7.8

CVE-2017-7889

The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 3.2.91
LinuxLinux Kernel Version >= 3.3 < 3.10.107
LinuxLinux Kernel Version >= 3.11 < 3.12.74
LinuxLinux Kernel Version >= 3.13 < 3.16.46
LinuxLinux Kernel Version >= 3.17 < 3.18.50
LinuxLinux Kernel Version >= 3.19 < 4.1.41
LinuxLinux Kernel Version >= 4.2 < 4.4.63
LinuxLinux Kernel Version >= 4.5 < 4.9.24
LinuxLinux Kernel Version >= 4.10 < 4.10.12
DebianDebian Linux Version8.0
CanonicalUbuntu Linux Version12.04 SwEdition-
CanonicalUbuntu Linux Version14.04 SwEditionesm
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.076
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-732 Incorrect Permission Assignment for Critical Resource

The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.