Lucene search

K
openvas
Copyright (c) 2009 E-Soft Inc. http://www.securityspace.comOPENVAS:136141256231065709
HistoryOct 11, 2009 - 12:00 a.m.

SLES11: Security update for Linux kernel

2009-10-1100:00:00
Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
plugins.openvas.org
19

0.114 Low

EPSS

Percentile

94.6%

The remote host is missing updates to packages that affect
the security of your system. One or more of the following packages
are affected:

ext4dev-kmp-default
ext4dev-kmp-pae
ext4dev-kmp-vmi
ext4dev-kmp-xen
kernel-default
kernel-default-base
kernel-pae
kernel-pae-base
kernel-source
kernel-syms
kernel-vmi
kernel-vmi-base
kernel-xen
kernel-xen-base

More details may also be found by searching for the SuSE
Enterprise Server 11 patch database located at
http://download.novell.com/patch/finder/

#
#VID 0522f4d2681968d0e344aad24e0e341b
# OpenVAS Vulnerability Test
# $
# Description: Security update for Linux kernel
#
# Authors:
# Thomas Reinke <reinke@securityspace.com>
#
# Copyright:
# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largely excerpted from the referenced
# advisories, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

include("revisions-lib.inc");
tag_summary = "The remote host is missing updates to packages that affect
the security of your system.  One or more of the following packages
are affected:

    ext4dev-kmp-default
    ext4dev-kmp-pae
    ext4dev-kmp-vmi
    ext4dev-kmp-xen
    kernel-default
    kernel-default-base
    kernel-pae
    kernel-pae-base
    kernel-source
    kernel-syms
    kernel-vmi
    kernel-vmi-base
    kernel-xen
    kernel-xen-base


More details may also be found by searching for the SuSE
Enterprise Server 11 patch database located at
http://download.novell.com/patch/finder/";

tag_solution = "Please install the updates provided by SuSE.";

if(description)
{
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=519111");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=530151");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=520975");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=525903");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=529369");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=514265");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=513954");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=509497");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=529660");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=528769");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=527361");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=526514");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=522414");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=528853");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=402922");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=514767");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=521190");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=511306");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=520975");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=527284");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=509407");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=527748");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=527848");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=502092");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=524347");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=523719");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=521578");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=490030");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=498358");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=518291");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=512070");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=489105");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=522764");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=467846");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=522914");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=522686");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=517098");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=522911");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=519188");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=492324");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=514375");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=504646");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=511079");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=501160");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=498402");
 script_xref(name : "URL" , value : "https://bugzilla.novell.com/show_bug.cgi?id=492658");
 script_oid("1.3.6.1.4.1.25623.1.0.65709");
 script_version("$Revision: 9350 $");
 script_tag(name:"last_modification", value:"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $");
 script_tag(name:"creation_date", value:"2009-10-11 22:58:51 +0200 (Sun, 11 Oct 2009)");
 script_cve_id("CVE-2009-2692", "CVE-2009-2406", "CVE-2009-2407", "CVE-2009-1389");
 script_tag(name:"cvss_base", value:"7.8");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:C");
 script_name("SLES11: Security update for Linux kernel");



 script_category(ACT_GATHER_INFO);

 script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
 script_family("SuSE Local Security Checks");
 script_dependencies("gather-package-list.nasl");
 script_mandatory_keys("ssh/login/suse_sles", "ssh/login/rpms");
 script_tag(name : "solution" , value : tag_solution);
 script_tag(name : "summary" , value : tag_summary);
 script_tag(name:"qod_type", value:"package");
 script_tag(name:"solution_type", value:"VendorFix");
 exit(0);
}

#
# The script code starts here
#

include("pkg-lib-rpm.inc");

res = "";
report = "";
if ((res = isrpmvuln(pkg:"ext4dev-kmp-default", rpm:"ext4dev-kmp-default~0_2.6.27.29_0.1~7.1.13", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"ext4dev-kmp-pae", rpm:"ext4dev-kmp-pae~0_2.6.27.29_0.1~7.1.13", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"ext4dev-kmp-vmi", rpm:"ext4dev-kmp-vmi~0_2.6.27.29_0.1~7.1.13", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"ext4dev-kmp-xen", rpm:"ext4dev-kmp-xen~0_2.6.27.29_0.1~7.1.13", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"kernel-default", rpm:"kernel-default~2.6.27.29~0.1.1", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"kernel-default-base", rpm:"kernel-default-base~2.6.27.29~0.1.1", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"kernel-pae", rpm:"kernel-pae~2.6.27.29~0.1.1", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"kernel-pae-base", rpm:"kernel-pae-base~2.6.27.29~0.1.1", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~2.6.27.29~0.1.1", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"kernel-syms", rpm:"kernel-syms~2.6.27.29~0.1.1", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"kernel-vmi", rpm:"kernel-vmi~2.6.27.29~0.1.1", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"kernel-vmi-base", rpm:"kernel-vmi-base~2.6.27.29~0.1.1", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.27.29~0.1.1", rls:"SLES11.0")) != NULL) {
    report += res;
}
if ((res = isrpmvuln(pkg:"kernel-xen-base", rpm:"kernel-xen-base~2.6.27.29~0.1.1", rls:"SLES11.0")) != NULL) {
    report += res;
}

if (report != "") {
    security_message(data:report);
} else if (__pkg_match) {
    exit(99); # Not vulnerable.
}

References

How to find holes in your network?

Try incredible fast Vulners Perimeter Scanner and find vulnerabilities and unnecessary ip and ports in network devices inside your network before anyone else.

Try Network Scanner

0.114 Low

EPSS

Percentile

94.6%

Related for OPENVAS:136141256231065709