The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.
Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-2067-1 Linux kernel (OMAP4) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 10:30:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Tue, 04 Feb 2025 02:15:00 +0900

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

kev

{'dateAdded': '2022-09-15'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-22T00:05:39.816Z

Reserved: 2013-10-25T00:00:00.000Z

Link: CVE-2013-6282

cve-icon Vulnrichment

Updated: 2024-08-06T17:38:59.708Z

cve-icon NVD

Status : Deferred

Published: 2013-11-20T13:19:43.023

Modified: 2025-10-22T01:15:52.693

Link: CVE-2013-6282

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses