Vulnerability Description
The time subsystem in the Linux kernel through 4.9.9, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distinguished from PID values inside a PID namespace) by reading the /proc/timer_list file, related to the print_timer function in kernel/time/timer_list.c and the __timer_stats_timer_set_start_info function in kernel/time/timer.c.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 4.9.9 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=dfb4357da6ddbIssue TrackingPatchThird Party Advisory
- http://www.securityfocus.com/bid/96271
- https://bugzilla.kernel.org/show_bug.cgi?id=193921Issue Tracking
- http://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=dfb4357da6ddbIssue TrackingPatchThird Party Advisory
- http://www.securityfocus.com/bid/96271
- https://bugzilla.kernel.org/show_bug.cgi?id=193921Issue Tracking
FAQ
What is CVE-2017-5967?
CVE-2017-5967 is a vulnerability with a CVSS score of 4.0 (MEDIUM). The time subsystem in the Linux kernel through 4.9.9, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distinguished from PID values inside a PID namespace) by re...
How severe is CVE-2017-5967?
CVE-2017-5967 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5967?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.