Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 716640 - sys-kernel/gentoo-sources: Unspecified vulnerability (CVE-2020-9391)
Summary: sys-kernel/gentoo-sources: Unspecified vulnerability (CVE-2020-9391)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2020-04-08 05:12 UTC by GLSAMaker/CVETool Bot
Modified: 2021-06-12 16:04 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2020-04-08 05:12:44 UTC
CVE-2020-9391 (https://nvd.nist.gov/vuln/detail/CVE-2020-9391):
  An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the
  AArch64 architecture. It ignores the top byte in the address passed to the
  brk system call, potentially moving the memory break downwards when the
  application expects it to move upwards, aka CID-dcde237319e6. This has been
  observed to cause heap corruption with the GNU C Library malloc
  implementation.


This is for arm kernel.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-06-12 16:04:46 UTC
Looks like all modern LTS/stable versions have some version of the patch from the oss-security mail or are unaffected.