First published: Tue Sep 18 2007(Updated: )
Race condition in the tee (sys_tee) system call in the Linux kernel 2.6.17 through 2.6.17.6 might allow local users to cause a denial of service (system crash), obtain sensitive information (kernel memory contents), or gain privileges via unspecified vectors related to a potentially dropped ipipe lock during a race between two pipe readers.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =2.6.17-rc6 | |
Linux Linux kernel | =2.6.17.2 | |
Linux Linux kernel | =2.6.17.4 | |
Linux Linux kernel | =2.6.17.3 | |
Linux Linux kernel | =2.6.17.5 | |
Linux Linux kernel | =2.6.17 | |
Linux Linux kernel | =2.6.17-rc3 | |
Linux Linux kernel | =2.6.17.1 | |
Linux Linux kernel | =2.6.17-rc1 | |
Linux Linux kernel | =2.6.17-rc2 | |
Linux Linux kernel | =2.6.17.6 | |
Linux Linux kernel | =2.6.17-rc4 | |
Linux Linux kernel | =2.6.17-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.