CVE-2017-7889

CVSS v3.1 7.8 (High)
78% Progress
CVSS v2.0 7.2 (High)
72% Progress
EPSS 0.04 % (5th)
0.04% Progress
Affected Products 3
Advisories 18

The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

Weaknesses
CWE-732
Incorrect Permission Assignment for Critical Resource
CVE Status
PUBLISHED
CNA
MITRE
Published Date
2017-04-17 00:59:00
(7 years ago)
Updated Date
2023-02-14 21:12:55
(19 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel prior 3.2.91 version cpe:2.3:o:linux:linux_kernel < 3.2.91
  Linux Kernel from 3.3 version and prior 3.10.107 version cpe:2.3:o:linux:linux_kernel >= 3.3 < 3.10.107
  Linux Kernel from 3.11 version and prior 3.12.74 version cpe:2.3:o:linux:linux_kernel >= 3.11 < 3.12.74
  Linux Kernel from 3.13 version and prior 3.16.46 version cpe:2.3:o:linux:linux_kernel >= 3.13 < 3.16.46
  Linux Kernel from 3.17 version and prior 3.18.50 version cpe:2.3:o:linux:linux_kernel >= 3.17 < 3.18.50
  Linux Kernel from 3.19 version and prior 4.1.41 version cpe:2.3:o:linux:linux_kernel >= 3.19 < 4.1.41
  Linux Kernel from 4.2 version and prior 4.4.63 version cpe:2.3:o:linux:linux_kernel >= 4.2 < 4.4.63
  Linux Kernel from 4.5 version and prior 4.9.24 version cpe:2.3:o:linux:linux_kernel >= 4.5 < 4.9.24
  Linux Kernel from 4.10 version and prior 4.10.12 version cpe:2.3:o:linux:linux_kernel >= 4.10 < 4.10.12

Configuration #2

    CPE23 From Up To
  Debian Linux 8.0 cpe:2.3:o:debian:debian_linux:8.0

Configuration #3

    CPE23 From Up To
  Canonical Ubuntu Linux 12.04 cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-
  Canonical Ubuntu Linux 14.04 cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...