An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1797052 | Exploit Issue Tracking Patch Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dcde237319e626d1ec3c9d8b7613032f0fd4663a | Mailing List Patch Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2020/02/25/6 | Exploit Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O4LH35HOPBJIKYHYFXMBBM75DN75PZHZ/ | Mailing List Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20200313-0003/ |
Information
Published : 2020-02-25 18:15
Updated : 2021-07-21 11:39
NVD link : CVE-2020-9391
Mitre link : CVE-2020-9391
JSON object : View
Products Affected
fedoraproject
- fedora
linux
- linux_kernel
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
