kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #11681
[Bug 1220185] [NEW] CVE-2013-2888
*** This bug is a security vulnerability ***
Public security bug reported:
Memory write via arbitrary heap array index. This is the most serious,
IMO, as it allows (on 32-bit) access to the entire memory range (the
index is unsigned 32 bit). This is mitigated slightly by the fact that
the starting address is at an "unknown" location on the heap, and that
the value written is an "arbitrary" kernel pointer. Still, this could
almost certainly be turned into full kernel execution given enough
study.
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-ec2 (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-lts-raring (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu)
Importance: Medium
Status: New
** Affects: linux (Ubuntu Lucid)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Lucid)
Importance: Medium
Status: Invalid
** Affects: linux-ec2 (Ubuntu Lucid)
Importance: Medium
Status: New
** Affects: linux-fsl-imx51 (Ubuntu Lucid)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Lucid)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu Lucid)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu Lucid)
Importance: Medium
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Lucid)
Importance: Medium
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Lucid)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Lucid)
Importance: Medium
Status: Invalid
** Affects: linux (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux-ec2 (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Precise)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu Precise)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux-lts-raring (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux-mvl-dove (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux (Ubuntu Quantal)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Quantal)
Importance: Medium
Status: New
** Affects: linux-ec2 (Ubuntu Quantal)
Importance: Medium
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Quantal)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Quantal)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu Quantal)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu Quantal)
Importance: Medium
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Quantal)
Importance: Medium
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Quantal)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Quantal)
Importance: Medium
Status: New
** Affects: linux (Ubuntu Raring)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Affects: linux-ec2 (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Raring)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu Raring)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Raring)
Importance: Medium
Status: New
** Affects: linux (Ubuntu Saucy)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Affects: linux-ec2 (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Saucy)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu Saucy)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Saucy)
Importance: Medium
Status: New
** Tags: kernel-cve-tracking-bug
** Tags added: kernel-cve-tracking-bug
** Information type changed from Public to Public Security
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2888
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1220185
Title:
CVE-2013-2888
Status in “linux” package in Ubuntu:
New
Status in “linux-armadaxp” package in Ubuntu:
Invalid
Status in “linux-ec2” package in Ubuntu:
Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
New
Status in “linux-lts-backport-natty” package in Ubuntu:
New
Status in “linux-lts-quantal” package in Ubuntu:
Invalid
Status in “linux-lts-raring” package in Ubuntu:
Invalid
Status in “linux-mvl-dove” package in Ubuntu:
Invalid
Status in “linux-ti-omap4” package in Ubuntu:
New
Status in “linux” source package in Lucid:
New
Status in “linux-armadaxp” source package in Lucid:
Invalid
Status in “linux-ec2” source package in Lucid:
New
Status in “linux-fsl-imx51” source package in Lucid:
Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
New
Status in “linux-lts-backport-natty” source package in Lucid:
New
Status in “linux-lts-quantal” source package in Lucid:
Invalid
Status in “linux-lts-raring” source package in Lucid:
Invalid
Status in “linux-mvl-dove” source package in Lucid:
Invalid
Status in “linux-ti-omap4” source package in Lucid:
Invalid
Status in “linux” source package in Precise:
New
Status in “linux-armadaxp” source package in Precise:
New
Status in “linux-ec2” source package in Precise:
Invalid
Status in “linux-fsl-imx51” source package in Precise:
Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
