The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.
3.13.0-142.1914.4.0-97.120~14.04.14.4.0-97.1204.4.0-1038.474.13.0-1005.74.13.0-1002.54.4.0-1032.324.13.0-32.35~16.04.14.4.0-1008.134.4.0-1075.83Exploitability
AV:LAC:LPR:LUI:NScope
S:UImpact
C:HI:NA:NCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N