By executing a specially-crafted program, an attacker could exploit this vulnerability to obtain sensitive information from the kernel memory, and use this information to launch further attacks against the affected system. Linux Kernel could allow a local authenticated attacker to obtain sensitive information.
By sending a specially-crafted request, an <authenticated> attacker could exploit this vulnerability to gain elevated privileges. Linux Kernel could allow a local authenticated attacker to gain elevated privileges on the system.
Refer to Linux Kernel GIT Repository for patch, upgrade or suggested workaround information.