Bug 1182623 - (CVE-2021-27862) VUL-0: CVE-2021-27862: kernel-source: Bypass using 802.3 headers
VUL-0: CVE-2021-27862: kernel-source: Bypass using 802.3 headers
: 1203837 (view as bug list)
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
Depends on:
  Show dependency treegraph
Reported: 2021-02-23 15:37 UTC by Alexandros Toptsoglou
Modified: 2023-03-09 10:03 UTC (History)
9 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Note You need to log in before you can comment on or make changes to this bug.
Comment 13 Robert Frohl 2022-09-28 12:09:31 UTC
*** Bug 1203837 has been marked as a duplicate of this bug. ***
Comment 14 Robert Frohl 2022-09-28 12:10:00 UTC

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed
using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion
(and optionally VLAN0 headers).

Comment 16 Takashi Iwai 2022-12-01 13:54:08 UTC
Denis, any progress on this bug?

Through a quick glance, it's not clear whether any relevant upstream fix is present -- or whether we would need any fix, above all, though...
Comment 17 Jan Kara 2023-01-09 14:56:52 UTC
As I'm reading comment 2, Linux is affected by this problem when it acts as a router between ethernet and WiFi. Not a common usecase of our product but perhaps possible. No sure if there are any fixes for this though... Denis can you have a look and tell us whether there's something to fix for us?
Comment 19 Robert Frohl 2023-03-09 10:02:43 UTC
configuration issue with the kernel that we will not fix, users should handle the problem by applying proper configuration to their systems.