Home CVE Database CVE-2017-7889

CVE-2017-7889

Description

The mm subsystem in the Linux kernel through 4.10.10 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

Priority: HIGH
CVSS v3: 7.8
Publish Date: Apr 16, 2017
Related ID: --
CVSS v2: High
Modified Date: Apr 21, 2017

Find out more about CVE-2017-7889 from the MITRE-CVE dictionary and NIST NVD


Products Affected

Login may be required to access defects or downloads.

Product Name Status Defect Fixed Downloads
Linux
Wind River Linux LTS 17 Won't Fix -- -- --
Wind River Linux 8 Fixed LIN8-6553
8.0.0.25 --
Wind River Linux 9 Fixed LIN9-4076
9.0.0.14 --
Wind River Linux 7 Fixed -- 7.0.0.28 --
Wind River Linux LTS 18 Won't Fix -- -- --
Wind River Linux LTS 19 Won't Fix -- -- --
Wind River Linux CD release Won't Fix -- -- --
VxWorks
VxWorks 7 Not Vulnerable -- -- --
VxWorks 6.9 Not Vulnerable -- -- --

Related Products

Product Name Status Defect Fixed Downloads

Comments

linux

Live chat
Online