CERTA-2010-AVI-392

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité affectant les noyaux Linux et permettant un déni de service ou une élévation de privilèges a été corrigée.

Description

Une vulnérabilité affectant les noyaux Linux a été rendue publique. Elle concerne l'implémentation du mécanisme de dépassement de pile et permet, entre autres, l'élévation de privilèges.

Solution

Le correctif actuel se trouve dans le Git de kernel.org mais devrait être rapidement intégré dans les différentes distributions. (cf. section Documentation).

None
Impacted products
Vendor Product Description
N/A N/A les noyaux Linux antérieurs à 2.6.35.2.
N/A N/A Les noyaux Linux antérieurs à 2.6.32.19 ;
N/A N/A les noyaux Linux antérieurs à 2.6.34.4 ;

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "les noyaux Linux ant\u00e9rieurs \u00e0 2.6.35.2.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Les noyaux Linux ant\u00e9rieurs \u00e0 2.6.32.19 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "les noyaux Linux ant\u00e9rieurs \u00e0 2.6.34.4 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 affectant les noyaux Linux a \u00e9t\u00e9 rendue publique. Elle\nconcerne l\u0027impl\u00e9mentation du m\u00e9canisme de d\u00e9passement de pile et permet,\nentre autres, l\u0027\u00e9l\u00e9vation de privil\u00e8ges.\n\n## Solution\n\nLe correctif actuel se trouve dans le Git de kernel.org mais devrait\n\u00eatre rapidement int\u00e9gr\u00e9 dans les diff\u00e9rentes distributions. (cf. section\nDocumentation).\n",
  "cves": [
    {
      "name": "CVE-2010-2240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2240"
    }
  ],
  "links": [
    {
      "title": "Soumission du 13 ao\u00fbt 2010 dans le Git de kernel.org :",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=320b2b8de12698082609ebbc1a17165727f4c893"
    }
  ],
  "reference": "CERTA-2010-AVI-392",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-08-19T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 affectant les noyaux Linux et permettant un d\u00e9ni de\nservice ou une \u00e9l\u00e9vation de privil\u00e8ges a \u00e9t\u00e9 corrig\u00e9e.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin d\u0027annonce d\u0027erreur Red Hat #606611 du 22 juin 2010",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…