Карточка уязвимости
Характеристики уязвимости
Уровень опасности
Оценка CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Производитель ПО
Наименование ПО
btrfs-kmp-default
(any)
btrfs-kmp-pae
(any)
btrfs-kmp-xen
(any)
cluster-network-kmp-default
(any)
cluster-network-kmp-pae
(any)
cluster-network-kmp-ppc64
(any)
cluster-network-kmp-xen
(any)
ext4dev-kmp-default
(any)
ext4dev-kmp-pae
(any)
ext4dev-kmp-ppc64
(any)
ext4dev-kmp-xen
(any)
gfs2-kmp-default
(any)
gfs2-kmp-pae
(any)
gfs2-kmp-ppc64
(any)
gfs2-kmp-xen
(any)
hyper-v-kmp-default
(any)
hyper-v-kmp-pae
(any)
kernel-default
(any)
kernel-default-base
(any)
kernel-default-devel
(any)
kernel-default-extra
(any)
kernel-default-man
(any)
kernel-desktop-devel
(any)
kernel-pae
(any)
kernel-pae-base
(any)
kernel-pae-devel
(any)
kernel-pae-extra
(any)
kernel-ppc64
(any)
kernel-ppc64-base
(any)
kernel-ppc64-devel
(any)
kernel-source
(any)
kernel-syms
(any)
kernel-trace
(any)
kernel-trace-base
(any)
kernel-trace-devel
(any)
kernel-xen
(any)
kernel-xen-base
(any)
kernel-xen-devel
(any)
kernel-xen-extra
(any)
Описание
Уведомление безопасности об уязвимостях SLE 11 SERVER Unsupported Extras, SUSE Linux Enterprise High Availability Extension 11 SP1, SUSE Linux Enterprise Desktop 11 SP1, SUSE Linux Enterprise Server 11 SP1
Как исправить
Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
SUSE Linux Enterprise High Availability Extension 11 SP1:
ppc64:
cluster-network-kmp-default - 1.4_2.6.32.23_0.3-2.3.20
cluster-network-kmp-ppc64 - 1.4_2.6.32.23_0.3-2.3.20
gfs2-kmp-default - 2_2.6.32.23_0.3-0.2.20
gfs2-kmp-ppc64 - 2_2.6.32.23_0.3-0.2.20
SUSE Linux Enterprise Desktop 11 SP1:
i586:
btrfs-kmp-default - 0_2.6.32.23_0.3-0.3.20
btrfs-kmp-pae - 0_2.6.32.23_0.3-0.3.20
btrfs-kmp-xen - 0_2.6.32.23_0.3-0.3.20
hyper-v-kmp-default - 0_2.6.32.23_0.3-0.7.15
hyper-v-kmp-pae - 0_2.6.32.23_0.3-0.7.15
kernel-default - 2.6.32.23-0.3.1
kernel-default-base - 2.6.32.23-0.3.1
kernel-default-devel - 2.6.32.23-0.3.1
kernel-default-extra - 2.6.32.23-0.3.1
kernel-desktop-devel - 2.6.32.23-0.3.1
kernel-pae - 2.6.32.23-0.3.1
kernel-pae-base - 2.6.32.23-0.3.1
kernel-pae-devel - 2.6.32.23-0.3.1
kernel-pae-extra - 2.6.32.23-0.3.1
kernel-source - 2.6.32.23-0.3.1
kernel-syms - 2.6.32.23-0.3.1
kernel-xen - 2.6.32.23-0.3.1
kernel-xen-base - 2.6.32.23-0.3.1
kernel-xen-devel - 2.6.32.23-0.3.1
kernel-xen-extra - 2.6.32.23-0.3.1
SUSE Linux Enterprise Server 11 SP1:
ppc64:
btrfs-kmp-default - 0_2.6.32.23_0.3-0.3.20
ext4dev-kmp-default - 0_2.6.32.23_0.3-7.3.20
ext4dev-kmp-ppc64 - 0_2.6.32.23_0.3-7.3.20
kernel-default - 2.6.32.23-0.3.1
kernel-default-base - 2.6.32.23-0.3.1
kernel-default-devel - 2.6.32.23-0.3.1
kernel-ppc64 - 2.6.32.23-0.3.1
kernel-ppc64-base - 2.6.32.23-0.3.1
kernel-ppc64-devel - 2.6.32.23-0.3.1
kernel-source - 2.6.32.23-0.3.1
kernel-syms - 2.6.32.23-0.3.1
kernel-trace - 2.6.32.23-0.3.1
kernel-trace-base - 2.6.32.23-0.3.1
kernel-trace-devel - 2.6.32.23-0.3.1
SUSE Linux Enterprise Server 11 SP1 for VMware:
i586:
btrfs-kmp-default - 0_2.6.32.23_0.3-0.3.20
btrfs-kmp-pae - 0_2.6.32.23_0.3-0.3.20
ext4dev-kmp-default - 0_2.6.32.23_0.3-7.3.20
ext4dev-kmp-pae - 0_2.6.32.23_0.3-7.3.20
hyper-v-kmp-default - 0_2.6.32.23_0.3-0.7.15
hyper-v-kmp-pae - 0_2.6.32.23_0.3-0.7.15
kernel-default - 2.6.32.23-0.3.1
kernel-default-base - 2.6.32.23-0.3.1
kernel-default-devel - 2.6.32.23-0.3.1
kernel-pae - 2.6.32.23-0.3.1
kernel-pae-base - 2.6.32.23-0.3.1
kernel-pae-devel - 2.6.32.23-0.3.1
kernel-source - 2.6.32.23-0.3.1
kernel-syms - 2.6.32.23-0.3.1
kernel-trace - 2.6.32.23-0.3.1
kernel-trace-base - 2.6.32.23-0.3.1
kernel-trace-devel - 2.6.32.23-0.3.1
SUSE Linux Enterprise High Availability Extension 11 SP1:
ppc64:
cluster-network-kmp-default - 1.4_2.6.32.23_0.3-2.3.20
cluster-network-kmp-ppc64 - 1.4_2.6.32.23_0.3-2.3.20
gfs2-kmp-default - 2_2.6.32.23_0.3-0.2.20
gfs2-kmp-ppc64 - 2_2.6.32.23_0.3-0.2.20
SUSE Linux Enterprise Desktop 11 SP1:
i586:
btrfs-kmp-default - 0_2.6.32.23_0.3-0.3.20
btrfs-kmp-pae - 0_2.6.32.23_0.3-0.3.20
btrfs-kmp-xen - 0_2.6.32.23_0.3-0.3.20
hyper-v-kmp-default - 0_2.6.32.23_0.3-0.7.15
