The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-14140.json"
[
{
"digest": {
"line_hashes": [
"249854819853273416778527717812335853936",
"240685930793473275274097221028777529939",
"274209831984500833518979163987434523600",
"209572696043079855941473491468967375966",
"26327324403050605969675971345301447892",
"112568613507774618119702813903234866232",
"121358260683237141092037285082877046062",
"287487465849884267545416126578991735156",
"51997352818483114174695913045745238090",
"334497822776868385671964802034719463832",
"214661977582528008333298793853680826075",
"250112760371779908054573012995795232379",
"16769454503250973767757156396235986901",
"330178539687396208982020177526117629635",
"236642649589106256472592381846365170823"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "mm/migrate.c"
},
"signature_type": "Line",
"id": "CVE-2017-14140-c0c213c2",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@197e7e521384a23b9e585178f3f11c9fa08274b9",
"deprecated": false
}
]