Vulnerability Description
The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 3.2.91 |
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aIssue TrackingPatchThird Party Advisory
- http://www.debian.org/security/2017/dsa-3945Third Party Advisory
- http://www.openwall.com/lists/oss-security/2017/04/16/4Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/97690Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:1842Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2077Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2669Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1854Third Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa1Third Party Advisory
- https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de9Issue TrackingPatchThird Party Advisory
- https://usn.ubuntu.com/3583-1/Third Party Advisory
- https://usn.ubuntu.com/3583-2/Third Party Advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aIssue TrackingPatchThird Party Advisory
- http://www.debian.org/security/2017/dsa-3945Third Party Advisory
- http://www.openwall.com/lists/oss-security/2017/04/16/4Mailing ListPatchThird Party Advisory
FAQ
What is CVE-2017-7889?
CVE-2017-7889 is a vulnerability with a CVSS score of 7.8 (HIGH). The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the fi...
How severe is CVE-2017-7889?
CVE-2017-7889 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7889?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Canonical Ubuntu Linux.