qemu was updated to fix 37 security issues.
These security issues were fixed :
CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
CVE-2016-4952: Avoid OOB access in Vmware PV SCSI emulation (bsc#981266)
CVE-2015-8817: Avoid OOB access in PCI DMA I/O (bsc#969121)
CVE-2015-8818: Avoid OOB access in PCI DMA I/O (bsc#969122)
CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)
CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)
CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)
CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)
CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).
CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).
CVE-2015-7549: PCI NULL pointer dereferences (bsc#958917).
CVE-2015-8504: VNC floating point exception (bsc#958491).
CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
CVE-2015-8567: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
CVE-2015-8568: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
CVE-2015-8744: Incorrect l2 header validation could have lead to a crash via assert(2) call (bsc#960835).
CVE-2015-8745: Reading IMR registers could have lead to a crash via assert(2) call (bsc#960708).
CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).
This non-security issue was fixed
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2016:1560-1.
# The text itself is copyright (C) SUSE.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(91660);
script_version("2.12");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2014-3615", "CVE-2014-3689", "CVE-2014-9718", "CVE-2015-3214", "CVE-2015-5239", "CVE-2015-5745", "CVE-2015-7295", "CVE-2015-7549", "CVE-2015-8504", "CVE-2015-8558", "CVE-2015-8567", "CVE-2015-8568", "CVE-2015-8613", "CVE-2015-8619", "CVE-2015-8743", "CVE-2015-8744", "CVE-2015-8745", "CVE-2015-8817", "CVE-2015-8818", "CVE-2016-1568", "CVE-2016-1714", "CVE-2016-1922", "CVE-2016-1981", "CVE-2016-2198", "CVE-2016-2538", "CVE-2016-2841", "CVE-2016-2857", "CVE-2016-2858", "CVE-2016-3710", "CVE-2016-3712", "CVE-2016-4001", "CVE-2016-4002", "CVE-2016-4020", "CVE-2016-4037", "CVE-2016-4439", "CVE-2016-4441", "CVE-2016-4952");
script_bugtraq_id(69654, 70997, 73316, 75273);
script_name(english:"SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1560-1)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote SUSE host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"qemu was updated to fix 37 security issues.
These security issues were fixed :
- CVE-2016-4439: Avoid OOB access in 53C9X emulation
(bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation
(bsc#980723)
- CVE-2016-4952: Avoid OOB access in Vmware PV SCSI
emulation (bsc#981266)
- CVE-2015-8817: Avoid OOB access in PCI DMA I/O
(bsc#969121)
- CVE-2015-8818: Avoid OOB access in PCI DMA I/O
(bsc#969122)
- CVE-2016-3710: Fixed VGA emulation based OOB access with
potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB
read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)
- CVE-2016-2538: Fixed potential OOB access in USB net
device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000
emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU
pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP
checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet
emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated
controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest
from TPR access (bsc#975700)
- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)
- CVE-2014-9718: Fixed the handling of malformed or short
ide PRDTs to avoid any opportunity for guest to cause
DoS by abusing that interface (bsc#928393)
- CVE-2014-3689: Fixed insufficient parameter validation
in rectangle functions (bsc#901508)
- CVE-2014-3615: The VGA emulator in QEMU allowed local
guest users to read host memory by setting the display
to a high resolution (bsc#895528).
- CVE-2015-5239: Integer overflow in vnc_client_read() and
protocol_client_msg() (bsc#944463).
- CVE-2015-5745: Buffer overflow in virtio-serial
(bsc#940929).
- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network
Device (virtio-net) support in QEMU, when big or
mergeable receive buffers are not supported, allowed
remote attackers to cause a denial of service (guest
network consumption) via a flood of jumbo frames on the
(1) tuntap or (2) macvtap interface (bsc#947159).
- CVE-2015-7549: PCI NULL pointer dereferences
(bsc#958917).
- CVE-2015-8504: VNC floating point exception
(bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state
resulting in DoS (bsc#959005).
- CVE-2015-8567: A guest repeatedly activating a vmxnet3
device can leak host memory (bsc#959386).
- CVE-2015-8568: A guest repeatedly activating a vmxnet3
device can leak host memory (bsc#959386).
- CVE-2015-8613: Wrong sized memset in megasas command
handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey
command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w
functions (bsc#960725).
- CVE-2015-8744: Incorrect l2 header validation could have
lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers could have lead to
a crash via assert(2) call (bsc#960708).
- CVE-2016-1568: AHCI use-after-free in aio port commands
(bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing
firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing
hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000
device emulation by malicious privileged user within
guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able
to cause DoS by writing to read-only EHCI capabilities
registers (bsc#964413).
