CONFIG_STRICT_MEMORY_RWX is not strictly enforced (CVE-2013-4737)

Release Date:

September 15, 2013

Affected Projects:

Android for MSMFirefox OS for MSMQRD Android

Advisory ID:

QCIR-2013-00006-1

CVE ID(s):

CVE-2013-4737

Summary:

The following security vulnerability has been identified in the implementation of the CONFIG_STRICT_MEMORY_RWX feature. CVE-2013-4737: If CONFIG_STRICT_MEMORY_RWX is set, the first section (containing the kernel page table and the initial code) and the section containing the init code are both given RWX permission. This effectively bypasses the intention of this this feature and eases exploitation of kernel vulnerabilities by providing readable, writeable and executable memory at a known location.

Access Vector: Local/Remote
Security Risk: High
Access Vector: Local/Remote

Affected Versions:

All Android releases from CAF using the Linux kernel from the following heads: msm-3.*, jb*, ics* (Note: Because the patch is making use of additional padding of the memory sections, it results in approximately using 1900kB additional memory for the kernel)

Patch:

We advise customers to apply the following patch:

https://www.codeaurora.org/cgit/quic/la/kernel/msm/commit/?id=4256415b296348ff16cd17a5b8f8dce4dea37328

Acknowledgement:

Qualcomm Innovation Center, Inc. (QuIC) thanks Georg Wicherski of CrowdStrike for reporting the related issues and working with QuIC to help improve Android device security.

Revisions:

Initial revision

Contact:

security-advisory@quicinc.com