Логотип exploitDog
bind:CVE-2017-7889
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-7889

Количество 13

Количество 13

ubuntu логотип

CVE-2017-7889

около 8 лет назад

The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2017-7889

около 8 лет назад

The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2017-7889

около 8 лет назад

The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2017-7889

около 8 лет назад

The mm subsystem in the Linux kernel through 3.2 does not properly enf ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-p5mv-cxgx-vhg7

около 3 лет назад

The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2017-01547

около 8 лет назад

Уязвимость операционной системы Linux, позволяющая нарушителю считывать или записывать в ячейки памяти ядра

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2017-3657

больше 7 лет назад

ELSA-2017-3657: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-3658

больше 7 лет назад

ELSA-2017-3658: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2018-1854

почти 7 лет назад

ELSA-2018-1854: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2908-1

больше 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2017-1842

почти 8 лет назад

ELSA-2017-1842: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-1842-1

почти 8 лет назад

ELSA-2017-1842-1: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2920-1

больше 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-7889

The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

CVSS3: 7.8
0%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-7889

The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

CVSS3: 7.8
0%
Низкий
около 8 лет назад
nvd логотип
CVE-2017-7889

The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

CVSS3: 7.8
0%
Низкий
около 8 лет назад
debian логотип
CVE-2017-7889

The mm subsystem in the Linux kernel through 3.2 does not properly enf ...

CVSS3: 7.8
0%
Низкий
около 8 лет назад
github логотип
GHSA-p5mv-cxgx-vhg7

The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2017-01547

Уязвимость операционной системы Linux, позволяющая нарушителю считывать или записывать в ячейки памяти ядра

CVSS3: 7.8
0%
Низкий
около 8 лет назад
oracle-oval логотип
ELSA-2017-3657

ELSA-2017-3657: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 7 лет назад
oracle-oval логотип
ELSA-2017-3658

ELSA-2017-3658: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 7 лет назад
oracle-oval логотип
ELSA-2018-1854

ELSA-2018-1854: kernel security and bug fix update (IMPORTANT)

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2017:2908-1

Security update for the Linux Kernel

больше 7 лет назад
oracle-oval логотип
ELSA-2017-1842

ELSA-2017-1842: kernel security, bug fix, and enhancement update (IMPORTANT)

почти 8 лет назад
oracle-oval логотип
ELSA-2017-1842-1

ELSA-2017-1842-1: kernel security, bug fix, and enhancement update (IMPORTANT)

почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2920-1

Security update for the Linux Kernel

больше 7 лет назад

Уязвимостей на страницу