{"id":"CVE-2021-29264","details":"An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.","modified":"2026-03-14T10:50:35.886798Z","published":"2021-03-26T22:15:13.023Z","related":["SUSE-SU-2021:1175-1","SUSE-SU-2021:1176-1","SUSE-SU-2021:1177-1","SUSE-SU-2021:1210-1","SUSE-SU-2021:1211-1","SUSE-SU-2021:1238-1","SUSE-SU-2021:1573-1","SUSE-SU-2021:1596-1","SUSE-SU-2021:1617-1","SUSE-SU-2021:1623-1","SUSE-SU-2021:1624-1","SUSE-SU-2021:1625-1","SUSE-SU-2021:1975-1","SUSE-SU-2021:1977-1","openSUSE-SU-2021:0532-1","openSUSE-SU-2021:0758-1","openSUSE-SU-2021:1975-1","openSUSE-SU-2021:1977-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"5.11.10"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-29264.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}