CERTA-2010-AVI-392
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité affectant les noyaux Linux et permettant un déni de service ou une élévation de privilèges a été corrigée.
Description
Une vulnérabilité affectant les noyaux Linux a été rendue publique. Elle concerne l'implémentation du mécanisme de dépassement de pile et permet, entre autres, l'élévation de privilèges.
Solution
Le correctif actuel se trouve dans le Git de kernel.org mais devrait être rapidement intégré dans les différentes distributions. (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "les noyaux Linux ant\u00e9rieurs \u00e0 2.6.35.2.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Les noyaux Linux ant\u00e9rieurs \u00e0 2.6.32.19 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "les noyaux Linux ant\u00e9rieurs \u00e0 2.6.34.4 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 affectant les noyaux Linux a \u00e9t\u00e9 rendue publique. Elle\nconcerne l\u0027impl\u00e9mentation du m\u00e9canisme de d\u00e9passement de pile et permet,\nentre autres, l\u0027\u00e9l\u00e9vation de privil\u00e8ges.\n\n## Solution\n\nLe correctif actuel se trouve dans le Git de kernel.org mais devrait\n\u00eatre rapidement int\u00e9gr\u00e9 dans les diff\u00e9rentes distributions. (cf. section\nDocumentation).\n",
"cves": [
{
"name": "CVE-2010-2240",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2240"
}
],
"links": [
{
"title": "Soumission du 13 ao\u00fbt 2010 dans le Git de kernel.org :",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=320b2b8de12698082609ebbc1a17165727f4c893"
}
],
"reference": "CERTA-2010-AVI-392",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-08-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 affectant les noyaux Linux et permettant un d\u00e9ni de\nservice ou une \u00e9l\u00e9vation de privil\u00e8ges a \u00e9t\u00e9 corrig\u00e9e.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin d\u0027annonce d\u0027erreur Red Hat #606611 du 22 juin 2010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…