The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.2.92"
}
]
},
{
"events": [
{
"introduced": "3.3"
},
{
"fixed": "3.16.47"
}
]
},
{
"events": [
{
"introduced": "3.17"
},
{
"fixed": "3.18.61"
}
]
},
{
"events": [
{
"introduced": "3.19"
},
{
"fixed": "4.1.43"
}
]
},
{
"events": [
{
"introduced": "4.2"
},
{
"fixed": "4.4.77"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.9.38"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.11.11"
}
]
},
{
"events": [
{
"introduced": "4.12"
},
{
"fixed": "4.12.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-11176.json"