CVE-2017-11176

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1 Issue Tracking Patch Third Party Advisory
http://www.debian.org/security/2017/dsa-3927 Third Party Advisory
http://www.debian.org/security/2017/dsa-3945 Third Party Advisory
http://www.securityfocus.com/bid/99919 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2918 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2930 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2931 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0169 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3822 Third Party Advisory
https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1 Issue Tracking Patch Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory
https://www.exploit-db.com/exploits/45553/ Third Party Advisory VDB Entry
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1 Issue Tracking Patch Third Party Advisory
http://www.debian.org/security/2017/dsa-3927 Third Party Advisory
http://www.debian.org/security/2017/dsa-3945 Third Party Advisory
http://www.securityfocus.com/bid/99919 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2918 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2930 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2931 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0169 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3822 Third Party Advisory
https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1 Issue Tracking Patch Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory
https://www.exploit-db.com/exploits/45553/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:07

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1 - Issue Tracking, Patch, Third Party Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1 - Issue Tracking, Patch, Third Party Advisory
References () http://www.debian.org/security/2017/dsa-3927 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3927 - Third Party Advisory
References () http://www.debian.org/security/2017/dsa-3945 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3945 - Third Party Advisory
References () http://www.securityfocus.com/bid/99919 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/99919 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:2918 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2918 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2930 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2930 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2931 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2931 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0169 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0169 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3822 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3822 - Third Party Advisory
References () https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1 - Issue Tracking, Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1 - Issue Tracking, Patch, Third Party Advisory
References () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - Third Party Advisory () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - Third Party Advisory
References () https://www.exploit-db.com/exploits/45553/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45553/ - Third Party Advisory, VDB Entry

Information

Published : 2017-07-11 23:29

Updated : 2025-04-20 01:37


NVD link : CVE-2017-11176

Mitre link : CVE-2017-11176

CVE.ORG link : CVE-2017-11176


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free