openSUSE 安全更新:kernel (openSUSE-SU-2010:0902-1)

high Nessus 插件 ID 75552

简介

远程 openSUSE 主机缺少安全更新。

描述

openSUSE 11.3 Linux 内核的此更新修复了两个危急安全问题和一些缺陷。

修复了以下安全问题:CVE-2010-3904:本地攻击者可通过 RDS 套接字中的本地权限升级获取权限。

CVE-2010-2963:在 video4linux 中进行处理的 compat ioctl 中的问题允许本地攻击者利用插入的视频设备获取 x86_64 系统上的权限。

解决方案

更新受影响的 kernel 程序包。

另见

https://bugzilla.novell.com/show_bug.cgi?id=564324

https://bugzilla.novell.com/show_bug.cgi?id=573330

https://bugzilla.novell.com/show_bug.cgi?id=643477

https://bugzilla.novell.com/show_bug.cgi?id=645066

https://bugzilla.novell.com/show_bug.cgi?id=646045

https://bugzilla.novell.com/show_bug.cgi?id=647392

https://lists.opensuse.org/opensuse-updates/2010-10/msg00033.html

插件详情

严重性: High

ID: 75552

文件名: suse_11_3_kernel-101026.nasl

版本: 1.7

类型: local

代理: unix

发布时间: 2014/6/13

最近更新时间: 2023/5/14

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

风险信息

VPR

风险因素: High

分数: 8.9

CVSS v2

风险因素: High

基本分数: 7.2

矢量: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

漏洞信息

CPE: p-cpe:/a:novell:opensuse:kernel-debug, p-cpe:/a:novell:opensuse:kernel-debug-base, p-cpe:/a:novell:opensuse:kernel-debug-devel, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:kernel-default-base, p-cpe:/a:novell:opensuse:kernel-default-devel, p-cpe:/a:novell:opensuse:kernel-desktop, p-cpe:/a:novell:opensuse:kernel-desktop-base, p-cpe:/a:novell:opensuse:kernel-desktop-devel, p-cpe:/a:novell:opensuse:kernel-devel, p-cpe:/a:novell:opensuse:kernel-ec2, p-cpe:/a:novell:opensuse:kernel-ec2-base, p-cpe:/a:novell:opensuse:kernel-ec2-devel, p-cpe:/a:novell:opensuse:kernel-ec2-extra, p-cpe:/a:novell:opensuse:kernel-pae, p-cpe:/a:novell:opensuse:kernel-pae-base, p-cpe:/a:novell:opensuse:kernel-pae-devel, p-cpe:/a:novell:opensuse:kernel-source, p-cpe:/a:novell:opensuse:kernel-source-vanilla, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:kernel-trace, p-cpe:/a:novell:opensuse:kernel-trace-base, p-cpe:/a:novell:opensuse:kernel-trace-devel, p-cpe:/a:novell:opensuse:kernel-vanilla, p-cpe:/a:novell:opensuse:kernel-vanilla-base, p-cpe:/a:novell:opensuse:kernel-vanilla-devel, p-cpe:/a:novell:opensuse:kernel-vmi, p-cpe:/a:novell:opensuse:kernel-vmi-base, p-cpe:/a:novell:opensuse:kernel-vmi-devel, p-cpe:/a:novell:opensuse:kernel-xen, p-cpe:/a:novell:opensuse:kernel-xen-base, p-cpe:/a:novell:opensuse:kernel-xen-devel, p-cpe:/a:novell:opensuse:preload-kmp-default, p-cpe:/a:novell:opensuse:preload-kmp-desktop, cpe:/o:novell:opensuse:11.3

必需的 KB 项: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

可利用: true

易利用性: Exploits are available

补丁发布日期: 2010/10/26

CISA 已知可遭利用的漏洞到期日期: 2023/6/2

可利用的方式

CANVAS (CANVAS)

Core Impact

Metasploit (Reliable Datagram Sockets (RDS) Privilege Escalation)

参考资料信息

CVE: CVE-2010-2963, CVE-2010-3904