New
Status in “linux-lts-backport-natty” source package in Precise:
New
Status in “linux-lts-quantal” source package in Precise:
New
Status in “linux-lts-raring” source package in Precise:
New
Status in “linux-mvl-dove” source package in Precise:
Invalid
Status in “linux-ti-omap4” source package in Precise:
New
Status in “linux” source package in Quantal:
New
Status in “linux-armadaxp” source package in Quantal:
New
Status in “linux-ec2” source package in Quantal:
Invalid
Status in “linux-fsl-imx51” source package in Quantal:
Invalid
Status in “linux-lts-backport-maverick” source package in Quantal:
New
Status in “linux-lts-backport-natty” source package in Quantal:
New
Status in “linux-lts-quantal” source package in Quantal:
Invalid
Status in “linux-lts-raring” source package in Quantal:
Invalid
Status in “linux-mvl-dove” source package in Quantal:
Invalid
Status in “linux-ti-omap4” source package in Quantal:
New
Status in “linux” source package in Raring:
New
Status in “linux-armadaxp” source package in Raring:
Invalid
Status in “linux-ec2” source package in Raring:
Invalid
Status in “linux-fsl-imx51” source package in Raring:
Invalid
Status in “linux-lts-backport-maverick” source package in Raring:
New
Status in “linux-lts-backport-natty” source package in Raring:
New
Status in “linux-lts-quantal” source package in Raring:
Invalid
Status in “linux-lts-raring” source package in Raring:
Invalid
Status in “linux-mvl-dove” source package in Raring:
Invalid
Status in “linux-ti-omap4” source package in Raring:
New
Status in “linux” source package in Saucy:
New
Status in “linux-armadaxp” source package in Saucy:
Invalid
Status in “linux-ec2” source package in Saucy:
Invalid
Status in “linux-fsl-imx51” source package in Saucy:
Invalid
Status in “linux-lts-backport-maverick” source package in Saucy:
New
Status in “linux-lts-backport-natty” source package in Saucy:
New
Status in “linux-lts-quantal” source package in Saucy:
Invalid
Status in “linux-lts-raring” source package in Saucy:
Invalid
Status in “linux-mvl-dove” source package in Saucy:
Invalid
Status in “linux-ti-omap4” source package in Saucy:
New
Bug description:
Memory write via arbitrary heap array index. This is the most serious,
IMO, as it allows (on 32-bit) access to the entire memory range (the
index is unsigned 32 bit). This is mitigated slightly by the fact that
the starting address is at an "unknown" location on the heap, and that
the value written is an "arbitrary" kernel pointer. Still, this could
almost certainly be turned into full kernel execution given enough
study.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1220185/+subscriptions
Follow ups
-
[Bug 1220185] Re: CVE-2013-2888
From: Steve Beattie, 2016-05-05
-
[Bug 1220185] Re: CVE-2013-2888
From: Steve Beattie, 2016-04-26
-
[Bug 1220185] Re: CVE-2013-2888
From: Steve Beattie, 2016-04-18
-
[Bug 1220185] Re: CVE-2013-2888
From: Steve Beattie, 2016-02-10
-
[Bug 1220185] Re: CVE-2013-2888
From: Steve Beattie, 2015-12-03
-
[Bug 1220185] Re: CVE-2013-2888
From: Steve Beattie, 2015-11-16
-
[Bug 1220185] Re: CVE-2013-2888
From: Steve Beattie, 2015-11-10
-
[Bug 1220185] Re: CVE-2013-2888
From: Steve Beattie, 2015-10-28
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2015-07-28
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2015-05-08
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2015-05-04
-
[Bug 1220185] Re: CVE-2013-2888
From: Mathew Hodson, 2015-03-25
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2015-01-28
-
[Bug 1220185] Re: CVE-2013-2888
From: Rolf Leggewie, 2014-12-05
-
[Bug 1220185] Closing unsupported series nomination.
From: Joseph Salisbury, 2014-09-15
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2013-12-06
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2013-12-04
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2013-12-02
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2013-11-15
-
[Bug 1220185] Re: CVE-2013-2888
From: Jamie Strandboge, 2013-11-12
-
[Bug 1220185] Re: CVE-2013-2888
From: Jamie Strandboge, 2013-11-12
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2013-10-25
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2013-10-08
-
[Bug 1220185] Re: CVE-2013-2888
From: Launchpad Bug Tracker, 2013-09-29
-
[Bug 1220185] Re: CVE-2013-2888
From: Launchpad Bug Tracker, 2013-09-29
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2013-09-27
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2013-09-24
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2013-09-17
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2013-09-10
-
[Bug 1220185] Re: CVE-2013-2888
From: John Johansen, 2013-09-03
-
[Bug 1220185] [NEW] CVE-2013-2888
From: John Johansen, 2013-09-03
References