The SUSE Linux Enterprise 11 Service Pack 1 kernel has been updated to version 2.6.32.49 and fixes various bugs and security issues.
The TCP/IP initial sequence number generation effectively only used 24 bits of 32 to generate randomness, making a brute-force man-in-the-middle attack on TCP/IP connections feasible. The generator was changed to use full 32bit randomness. (CVE-2011-3188)
Fernando Gont discovered that the IPv6 stack used predictable fragment identification numbers. A remote attacker could exploit this to exhaust network resources, leading to a denial of service.
(CVE-2011-2699)
A NULL ptr dereference on mounting corrupt hfs filesystems was fixed which could be used by local attackers to crash the kernel. (CVE-2011-2203)
Added a kernel option to ensure ecryptfs is mounting only on paths belonging to the current ui, which would have allowed local attackers to potentially gain privileges via symlink attacks. (CVE-2011-1833)
The Generic Receive Offload (GRO) implementation in the Linux kernel allowed remote attackers to cause a denial of service via crafted VLAN packets that are processed by the napi_reuse_skb function, leading to (1) a memory leak or (2) memory corruption, a different vulnerability than CVE-2011-1478. (CVE-2011-1576)
A name overflow in the hfs filesystem was fixed, where mounting a corrupted hfs filesystem could lead to a stack overflow and code execution in the kernel. This requires a local attacker to be able to mount hfs filesystems. (CVE-2011-4330)
A bug was found in the way headroom check was performed in udp6_ufo_fragment() function. A remote attacker could use this flaw to crash the system. (CVE-2011-4326)
The following non-security bugs have been fixed :
ALSA: hda - Fix S3/S4 problem on machines with VREF-pin mute-LED. (bnc#732535)
patches.xen/xen-pcpu-hotplug: Fix a double kfree().
ixgbe: fix bug with vlan strip in promsic mode (bnc#687049, fate#311821).
ixgbe: fix panic when shutting down system with WoL enabled.
fnic: Allow users to modify dev_loss_tmo setting.
(bnc#719786)
x86, intel: Do not mark sched_clock() as stable.
(bnc#725709)
ALSA: hda - Keep vref-LED during power-saving on IDT codecs. (bnc#731981)
cifs: Assume passwords are encoded according to iocharset. (bnc#731035)
scsi_dh: Check queuedata pointer before proceeding.
(bnc#714744)
netback: use correct index for invalidation in netbk_tx_check_mop().
ACPI video: introduce module parameter video.use_bios_initial_backlight. (bnc#731229)
SUNRPC: prevent task_cleanup running on freed xprt.
(bnc#709671)
add device entry for Broadcom Valentine combo card.
(bnc#722429)
quota: Fix WARN_ON in lookup_one_len. (bnc#728626)
Update Xen patches to 2.6.32.48.
pv-on-hvm/kexec: add xs_reset_watches to shutdown watches from old kernel. (bnc#694863)
x86: undo_limit_pages() must reset page count.
mm/vmstat.c: cache align vm_stat. (bnc#729721)
s390/ccwgroup: fix uevent vs dev attrs race (bnc#659101,LTC#69028).
Warn on pagecache limit usage (FATE309111).
SCSI: st: fix race in st_scsi_execute_end. (bnc#720536)
ACPI: introduce ‘acpi_rsdp=’ parameter for kdump.
(bnc#717263)
elousb: Limit the workaround warning to one per error, control workaround activity. (bnc#719916)
SCSI: libiscsi: reset cmd timer if cmds are making progress. (bnc#691440)
SCSI: fix crash in scsi_dispatch_cmd(). (bnc#724989)
NFS/sunrpc: do not use a credential with extra groups.
(bnc#725878)
s390/qdio: EQBS retry after CCQ 96 (bnc#725453,LTC#76117).
fcoe: Reduce max_sectors to 1024. (bnc#695898)
apparmor: return -ENOENT when there is no profile for a hat. (bnc#725502)
sched, cgroups: disallow attaching kthreadd.
(bnc#721840)
nfs: Check validity of cl_rpcclient in nfs_server_list_show. (bnc#717884)
x86, vt-d: enable x2apic opt out (disabling x2apic through BIOS flag) (bnc#701183, fate#311989).
block: Free queue resources at blk_release_queue().
(bnc#723815)
ALSA: hda - Add post_suspend patch ops. (bnc#724800)
ALSA: hda - Allow codec-specific set_power_state ops.
(bnc#724800)
ALSA: hda - Add support for vref-out based mute LED control on IDT codecs. (bnc#724800)
scsi_dh_rdac : Add definitions for different RDAC operating modes. (bnc#724365)
scsi_dh_rdac : Detect the different RDAC operating modes. (bnc#724365)
scsi_dh_rdac : decide whether to send mode select based on operating mode. (bnc#724365)
scsi_dh_rdac: Use WWID from C8 page instead of Subsystem id from C4 page to identify storage. (bnc#724365)
vlan: Match underlying dev carrier on vlan add.
(bnc#722504)
scsi_lib: pause between error retries. (bnc#675127)
xfs: use KM_NOFS for allocations during attribute list operations. (bnc#721830)
bootsplash: Do not crash when no fb is set. (bnc#723542)
cifs: do not allow cifs_iget to match inodes of the wrong type. (bnc#711501)
cifs: fix noserverino handling when 1 extensions are enabled. (bnc#711501)
cifs: reduce false positives with inode aliasing serverino autodisable. (bnc#711501)
parport_pc: release IO region properly if unsupported ITE887x card is found. (bnc#721464)
writeback: avoid unnecessary calculation of bdi dirty thresholds. (bnc#721299)
1: Fix bogus it_blocksize in VIO iommu code.
(bnc#717690)
ext4: Fix max file size and logical block counting of extent format file. (bnc#706374)
novfs: Unable to change password in the Novell Client for Linux. (bnc#713229)
xfs: add more ilock tracing.
sched: move wakeup tracepoint above out_running.
(bnc#712002)
config.conf: Build KMPs for the -trace flavor as well (fate#312759, bnc#712404, bnc#712405, bnc#721337).
memsw: remove noswapaccount kernel parameter.
(bnc#719450)
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SuSE 11 update information. The text itself is
# copyright (C) Novell, Inc.
#
if (NASL_LEVEL < 3000) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(57297);
script_version("1.10");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2011-1478", "CVE-2011-1576", "CVE-2011-1833", "CVE-2011-2203", "CVE-2011-2699", "CVE-2011-3188", "CVE-2011-4326", "CVE-2011-4330");
script_name(english:"SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 5493 / 5510 / 5511)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote SuSE 11 host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"The SUSE Linux Enterprise 11 Service Pack 1 kernel has been updated to
version 2.6.32.49 and fixes various bugs and security issues.
- The TCP/IP initial sequence number generation
effectively only used 24 bits of 32 to generate
randomness, making a brute-force man-in-the-middle
attack on TCP/IP connections feasible. The generator was
changed to use full 32bit randomness. (CVE-2011-3188)
- Fernando Gont discovered that the IPv6 stack used
predictable fragment identification numbers. A remote
attacker could exploit this to exhaust network
resources, leading to a denial of service.
(CVE-2011-2699)
- A NULL ptr dereference on mounting corrupt hfs
filesystems was fixed which could be used by local
attackers to crash the kernel. (CVE-2011-2203)
- Added a kernel option to ensure ecryptfs is mounting
only on paths belonging to the current ui, which would
have allowed local attackers to potentially gain
privileges via symlink attacks. (CVE-2011-1833)
- The Generic Receive Offload (GRO) implementation in the
Linux kernel allowed remote attackers to cause a denial
of service via crafted VLAN packets that are processed
by the napi_reuse_skb function, leading to (1) a memory
leak or (2) memory corruption, a different vulnerability
than CVE-2011-1478. (CVE-2011-1576)
- A name overflow in the hfs filesystem was fixed, where
mounting a corrupted hfs filesystem could lead to a
stack overflow and code execution in the kernel. This
requires a local attacker to be able to mount hfs
filesystems. (CVE-2011-4330)
- A bug was found in the way headroom check was performed
in udp6_ufo_fragment() function. A remote attacker could
use this flaw to crash the system. (CVE-2011-4326)
The following non-security bugs have been fixed :
- ALSA: hda - Fix S3/S4 problem on machines with VREF-pin
mute-LED. (bnc#732535)
- patches.xen/xen-pcpu-hotplug: Fix a double kfree().
