CERTA-2009-AVI-337
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité affectant les noyaux Linux et permettant une élévation de privilèges a été corrigée.
Description
Une vulnérabilité récente affectant les noyaux Linux a été rendue publique. Elle concerne un déréférencement de pointeur NULL à la création de sockets pour quelques protocoles et permet l'élévation de privilèges.
Solution
Le correctif actuel se trouve dans le Git de kernel.org mais devrait être rapidement intégré dans les différentes distributions. (cf. section Documentation).
NoneImpacted products
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Les noyaux Linux 2.4.37.4 et ant\u00e9rieurs ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "les noyaux 2.6.30.4 et ant\u00e9rieurs.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 r\u00e9cente affectant les noyaux Linux a \u00e9t\u00e9 rendue\npublique. Elle concerne un d\u00e9r\u00e9f\u00e9rencement de pointeur NULL \u00e0 la\ncr\u00e9ation de sockets pour quelques protocoles et permet l\u0027\u00e9l\u00e9vation de\nprivil\u00e8ges.\n\n## Solution\n\nLe correctif actuel se trouve dans le Git de kernel.org mais devrait\n\u00eatre rapidement int\u00e9gr\u00e9 dans les diff\u00e9rentes distributions. (cf. section\nDocumentation).\n",
"cves": [
{
"name": "CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
}
],
"links": [
{
"title": "Soumission du 13 ao\u00fbt 2009 dans le Git de kernel.org :",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e694958388c50148389b0e9b9e9e8945cf0f1b98"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Suse SUSE-SA:2009:045 du 20 ao\u00fbt 2009 :",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00007.html"
},
{
"title": "Article de l\u0027ISC SANS 6964 du 14 ao\u00fbt 2009 :",
"url": "http://isc.sans.org/diary.html?storyid=6964"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Debian DSA-1862 du 14 ao\u00fbt 2009 et DSA-1864 du 16 ao\u00fbt 2009 :",
"url": "http://www.us.debian.org/security/2009/dsa-1864"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-819-1 du 19 ao\u00fbt 2009 :",
"url": "http://www.ubuntu.com/usn/usn-819-1"
},
{
"title": "Bulletins d\u0027annonce d\u0027erreur RedHat 516949 du 14 ao\u00fbt 2009 :",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516949"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Debian DSA-1862 du 14 ao\u00fbt 2009 et DSA-1864 du 16 ao\u00fbt 2009 :",
"url": "http://www.us.debian.org/security/2009/dsa-1862"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDVSA-2009:205 du 17 ao\u00fbt 2009 :",
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2009:205"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Fedora 10 et 11 du 15 ao\u00fbt 2009 :",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00728.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Fedora 10 et 11 du 15 ao\u00fbt 2009 :",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00727.html"
},
{
"title": "Bulletins d\u0027annonce d\u0027erreur RedHat 516949 du 14 ao\u00fbt 2009 :",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2692"
}
],
"reference": "CERTA-2009-AVI-337",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-08-14T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Mandriva, Fedora et Debian.",
"revision_date": "2009-08-18T00:00:00.000000"
},
{
"description": "correction de coquille et ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Ubuntu.",
"revision_date": "2009-08-19T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Suse.",
"revision_date": "2009-08-21T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 affectant les noyaux Linux et permettant une \u00e9l\u00e9vation\nde privil\u00e8ges a \u00e9t\u00e9 corrig\u00e9e.\n",
"title": "Vuln\u00e9rabilit\u00e9 du noyau Linux",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin d\u0027annonce d\u0027erreur RedHat 516949 du 14 ao\u00fbt 2009",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…