Bug 1995236 (CVE-2021-0084) - CVE-2021-0084 kernel: Improper input validation in the Intel(R) Ethernet Controllers X722 and 800 series Linux RMDA driver
Summary: CVE-2021-0084 kernel: Improper input validation in the Intel(R) Ethernet Cont...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2021-0084
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1995237
Blocks: 1995239
TreeView+ depends on / blocked
 
Reported: 2021-08-18 16:39 UTC by Pedro Sampaio
Modified: 2021-08-26 00:59 UTC (History)
50 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2021-08-26 00:59:54 UTC
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2021-08-18 16:39:10 UTC
Improper input validation in the Intel(R) Ethernet Controllers X722 and 800 series Linux RMDA driver before version 1.3.19 may allow an authenticated user to potentially enable escalation of privilege via local access.

References:

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00515.html

Comment 1 Pedro Sampaio 2021-08-18 16:41:04 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1995237]

Comment 2 Justin M. Forbes 2021-08-18 19:43:08 UTC
This is not in kernel code, but external drivers available from Intel.

Comment 3 Wade Mealing 2021-08-19 03:05:15 UTC
@Jforbes, thats what i thought too.. however upstream intel shares quite a lot of structure with the 'ice' kernel module in the kernel.  Intel security team has been contacted awaiting their reply on more specific details as there is insufficient data to draw accurate conclusions at this time.

If you have evidence supporting otherwise, happy to hear it.

Comment 5 Wade Mealing 2021-08-26 00:59:54 UTC
Its been 7 days and three emails with no data from intel regarding these flaws and if they affect the upstream release.  If they get back to me with data I'll re-open the flaws.  Till then I'll mark notaffected as I do not have sufficient information to state affectedness.


Note You need to log in before you can comment on or make changes to this bug.