- ixgbe: fix bug with vlan strip in promsic mode
(bnc#687049, fate#311821).
- ixgbe: fix panic when shutting down system with WoL
enabled.
- fnic: Allow users to modify dev_loss_tmo setting.
(bnc#719786)
- x86, intel: Do not mark sched_clock() as stable.
(bnc#725709)
- ALSA: hda - Keep vref-LED during power-saving on IDT
codecs. (bnc#731981)
- cifs: Assume passwords are encoded according to
iocharset. (bnc#731035)
- scsi_dh: Check queuedata pointer before proceeding.
(bnc#714744)
- netback: use correct index for invalidation in
netbk_tx_check_mop().
- ACPI video: introduce module parameter
video.use_bios_initial_backlight. (bnc#731229)
- SUNRPC: prevent task_cleanup running on freed xprt.
(bnc#709671)
- add device entry for Broadcom Valentine combo card.
(bnc#722429)
- quota: Fix WARN_ON in lookup_one_len. (bnc#728626)
- Update Xen patches to 2.6.32.48.
- pv-on-hvm/kexec: add xs_reset_watches to shutdown
watches from old kernel. (bnc#694863)
- x86: undo_limit_pages() must reset page count.
- mm/vmstat.c: cache align vm_stat. (bnc#729721)
- s390/ccwgroup: fix uevent vs dev attrs race
(bnc#659101,LTC#69028).
- Warn on pagecache limit usage (FATE309111).
- SCSI: st: fix race in st_scsi_execute_end. (bnc#720536)
- ACPI: introduce 'acpi_rsdp=' parameter for kdump.
(bnc#717263)
- elousb: Limit the workaround warning to one per error,
control workaround activity. (bnc#719916)
- SCSI: libiscsi: reset cmd timer if cmds are making
progress. (bnc#691440)
- SCSI: fix crash in scsi_dispatch_cmd(). (bnc#724989)
- NFS/sunrpc: do not use a credential with extra groups.
(bnc#725878)
- s390/qdio: EQBS retry after CCQ 96
(bnc#725453,LTC#76117).
- fcoe: Reduce max_sectors to 1024. (bnc#695898)
- apparmor: return -ENOENT when there is no profile for a
hat. (bnc#725502)
- sched, cgroups: disallow attaching kthreadd.
(bnc#721840)
- nfs: Check validity of cl_rpcclient in
nfs_server_list_show. (bnc#717884)
- x86, vt-d: enable x2apic opt out (disabling x2apic
through BIOS flag) (bnc#701183, fate#311989).
- block: Free queue resources at blk_release_queue().
(bnc#723815)
- ALSA: hda - Add post_suspend patch ops. (bnc#724800)
- ALSA: hda - Allow codec-specific set_power_state ops.
(bnc#724800)
- ALSA: hda - Add support for vref-out based mute LED
control on IDT codecs. (bnc#724800)
- scsi_dh_rdac : Add definitions for different RDAC
operating modes. (bnc#724365)
- scsi_dh_rdac : Detect the different RDAC operating
modes. (bnc#724365)
- scsi_dh_rdac : decide whether to send mode select based
on operating mode. (bnc#724365)
- scsi_dh_rdac: Use WWID from C8 page instead of Subsystem
id from C4 page to identify storage. (bnc#724365)
- vlan: Match underlying dev carrier on vlan add.
(bnc#722504)
- scsi_lib: pause between error retries. (bnc#675127)
- xfs: use KM_NOFS for allocations during attribute list
operations. (bnc#721830)
- bootsplash: Do not crash when no fb is set. (bnc#723542)
- cifs: do not allow cifs_iget to match inodes of the
wrong type. (bnc#711501)
- cifs: fix noserverino handling when 1 extensions are
enabled. (bnc#711501)
- cifs: reduce false positives with inode aliasing
serverino autodisable. (bnc#711501)
- parport_pc: release IO region properly if unsupported
ITE887x card is found. (bnc#721464)
- writeback: avoid unnecessary calculation of bdi dirty
thresholds. (bnc#721299)
- 1: Fix bogus it_blocksize in VIO iommu code.
(bnc#717690)
- ext4: Fix max file size and logical block counting of
extent format file. (bnc#706374)
- novfs: Unable to change password in the Novell Client
for Linux. (bnc#713229)
- xfs: add more ilock tracing.
