By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. This affects Linux distributions that use 4.9.x longterm kernels before 4.9.187. External References: https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-inetcsklistenstop-gpf Upstream Patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=99253eb750fda6a644d5188fb26c43bad8d5a745
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1743914]
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1743915]
Statement: At this time none of the Red Hat Enterprse Linux shipping releases are vulnerable to the described flaw.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-18509
This was fixed in the 4.11 kernel, no currently supported Fedora release was ever vulnerable.