The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2016-04-27 10:59
Updated : 2018-10-09 12:59
NVD link : CVE-2016-3672
Mitre link : CVE-2016-3672
JSON object : View
CWE
CWE-254
7PK - Security Features
Products Affected
novell
- suse_linux_enterprise_server
- suse_linux_enterprise_module_for_public_cloud
- suse_linux_enterprise_desktop
- suse_linux_enterprise_software_development_kit
- suse_linux_enterprise_live_patching
- suse_linux_enterprise_real_time_extension
- suse_linux_enterprise_workstation_extension
canonical
- ubuntu_linux
linux
- linux_kernel