The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.
References
Configurations
Information
Published : 2017-09-04 23:29
Updated : 2018-04-11 18:29
NVD link : CVE-2017-14140
Mitre link : CVE-2017-14140
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
linux
- linux_kernel