The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://www.openwall.com/lists/oss-security/2019/04/15/1
http://www.securityfocus.com/bid/107890
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-2/
https://usn.ubuntu.com/4008-3/
Source: MITRE
Published: 2019-04-12
Updated: 2019-06-07
Type: CWE-362
Base Score: 4.7
Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N
Impact Score: 6.9
Exploitability Score: 3.4
Severity: MEDIUM
Base Score: 4.7
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Impact Score: 3.6
Exploitability Score: 1
Severity: MEDIUM