7.2
CVSSv2

CVE-2017-10663

Published: 19/08/2017 Updated: 17/01/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The sanity_check_ckpt function in fs/f2fs/super.c in the Linux kernel prior to 4.12.4 does not validate the blkoff and segno arrays, which allows local users to gain privileges via unspecified vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
The sanity_check_ckpt function in fs/f2fs/superc in the Linux kernel before version 4124 does not validate the blkoff and segno arrays This allows an unprivileged, local user to cause a system panic and DoS Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely ...

Github Repositories

Anchore Engine How To Guide Purpose: I started in the early days of docker Back then saying we are using docker now was enough to get you past the securtiy team But today not so much Security teams have caught up and now so have the tools Mature pipelines now include some sort of security scan Looking around for a free scanner with an enterprise upgrade option is few a