** Description changed:

  Memory write via arbitrary heap array index. This is the most serious,
  IMO, as it allows (on 32-bit) access to the entire memory range (the
  index is unsigned 32 bit). This is mitigated slightly by the fact that
  the starting address is at an "unknown" location on the heap, and that
  the value written is an "arbitrary" kernel pointer. Still, this could
  almost certainly be turned into full kernel execution given enough
  study.
+ 
+ Break-Fix: - 43622021d2e2b82ea03d883926605bdd0525e1d1

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1220185

Title:
  CVE-2013-2888

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1220185/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to