Oval Definition:oval:com.ubuntu.bionic:def:201717450000
Revision Date:2017-12-06Version:1
Title:CVE-2017-17450 on Ubuntu 18.04 LTS (bionic) - medium.
Description:net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces. It was discovered that the netfilter passive OS fingerprinting (xt_osf) module did not properly perform access control checks. A local attacker could improperly modify the system-wide OS fingerprint list.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2017-17450
Platform(s):Ubuntu 18.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 18.04 LTS (bionic) is installed.
  • AND Package Information
  • NOT While related to the CVE in some way, the 'linux' package in bionic is not affected (note: '4.15.0-10.11').
  • OR NOT While related to the CVE in some way, the 'linux-aws' package in bionic is not affected (note: '4.15.0-1001.1').
  • OR NOT While related to the CVE in some way, the 'linux-azure' package in bionic is not affected (note: '4.15.0-1002.2').
  • OR NOT While related to the CVE in some way, the 'linux-gcp' package in bionic is not affected (note: '4.15.0-1001.1').
  • OR NOT While related to the CVE in some way, the 'linux-hwe' package in bionic is not affected.
  • OR The 'linux-hwe-edge' package in bionic is affected. An update containing the fix has been completed and is pending publication (note: '4.18.0-8.9~18.04.1').
  • OR NOT While related to the CVE in some way, the 'linux-kvm' package in bionic is not affected (note: '4.15.0-1002.2').
  • OR NOT While related to the CVE in some way, the 'linux-oem' package in bionic is not affected (note: '4.15.0-1002.3').
  • OR NOT While related to the CVE in some way, the 'linux-raspi2' package in bionic is not affected (note: '4.15.0-1006.7').
  • BACK