This non-security issue was fixed
- bsc#886378: qemu truncates vhd images in virt-rescue
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=886378"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=895528"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=901508"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=928393"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=934069"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=940929"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=944463"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=947159"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=958491"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=958917"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=959005"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=959386"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=960334"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=960708"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=960725"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=960835"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=961332"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=961333"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=961358"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=961556"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=961691"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=962320"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=963782"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=964413"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=967969"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=969121"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=969122"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=969350"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=970036"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=970037"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=975128"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=975136"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=975700"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=976109"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=978158"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=978160"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=980711"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=980723"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=981266"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2014-3615/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2014-3689/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2014-9718/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-3214/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-5239/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-5745/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7295/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7549/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8504/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8558/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8567/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8568/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8613/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8619/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8743/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8744/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8745/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8817/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8818/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-1568/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-1714/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-1922/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-1981/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-2198/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-2538/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-2841/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-2857/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-2858/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-3710/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-3712/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-4001/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-4002/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-4020/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-4037/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-4439/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-4441/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-4952/"
);
# https://www.suse.com/support/update/announcement/2016/suse-su-20161560-1/
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?e8098092"
);
script_set_attribute(
attribute:"solution",
value:
"To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :
SUSE Linux Enterprise Server 12 :
zypper in -t patch SUSE-SLE-SERVER-12-2016-924=1
SUSE Linux Enterprise Desktop 12 :
zypper in -t patch SUSE-SLE-DESKTOP-12-2016-924=1
To bring your system up-to-date, use 'zypper patch'."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-block-curl");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-block-curl-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-block-rbd");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-block-rbd-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-guest-agent");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-guest-agent-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-kvm");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-lang");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-s390");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-s390-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-tools-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-x86");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:qemu-x86-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
script_set_attribute(attribute:"vuln_publication_date", value:"2014/11/01");
script_set_attribute(attribute:"patch_publication_date", value:"2016/06/13");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/06/17");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED12|SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED12 / SLES12", "SUSE " + os_ver);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLES12" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP0", os_ver + " SP" + sp);
if (os_ver == "SLED12" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLED12 SP0", os_ver + " SP" + sp);
flag = 0;
