MDVA-2011:057 : rpm

2011-10-12T00:00:00
ID MANDRIVA_MDVA-2011-057.NASL
Type nessus
Reporter Tenable
Modified 2018-07-19T00:00:00

Description

It was discovered the xz v5.0.0 (lzma) changes in MDVSA-2011:143 were incomplete. This advisory upgrades the xz package to the 5.0.3 version and the spec-helper package to the 0.30.5 version to be able to handle lzma files.

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490

                                        
                                            #%NASL_MIN_LEVEL 70103

#%NASL_MIN_LEVEL 99999
# @DEPRECATED@
#
# This script has been deprecated as the associated patch is not
# currently a security fix.
#
# Disabled on 2012/09/06.
#

#
# (C) Tenable Network Security, Inc.
#
# This script was automatically generated from
# Mandriva Linux Security Advisory MDVA-2011:057.
#

if (!defined_func("bn_random")) exit(0);

include("compat.inc");

if (description)
{
  script_id(56461);
  script_version("1.4");
  script_cvs_date("Date: 2018/07/19 20:59:17");

  script_name(english:"MDVA-2011:057 : rpm");
  script_summary(english:"Checks for patch(es) in 'rpm -qa' output");

  script_set_attribute(attribute:"synopsis", value: 
"The remote Mandriva host is missing one or more security-related
patches.");
  script_set_attribute(attribute:"description", value:
"It was discovered the xz v5.0.0 (lzma) changes in MDVSA-2011:143 were
incomplete. This advisory upgrades the xz package to the 5.0.3
version and the spec-helper package to the 0.30.5 version to be able
to handle lzma files.

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490");
  script_set_attribute(attribute:"see_also", value:"http://www.mandriva.com/security/advisories?name=MDVA-2011:057");
  script_set_attribute(attribute:"solution", value:"Update the affected package(s).");
  script_set_attribute(attribute:"risk_factor", value:"High");
  script_set_attribute(attribute:"patch_publication_date", value:"2011/10/11");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux");
  script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"plugin_publication_date", value:"2011/10/12");
  script_end_attributes();
 
  script_category(ACT_GATHER_INFO);
  script_family(english:"Mandriva Local Security Checks");
 
  script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/Mandrake/release", "Host/Mandrake/rpm-list");

  exit(0);
}

# Deprecated.
exit(0, "The associated patch is not currently a security fix.");


include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
if (!get_kb_item("Host/Mandrake/release")) exit(0, "The host is not running Mandrake Linux.");
if (!get_kb_item("Host/Mandrake/rpm-list")) exit(1, "Could not get the list of packages.");

flag = 0;

if (rpm_check(reference:"liblzma5-5.0.3-0.1mdv2009.0", release:"MDK2009.0", cpu:"i386", yank:"mdv")) flag++;
if (rpm_check(reference:"liblzma-devel-5.0.3-0.1mdv2009.0", release:"MDK2009.0", cpu:"i386", yank:"mdv")) flag++;
if (rpm_check(reference:"libpopt0-1.10.8-32.5mdv2009.0", release:"MDK2009.0", cpu:"i386", yank:"mdv")) flag++;
if (rpm_check(reference:"libpopt-devel-1.10.8-32.5mdv2009.0", release:"MDK2009.0", cpu:"i386", yank:"mdv")) flag++;
if (rpm_check(reference:"librpm4.4-4.4.2.3-20.5mnb2", release:"MDK2009.0", cpu:"i386", yank:"mdk")) flag++;
if (rpm_check(reference:"librpm-devel-4.4.2.3-20.5mnb2", release:"MDK2009.0", cpu:"i386", yank:"mdk")) flag++;
if (rpm_check(reference:"popt-data-1.10.8-32.5mdv2009.0", release:"MDK2009.0", cpu:"i386", yank:"mdv")) flag++;
if (rpm_check(reference:"python-rpm-4.4.2.3-20.5mnb2", release:"MDK2009.0", cpu:"i386", yank:"mdk")) flag++;
if (rpm_check(reference:"rpm-4.4.2.3-20.5mnb2", release:"MDK2009.0", cpu:"i386", yank:"mdk")) flag++;
if (rpm_check(reference:"rpm-build-4.4.2.3-20.5mnb2", release:"MDK2009.0", cpu:"i386", yank:"mdk")) flag++;
if (rpm_check(reference:"xz-5.0.3-0.1mdv2009.0", release:"MDK2009.0", cpu:"i386", yank:"mdv")) flag++;

if (rpm_check(reference:"spec-helper-0.30.5-0.1mdv2009.0", release:"MDK2009.0", cpu:"noarch", yank:"mdv")) flag++;
if (rpm_check(reference:"spec-helper-0.30.5-0.1mdv2009.0", release:"MDK2009.0", cpu:"noarch", yank:"mdv")) flag++;

if (rpm_check(reference:"lib64lzma5-5.0.3-0.1mdv2009.0", release:"MDK2009.0", cpu:"x86_64", yank:"mdv")) flag++;
if (rpm_check(reference:"lib64lzma-devel-5.0.3-0.1mdv2009.0", release:"MDK2009.0", cpu:"x86_64", yank:"mdv")) flag++;
if (rpm_check(reference:"lib64popt0-1.10.8-32.5mdv2009.0", release:"MDK2009.0", cpu:"x86_64", yank:"mdv")) flag++;
if (rpm_check(reference:"lib64popt-devel-1.10.8-32.5mdv2009.0", release:"MDK2009.0", cpu:"x86_64", yank:"mdv")) flag++;
if (rpm_check(reference:"lib64rpm4.4-4.4.2.3-20.5mnb2", release:"MDK2009.0", cpu:"x86_64", yank:"mdk")) flag++;
if (rpm_check(reference:"lib64rpm-devel-4.4.2.3-20.5mnb2", release:"MDK2009.0", cpu:"x86_64", yank:"mdk")) flag++;
if (rpm_check(reference:"popt-data-1.10.8-32.5mdv2009.0", release:"MDK2009.0", cpu:"x86_64", yank:"mdv")) flag++;
if (rpm_check(reference:"python-rpm-4.4.2.3-20.5mnb2", release:"MDK2009.0", cpu:"x86_64", yank:"mdk")) flag++;
if (rpm_check(reference:"rpm-4.4.2.3-20.5mnb2", release:"MDK2009.0", cpu:"x86_64", yank:"mdk")) flag++;
if (rpm_check(reference:"rpm-build-4.4.2.3-20.5mnb2", release:"MDK2009.0", cpu:"x86_64", yank:"mdk")) flag++;
if (rpm_check(reference:"xz-5.0.3-0.1mdv2009.0", release:"MDK2009.0", cpu:"x86_64", yank:"mdv")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else 
{
  exit(0, "The host is not affected.");
}