The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2016-04-27 17:59
Updated : 2023-09-12 14:55
NVD link : CVE-2016-3672
Mitre link : CVE-2016-3672
CVE.ORG link : CVE-2016-3672
JSON object : View
Products Affected
novell
- suse_linux_enterprise_real_time_extension
- suse_linux_enterprise_live_patching
- suse_linux_enterprise_desktop
- suse_linux_enterprise_software_development_kit
- suse_linux_enterprise_server
- suse_linux_enterprise_workstation_extension
- suse_linux_enterprise_module_for_public_cloud
canonical
- ubuntu_linux
linux
- linux_kernel
CWE
CWE-254
7PK - Security Features