BSA-2017-424

Brocade Fabric OS

2 more products

21336

27 October 2017

25 August 2017

Closed

High

7.0

N/A

CVE-2017-10662

Summary

Security Advisory ID : BSA-2017-424

Component : Kernel

Revision : 3.0: Interim

The sanity_check_raw_super function in fs/f2fs/super.c in the Linux kernel before 4.11.1 does not validate the segment count, which allows local users to gain privileges via unspecified vectors kernel: Missing sanity check for segment count in f2fs.

Affected Products

Brocade is investigating its product lines to determine which products may be affected by this vulnerability and the impact on each affected product.

Products Confirmed Not Vulnerable

Brocade Fabric OS, Brocade NetIron OS, Brocade ServerIron ADX, Brocade Virtual ADX, and Brocade Workflow Composer is confirmed not affected by this vulnerability.

Workaround

There are no workarounds that address this vulnerability.

Revision History

Version Change Date
1.0 Initial Publication August 25, 2017
2.0 Updated to address FOS & WC October 13, 2017
3.0 Updated to address ADX & vADX October 27, 2017