7
CVSSv3

CVE-2017-6001

Published: 18/02/2017 Updated: 09/02/2024
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 677
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Race condition in kernel/events/core.c in the Linux kernel prior to 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Debian Bug report logs - #852556 linux-image-490-1-amd64: [Regression] Trendnet's TU-ET100C Pegasus II based LAN to USB adapter stopped to work Package: src:linux; Maintainer for src:linux is Debian Kernel Team <debian-kernel@listsdebianorg>; Reported by: Lisandro Damián Nicanor Pérez Meyer <lisandro@debianorg> ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or have other impacts CVE-2016-6786 / CVE-2016-6787 It was discovered that the performance events subsystem does not properly manage locks during certain migrations, allowing a local attacker to escalate privileg ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
It was found that the original fix for CVE-2016-6786 was incomplete There exist a race between two concurrent sys_perf_event_open() calls when both try and move the same pre-existing software group into a hardware context ...
Race condition in kernel/events/corec in the Linux kernel before 497 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786 ...