openSUSE 安全性更新:kernel (openSUSE-2012-65)

high Nessus Plugin ID 74767

概要

遠端 openSUSE 主機缺少安全性更新。

說明

openSUSE 12.1 核心已更新至 3.1.9,修正了多個錯誤和安全性問題。如需 3.1.9 版變更的完整清單,請參閱:

http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.9 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.8 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.7 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.6 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.5 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.4 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.3 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.2 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.2

已修正下列安全性問題:

CVE-2011-2203:hfs 檔案系統程式碼中遺漏的 NULL 指標檢查

CVE-2011-4604:修正使用 B.A.T.M.A.N. 網狀通訊協定時可能
存在的核心記憶體損毀。

CVE-2012-0056:透過寫入至 /proc/pid/mem 造成的本機 root 弱點

CVE-2012-0207:透過特製 IGMP 封包造成的遠端 DoS 弱點。

已新增下列非安全性錯誤修正:

- BTRFS 支援已經由多個錯誤修正改善。

解決方案

更新受影響的 kernel 套件。

另請參閱

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.2

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.3

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.4

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.5

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.6

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.7

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.8

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.9

https://bugzilla.novell.com/show_bug.cgi?id=672923

https://bugzilla.novell.com/show_bug.cgi?id=679059

https://bugzilla.novell.com/show_bug.cgi?id=689860

https://bugzilla.novell.com/show_bug.cgi?id=691052

https://bugzilla.novell.com/show_bug.cgi?id=698540

https://bugzilla.novell.com/show_bug.cgi?id=699709

https://bugzilla.novell.com/show_bug.cgi?id=724616

https://bugzilla.novell.com/show_bug.cgi?id=724620

https://bugzilla.novell.com/show_bug.cgi?id=724734

https://bugzilla.novell.com/show_bug.cgi?id=726296

https://bugzilla.novell.com/show_bug.cgi?id=727348

https://bugzilla.novell.com/show_bug.cgi?id=730103

https://bugzilla.novell.com/show_bug.cgi?id=730731

https://bugzilla.novell.com/show_bug.cgi?id=731261

https://bugzilla.novell.com/show_bug.cgi?id=736149

https://bugzilla.novell.com/show_bug.cgi?id=737624

https://bugzilla.novell.com/show_bug.cgi?id=740118

https://bugzilla.novell.com/show_bug.cgi?id=742279

https://bugzilla.novell.com/show_bug.cgi?id=742322

https://bugzilla.novell.com/show_bug.cgi?id=743608

Plugin 詳細資訊

嚴重性: High

ID: 74767

檔案名稱: openSUSE-2012-65.nasl

版本: 1.5

類型: local

代理程式: unix

已發布: 2014/6/13

已更新: 2021/1/19

支援的感應器: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

風險資訊

VPR

風險因素: Critical

分數: 9.7

CVSS v2

風險因素: High

基本分數: 7.8

媒介: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

弱點資訊

CPE: p-cpe:/a:novell:opensuse:kernel-ec2, p-cpe:/a:novell:opensuse:kernel-ec2-base, p-cpe:/a:novell:opensuse:kernel-ec2-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-debugsource, p-cpe:/a:novell:opensuse:kernel-ec2-devel, p-cpe:/a:novell:opensuse:kernel-ec2-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-extra, p-cpe:/a:novell:opensuse:kernel-ec2-extra-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae, p-cpe:/a:novell:opensuse:kernel-pae-base, p-cpe:/a:novell:opensuse:kernel-pae-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-debugsource, p-cpe:/a:novell:opensuse:kernel-pae-devel, p-cpe:/a:novell:opensuse:kernel-pae-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-source, p-cpe:/a:novell:opensuse:kernel-source-vanilla, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:kernel-trace, p-cpe:/a:novell:opensuse:kernel-trace-base, p-cpe:/a:novell:opensuse:kernel-trace-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-trace-debuginfo, p-cpe:/a:novell:opensuse:kernel-trace-debugsource, p-cpe:/a:novell:opensuse:kernel-trace-devel, p-cpe:/a:novell:opensuse:kernel-trace-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla, p-cpe:/a:novell:opensuse:kernel-vanilla-base, p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource, p-cpe:/a:novell:opensuse:kernel-vanilla-devel, p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen, p-cpe:/a:novell:opensuse:kernel-xen-base, p-cpe:/a:novell:opensuse:kernel-xen-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen-debugsource, p-cpe:/a:novell:opensuse:kernel-xen-devel, p-cpe:/a:novell:opensuse:kernel-xen-devel-debuginfo, cpe:/o:novell:opensuse:12.1, p-cpe:/a:novell:opensuse:kernel-debug, p-cpe:/a:novell:opensuse:kernel-debug-base, p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debugsource, p-cpe:/a:novell:opensuse:kernel-debug-devel, p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:kernel-default-base, p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-debugsource, p-cpe:/a:novell:opensuse:kernel-default-devel, p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop, p-cpe:/a:novell:opensuse:kernel-desktop-base, p-cpe:/a:novell:opensuse:kernel-desktop-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop-debugsource, p-cpe:/a:novell:opensuse:kernel-desktop-devel, p-cpe:/a:novell:opensuse:kernel-desktop-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-devel

必要的 KB 項目: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2012/1/27

可惡意利用

CANVAS (CANVAS)

Core Impact

參考資訊

CVE: CVE-2011-2203, CVE-2011-4604, CVE-2012-0056, CVE-2012-0207