The CONFIG_STRICT_MEMORY_RWX implementation for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly consider certain memory sections, which makes it easier for attackers to bypass intended access restrictions by leveraging the presence of RWX memory at a fixed location.
References
Link | Resource |
---|---|
https://www.codeaurora.org/projects/security-advisories/configstrictmemoryrwx-not-strictly-enforced-cve-2013-4737 | Patch Vendor Advisory |
Configurations
Information
Published : 2014-02-15 06:57
Updated : 2014-02-18 11:35
NVD link : CVE-2013-4737
Mitre link : CVE-2013-4737
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
qualcomm
- quic_mobile_station_modem_kernel