The move_pages system call in mm/migrate.c in the Linux kernel prior to 4.12.9 doesn't check the effective uid of the target process, enabling a local malicious user to learn the memory layout of a setuid executable despite ASLR.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |