Bug 1944689 (CVE-2021-29264) - CVE-2021-29264 kernel: DoS due to negative fragment size calculation in drivers/net/ethernet/freescale/gianfar.c
Summary: CVE-2021-29264 kernel: DoS due to negative fragment size calculation in drive...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2021-29264
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1944690
Blocks: 1944691
TreeView+ depends on / blocked
 
Reported: 2021-03-30 13:51 UTC by Guilherme de Almeida Suckevicz
Modified: 2021-04-05 17:35 UTC (History)
44 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel. The Freescale Gianfar Ethernet driver allows attackers to cause a system crash due to a negative fragment size calculated in situations involving an RX queue overrun when jumbo packets are used and NAPI is enabled. The highest threat from this vulnerability is to data integrity and system availability.
Clone Of:
Environment:
Last Closed: 2021-04-05 17:35:29 UTC


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2021-03-30 13:51:41 UTC
An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled.

Reference and upstream patch:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f

Comment 1 Guilherme de Almeida Suckevicz 2021-03-30 13:52:33 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1944690]

Comment 4 Alex 2021-03-31 17:24:40 UTC
Statement:

This flaw is rated as having Moderate impact because of the need to have privileges and both configuration with the usage of jumbo packets that is available only for the local network.

Comment 5 Product Security DevOps Team 2021-04-05 17:35:29 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-29264


Note You need to log in before you can comment on or make changes to this bug.