CERTA-2010-AVI-619
Vulnerability from certfr_avis

Une vulnérabilité dans le noyau Linux permet à un utilisateur local identifié d'élever ses privilèges.

Description

Une vulnérabilité relative à la mise en œuvre du pseudo système de fichiers debugfs et à l'ACPI (Advanced Configuration and Power Interface) est présente dans le noyau Linux. Elle permet à un utilisateur disposant d'un compte sur la machine vulnérable d'élever ses privilèges jusqu'au niveau administrateur (root).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Linux Kernel versions 2.6.33 à 2.6.36.1.

Impacted products
Vendor Product Description
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eLinux Kernel versions 2.6.33 \u00e0 2.6.36.1.\u003c/P\u003e",
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 relative \u00e0 la mise en \u0153uvre du pseudo syst\u00e8me de\nfichiers debugfs et \u00e0 l\u0027ACPI (Advanced Configuration and Power\nInterface) est pr\u00e9sente dans le noyau Linux. Elle permet \u00e0 un\nutilisateur disposant d\u0027un compte sur la machine vuln\u00e9rable d\u0027\u00e9lever ses\nprivil\u00e8ges jusqu\u0027au niveau administrateur (root).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2010-4347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4347"
    }
  ],
  "initial_release_date": "2010-12-17T00:00:00",
  "last_revision_date": "2010-12-17T00:00:00",
  "links": [
    {
      "title": "Site du noyau Linux :",
      "url": "http://www.kernel.org"
    }
  ],
  "reference": "CERTA-2010-AVI-619",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-12-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans le noyau Linux permet \u00e0 un utilisateur local\nidentifi\u00e9 d\u0027\u00e9lever ses privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Rapport Bugzilla RedHat n\u00b0663542 du 16 d\u00e9cembre 2010",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=66345"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…