hyper-v-kmp-pae - 0_2.6.32.23_0.3-0.7.15
kernel-default - 2.6.32.23-0.3.1
kernel-default-base - 2.6.32.23-0.3.1
kernel-default-devel - 2.6.32.23-0.3.1
kernel-default-extra - 2.6.32.23-0.3.1
kernel-desktop-devel - 2.6.32.23-0.3.1
kernel-pae - 2.6.32.23-0.3.1
kernel-pae-base - 2.6.32.23-0.3.1
kernel-pae-devel - 2.6.32.23-0.3.1
kernel-pae-extra - 2.6.32.23-0.3.1
kernel-source - 2.6.32.23-0.3.1
kernel-syms - 2.6.32.23-0.3.1
kernel-xen - 2.6.32.23-0.3.1
kernel-xen-base - 2.6.32.23-0.3.1
kernel-xen-devel - 2.6.32.23-0.3.1
kernel-xen-extra - 2.6.32.23-0.3.1
SUSE Linux Enterprise Server 11 SP1:
ppc64:
btrfs-kmp-default - 0_2.6.32.23_0.3-0.3.20
ext4dev-kmp-default - 0_2.6.32.23_0.3-7.3.20
ext4dev-kmp-ppc64 - 0_2.6.32.23_0.3-7.3.20
kernel-default - 2.6.32.23-0.3.1
kernel-default-base - 2.6.32.23-0.3.1
kernel-default-devel - 2.6.32.23-0.3.1
kernel-ppc64 - 2.6.32.23-0.3.1
kernel-ppc64-base - 2.6.32.23-0.3.1
kernel-ppc64-devel - 2.6.32.23-0.3.1
kernel-source - 2.6.32.23-0.3.1
kernel-syms - 2.6.32.23-0.3.1
kernel-trace - 2.6.32.23-0.3.1
kernel-trace-base - 2.6.32.23-0.3.1
kernel-trace-devel - 2.6.32.23-0.3.1
SUSE Linux Enterprise Server 11 SP1 for VMware:
i586:
btrfs-kmp-default - 0_2.6.32.23_0.3-0.3.20
btrfs-kmp-pae - 0_2.6.32.23_0.3-0.3.20
ext4dev-kmp-default - 0_2.6.32.23_0.3-7.3.20
ext4dev-kmp-pae - 0_2.6.32.23_0.3-7.3.20
hyper-v-kmp-default - 0_2.6.32.23_0.3-0.7.15
hyper-v-kmp-pae - 0_2.6.32.23_0.3-0.7.15
kernel-default - 2.6.32.23-0.3.1
kernel-default-base - 2.6.32.23-0.3.1
kernel-default-devel - 2.6.32.23-0.3.1
kernel-pae - 2.6.32.23-0.3.1
kernel-pae-base - 2.6.32.23-0.3.1
kernel-pae-devel - 2.6.32.23-0.3.1
kernel-source - 2.6.32.23-0.3.1
kernel-syms - 2.6.32.23-0.3.1
kernel-trace - 2.6.32.23-0.3.1
kernel-trace-base - 2.6.32.23-0.3.1
kernel-trace-devel - 2.6.32.23-0.3.1
Ссылки
https://www.suse.com/support/security/advisories/2010_50_kernal.html
Источник: CVE
Наименование: CVE-2010-3298
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3298
Источник: CVE
Наименование: CVE-2010-3078
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3078
Источник: CVE
Наименование: CVE-2010-3079
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3079
Источник: CVE
Наименование: CVE-2010-3081
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081
Источник: CVE
Наименование: CVE-2010-3080
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3080
Источник: CVE
Наименование: CVE-2010-3310
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310
Источник: CVE
Наименование: CVE-2010-2954
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954
Источник: CVE
Наименование: CVE-2010-3297
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297
Источник: CVE
Наименование: CVE-2010-2960
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2960
Источник: CVE
Наименование: CVE-2010-3296
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3296
Источник: CVE
Наименование: CVE-2010-2962
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2962
Источник: CVE
Наименование: CVE-2010-3298
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3298
Источник: CVE
Наименование: CVE-2010-3078
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3078
Источник: CVE
Наименование: CVE-2010-3079
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3079
Источник: CVE
Наименование: CVE-2010-3081
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081
Источник: CVE
Наименование: CVE-2010-3080
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3080
Источник: CVE
Наименование: CVE-2010-3310
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310
Источник: CVE
Наименование: CVE-2010-2954
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954
Источник: CVE
Наименование: CVE-2010-3297
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297
Источник: CVE
Наименование: CVE-2010-2960
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2960
Источник: CVE
Наименование: CVE-2010-3296
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3296
Источник: CVE
Наименование: CVE-2010-2962
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2962