net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4073-1 | linux security update |
Debian DSA |
DSA-4082-1 | linux security update |
EUVD |
EUVD-2017-8614 | net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces. |
Ubuntu USN |
USN-3583-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3583-2 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-3617-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3617-2 | Linux (HWE) vulnerabilities |
Ubuntu USN |
USN-3617-3 | Linux kernel (Raspberry Pi 2) vulnerabilities |
Ubuntu USN |
USN-3619-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3619-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3632-1 | Linux kernel (Azure) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:51:31.635Z
Reserved: 2017-12-06T00:00:00
Link: CVE-2017-17450
No data.
Status : Deferred
Published: 2017-12-07T00:29:00.397
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-17450
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN