An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation.
NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.
|Base Score:||5.5||Base Metrics:||AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H|
|Access Vector:||Local network||Attack Complexity:||Low|
|Privileges Required:||Low||User Interaction:||None|
|Integrity Impact:||None||Availability Impact:||High|
|Oracle Linux version 7 (kernel-uek)||ELSA-2020-5691||2020-05-18|
|Oracle Linux version 8 (kernel-uek)||ELSA-2020-5691||2020-05-18|
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team