CVE-2017-7889 linux


2017-12-29 22:42
2017-09-19 05:03
2017-08-17 20:03
2017-06-18 07:51
2017-06-16 19:22
2017-05-17 17:03
2017-05-03 11:03
2017-04-23 05:03
2017-04-18 05:03
2017-04-17 05:03


The mm subsystem in the Linux kernel through 4.10.10 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
buster linux 4.9.25-1
jessie linux 3.16.43-2+deb8u3
sid linux 4.9.25-1
stretch linux 4.9.25-1
wheezy linux 3.2.93-1