Description
net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4073-1 | linux security update |
Debian DSA |
DSA-4082-1 | linux security update |
EUVD |
EUVD-2017-8614 | net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces. |
Ubuntu USN |
USN-3583-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3583-2 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-3617-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3617-2 | Linux (HWE) vulnerabilities |
Ubuntu USN |
USN-3617-3 | Linux kernel (Raspberry Pi 2) vulnerabilities |
Ubuntu USN |
USN-3619-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3619-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3632-1 | Linux kernel (Azure) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:51:31.635Z
Reserved: 2017-12-06T00:00:00.000Z
Link: CVE-2017-17450
No data.
Status : Modified
Published: 2017-12-07T00:29:00.397
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-17450
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN