CVE-2013-6763

Priority
Description
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel
before 3.12 does not validate the size of a memory block, which allows
local users to cause a denial of service (memory corruption) or possibly
gain privileges via crafted mmap operations, a different vulnerability than
CVE-2013-4511.
Ubuntu-Description
Nico Golde reported a flaw in the Linux kernel's userspace IO (uio) driver.
A local user could exploit this flaw to cause a denial of service (memory
corruption) or possibly gain privileges.
Notes
seth-arnoldMarked 'low' because uio_mmap_physical()'s only caller does length
checking before the call, see the 12 November 2013 oss-security mail from
Petr Matousek.
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (3.12)
Ubuntu 16.04 ESM (Xenial Xerus):not-affected (4.2.0-16.19)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (3.12.0-2.5)
Ubuntu 20.04 FIPS Compliant (Focal Fossa):not-affected (4.10.0-19.21)
Patches:
Introduced by
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by
7314e613d5ff9f0934f7a0f74ed7973b903315d1
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (3.12)
Ubuntu 16.04 ESM (Xenial Xerus):not-affected (4.4.0-1001.10)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (4.4.0-1002.2)
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored [was needed now end-of-life])
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored [was needed now end-of-life])
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored [abandoned])
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 16.04 ESM (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 16.04 ESM (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.16.0-25.33~14.04.2])
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.19.0-18.18~14.04.1])
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [4.2.0-18.22~14.04.1])
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (4.4.0-13.29~14.04.1)
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored [abandoned])
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored [was needed now end-of-life])
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored [was needed now end-of-life])
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):not-affected (4.10.0-1004.6)
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):not-affected (4.4.0-1050.54)
Patches:
Package
Upstream:released (3.12)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
More Information

Updated: 2022-02-11 00:38:12 UTC (commit acb3d89ab51f1d5e5543fa993969c0eb13c71f04)