Lucene search

K
redhatRedHatRHSA-2010:0676
HistorySep 07, 2010 - 12:00 a.m.

(RHSA-2010:0676) Important: kernel security update

2010-09-0700:00:00
access.redhat.com
11

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

52.6%

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • When an application has a stack overflow, the stack could silently
    overwrite another memory mapped area instead of a segmentation fault
    occurring, which could cause an application to execute arbitrary code,
    possibly leading to privilege escalation. It is known that the X Window
    System server can be used to trigger this flaw. (CVE-2010-2240, Important)

Red Hat would like to thank the X.Org security team for reporting this
issue. Upstream acknowledges Rafal Wojtczuk as the original reporter.

Users should upgrade to these updated packages, which contain backported
patches to correct this issue. The system must be rebooted for this update
to take effect.

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

52.6%