Bug 2068236 (CVE-2021-33098) - CVE-2021-33098 kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access
Summary: CVE-2021-33098 kernel: Improper input validation in the Intel(R) Ethernet ixg...
Keywords:
Status: NEW
Alias: CVE-2021-33098
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2068238
Blocks: 2068239
TreeView+ depends on / blocked
 
Reported: 2022-03-24 17:54 UTC by Guilherme de Almeida Suckevicz
Modified: 2023-09-19 14:13 UTC (History)
43 users (show)

Fixed In Version: 3.10-rc1
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel. This flaw allows an attacker who can modify the MTU of a virtualized PCIe device (in a guest, for example) to crash the host system’s kernel if they set the MTU of the VF device to an unsupported value.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2022-03-24 17:54:08 UTC
A flaw was found in the Linux kernels SR-IOV for IXGBE.   The Intel IXGBE driver supports SR-IOV,  allowing a single PCIe (PCI Express) device to emulate multiple separate PCIe devices.  The emulated PCIe functions are called "virtual functions" (VFs) and can be exported into virtual guests to be used with some performance improvements compared to emulated virtual NIC devices used by vitualized systems.

An attacker with the ability to modify the MTU of a virtualized PCIe device (in a guest for example) may crash the host systems kernel if they set the MTU of the VF device to an to an unsupported value.

This is fixed in Red Hat Enterprise Linux 8 in kernel version kernel-4.18.0-419.el8 and newer. 

References:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html
https://security.netapp.com/advisory/ntap-20211210-0005/

Upstream:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e39d29b3da02e901349f6cd71159818a4737a6

Comment 1 Guilherme de Almeida Suckevicz 2022-03-24 17:58:34 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2068238]

Comment 2 Justin M. Forbes 2022-03-28 13:32:24 UTC
This was fixed for Fedora with the 5.12.9 stable kernel update.


Note You need to log in before you can comment on or make changes to this bug.