if (rpm_check(release:"SLES12", sp:"0", cpu:"x86_64", reference:"qemu-block-rbd-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", cpu:"x86_64", reference:"qemu-block-rbd-debuginfo-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", cpu:"x86_64", reference:"qemu-x86-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", cpu:"x86_64", reference:"qemu-x86-debuginfo-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", cpu:"s390x", reference:"qemu-s390-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", cpu:"s390x", reference:"qemu-s390-debuginfo-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", reference:"qemu-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", reference:"qemu-block-curl-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", reference:"qemu-block-curl-debuginfo-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", reference:"qemu-debugsource-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", reference:"qemu-guest-agent-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", reference:"qemu-guest-agent-debuginfo-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", reference:"qemu-lang-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", reference:"qemu-tools-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", reference:"qemu-tools-debuginfo-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLES12", sp:"0", reference:"qemu-kvm-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLED12", sp:"0", cpu:"x86_64", reference:"qemu-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLED12", sp:"0", cpu:"x86_64", reference:"qemu-block-curl-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLED12", sp:"0", cpu:"x86_64", reference:"qemu-block-curl-debuginfo-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLED12", sp:"0", cpu:"x86_64", reference:"qemu-debugsource-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLED12", sp:"0", cpu:"x86_64", reference:"qemu-kvm-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLED12", sp:"0", cpu:"x86_64", reference:"qemu-tools-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLED12", sp:"0", cpu:"x86_64", reference:"qemu-tools-debuginfo-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLED12", sp:"0", cpu:"x86_64", reference:"qemu-x86-2.0.2-48.19.1")) flag++;
if (rpm_check(release:"SLED12", sp:"0", cpu:"x86_64", reference:"qemu-x86-debuginfo-2.0.2-48.19.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "qemu");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | qemu | p-cpe:/a:novell:suse_linux:qemu |
novell | suse_linux | qemu-block-curl | p-cpe:/a:novell:suse_linux:qemu-block-curl |
novell | suse_linux | qemu-block-curl-debuginfo | p-cpe:/a:novell:suse_linux:qemu-block-curl-debuginfo |
novell | suse_linux | qemu-block-rbd | p-cpe:/a:novell:suse_linux:qemu-block-rbd |
novell | suse_linux | qemu-block-rbd-debuginfo | p-cpe:/a:novell:suse_linux:qemu-block-rbd-debuginfo |
novell | suse_linux | qemu-debugsource | p-cpe:/a:novell:suse_linux:qemu-debugsource |
novell | suse_linux | qemu-guest-agent | p-cpe:/a:novell:suse_linux:qemu-guest-agent |
novell | suse_linux | qemu-guest-agent-debuginfo | p-cpe:/a:novell:suse_linux:qemu-guest-agent-debuginfo |
novell | suse_linux | qemu-kvm | p-cpe:/a:novell:suse_linux:qemu-kvm |
novell | suse_linux | qemu-lang | p-cpe:/a:novell:suse_linux:qemu-lang |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5239
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8818
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2857
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4001
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4037
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4952
www.nessus.org/u?e8098092
bugzilla.suse.com/show_bug.cgi?id=886378
bugzilla.suse.com/show_bug.cgi?id=895528
bugzilla.suse.com/show_bug.cgi?id=901508
bugzilla.suse.com/show_bug.cgi?id=928393
bugzilla.suse.com/show_bug.cgi?id=934069
bugzilla.suse.com/show_bug.cgi?id=940929
bugzilla.suse.com/show_bug.cgi?id=944463
bugzilla.suse.com/show_bug.cgi?id=947159
bugzilla.suse.com/show_bug.cgi?id=958491
bugzilla.suse.com/show_bug.cgi?id=958917
bugzilla.suse.com/show_bug.cgi?id=959005
bugzilla.suse.com/show_bug.cgi?id=959386
bugzilla.suse.com/show_bug.cgi?id=960334
bugzilla.suse.com/show_bug.cgi?id=960708
bugzilla.suse.com/show_bug.cgi?id=960725
bugzilla.suse.com/show_bug.cgi?id=960835
bugzilla.suse.com/show_bug.cgi?id=961332
bugzilla.suse.com/show_bug.cgi?id=961333
bugzilla.suse.com/show_bug.cgi?id=961358
bugzilla.suse.com/show_bug.cgi?id=961556
bugzilla.suse.com/show_bug.cgi?id=961691
bugzilla.suse.com/show_bug.cgi?id=962320
bugzilla.suse.com/show_bug.cgi?id=963782
bugzilla.suse.com/show_bug.cgi?id=964413
bugzilla.suse.com/show_bug.cgi?id=967969
bugzilla.suse.com/show_bug.cgi?id=969121
bugzilla.suse.com/show_bug.cgi?id=969122
bugzilla.suse.com/show_bug.cgi?id=969350
bugzilla.suse.com/show_bug.cgi?id=970036
bugzilla.suse.com/show_bug.cgi?id=970037
bugzilla.suse.com/show_bug.cgi?id=975128
bugzilla.suse.com/show_bug.cgi?id=975136
bugzilla.suse.com/show_bug.cgi?id=975700
bugzilla.suse.com/show_bug.cgi?id=976109
bugzilla.suse.com/show_bug.cgi?id=978158
bugzilla.suse.com/show_bug.cgi?id=978160
bugzilla.suse.com/show_bug.cgi?id=980711
bugzilla.suse.com/show_bug.cgi?id=980723
bugzilla.suse.com/show_bug.cgi?id=981266
www.suse.com/security/cve/CVE-2014-3615/
www.suse.com/security/cve/CVE-2014-3689/
www.suse.com/security/cve/CVE-2014-9718/
www.suse.com/security/cve/CVE-2015-3214/
www.suse.com/security/cve/CVE-2015-5239/
www.suse.com/security/cve/CVE-2015-5745/
www.suse.com/security/cve/CVE-2015-7295/
www.suse.com/security/cve/CVE-2015-7549/
www.suse.com/security/cve/CVE-2015-8504/
www.suse.com/security/cve/CVE-2015-8558/
www.suse.com/security/cve/CVE-2015-8567/
www.suse.com/security/cve/CVE-2015-8568/
www.suse.com/security/cve/CVE-2015-8613/
www.suse.com/security/cve/CVE-2015-8619/
www.suse.com/security/cve/CVE-2015-8743/
www.suse.com/security/cve/CVE-2015-8744/
www.suse.com/security/cve/CVE-2015-8745/
www.suse.com/security/cve/CVE-2015-8817/
www.suse.com/security/cve/CVE-2015-8818/
www.suse.com/security/cve/CVE-2016-1568/
www.suse.com/security/cve/CVE-2016-1714/
www.suse.com/security/cve/CVE-2016-1922/
www.suse.com/security/cve/CVE-2016-1981/
www.suse.com/security/cve/CVE-2016-2198/
www.suse.com/security/cve/CVE-2016-2538/
www.suse.com/security/cve/CVE-2016-2841/
www.suse.com/security/cve/CVE-2016-2857/
www.suse.com/security/cve/CVE-2016-2858/
www.suse.com/security/cve/CVE-2016-3710/
www.suse.com/security/cve/CVE-2016-3712/
www.suse.com/security/cve/CVE-2016-4001/
www.suse.com/security/cve/CVE-2016-4002/
www.suse.com/security/cve/CVE-2016-4020/
www.suse.com/security/cve/CVE-2016-4037/
www.suse.com/security/cve/CVE-2016-4439/
www.suse.com/security/cve/CVE-2016-4441/
www.suse.com/security/cve/CVE-2016-4952/