openSUSE 安全更新:kernel (openSUSE-2012-65)

high Nessus 插件 ID 74767

简介

远程 openSUSE 主机缺少安全更新。

描述

openSUSE 12.1 内核已更新到 3.1.9,修复了缺陷和安全问题。3.1.9 中的完整变更列表请见:

http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.9 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.8 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.7 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.6 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.5 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.4 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.3 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.2 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.2

以下安全问题已得到修复:

CVE-2011-2203:hfs 文件系统代码中缺少的空指针检查

CVE-2011-4604:修复在使用 B.A.T.M.A.N. 网格协议
时可能的内核内存损坏。

CVE-2012-0056:通过写入至 /proc/pid/mem 造成的本地根漏洞

CVE-2012-0207:通过构建的 IGMP 程序包造成的远程 DoS 漏洞。

已新增以下非安全性缺陷补丁:

- BTRFS 支持已通过许多缺陷补丁进行改善。

解决方案

更新受影响的 kernel 程序包。

另见

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.2

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.3

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.4

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.5

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.6

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.7

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.8

https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.1.9

https://bugzilla.novell.com/show_bug.cgi?id=672923

https://bugzilla.novell.com/show_bug.cgi?id=679059

https://bugzilla.novell.com/show_bug.cgi?id=689860

https://bugzilla.novell.com/show_bug.cgi?id=691052

https://bugzilla.novell.com/show_bug.cgi?id=698540

https://bugzilla.novell.com/show_bug.cgi?id=699709

https://bugzilla.novell.com/show_bug.cgi?id=724616

https://bugzilla.novell.com/show_bug.cgi?id=724620

https://bugzilla.novell.com/show_bug.cgi?id=724734

https://bugzilla.novell.com/show_bug.cgi?id=726296

https://bugzilla.novell.com/show_bug.cgi?id=727348

https://bugzilla.novell.com/show_bug.cgi?id=730103

https://bugzilla.novell.com/show_bug.cgi?id=730731

https://bugzilla.novell.com/show_bug.cgi?id=731261

https://bugzilla.novell.com/show_bug.cgi?id=736149

https://bugzilla.novell.com/show_bug.cgi?id=737624

https://bugzilla.novell.com/show_bug.cgi?id=740118

https://bugzilla.novell.com/show_bug.cgi?id=742279

https://bugzilla.novell.com/show_bug.cgi?id=742322

https://bugzilla.novell.com/show_bug.cgi?id=743608

插件详情

严重性: High

ID: 74767

文件名: openSUSE-2012-65.nasl

版本: 1.5

类型: local

代理: unix

发布时间: 2014/6/13

最近更新时间: 2021/1/19

支持的传感器: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

风险信息

VPR

风险因素: Critical

分数: 9.7

CVSS v2

风险因素: High

基本分数: 7.8

矢量: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

漏洞信息

CPE: p-cpe:/a:novell:opensuse:kernel-debug, p-cpe:/a:novell:opensuse:kernel-debug-base, p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debugsource, p-cpe:/a:novell:opensuse:kernel-debug-devel, p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:kernel-default-base, p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-debugsource, p-cpe:/a:novell:opensuse:kernel-default-devel, p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop, p-cpe:/a:novell:opensuse:kernel-desktop-base, p-cpe:/a:novell:opensuse:kernel-desktop-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop-debugsource, p-cpe:/a:novell:opensuse:kernel-desktop-devel, p-cpe:/a:novell:opensuse:kernel-desktop-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-devel, p-cpe:/a:novell:opensuse:kernel-ec2-extra-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae, p-cpe:/a:novell:opensuse:kernel-pae-base, p-cpe:/a:novell:opensuse:kernel-pae-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-debugsource, p-cpe:/a:novell:opensuse:kernel-pae-devel, p-cpe:/a:novell:opensuse:kernel-pae-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-source, p-cpe:/a:novell:opensuse:kernel-source-vanilla, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:kernel-trace, p-cpe:/a:novell:opensuse:kernel-trace-base, p-cpe:/a:novell:opensuse:kernel-trace-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-trace-debuginfo, p-cpe:/a:novell:opensuse:kernel-trace-debugsource, p-cpe:/a:novell:opensuse:kernel-trace-devel, p-cpe:/a:novell:opensuse:kernel-trace-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla, p-cpe:/a:novell:opensuse:kernel-vanilla-base, p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource, p-cpe:/a:novell:opensuse:kernel-vanilla-devel, p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen, p-cpe:/a:novell:opensuse:kernel-xen-base, p-cpe:/a:novell:opensuse:kernel-xen-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen-debugsource, p-cpe:/a:novell:opensuse:kernel-xen-devel, p-cpe:/a:novell:opensuse:kernel-xen-devel-debuginfo, cpe:/o:novell:opensuse:12.1, p-cpe:/a:novell:opensuse:kernel-ec2, p-cpe:/a:novell:opensuse:kernel-ec2-base, p-cpe:/a:novell:opensuse:kernel-ec2-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-debugsource, p-cpe:/a:novell:opensuse:kernel-ec2-devel, p-cpe:/a:novell:opensuse:kernel-ec2-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-extra

必需的 KB 项: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

可利用: true

易利用性: Exploits are available

补丁发布日期: 2012/1/27

可利用的方式

CANVAS (CANVAS)

Core Impact

参考资料信息

CVE: CVE-2011-2203, CVE-2011-4604, CVE-2012-0056, CVE-2012-0207