SuSE 11 Security Update : Xen (SAT Patch Number 2230)

2010-12-02T00:00:00
ID SUSE_11_XEN-201004-100220.NASL
Type nessus
Reporter This script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
Modified 2020-04-02T00:00:00

Description

Collective Xen/201004 Update, containing fixes for the following issues :

  • pygrub, reiserfs: Fix on-disk structure definition bnc#537370 - Xen on SLES 11 does not boot - endless loop in ATA detection bnc#561912 - xend leaks memory bnc#564750 - Keyboard Caps Lock key works abnormal under SLES11 xen guest OS. bnc#548443 - keymap setting not preserved bnc#555152 -

                                        
                                            #%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from SuSE 11 update information. The text itself is
# copyright (C) Novell, Inc.
#

include("compat.inc");

if (description)
{
  script_id(50966);
  script_version("1.6");
  script_cvs_date("Date: 2019/10/25 13:36:40");

  script_cve_id("CVE-2009-3525");

  script_name(english:"SuSE 11 Security Update : Xen (SAT Patch Number 2230)");
  script_summary(english:"Checks rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote SuSE 11 host is missing one or more security updates."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Collective Xen/201004 Update, containing fixes for the following
issues :

  - pygrub, reiserfs: Fix on-disk structure definition
    bnc#537370 - Xen on SLES 11 does not boot - endless loop
    in ATA detection bnc#561912 - xend leaks memory
    bnc#564750 - Keyboard Caps Lock key works abnormal under
    SLES11 xen guest OS. bnc#548443 - keymap setting not
    preserved bnc#555152 - 'NAME' column in xentop (SLES11)
    output limited to 10 characters unlike SLES10 bnc#553631
    - L3: diskpart will not run on windows 2008 bnc#548852 -
    DL585G2 - plug-in PCI cards fail in IO-APIC mode
    bnc#529195 - xend: disallow ! as a sxp separator
    bnc#550397 - xend: bootable flag of VBD not always of
    type int bnc#545470 - Xen vifname parameter is ignored
    when using type=ioemu in guest configuration file
    bnc#541945 - xm create -x command does not work in SLES
    10 SP2 or SLES 11 bnc#542525 - xen pygrub vulnerability
    (CVE-2009-3525) bnc#481592 and fate#306125 - Virtual
    machines are not able to boot from CD to allow upgrade
    to OES2SP1 (sle10 bug) bnc#553633 - Update breaks menu
    access keys in virt-viewer and still misses some key
    sequences. (sle10 bug) fate#306720: xen: virt-manager
    cdrom handling. bnc#547590 - L3: virt-manager is unable
    of displaying VNC console on remote hosts bnc#572691 -
    libvird segfaults when trying to create a kvm guest
    bnc#573748 - L3: Virsh gives error Device 51712 not
    connected after updating libvirt modules bnc#548438 -
    libcmpiutil / libvirt-cim does not properly handle CIM_
    prefixed. (bnc#576832)

  - Xen doesn't work get an eror when starting the install
    processes or starting a pervious installed DomU.
    (bnc#513921)

  - Cannot set MAC address for PV guest in vm-install.
    (bnc#526855)"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=481592"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=513921"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=526855"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=529195"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=537370"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=541945"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=542525"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=545470"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=547590"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=548438"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=548443"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=548852"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=550397"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=553631"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=553633"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=555152"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=561912"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=564750"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=572691"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=573748"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=576832"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=591092"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://support.novell.com/security/cve/CVE-2009-3525.html"
  );
  script_set_attribute(attribute:"solution", value:"Apply SAT patch number 2230.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_cwe_id(264);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libcmpiutil");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libvirt");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libvirt-cim");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libvirt-doc");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libvirt-python");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:virt-manager");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:virt-viewer");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:vm-install");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:xen");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:xen-doc-html");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:xen-doc-pdf");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:xen-kmp-default");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:xen-kmp-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:xen-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:xen-tools");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:xen-tools-domU");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");

  script_set_attribute(attribute:"patch_publication_date", value:"2010/02/20");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/12/02");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2010-2019 Tenable Network Security, Inc.");
  script_family(english:"SuSE Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11");
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu);

pl = get_kb_item("Host/SuSE/patchlevel");
if (pl) audit(AUDIT_OS_NOT, "SuSE 11.0");


flag = 0;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"libcmpiutil-0.5-15.16.1")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"libvirt-0.4.6-14.60.16")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"libvirt-cim-0.5.2-8.47.85")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"libvirt-doc-0.4.6-14.60.16")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"libvirt-python-0.4.6-14.60.16")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"virt-manager-0.5.3-66.42.13")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"virt-viewer-0.0.3-3.57.13")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"vm-install-0.3.27-0.1.15")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"xen-3.3.1_18546_24-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"xen-doc-html-3.3.1_18546_24-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"xen-doc-pdf-3.3.1_18546_24-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"xen-kmp-default-3.3.1_18546_24_2.6.27.45_0.3-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"xen-kmp-pae-3.3.1_18546_24_2.6.27.45_0.3-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"xen-libs-3.3.1_18546_24-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"xen-tools-3.3.1_18546_24-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"i586", reference:"xen-tools-domU-3.3.1_18546_24-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"libcmpiutil-0.5-15.16.1")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"libvirt-0.4.6-14.60.16")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"libvirt-cim-0.5.2-8.47.85")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"libvirt-doc-0.4.6-14.60.16")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"libvirt-python-0.4.6-14.60.16")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"virt-manager-0.5.3-66.42.13")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"virt-viewer-0.0.3-3.57.13")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"vm-install-0.3.27-0.1.15")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"xen-3.3.1_18546_24-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"xen-doc-html-3.3.1_18546_24-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"xen-doc-pdf-3.3.1_18546_24-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"xen-kmp-default-3.3.1_18546_24_2.6.27.45_0.3-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"xen-libs-3.3.1_18546_24-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"xen-tools-3.3.1_18546_24-0.3.7")) flag++;
if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"xen-tools-domU-3.3.1_18546_24-0.3.7")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");