Lucene search

K
centosCentOS ProjectCESA-2010:0676
HistorySep 08, 2010 - 9:23 p.m.

kernel security update

2010-09-0821:23:21
CentOS Project
lists.centos.org
52

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

52.1%

CentOS Errata and Security Advisory CESA-2010:0676

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • When an application has a stack overflow, the stack could silently
    overwrite another memory mapped area instead of a segmentation fault
    occurring, which could cause an application to execute arbitrary code,
    possibly leading to privilege escalation. It is known that the X Window
    System server can be used to trigger this flaw. (CVE-2010-2240, Important)

Red Hat would like to thank the X.Org security team for reporting this
issue. Upstream acknowledges Rafal Wojtczuk as the original reporter.

Users should upgrade to these updated packages, which contain backported
patches to correct this issue. The system must be rebooted for this update
to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-September/079126.html
https://lists.centos.org/pipermail/centos-announce/2010-September/079127.html

Affected packages:
kernel
kernel-devel
kernel-doc
kernel-hugemem
kernel-hugemem-devel
kernel-largesmp
kernel-largesmp-devel
kernel-smp
kernel-smp-devel
kernel-xenU
kernel-xenU-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0676

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

52.1%