CVE-2013-6763
Published: 12 November 2013
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
From the Ubuntu security team
Nico Golde reported a flaw in the Linux kernel's userspace IO (uio) driver. A local user could exploit this flaw to cause a denial of service (memory corruption) or possibly gain privileges.
Priority
Status
Notes
Author | Note |
---|---|
seth-arnold | Marked 'low' because uio_mmap_physical()'s only caller does length checking before the call, see the 12 November 2013 oss-security mail from Petr Matousek. |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6763
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
- https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7314e613d5ff9f0934f7a0f74ed7973b903315d1
- http://www.openwall.com/lists/oss-security/2013/11/04/22
- http://www.openwall.com/lists/oss-security/2013/11/12/1
- https://ubuntu.com/security/notices/USN-2064-1
- https://ubuntu.com/security/notices/USN-2065-1
- https://ubuntu.com/security/notices/USN-2066-1
- https://ubuntu.com/security/notices/USN-2067-1
- https://ubuntu.com/security/notices/USN-2068-1
- https://ubuntu.com/security/notices/USN-2069-1
- https://ubuntu.com/security/notices/USN-2070-1
- https://ubuntu.com/security/notices/USN-2071-1
- https://ubuntu.com/security/notices/USN-2072-1
- https://ubuntu.com/security/notices/USN-2073-1
- https://ubuntu.com/security/notices/USN-2074-1
- https://ubuntu.com/security/notices/USN-2075-1
- https://ubuntu.com/security/notices/USN-2076-1
- NVD
- Launchpad
- Debian