First published: Tue Sep 18 2007(Updated: )
Race condition in the tee (sys_tee) system call in the Linux kernel 2.6.17 through 2.6.17.6 might allow local users to cause a denial of service (system crash), obtain sensitive information (kernel memory contents), or gain privileges via unspecified vectors related to a potentially dropped ipipe lock during a race between two pipe readers.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.17-rc6 | |
Linux Kernel | =2.6.17.2 | |
Linux Kernel | =2.6.17.4 | |
Linux Kernel | =2.6.17.3 | |
Linux Kernel | =2.6.17.5 | |
Linux Kernel | =2.6.17 | |
Linux Kernel | =2.6.17-rc3 | |
Linux Kernel | =2.6.17.1 | |
Linux Kernel | =2.6.17-rc1 | |
Linux Kernel | =2.6.17-rc2 | |
Linux Kernel | =2.6.17.6 | |
Linux Kernel | =2.6.17-rc4 | |
Linux Kernel | =2.6.17-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0997 has a high severity rating due to its potential for causing system crashes and exposing kernel memory contents.
To fix CVE-2007-0997, upgrade the Linux kernel to version 2.6.18 or later, which contains the necessary patches.
CVE-2007-0997 may allow local users to exploit a race condition to obtain sensitive information, cause a denial of service, or gain elevated privileges.
CVE-2007-0997 affects Linux kernel versions 2.6.17 through 2.6.17.6.
No, CVE-2007-0997 is a local vulnerability that can only be exploited by local users with access to the affected system.