment size
> is calculated in situations involving an rx queue overrun when jumbo packets are
> used and NAPI is enabled, aka CID-d8861bab48b6.
> 
> Introduced by 6c389fc931bcda88940c809f752ada6d7799482c (v4.8)
> 
> [Test Plan]
> 
> [Where problems could occur]
> Released in stable kernels:
> linux-4.19.y
> linux-5.10.y
> linux-5.11.y
> linux-5.4.y
> 
> [Other Info]
> None
> 
> 

Applied to bionic/linux and groovy/linux.

Thanks,
Kleber



More information about the kernel-team mailing list