7.8
CVSSv3

CVE-2017-10662

Published: 19/08/2017 Updated: 17/01/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The sanity_check_raw_super function in fs/f2fs/super.c in the Linux kernel prior to 4.11.1 does not validate the segment count, which allows local users to gain privileges via unspecified vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
It was found that the sanity_check_raw_super() function in 'fs/f2fs/superc' file in the Linux kernel before version 412-rc1 does not validate the f2fs filesystem segment count This allows an unprivileged local user to cause a system panic and DoS Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe ...

Github Repositories

Anchore Engine How To Guide Purpose: I started in the early days of docker Back then saying we are using docker now was enough to get you past the securtiy team But today not so much Security teams have caught up and now so have the tools Mature pipelines now include some sort of security scan Looking around for a free scanner with an enterprise upgrade option is few a