Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-11176

Опубликовано: 11 июл. 2017
Источник: debian
EPSS Средний

Описание

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.11.11-1package

Примечания

  • Fixed by: https://git.kernel.org/linus/f991af3daabaecff34684fd51fac80319d1baad1

EPSS

Процентиль: 96%
0.25678
Средний

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
redhat
почти 8 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
nvd
почти 8 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
github
около 3 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
fstec
почти 8 лет назад

Уязвимость функции mq_notify операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие

EPSS

Процентиль: 96%
0.25678
Средний