The CONFIG_STRICT_MEMORY_RWX implementation for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly consider certain memory sections, which makes it easier for attackers to bypass intended access restrictions by leveraging the presence of RWX memory at a fixed location.
References
Link | Resource |
---|---|
https://www.codeaurora.org/projects/security-advisories/configstrictmemoryrwx-not-strictly-enforced-cve-2013-4737 | Patch Vendor Advisory |
https://www.codeaurora.org/projects/security-advisories/configstrictmemoryrwx-not-strictly-enforced-cve-2013-4737 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 01:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.codeaurora.org/projects/security-advisories/configstrictmemoryrwx-not-strictly-enforced-cve-2013-4737 - Patch, Vendor Advisory |
Information
Published : 2014-02-15 14:57
Updated : 2024-11-21 01:56
NVD link : CVE-2013-4737
Mitre link : CVE-2013-4737
CVE.ORG link : CVE-2013-4737
JSON object : View
Products Affected
qualcomm
- quic_mobile_station_modem_kernel
CWE
CWE-264
Permissions, Privileges, and Access Controls