An array overflow was discovered in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c in the Linux kernel before 5.5.10, aka CID-b102f0c522cf. An oversized packet with too many rx fragments can corrupt memory of adjacent pages.
References
Link | Resource |
---|---|
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.10 | Release Notes Vendor Advisory |
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b102f0c522cf668c8382c56a4f771b37d011cda2 | Patch Vendor Advisory |
https://github.com/torvalds/linux/commit/b102f0c522cf668c8382c56a4f771b37d011cda2 | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20200608-0001/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2020-04-29 19:15
Updated : 2023-10-12 13:31
NVD link : CVE-2020-12465
Mitre link : CVE-2020-12465
CVE.ORG link : CVE-2020-12465
JSON object : View
Products Affected
netapp
- cloud_backup
- hci_compute_node
- solidfire_baseboard_management_controller
- active_iq_unified_manager
- solidfire_\&_hci_management_node
- hci_baseboard_management_controller
- aff_baseboard_management_controller
- steelstore_cloud_integrated_storage
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')