- sched: move wakeup tracepoint above out_running.
(bnc#712002)
- config.conf: Build KMPs for the -trace flavor as well
(fate#312759, bnc#712404, bnc#712405, bnc#721337).
- memsw: remove noswapaccount kernel parameter.
(bnc#719450)"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=659101"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=675127"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=687049"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=691440"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=694863"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=695898"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=698450"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=699709"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=701183"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=702013"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=706374"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=707288"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=709671"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=711501"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=711539"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=712002"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=712404"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=712405"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=713229"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=713650"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=714744"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=717263"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=717690"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=717884"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=719450"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=719786"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=719916"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=720536"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=721299"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=721337"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=721464"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=721830"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=721840"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=722429"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=722504"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=723542"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=723815"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=724365"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=724800"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=724989"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=725453"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=725502"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=725709"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=725878"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=728626"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=729111"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=729721"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=731035"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=731229"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=731673"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=731981"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=732021"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=732535"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1478.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1576.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1833.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-2203.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-2699.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-3188.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-4326.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-4330.html"
);
script_set_attribute(
attribute:"solution",
value:"Apply SAT patch number 5493 / 5510 / 5511 as appropriate."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:btrfs-kmp-pae");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-pae");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-trace");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-pae");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-trace");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-default-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-default-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-default-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-default-man");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-ec2");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-ec2-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-pae");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-pae-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-pae-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-pae-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-source");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-syms");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-trace");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-trace-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-trace-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-xen");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-xen-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-xen-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-xen-extra");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
script_set_attribute(attribute:"patch_publication_date", value:"2011/12/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/12/14");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11");
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu);
pl = get_kb_item("Host/SuSE/patchlevel");
if (isnull(pl) || int(pl) != 1) audit(AUDIT_OS_NOT, "SuSE 11.1");
flag = 0;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"btrfs-kmp-default-0_2.6.32.49_0.3-0.3.66")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"btrfs-kmp-pae-0_2.6.32.49_0.3-0.3.66")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"btrfs-kmp-xen-0_2.6.32.49_0.3-0.3.66")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"hyper-v-kmp-default-0_2.6.32.49_0.3-0.14.17")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"hyper-v-kmp-pae-0_2.6.32.49_0.3-0.14.17")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-default-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-default-base-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-default-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-default-extra-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-desktop-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-pae-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-pae-base-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-pae-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-pae-extra-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-source-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-syms-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