Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-11176

Опубликовано: 11 июл. 2017
Источник: debian
EPSS Средний

Описание

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.11.11-1package

Примечания

  • Fixed by: https://git.kernel.org/linus/f991af3daabaecff34684fd51fac80319d1baad1

EPSS

Процентиль: 94%
0.14793
Средний

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
redhat
около 8 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
nvd
около 8 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
github
около 3 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
fstec
около 8 лет назад

Уязвимость функции mq_notify операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие

EPSS

Процентиль: 94%
0.14793
Средний