An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1797052 | Exploit Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dcde237319e626d1ec3c9d8b7613032f0fd4663a | Mailing List Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2020/02/25/6 | Exploit Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O4LH35HOPBJIKYHYFXMBBM75DN75PZHZ/ | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20200313-0003/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Information
Published : 2020-02-25 10:15
Updated : 2022-04-18 08:13
NVD link : CVE-2020-9391
Mitre link : CVE-2020-9391
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
netapp
- cloud_backup
- h410c_firmware
- active_iq_unified_manager
- solidfire
- steelstore_cloud_integrated_storage
- hci_management_node
- h410c
- data_availability_services
fedoraproject
- fedora
linux
- linux_kernel