CVE-2017-14140 PUBLISHED

The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.

EPSS 0.07% · 21.6th percentile

Risk Scores

EPSS Score
0.07%
21.6th percentile

Affected Products

VendorProductVersions
Ubuntu:22.04:LTSlinux-realtime5.15.0-1032.35, 0
Ubuntu:22.04:LTSlinux-intel-iot-realtime5.15.0-1073.75, 0
Ubuntu:16.04:LTSlinux-aws4.4.0-1035.44, 0, 4.4.0-1018.27
Ubuntu:14.04:LTSlinux-lts-xenial4.4.0-70.91~14.04.1, 4.4.0-71.92~14.04.1, *
Ubuntu:20.04:LTSlinux-raspi25.4.0-1004.4, 5.4.0-1006.6, 0
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1078.81+cvm1.1, 5.4.0-1063.66+cvm2.2, 5.4.0-1063.66+cvm3.2
Ubuntu:16.04:LTSlinux-gke4.4.0-1014.14, 4.4.0-1016.16, 4.4.0-1018.18
Ubuntu:24.04:LTSlinux-gcp-6.116.11.0-1014.14~24.04.1, 6.11.0-1016.16~24.04.1, *
Ubuntu:16.04:LTSlinux-snapdragon4.4.0-1026.29, 4.4.0-1019.22, 4.4.0-1057.61
Ubuntu:24.04:LTSlinux-lowlatency-hwe-6.11*, 6.11.0-1009.10~24.04.1, 6.11.0-1013.14~24.04.1
Ubuntu:16.04:LTSlinux-azure4.11.0-1009.9, 4.11.0-1016.16, 4.11.0-1015.15
Ubuntu:16.04:LTSlinux4.4.0-13.29, 4.4.0-10.25, 4.4.0-64.85
Ubuntu:16.04:LTSlinux-raspi24.4.0-1048.55, 4.4.0-1051.58, 4.4.0-1052.59
Ubuntu:22.04:LTSlinux-riscv5.15.0-1012.13, 5.13.0-1004.4, 5.13.0-1007.7+22.04.1
Ubuntu:Pro:20.04:LTSlinux-azure-fde-5.155.15.0-1070.79~20.04.1.1, *, *
Ubuntu:24.04:LTSlinux-raspi-realtime6.8.0-2019.20, 0
Ubuntu:16.04:LTSlinux-gcp4.10.0-1006.6, 0, 4.10.0-1004.4
Ubuntu:20.04:LTSlinux-gke5.4.0-1103.110, 5.4.0-1102.109, 5.4.0-1101.108
Ubuntu:24.04:LTSlinux-hwe-6.110, 6.11.0-19.19~24.04.1, 6.11.0-21.21~24.04.1
Ubuntu:14.04:LTSlinux3.13.0-52.85, 3.13.0-44.73, 3.13.0-62.102

…and 4 more

Timeline

References

Open in Interactive Console →