openSUSE 安全性更新:核心 (openSUSE-SU-2010:0902-1)

high Nessus Plugin ID 75552

概要

遠端 openSUSE 主機缺少安全性更新。

說明

此 openSUSE 11.3 Linux 核心更新修正了兩個重大安全性問題和一些錯誤。

下列安全性問題已修正:CVE-2010-3904:RDS 通訊端中的本機權限提升允許本機攻擊者取得權限。

CVE-2010-2963:video4linux 中相容 ioctl 處理內的問題允許已插入視訊裝置的本機攻擊者取得 x86_64 系統上的權限。

解決方案

更新受影響的 kernel 套件。

另請參閱

https://bugzilla.novell.com/show_bug.cgi?id=564324

https://bugzilla.novell.com/show_bug.cgi?id=573330

https://bugzilla.novell.com/show_bug.cgi?id=643477

https://bugzilla.novell.com/show_bug.cgi?id=645066

https://bugzilla.novell.com/show_bug.cgi?id=646045

https://bugzilla.novell.com/show_bug.cgi?id=647392

https://lists.opensuse.org/opensuse-updates/2010-10/msg00033.html

Plugin 詳細資訊

嚴重性: High

ID: 75552

檔案名稱: suse_11_3_kernel-101026.nasl

版本: 1.7

類型: local

代理程式: unix

已發布: 2014/6/13

已更新: 2023/5/14

支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

風險資訊

VPR

風險因素: High

分數: 8.9

CVSS v2

風險因素: High

基本分數: 7.2

媒介: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

弱點資訊

CPE: p-cpe:/a:novell:opensuse:kernel-debug, p-cpe:/a:novell:opensuse:kernel-debug-base, p-cpe:/a:novell:opensuse:kernel-debug-devel, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:kernel-default-base, p-cpe:/a:novell:opensuse:kernel-default-devel, p-cpe:/a:novell:opensuse:kernel-desktop, p-cpe:/a:novell:opensuse:kernel-desktop-base, p-cpe:/a:novell:opensuse:kernel-desktop-devel, p-cpe:/a:novell:opensuse:kernel-devel, p-cpe:/a:novell:opensuse:kernel-ec2, p-cpe:/a:novell:opensuse:kernel-ec2-base, p-cpe:/a:novell:opensuse:kernel-ec2-devel, p-cpe:/a:novell:opensuse:kernel-ec2-extra, p-cpe:/a:novell:opensuse:kernel-pae, p-cpe:/a:novell:opensuse:kernel-pae-base, p-cpe:/a:novell:opensuse:kernel-pae-devel, p-cpe:/a:novell:opensuse:kernel-source, p-cpe:/a:novell:opensuse:kernel-source-vanilla, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:kernel-trace, p-cpe:/a:novell:opensuse:kernel-trace-base, p-cpe:/a:novell:opensuse:kernel-trace-devel, p-cpe:/a:novell:opensuse:kernel-vanilla, p-cpe:/a:novell:opensuse:kernel-vanilla-base, p-cpe:/a:novell:opensuse:kernel-vanilla-devel, p-cpe:/a:novell:opensuse:kernel-vmi, p-cpe:/a:novell:opensuse:kernel-vmi-base, p-cpe:/a:novell:opensuse:kernel-vmi-devel, p-cpe:/a:novell:opensuse:kernel-xen, p-cpe:/a:novell:opensuse:kernel-xen-base, p-cpe:/a:novell:opensuse:kernel-xen-devel, p-cpe:/a:novell:opensuse:preload-kmp-default, p-cpe:/a:novell:opensuse:preload-kmp-desktop, cpe:/o:novell:opensuse:11.3

必要的 KB 項目: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2010/10/26

CISA 已知遭惡意利用弱點到期日: 2023/6/2

可惡意利用

CANVAS (CANVAS)

Core Impact

Metasploit (Reliable Datagram Sockets (RDS) Privilege Escalation)

參考資訊

CVE: CVE-2010-2963, CVE-2010-3904