{"id":"CVE-2017-18017","details":"The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.","modified":"2026-02-24T11:30:44.385889Z","published":"2018-01-03T06:29:00.517Z","related":["SUSE-SU-2018:0383-1","SUSE-SU-2018:0416-1","SUSE-SU-2018:0482-1","SUSE-SU-2018:0555-1","SUSE-SU-2018:0660-1","SUSE-SU-2018:0834-1","SUSE-SU-2018:0841-1","SUSE-SU-2018:0848-1","SUSE-SU-2018:0986-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/102367"},{"type":"ADVISORY","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html"},{"type":"ADVISORY","url":"http://patchwork.ozlabs.org/patch/746618/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/102367"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3583-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3583-2"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0676"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1062"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1130"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1170"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1319"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1737"},{"type":"ADVISORY","url":"https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1739765"},{"type":"ADVISORY","url":"https://github.com/torvalds/linux/commit/2638fd0f92d4397884fd991d8f4925cb3f081901"},{"type":"ADVISORY","url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"},{"type":"ADVISORY","url":"https://lkml.org/lkml/2017/4/2/13"},{"type":"ADVISORY","url":"https://support.f5.com/csp/article/K18352029"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3583-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3583-2/"},{"type":"ADVISORY","url":"https://www.arista.com/en/support/advisories-notices/security-advisories/4577-security-advisory-34"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4187"},{"type":"ADVISORY","url":"https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.36"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20250103-0010/"},{"type":"REPORT","url":"https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1739765"},{"type":"FIX","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901"},{"type":"FIX","url":"http://patchwork.ozlabs.org/patch/746618/"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/2638fd0f92d4397884fd991d8f4925cb3f081901"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git","events":[{"introduced":"0"},{"fixed":"2638fd0f92d4397884fd991d8f4925cb3f081901"},{"introduced":"c470abd4fde40ea6a0846a2beab642a578c0b8cd"},{"fixed":"a351e9b9fc24e982ec2f0e76379a49826036da12"}]}],"versions":["v4.10","v4.11-rc1","v4.11-rc2","v4.11-rc3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-18017.json","vanir_signatures":[{"signature_type":"Function","target":{"function":"tcpmss_mangle_packet","file":"net/netfilter/xt_TCPMSS.c"},"source":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@2638fd0f92d4397884fd991d8f4925cb3f081901","id":"CVE-2017-18017-67aac2b8","digest":{"function_hash":"258529677211135581736056381308471737043","length":2288},"signature_version":"v1","deprecated":false},{"signature_type":"Line","target":{"file":"net/netfilter/xt_TCPMSS.c"},"source":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@2638fd0f92d4397884fd991d8f4925cb3f081901","id":"CVE-2017-18017-eea7e029","digest":{"threshold":0.9,"line_hashes":["162258670710416702997586488041210628232","148964180394642854167106965748630098256","15984514308700478718840847737910083897","232735794523049691887418241897364459863","324155596358226543237301865408864531656","230697090639336258677461166945617381557","333144358156474064786568956147931082934"]},"signature_version":"v1","deprecated":false}]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}