CERTA-2010-AVI-392
Vulnerability from certfr_avis

Une vulnérabilité affectant les noyaux Linux et permettant un déni de service ou une élévation de privilèges a été corrigée.

Description

Une vulnérabilité affectant les noyaux Linux a été rendue publique. Elle concerne l'implémentation du mécanisme de dépassement de pile et permet, entre autres, l'élévation de privilèges.

Solution

Le correctif actuel se trouve dans le Git de kernel.org mais devrait être rapidement intégré dans les différentes distributions. (cf. section Documentation).

None
Impacted products
Vendor Product Description
N/A N/A les noyaux Linux antérieurs à 2.6.35.2.
N/A N/A Les noyaux Linux antérieurs à 2.6.32.19 ;
N/A N/A les noyaux Linux antérieurs à 2.6.34.4 ;

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "les noyaux Linux ant\u00e9rieurs \u00e0 2.6.35.2.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Les noyaux Linux ant\u00e9rieurs \u00e0 2.6.32.19 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "les noyaux Linux ant\u00e9rieurs \u00e0 2.6.34.4 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 affectant les noyaux Linux a \u00e9t\u00e9 rendue publique. Elle\nconcerne l\u0027impl\u00e9mentation du m\u00e9canisme de d\u00e9passement de pile et permet,\nentre autres, l\u0027\u00e9l\u00e9vation de privil\u00e8ges.\n\n## Solution\n\nLe correctif actuel se trouve dans le Git de kernel.org mais devrait\n\u00eatre rapidement int\u00e9gr\u00e9 dans les diff\u00e9rentes distributions. (cf. section\nDocumentation).\n",
  "cves": [
    {
      "name": "CVE-2010-2240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2240"
    }
  ],
  "initial_release_date": "2010-08-19T00:00:00",
  "last_revision_date": "2010-08-19T00:00:00",
  "links": [
    {
      "title": "Soumission du 13 ao\u00fbt 2010 dans le Git de kernel.org :",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=320b2b8de12698082609ebbc1a17165727f4c893"
    }
  ],
  "reference": "CERTA-2010-AVI-392",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-08-19T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 affectant les noyaux Linux et permettant un d\u00e9ni de\nservice ou une \u00e9l\u00e9vation de privil\u00e8ges a \u00e9t\u00e9 corrig\u00e9e.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin d\u0027annonce d\u0027erreur Red Hat #606611 du 22 juin 2010",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…