Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-10663

Опубликовано: 19 авг. 2017
Источник: debian

Описание

The sanity_check_ckpt function in fs/f2fs/super.c in the Linux kernel before 4.12.4 does not validate the blkoff and segno arrays, which allows local users to gain privileges via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.12.6-1package
linuxfixed4.9.47-1stretchpackage
linuxignoredjessiepackage
linuxnot-affectedwheezypackage

Примечания

  • Fixed by: https://git.kernel.org/linus/15d3042a937c13f5d9244241c7a9c8416ff6e82a (v4.13-rc1)

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

The sanity_check_ckpt function in fs/f2fs/super.c in the Linux kernel before 4.12.4 does not validate the blkoff and segno arrays, which allows local users to gain privileges via unspecified vectors.

CVSS3: 4.7
redhat
больше 8 лет назад

The sanity_check_ckpt function in fs/f2fs/super.c in the Linux kernel before 4.12.4 does not validate the blkoff and segno arrays, which allows local users to gain privileges via unspecified vectors.

CVSS3: 7.8
nvd
больше 8 лет назад

The sanity_check_ckpt function in fs/f2fs/super.c in the Linux kernel before 4.12.4 does not validate the blkoff and segno arrays, which allows local users to gain privileges via unspecified vectors.

CVSS3: 7.8
github
больше 3 лет назад

The sanity_check_ckpt function in fs/f2fs/super.c in the Linux kernel before 4.12.4 does not validate the blkoff and segno arrays, which allows local users to gain privileges via unspecified vectors.

CVSS3: 7.8
fstec
больше 8 лет назад

Уязвимость функции sanity_check_ckpt операционной системы Linux, позволяющая нарушителю повысить свои привилегии