Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-14140

Опубликовано: 05 сент. 2017
Источник: debian
EPSS Низкий

Описание

The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.12.12-1package

Примечания

  • Fixed by: https://git.kernel.org/linus/197e7e521384a23b9e585178f3f11c9fa08274b9

EPSS

Процентиль: 21%
0.00066
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 8 лет назад

The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.

CVSS3: 3.3
redhat
почти 8 лет назад

The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.

CVSS3: 5.5
nvd
почти 8 лет назад

The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.

CVSS3: 5.5
github
около 3 лет назад

The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.

oracle-oval
больше 7 лет назад

ELSA-2018-4025: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 21%
0.00066
Низкий