First published: Fri Mar 03 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-693.rt56.617.el7 | 0:3.10.0-693.rt56.617.el7 |
redhat/kernel | <0:3.10.0-693.el7 | 0:3.10.0-693.el7 |
redhat/kernel-rt | <1:3.10.0-693.2.1.rt56.585.el6 | 1:3.10.0-693.2.1.rt56.585.el6 |
Linux Kernel | <=3.14.79 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2017-6951.
The severity of CVE-2017-6951 is medium with a CVSS score of 5.5.
The affected software includes Linux kernel versions up to 3.14.79.
This vulnerability can be exploited by local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the "dead" type.
Yes, you can refer to the following links for more information: http://www.spinics.net/lists/keyrings/msg01846.html, https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c06cfb08b88d, https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1268882&action=diff