A local attacker could exploit the vulnerability by running a crafted program that is designed to send malicious requests to an affected system.
Successful exploitation of this vulnerability could allow an attacker to execute an arbitrary code with the privileges of the kernel and take complete control of an affected system.
The information provided herein is on "as is" basis, without warranty of any kind.