The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2016-04-27T17:00:00
Updated: 2024-08-06T00:03:34.467Z
Reserved: 2016-03-25T00:00:00
Link: CVE-2016-3672
Vulnrichment
No data.
NVD
Status : Modified
Published: 2016-04-27T17:59:27.397
Modified: 2024-11-21T02:50:28.983
Link: CVE-2016-3672
Redhat