First published: Mon Apr 17 2017(Updated: )
Last updated 29 November 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <3.2.91 | |
Linux Linux kernel | >=3.3<3.10.107 | |
Linux Linux kernel | >=3.11<3.12.74 | |
Linux Linux kernel | >=3.13<3.16.46 | |
Linux Linux kernel | >=3.17<3.18.50 | |
Linux Linux kernel | >=3.19<4.1.41 | |
Linux Linux kernel | >=4.2<4.4.63 | |
Linux Linux kernel | >=4.5<4.9.24 | |
Linux Linux kernel | >=4.10<4.10.12 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7889 is a vulnerability in the Linux kernel that allows local users to read or write to kernel memory locations in the first megabyte through the CONFIG_STRICT_DEVMEM protection mechanism.
CVE-2017-7889 has a severity level of medium.
CVE-2017-7889 affects Linux systems running kernel versions through 3.2 that do not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism.
To fix the CVE-2017-7889 vulnerability, update your Linux kernel to version 4.11 or higher.
You can find more information about CVE-2017-7889 at the following references: [http://seclists.org/oss-sec/2017/q2/76](http://seclists.org/oss-sec/2017/q2/76), [https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94](https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94), [https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1444496](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1444496).