Bug 850934 (CVE-2013-6282) - VUL-1: CVE-2013-6282: kernel: arm: Missing access checks in put_user/get_user kernel API
Summary: VUL-1: CVE-2013-6282: kernel: arm: Missing access checks in put_user/get_user...
Status: RESOLVED FIXED
Alias: CVE-2013-6282
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: E-mail List
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-11-18 16:25 UTC by Victor Pereira
Modified: 2016-04-27 19:10 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2013-11-18 16:25:30 UTC
CVE-2013-6282

The get_user and put_user API functions of the Linux kernel fail to validate the target address when being used on ARM v6k/v7 platforms. This functionality was originally implemented and controlled by the domain switching feature (CONFIG_CPU_USE_DOMAINS), which has been deprecated due to architectural changes. As a result, any kernel code using these API functions may introduce a security issue where none existed before. This allows an application to read and write kernel memory to, e.g., escalated privileges.


References:
https://www.codeaurora.org/projects/security-advisories/missing-access-checks-putusergetuser-kernel-api-cve-2013-6282
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/arch/arm/include/asm/uaccess.h?id=8404663f81d212918ff85f493649a7991209fa04
http://comments.gmane.org/gmane.comp.security.oss.general/11487
Comment 1 Swamp Workflow Management 2013-11-18 23:00:40 UTC
bugbot adjusting priority
Comment 7 Marcus Meissner 2013-12-19 14:15:00 UTC
as it seems fixed before we even shipped arm stuff, it does not affect us.
Comment 8 SMASH SMASH 2014-02-27 13:35:12 UTC
Affected packages:

SLE-11-SP3: kernel-source
SLE-11-SP2: kernel-source
SLE-10-SP3-TERADATA: kernel-source
SLE-9-SP3-TERADATA: kernel-source
SLE-10-SP4: kernel-source
SLE-9-SP4: kernel-source
SLE-11-SP1-TERADATA: kernel-source