CVE-2013-6282

Linux Kernel — Linux Kernel Improper Input Validation Vulnerability
⚠️ CVSS 3.1  8.8 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

The get_user and put_user API functions of the Linux kernel fail to validate the target address when being used on ARM v6k/v7 platforms. This allows an application to read and write kernel memory which could lead to privilege escalation.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8404663f81d212918ff85f493649a7991209fa04; https://nvd.nist.gov/vuln/detail/CVE-2013-6282

Key Details

PropertyValue
CVE ID CVE-2013-6282
Vendor / Product Linux — Kernel
NVD Published2013-11-20
NVD Last Modified2025-10-22
CVSS 3.1 Score8.8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
SeverityHIGH
CWE CWE-20
CISA KEV Added2022-09-15
CISA KEV Deadline2022-10-06
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2022-10-06. Apply updates per vendor instructions.

Timeline

DateEvent
2022-09-15Added to CISA Known Exploited Vulnerabilities catalog
2022-10-06CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2013-6282 Vulnerability Database
CISA KEV Catalog Entry US Government