CVE-2017-7889 linux

Metadata

high
7.2
linux
CVE-2017-7889
2017-09-19 05:03
CVE-2017-7889
2017-08-17 20:03
2017-06-18 07:51
2017-06-16 19:22
2017-05-17 17:03
2017-05-03 11:03
2017-04-23 05:03
2017-04-18 05:03
2017-04-17 05:03

Description

The mm subsystem in the Linux kernel through 4.10.10 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
buster linux 4.9.25-1
jessie linux 3.16.43-2+deb8u3
sid linux 4.9.25-1
stretch linux 4.9.25-1
wheezy linux 3.2.93-1