An array overflow was discovered in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c in the Linux kernel before 5.5.10, aka CID-b102f0c522cf. An oversized packet with too many rx fragments can corrupt memory of adjacent pages.
                
            References
                    | Link | Resource | 
|---|---|
| https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.10 | Release Notes Vendor Advisory | 
| https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b102f0c522cf668c8382c56a4f771b37d011cda2 | Patch Vendor Advisory | 
| https://github.com/torvalds/linux/commit/b102f0c522cf668c8382c56a4f771b37d011cda2 | Patch Third Party Advisory | 
| https://security.netapp.com/advisory/ntap-20200608-0001/ | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2020-04-29 19:15
Updated : 2023-10-12 13:31
NVD link : CVE-2020-12465
Mitre link : CVE-2020-12465
CVE.ORG link : CVE-2020-12465
JSON object : View
Products Affected
                netapp
- cloud_backup
 - hci_compute_node
 - solidfire_baseboard_management_controller
 - active_iq_unified_manager
 - solidfire_\&_hci_management_node
 - hci_baseboard_management_controller
 - aff_baseboard_management_controller
 - steelstore_cloud_integrated_storage
 
linux
- linux_kernel
 
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
