Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-9391

Опубликовано: 25 фев. 2020
Источник: debian
EPSS Низкий

Описание

An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.5.13-1package
linuxnot-affectedbusterpackage
linuxnot-affectedstretchpackage
linuxnot-affectedjessiepackage

Примечания

  • https://git.kernel.org/linus/dcde237319e626d1ec3c9d8b7613032f0fd4663a

EPSS

Процентиль: 38%
0.00161
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 5 лет назад

An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation.

CVSS3: 5.5
redhat
больше 5 лет назад

An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation.

CVSS3: 5.5
nvd
больше 5 лет назад

An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation.

CVSS3: 5.5
github
около 3 лет назад

An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation.

CVSS3: 5.5
fstec
больше 5 лет назад

Уязвимость архитектуры AArch64 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 38%
0.00161
Низкий