High severity7.8NVD Advisory· Published Apr 17, 2017· Updated May 13, 2026
CVE-2017-7889
CVE-2017-7889
Description
The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.
Affected products
4- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*+ 1 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdIssue TrackingPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2017/04/16/4nvdMailing ListPatchThird Party Advisory
- github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94nvdIssue TrackingPatchThird Party Advisory
- www.debian.org/security/2017/dsa-3945nvdThird Party Advisory
- www.securityfocus.com/bid/97690nvdThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2017:1842nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:2077nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:2669nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2018:1854nvdThird Party Advisory
- git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/nvdThird Party Advisory
- usn.ubuntu.com/3583-1/nvdThird Party Advisory
- usn.ubuntu.com/3583-2/nvdThird Party Advisory
News mentions
0No linked articles in our index yet.