An array overflow was discovered in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c in the Linux kernel before 5.5.10, aka CID-b102f0c522cf. An oversized packet with too many rx fragments can corrupt memory of adjacent pages.
References
Link | Resource |
---|---|
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.10 | Release Notes Vendor Advisory |
https://github.com/torvalds/linux/commit/b102f0c522cf668c8382c56a4f771b37d011cda2 | Patch Third Party Advisory |
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b102f0c522cf668c8382c56a4f771b37d011cda2 | Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20200608-0001/ |
Configurations
Information
Published : 2020-04-29 12:15
Updated : 2020-06-08 06:15
NVD link : CVE-2020-12465
Mitre link : CVE-2020-12465
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
linux
- linux_kernel