The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.
Metrics
Affected Vendors & Products
References
History
Mon, 03 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-03T16:15:19.257Z
Reserved: 2013-10-25T00:00:00.000Z
Link: CVE-2013-6282

Updated: 2024-08-06T17:38:59.708Z

Status : Analyzed
Published: 2013-11-20T13:19:43.023
Modified: 2025-02-04T18:22:24.353
Link: CVE-2013-6282

No data.