Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 7.8, requiring local system access to exploit with relatively low complexity without requiring user interaction requiring only low-level privileges . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 3 products from centos, from redhat, from linux organizations running these solutions should prioritize assessment and patching.
First disclosed in 2017, this vulnerability was reported during a period defined by widespread IoT adoption challenges, mobile security concerns, and the emergence of advanced persistent threat (APT) techniques. Contemporary mitigation strategies focused on secure development practices and third-party component vetting.
2017-10-05T01:29:04.790
2026-04-21T18:00:48.183
Analyzed
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | centos | centos | 6.0 | Yes |
| Operating System | centos | centos | 6.1 | Yes |
| Operating System | centos | centos | 6.2 | Yes |
| Operating System | centos | centos | 6.3 | Yes |
| Operating System | centos | centos | 6.4 | Yes |
| Operating System | centos | centos | 6.5 | Yes |
| Operating System | centos | centos | 6.6 | Yes |
| Operating System | centos | centos | 6.7 | Yes |
| Operating System | centos | centos | 6.8 | Yes |
| Operating System | centos | centos | 6.9 | Yes |
| Operating System | centos | centos | 7.1406 | Yes |
| Operating System | centos | centos | 7.1503 | Yes |
| Operating System | centos | centos | 7.1511 | Yes |
| Operating System | centos | centos | 7.1611 | Yes |
| Operating System | redhat | enterprise_linux | 6.0 | Yes |
| Operating System | redhat | enterprise_linux | 6.1 | Yes |
| Operating System | redhat | enterprise_linux | 6.2 | Yes |
| Operating System | redhat | enterprise_linux | 6.3 | Yes |
| Operating System | redhat | enterprise_linux | 6.4 | Yes |
| Operating System | redhat | enterprise_linux | 6.5 | Yes |
| Operating System | redhat | enterprise_linux | 6.6 | Yes |
| Operating System | redhat | enterprise_linux | 6.7 | Yes |
| Operating System | redhat | enterprise_linux | 6.8 | Yes |
| Operating System | redhat | enterprise_linux | 6.9 | Yes |
| Operating System | redhat | enterprise_linux | 7.0 | Yes |
| Operating System | redhat | enterprise_linux | 7.1 | Yes |
| Operating System | redhat | enterprise_linux | 7.2 | Yes |
| Operating System | redhat | enterprise_linux | 7.3 | Yes |
| Operating System | linux | linux_kernel | < 3.2.70 | Yes |
| Operating System | linux | linux_kernel | < 3.4.109 | Yes |
| Operating System | linux | linux_kernel | < 3.10.77 | Yes |
| Operating System | linux | linux_kernel | < 3.12.43 | Yes |
| Operating System | linux | linux_kernel | < 3.14.41 | Yes |
| Operating System | linux | linux_kernel | < 3.16.35 | Yes |
| Operating System | linux | linux_kernel | < 3.18.14 | Yes |
| Operating System | linux | linux_kernel | < 3.19.7 | Yes |
| Operating System | linux | linux_kernel | < 4.0.2 | Yes |
SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For centos's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.