-trace-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-xen-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-xen-base-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-xen-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-xen-extra-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"btrfs-kmp-default-0_2.6.32.49_0.3-0.3.66")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"btrfs-kmp-xen-0_2.6.32.49_0.3-0.3.66")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"hyper-v-kmp-default-0_2.6.32.49_0.3-0.14.17")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-default-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-default-base-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-default-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-default-extra-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-desktop-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-source-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-syms-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-trace-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-xen-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-xen-base-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-xen-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-xen-extra-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"btrfs-kmp-default-0_2.6.32.49_0.3-0.3.66")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"ext4dev-kmp-default-0_2.6.32.49_0.3-7.9.33")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"ext4dev-kmp-trace-0_2.6.32.49_0.3-7.9.33")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-default-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-default-base-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-default-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-source-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-syms-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-trace-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-trace-base-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-trace-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"btrfs-kmp-pae-0_2.6.32.49_0.3-0.3.66")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"btrfs-kmp-xen-0_2.6.32.49_0.3-0.3.66")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"ext4dev-kmp-pae-0_2.6.32.49_0.3-7.9.33")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"ext4dev-kmp-xen-0_2.6.32.49_0.3-7.9.33")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"hyper-v-kmp-default-0_2.6.32.49_0.3-0.14.17")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"hyper-v-kmp-pae-0_2.6.32.49_0.3-0.14.17")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"hyper-v-kmp-trace-0_2.6.32.49_0.3-0.18.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-ec2-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-ec2-base-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-pae-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-pae-base-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-pae-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-xen-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-xen-base-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-xen-devel-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"s390x", reference:"kernel-default-man-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"btrfs-kmp-xen-0_2.6.32.49_0.3-0.3.66")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"ext4dev-kmp-xen-0_2.6.32.49_0.3-7.9.33")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"hyper-v-kmp-default-0_2.6.32.49_0.3-0.14.17")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"hyper-v-kmp-trace-0_2.6.32.49_0.3-0.18.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"kernel-ec2-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"kernel-ec2-base-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"kernel-xen-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"kernel-xen-base-2.6.32.49-0.3.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"kernel-xen-devel-2.6.32.49-0.3.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1478
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1576
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1833
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2699
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3188
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4326
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4330
support.novell.com/security/cve/CVE-2011-1478.html
support.novell.com/security/cve/CVE-2011-1576.html
support.novell.com/security/cve/CVE-2011-1833.html
support.novell.com/security/cve/CVE-2011-2203.html
support.novell.com/security/cve/CVE-2011-2699.html
support.novell.com/security/cve/CVE-2011-3188.html
support.novell.com/security/cve/CVE-2011-4326.html
support.novell.com/security/cve/CVE-2011-4330.html
bugzilla.novell.com/show_bug.cgi?id=659101
bugzilla.novell.com/show_bug.cgi?id=675127
bugzilla.novell.com/show_bug.cgi?id=687049
bugzilla.novell.com/show_bug.cgi?id=691440
bugzilla.novell.com/show_bug.cgi?id=694863
bugzilla.novell.com/show_bug.cgi?id=695898
bugzilla.novell.com/show_bug.cgi?id=698450
bugzilla.novell.com/show_bug.cgi?id=699709
bugzilla.novell.com/show_bug.cgi?id=701183
bugzilla.novell.com/show_bug.cgi?id=702013
bugzilla.novell.com/show_bug.cgi?id=706374
bugzilla.novell.com/show_bug.cgi?id=707288
bugzilla.novell.com/show_bug.cgi?id=709671
bugzilla.novell.com/show_bug.cgi?id=711501
bugzilla.novell.com/show_bug.cgi?id=711539
bugzilla.novell.com/show_bug.cgi?id=712002
bugzilla.novell.com/show_bug.cgi?id=712404
bugzilla.novell.com/show_bug.cgi?id=712405
bugzilla.novell.com/show_bug.cgi?id=713229
bugzilla.novell.com/show_bug.cgi?id=713650
bugzilla.novell.com/show_bug.cgi?id=714744
bugzilla.novell.com/show_bug.cgi?id=717263
bugzilla.novell.com/show_bug.cgi?id=717690
bugzilla.novell.com/show_bug.cgi?id=717884
bugzilla.novell.com/show_bug.cgi?id=719450
bugzilla.novell.com/show_bug.cgi?id=719786
bugzilla.novell.com/show_bug.cgi?id=719916
bugzilla.novell.com/show_bug.cgi?id=720536
bugzilla.novell.com/show_bug.cgi?id=721299
bugzilla.novell.com/show_bug.cgi?id=721337
bugzilla.novell.com/show_bug.cgi?id=721464
bugzilla.novell.com/show_bug.cgi?id=721830
bugzilla.novell.com/show_bug.cgi?id=721840
bugzilla.novell.com/show_bug.cgi?id=722429
bugzilla.novell.com/show_bug.cgi?id=722504
bugzilla.novell.com/show_bug.cgi?id=723542
bugzilla.novell.com/show_bug.cgi?id=723815
bugzilla.novell.com/show_bug.cgi?id=724365
bugzilla.novell.com/show_bug.cgi?id=724800
bugzilla.novell.com/show_bug.cgi?id=724989
bugzilla.novell.com/show_bug.cgi?id=725453
bugzilla.novell.com/show_bug.cgi?id=725502
bugzilla.novell.com/show_bug.cgi?id=725709
bugzilla.novell.com/show_bug.cgi?id=725878
bugzilla.novell.com/show_bug.cgi?id=728626
bugzilla.novell.com/show_bug.cgi?id=729111
bugzilla.novell.com/show_bug.cgi?id=729721
bugzilla.novell.com/show_bug.cgi?id=731035
bugzilla.novell.com/show_bug.cgi?id=731229
bugzilla.novell.com/show_bug.cgi?id=731673
bugzilla.novell.com/show_bug.cgi?id=731981
bugzilla.novell.com/show_bug.cgi?id=732021
bugzilla.novell.com/show_bug.cgi?id=732535