# cve-2017-11176
<h3> Public Information </h3>
<p>The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.</p>
<b>Status:</b>
- [x] Force netlink_attachskb() to return 1
- [x] Unblock the exploit thread
- [x] Force the second fget() call to return NULL
- [ ] Create the exploit
<b>Reference:</b>
[A step-by-step Linux Kernel exploitation](https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part1.html)
[4.0K] /data/pocs/31f088b6a31403c4706a920120e115b8a36e82b5
├── [7.6K] exploit.c
├── [3.2K] mqnotify.stp
└── [ 644] README.md
0 directories, 3 files