Fedora 29 xen security update addressing multiple flaws including grant table transfer issues, race with pass-through device hotplug, page_struct access violation, inconsistent PV IOMMU discipline, and insufficient TLB flushing
Source | Link |
---|---|
bodhi | www.bodhi.fedoraproject.org/updates/FEDORA-2019-3e89502cb1 |
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory FEDORA-2019-3e89502cb1.
#
include("compat.inc");
if (description)
{
script_id(122796);
script_version("1.2");
script_cvs_date("Date: 2019/09/23 11:21:10");
script_xref(name:"FEDORA", value:"2019-3e89502cb1");
script_name(english:"Fedora 29 : xen (2019-3e89502cb1)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"xen: various flaws (#1685577) grant table transfer issues on large
hosts [XSA-284] race with pass-through device hotplug [XSA-285] x86:
steal_page violates page_struct access discipline [XSA-287] x86:
Inconsistent PV IOMMU discipline [XSA-288] missing preemption in x86
PV page table unvalidation [XSA-290] x86/PV: page type reference
counting issue with failed IOMMU update [XSA-291] x86: insufficient
TLB flushing when using PCID [XSA-292] x86: PV kernel context switch
corruption [XSA-293] x86 shadow: Insufficient TLB flushing when using
PCID [XSA-294]
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bodhi.fedoraproject.org/updates/FEDORA-2019-3e89502cb1"
);
script_set_attribute(attribute:"solution", value:"Update the affected xen package.");
script_set_attribute(attribute:"risk_factor", value:"High");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:xen");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:29");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/03/12");
script_set_attribute(attribute:"patch_publication_date", value:"2019/03/12");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/03/13");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! preg(pattern:"^29([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 29", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC29", reference:"xen-4.11.1-4.fc29")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "xen");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo