ID SSV:60371
Type seebug
Reporter Root
Modified 2012-09-09T00:00:00
Description
BUGTRAQ ID: 55406
CVE ID: CVE-2012-3495
Xen是一个开放源代码虚拟机监视器,由剑桥大学开发。
Xen 4.1及其他版本在实现上存在本地拒绝服务漏洞,对客户端操作系统有访问权限的攻击者可利用此漏洞使主机操作系统崩溃。
0
XenSource Xen 4.x
XenSource Xen 3.x
厂商补丁:
XenSource
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://xen.xensource.com/
{"sourceData": "", "status": "details", "history": [], "description": "BUGTRAQ ID: 55406\r\nCVE ID: CVE-2012-3495\r\n\r\nXen\u662f\u4e00\u4e2a\u5f00\u653e\u6e90\u4ee3\u7801\u865a\u62df\u673a\u76d1\u89c6\u5668\uff0c\u7531\u5251\u6865\u5927\u5b66\u5f00\u53d1\u3002\r\n\r\nXen 4.1\u53ca\u5176\u4ed6\u7248\u672c\u5728\u5b9e\u73b0\u4e0a\u5b58\u5728\u672c\u5730\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u5bf9\u5ba2\u6237\u7aef\u64cd\u4f5c\u7cfb\u7edf\u6709\u8bbf\u95ee\u6743\u9650\u7684\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u4f7f\u4e3b\u673a\u64cd\u4f5c\u7cfb\u7edf\u5d29\u6e83\u3002\n0\nXenSource Xen 4.x\r\nXenSource Xen 3.x\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nXenSource\r\n---------\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\nhttp://xen.xensource.com/", "sourceHref": "", "reporter": "Root", "href": "https://www.seebug.org/vuldb/ssvid-60371", "type": "seebug", "_object_types": ["robots.models.base.Bulletin", "robots.models.seebug.SeebugBulletin"], "viewCount": 0, "references": [], "lastseen": "2017-11-19T17:53:56", "published": "2012-09-09T00:00:00", "objectVersion": "1.4", "cvelist": ["CVE-2012-3495"], "id": "SSV:60371", "enchantments_done": [], "modified": "2012-09-09T00:00:00", "title": "XenSource Xen 'physdev_get_free_pirq'\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "cvss": {"score": 6.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:COMPLETE/"}, "bulletinFamily": "exploit", "enchantments": {"score": {"value": 5.9, "vector": "NONE", "modified": "2017-11-19T17:53:56"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-3495"]}, {"type": "suse", "idList": ["SUSE-SU-2012:1132-1", "SUSE-SU-2012:1133-1", "OPENSUSE-SU-2012:1172-1", "OPENSUSE-SU-2012:1573-1", "OPENSUSE-SU-2012:1572-1"]}, {"type": "nessus", "idList": ["SUSE_11_XEN-201209-120831.NASL", "ORACLEVM_OVMSA-2012-0039.NASL", "SUSE_11_XEN-201209-120829.NASL", "FEDORA_2012-13443.NASL", "OPENSUSE-2012-598.NASL", "OPENSUSE-2012-597.NASL", "OPENSUSE-2012-811.NASL", "OPENSUSE-2012-812.NASL", "GENTOO_GLSA-201604-03.NASL", "ORACLEVM_OVMSA-2015-0068.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:850324", "OPENVAS:1361412562310850324", "OPENVAS:864720", "OPENVAS:864722", "OPENVAS:864860", "OPENVAS:1361412562310864720", "OPENVAS:1361412562310864722", "OPENVAS:1361412562310864860", "OPENVAS:1361412562310864862", "OPENVAS:1361412562310850433"]}, {"type": "gentoo", "idList": ["GLSA-201604-03", "GLSA-201309-24"]}], "modified": "2017-11-19T17:53:56"}, "vulnersScore": 5.9}, "_object_type": "robots.models.seebug.SeebugBulletin"}
{"cve": [{"lastseen": "2019-05-29T18:12:23", "bulletinFamily": "NVD", "description": "The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.", "modified": "2017-07-01T01:29:00", "id": "CVE-2012-3495", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3495", "published": "2012-11-23T20:55:00", "title": "CVE-2012-3495", "type": "cve", "cvss": {"score": 6.1, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:C"}}], "nessus": [{"lastseen": "2019-11-01T03:18:45", "bulletinFamily": "scanner", "description": "The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\n - console: bounds check whenever changing the cursor due\n to an escape code The device model used by fully\n virtualised (HVM) domains, qemu, does not properly\n handle escape VT100 sequences when emulating certain\n devices with a virtual console backend. (CVE-2012-3515)\n\n - x86/pvhvm: properly range-check\n PHYSDEVOP_map_pirq/MAP_PIRQ_TYPE_GSI PHYSDEVOP_map_pirq\n with MAP_PIRQ_TYPE_GSI does not range check map->index.\n This is being used as a array index, and hence must be\n validated before use. A malicious HVM guest kernel can\n crash the host. It might also be able to read hypervisor\n or guest memory. (CVE-2012-3496)\n\n - xen: Don", "modified": "2019-11-02T00:00:00", "id": "ORACLEVM_OVMSA-2012-0039.NASL", "href": "https://www.tenable.com/plugins/nessus/79482", "published": "2014-11-26T00:00:00", "title": "OracleVM 3.1 : xen (OVMSA-2012-0039)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from OracleVM\n# Security Advisory OVMSA-2012-0039.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(79482);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/09/27 13:00:34\");\n\n script_cve_id(\"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3515\");\n script_bugtraq_id(55400, 55406, 55412, 55413);\n\n script_name(english:\"OracleVM 3.1 : xen (OVMSA-2012-0039)\");\n script_summary(english:\"Checks the RPM output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote OracleVM host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\n - console: bounds check whenever changing the cursor due\n to an escape code The device model used by fully\n virtualised (HVM) domains, qemu, does not properly\n handle escape VT100 sequences when emulating certain\n devices with a virtual console backend. (CVE-2012-3515)\n\n - x86/pvhvm: properly range-check\n PHYSDEVOP_map_pirq/MAP_PIRQ_TYPE_GSI PHYSDEVOP_map_pirq\n with MAP_PIRQ_TYPE_GSI does not range check map->index.\n This is being used as a array index, and hence must be\n validated before use. A malicious HVM guest kernel can\n crash the host. It might also be able to read hypervisor\n or guest memory. (CVE-2012-3496)\n\n - xen: Don't BUG_ON PoD operations on a non-translated\n guest. XENMEM_populate_physmap can be called with\n invalid flags. By calling it with\n MEMF_populate_on_demand flag set, a BUG can be triggered\n if a translating paging mode is not being used.\n (CVE-2012-3496)\n\n - xen: handle out-of-pirq condition correctly in\n PHYSDEVOP_get_free_pirq PHYSDEVOP_get_free_pirq does not\n check that its call to get_free_pirq succeeded, and if\n it fails will use the error code as an array index.\n (CVE-2012-3495)\n\n - xen: prevent a 64 bit guest setting reserved bits in DR7\n The upper 32 bits of this register are reserved and\n should be written as zero. (CVE-2012-3494)\"\n );\n # https://oss.oracle.com/pipermail/oraclevm-errata/2012-September/000099.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f046f12a\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected xen / xen-devel / xen-tools packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:xen-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:3.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/11/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/09/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"OracleVM Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleVM/release\", \"Host/OracleVM/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/OracleVM/release\");\nif (isnull(release) || \"OVS\" >!< release) audit(AUDIT_OS_NOT, \"OracleVM\");\nif (! preg(pattern:\"^OVS\" + \"3\\.1\" + \"(\\.[0-9]|$)\", string:release)) audit(AUDIT_OS_NOT, \"OracleVM 3.1\", \"OracleVM \" + release);\nif (!get_kb_item(\"Host/OracleVM/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"OracleVM\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"OVS3.1\", reference:\"xen-4.1.2-18.el5.14\")) flag++;\nif (rpm_check(release:\"OVS3.1\", reference:\"xen-devel-4.1.2-18.el5.14\")) flag++;\nif (rpm_check(release:\"OVS3.1\", reference:\"xen-tools-4.1.2-18.el5.14\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xen / xen-devel / xen-tools\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:18:06", "bulletinFamily": "scanner", "description": "XEN was updated 4.1.3 to fix multiple bugs and security issues.\n\nThe following security issues have been fixed :\n\n - xen: hypercall set_debugreg vulnerability (XSA-12).\n (CVE-2012-3494)\n\n - xen: hypercall physdev_get_free_pirq vulnerability\n (XSA-13). (CVE-2012-3495)\n\n - xen: XENMEM_populate_physmap DoS vulnerability (XSA-14).\n (CVE-2012-3496)\n\n - xen: PHYSDEVOP_map_pirq index vulnerability (XSA-16).\n (CVE-2012-3498)\n\n - xen: Qemu VT100 emulation vulnerability (XSA-17) Also\n the following bugs have been fixed:. (CVE-2012-3515)\n\n - pvscsi support of attaching Luns - (bnc#776995) The\n following related bugs in vm-install 0.5.12 have been\n fixed :\n\n - vm-install does not pass --extra-args in --upgrade.\n (bnc#776300)\n\n - Add for support Open Enterprise Server 11\n\n - Add support for Windows 8 and Windows Server 2012\n\n - Add support for Ubuntu 12 (Precise Pangolin)", "modified": "2019-11-02T00:00:00", "id": "SUSE_11_XEN-201209-120831.NASL", "href": "https://www.tenable.com/plugins/nessus/64237", "published": "2013-01-25T00:00:00", "title": "SuSE 11.2 Security Update : Xen (SAT Patch Number 6748)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(64237);\n script_version(\"$Revision: 1.2 $\");\n script_cvs_date(\"$Date: 2013/10/25 23:56:05 $\");\n\n script_cve_id(\"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3498\", \"CVE-2012-3515\");\n\n script_name(english:\"SuSE 11.2 Security Update : Xen (SAT Patch Number 6748)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"XEN was updated 4.1.3 to fix multiple bugs and security issues.\n\nThe following security issues have been fixed :\n\n - xen: hypercall set_debugreg vulnerability (XSA-12).\n (CVE-2012-3494)\n\n - xen: hypercall physdev_get_free_pirq vulnerability\n (XSA-13). (CVE-2012-3495)\n\n - xen: XENMEM_populate_physmap DoS vulnerability (XSA-14).\n (CVE-2012-3496)\n\n - xen: PHYSDEVOP_map_pirq index vulnerability (XSA-16).\n (CVE-2012-3498)\n\n - xen: Qemu VT100 emulation vulnerability (XSA-17) Also\n the following bugs have been fixed:. (CVE-2012-3515)\n\n - pvscsi support of attaching Luns - (bnc#776995) The\n following related bugs in vm-install 0.5.12 have been\n fixed :\n\n - vm-install does not pass --extra-args in --upgrade.\n (bnc#776300)\n\n - Add for support Open Enterprise Server 11\n\n - Add support for Windows 8 and Windows Server 2012\n\n - Add support for Ubuntu 12 (Precise Pangolin)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=776300\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=776995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777084\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777088\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777090\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777091\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2012-3494.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2012-3495.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2012-3496.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2012-3498.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2012-3515.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 6748.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:vm-install\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen-kmp-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen-tools-domU\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(pl) || int(pl) != 2) audit(AUDIT_OS_NOT, \"SuSE 11.2\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"i586\", reference:\"vm-install-0.5.12-0.5.3\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"i586\", reference:\"xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"i586\", reference:\"xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"i586\", reference:\"xen-libs-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"i586\", reference:\"xen-tools-domU-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"i586\", reference:\"vm-install-0.5.12-0.5.3\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"i586\", reference:\"xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"i586\", reference:\"xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"i586\", reference:\"xen-libs-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"i586\", reference:\"xen-tools-domU-4.1.3_02-0.5.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:18:06", "bulletinFamily": "scanner", "description": "XEN was updated 4.1.3 to fix multiple bugs and security issues.\n\nThe following security issues have been fixed :\n\n - xen: hypercall set_debugreg vulnerability (XSA-12).\n (CVE-2012-3494)\n\n - xen: hypercall physdev_get_free_pirq vulnerability\n (XSA-13). (CVE-2012-3495)\n\n - xen: XENMEM_populate_physmap DoS vulnerability (XSA-14).\n (CVE-2012-3496)\n\n - xen: PHYSDEVOP_map_pirq index vulnerability (XSA-16).\n (CVE-2012-3498)\n\n - xen: Qemu VT100 emulation vulnerability (XSA-17) Also\n the following bugs have been fixed:. (CVE-2012-3515)\n\n - pvscsi support of attaching Luns - (bnc#776995) The\n following related bugs in vm-install 0.5.12 have been\n fixed :\n\n - vm-install does not pass --extra-args in --upgrade.\n (bnc#776300)\n\n - Add for support Open Enterprise Server 11\n\n - Add support for Windows 8 and Windows Server 2012\n\n - Add support for Ubuntu 12 (Precise Pangolin)", "modified": "2019-11-02T00:00:00", "id": "SUSE_11_XEN-201209-120829.NASL", "href": "https://www.tenable.com/plugins/nessus/64236", "published": "2013-01-25T00:00:00", "title": "SuSE 11.2 Security Update : Xen (SAT Patch Number 6748)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(64236);\n script_version(\"$Revision: 1.2 $\");\n script_cvs_date(\"$Date: 2013/10/25 23:56:05 $\");\n\n script_cve_id(\"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3498\", \"CVE-2012-3515\");\n\n script_name(english:\"SuSE 11.2 Security Update : Xen (SAT Patch Number 6748)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"XEN was updated 4.1.3 to fix multiple bugs and security issues.\n\nThe following security issues have been fixed :\n\n - xen: hypercall set_debugreg vulnerability (XSA-12).\n (CVE-2012-3494)\n\n - xen: hypercall physdev_get_free_pirq vulnerability\n (XSA-13). (CVE-2012-3495)\n\n - xen: XENMEM_populate_physmap DoS vulnerability (XSA-14).\n (CVE-2012-3496)\n\n - xen: PHYSDEVOP_map_pirq index vulnerability (XSA-16).\n (CVE-2012-3498)\n\n - xen: Qemu VT100 emulation vulnerability (XSA-17) Also\n the following bugs have been fixed:. (CVE-2012-3515)\n\n - pvscsi support of attaching Luns - (bnc#776995) The\n following related bugs in vm-install 0.5.12 have been\n fixed :\n\n - vm-install does not pass --extra-args in --upgrade.\n (bnc#776300)\n\n - Add for support Open Enterprise Server 11\n\n - Add support for Windows 8 and Windows Server 2012\n\n - Add support for Ubuntu 12 (Precise Pangolin)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=776300\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=776995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777084\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777088\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777090\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777091\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2012-3494.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2012-3495.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2012-3496.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2012-3498.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2012-3515.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 6748.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:vm-install\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen-doc-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen-doc-pdf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen-kmp-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen-libs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:xen-tools-domU\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(pl) || int(pl) != 2) audit(AUDIT_OS_NOT, \"SuSE 11.2\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"vm-install-0.5.12-0.5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"xen-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"xen-doc-html-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"xen-doc-pdf-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"xen-libs-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"xen-libs-32bit-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"xen-tools-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"xen-tools-domU-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"vm-install-0.5.12-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"xen-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"xen-doc-html-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"xen-doc-pdf-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"xen-libs-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"xen-libs-32bit-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"xen-tools-4.1.3_02-0.5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"xen-tools-domU-4.1.3_02-0.5.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:26:56", "bulletinFamily": "scanner", "description": "a malicious 64-bit PV guest can crash the dom0 [XSA-12, CVE-2012-3494]\n(#854585) a malicious crash might be able to crash the dom0 or\nescalate privileges [XSA-13, CVE-2012-3495] (#854589) a malicious PV\nguest can crash the dom0 [XSA-14, CVE-2012-3496] (#854590) a malicious\nHVM guest can crash the dom0 and might be able to read hypervisor or\nguest memory [XSA-16, CVE-2012-3498] (#854593) an HVM guest could use\nVT100 escape sequences to escalate privileges to that of the qemu\nprocess [XSA-17, CVE-2012-3515] (#854599) disable qemu monitor by\ndefault [XSA-19, CVE-2012-4411] (#855141)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2012-13443.NASL", "href": "https://www.tenable.com/plugins/nessus/62155", "published": "2012-09-18T00:00:00", "title": "Fedora 16 : xen-4.1.3-2.fc16 (2012-13443)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-13443.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62155);\n script_version(\"$Revision: 1.11 $\");\n script_cvs_date(\"$Date: 2015/10/20 22:25:12 $\");\n\n script_cve_id(\"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3498\", \"CVE-2012-3515\", \"CVE-2012-4411\");\n script_bugtraq_id(55400, 55406, 55412, 55413, 55414, 55442);\n script_xref(name:\"FEDORA\", value:\"2012-13443\");\n\n script_name(english:\"Fedora 16 : xen-4.1.3-2.fc16 (2012-13443)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"a malicious 64-bit PV guest can crash the dom0 [XSA-12, CVE-2012-3494]\n(#854585) a malicious crash might be able to crash the dom0 or\nescalate privileges [XSA-13, CVE-2012-3495] (#854589) a malicious PV\nguest can crash the dom0 [XSA-14, CVE-2012-3496] (#854590) a malicious\nHVM guest can crash the dom0 and might be able to read hypervisor or\nguest memory [XSA-16, CVE-2012-3498] (#854593) an HVM guest could use\nVT100 escape sequences to escalate privileges to that of the qemu\nprocess [XSA-17, CVE-2012-3515] (#854599) disable qemu monitor by\ndefault [XSA-19, CVE-2012-4411] (#855141)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=851139\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=851165\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=851172\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=851193\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=851252\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=855140\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/086340.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f7c6ee6d\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected xen package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xen\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:16\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/09/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/09/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^16([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 16.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC16\", reference:\"xen-4.1.3-2.fc16\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xen\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:00:31", "bulletinFamily": "scanner", "description": "Security Update for Xen\n\nFollowing bug and security fixes were applied :\n\n - bnc#776995 - attaching scsi control luns with pvscsi\n\n - xend/pvscsi: fix passing of SCSI control LUNs\n xen-bug776995-pvscsi-no-devname.patch\n\n - xend/pvscsi: fix usage of persistant device names for\n SCSI devices xen-bug776995-pvscsi-persistent-names.patch\n\n - xend/pvscsi: update sysfs parser for Linux 3.0\n xen-bug776995-pvscsi-sysfs-parser.patch\n\n - bnc#777090 - CVE-2012-3494: xen: hypercall set_debugreg\n vulnerability (XSA-12) CVE-2012-3494-xsa12.patch\n\n - bnc#777088 - CVE-2012-3495: xen: hypercall\n physdev_get_free_pirq vulnerability (XSA-13)\n CVE-2012-3495-xsa13.patch\n\n - bnc#777091 - CVE-2012-3496: xen: XENMEM_populate_physmap\n DoS vulnerability (XSA-14) CVE-2012-3496-xsa14.patch\n\n - bnc#777086 - CVE-2012-3498: xen: PHYSDEVOP_map_pirq\n index vulnerability (XSA-16) CVE-2012-3498-xsa16.patch\n\n - bnc#777084 - CVE-2012-3515: xen: Qemu VT100 emulation\n vulnerability (XSA-17) CVE-2012-3515-xsa17.patch\n\n - Upstream patches from Jan\n 25734-x86-MCG_CTL-default.patch\n 25735-x86-cpuid-masking-XeonE5.patch\n 25744-hypercall-return-long.patch\n\n - Update to Xen 4.1.3 c/s 23336 \n\n - Upstream or pending upstream patches from Jan\n 25587-fix-off-by-one-parsing-error.patch\n 25616-x86-MCi_CTL-default.patch\n 25617-vtd-qinval-addr.patch 25688-x86-nr_irqs_gsi.patch\n\n - bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest\n destroy p2m teardown host DoS vulnerability\n CVE-2012-3433-xsa11.patch\n\n - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user\n mode MMIO emulation DoS\n 25682-x86-inconsistent-io-state.patch\n\n - bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader\n doesn", "modified": "2019-11-02T00:00:00", "id": "OPENSUSE-2012-597.NASL", "href": "https://www.tenable.com/plugins/nessus/74750", "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : Xen (openSUSE-SU-2012:1172-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2012-597.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(74750);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2018/11/10 11:50:00\");\n\n script_cve_id(\"CVE-2012-2625\", \"CVE-2012-3432\", \"CVE-2012-3433\", \"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3498\", \"CVE-2012-3515\");\n\n script_name(english:\"openSUSE Security Update : Xen (openSUSE-SU-2012:1172-1)\");\n script_summary(english:\"Check for the openSUSE-2012-597 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security Update for Xen\n\nFollowing bug and security fixes were applied :\n\n - bnc#776995 - attaching scsi control luns with pvscsi\n\n - xend/pvscsi: fix passing of SCSI control LUNs\n xen-bug776995-pvscsi-no-devname.patch\n\n - xend/pvscsi: fix usage of persistant device names for\n SCSI devices xen-bug776995-pvscsi-persistent-names.patch\n\n - xend/pvscsi: update sysfs parser for Linux 3.0\n xen-bug776995-pvscsi-sysfs-parser.patch\n\n - bnc#777090 - CVE-2012-3494: xen: hypercall set_debugreg\n vulnerability (XSA-12) CVE-2012-3494-xsa12.patch\n\n - bnc#777088 - CVE-2012-3495: xen: hypercall\n physdev_get_free_pirq vulnerability (XSA-13)\n CVE-2012-3495-xsa13.patch\n\n - bnc#777091 - CVE-2012-3496: xen: XENMEM_populate_physmap\n DoS vulnerability (XSA-14) CVE-2012-3496-xsa14.patch\n\n - bnc#777086 - CVE-2012-3498: xen: PHYSDEVOP_map_pirq\n index vulnerability (XSA-16) CVE-2012-3498-xsa16.patch\n\n - bnc#777084 - CVE-2012-3515: xen: Qemu VT100 emulation\n vulnerability (XSA-17) CVE-2012-3515-xsa17.patch\n\n - Upstream patches from Jan\n 25734-x86-MCG_CTL-default.patch\n 25735-x86-cpuid-masking-XeonE5.patch\n 25744-hypercall-return-long.patch\n\n - Update to Xen 4.1.3 c/s 23336 \n\n - Upstream or pending upstream patches from Jan\n 25587-fix-off-by-one-parsing-error.patch\n 25616-x86-MCi_CTL-default.patch\n 25617-vtd-qinval-addr.patch 25688-x86-nr_irqs_gsi.patch\n\n - bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest\n destroy p2m teardown host DoS vulnerability\n CVE-2012-3433-xsa11.patch\n\n - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user\n mode MMIO emulation DoS\n 25682-x86-inconsistent-io-state.patch\n\n - bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader\n doesn't check the size of the bzip2 or lzma compressed\n kernel, leading to denial of service\n 25589-pygrub-size-limits.patch\n\n - bnc#767273 - unsupported /var/lock/subsys is still used\n by xendomains init.xendomains\n\n - bnc#766283 - opensuse 12.2 pv guests can not start after\n installation due to lack of grub2 support in the host\n 23686-pygrub-solaris.patch 23697-pygrub-grub2.patch\n 23944-pygrub-debug.patch 23998-pygrub-GPT.patch\n 23999-pygrub-grub2.patch 24000-pygrub-grub2.patch\n 24001-pygrub-grub2.patch 24002-pygrub-grub2.patch\n 24064-pygrub-HybridISO.patch\n 24401-pygrub-scrolling.patch 24402-pygrub-edit-fix.patch\n 24460-pygrub-extlinux.patch 24706-pygrub-extlinux.patch\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=762484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=766283\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=767273\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=773393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=773401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=776995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777084\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777088\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777090\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777091\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2012-09/msg00059.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected Xen packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-doc-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-doc-pdf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-domU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/09/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-debugsource-4.1.3_01-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-devel-4.1.3_01-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-kmp-default-4.1.3_01_k3.1.10_1.16-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-kmp-default-debuginfo-4.1.3_01_k3.1.10_1.16-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-kmp-desktop-4.1.3_01_k3.1.10_1.16-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-kmp-desktop-debuginfo-4.1.3_01_k3.1.10_1.16-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-kmp-pae-4.1.3_01_k3.1.10_1.16-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-kmp-pae-debuginfo-4.1.3_01_k3.1.10_1.16-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-libs-4.1.3_01-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-libs-debuginfo-4.1.3_01-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-tools-domU-4.1.3_01-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-tools-domU-debuginfo-4.1.3_01-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-4.1.3_01-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-doc-html-4.1.3_01-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-doc-pdf-4.1.3_01-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-libs-32bit-4.1.3_01-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-libs-debuginfo-32bit-4.1.3_01-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-tools-4.1.3_01-1.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-tools-debuginfo-4.1.3_01-1.13.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xen-debugsource / xen-devel / xen-kmp-default / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:00:31", "bulletinFamily": "scanner", "description": "Security Update for Xen", "modified": "2019-11-02T00:00:00", "id": "OPENSUSE-2012-598.NASL", "href": "https://www.tenable.com/plugins/nessus/74751", "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : Xen (openSUSE-SU-2012:1176-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2012-598.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(74751);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2018/11/10 11:50:00\");\n\n script_cve_id(\"CVE-2012-2625\", \"CVE-2012-3432\", \"CVE-2012-3433\", \"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3498\", \"CVE-2012-3515\");\n\n script_name(english:\"openSUSE Security Update : Xen (openSUSE-SU-2012:1176-1)\");\n script_summary(english:\"Check for the openSUSE-2012-598 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(attribute:\"description\", value:\"Security Update for Xen\");\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=762484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=766283\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=766284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=767273\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=773393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=773401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=776995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777084\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777088\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777090\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777091\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected Xen packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-doc-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-doc-pdf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-domU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/09/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-debugsource-4.1.3_01-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-devel-4.1.3_01-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-kmp-default-4.1.3_01_k3.4.6_2.10-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-kmp-default-debuginfo-4.1.3_01_k3.4.6_2.10-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-kmp-desktop-4.1.3_01_k3.4.6_2.10-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-kmp-desktop-debuginfo-4.1.3_01_k3.4.6_2.10-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-kmp-pae-4.1.3_01_k3.4.6_2.10-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-kmp-pae-debuginfo-4.1.3_01_k3.4.6_2.10-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-libs-4.1.3_01-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-libs-debuginfo-4.1.3_01-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-tools-domU-4.1.3_01-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-tools-domU-debuginfo-4.1.3_01-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-4.1.3_01-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-doc-html-4.1.3_01-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-doc-pdf-4.1.3_01-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-libs-32bit-4.1.3_01-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-libs-debuginfo-32bit-4.1.3_01-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-tools-4.1.3_01-5.6.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-tools-debuginfo-4.1.3_01-5.6.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xen-debugsource / xen-devel / xen-kmp-default / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:00:32", "bulletinFamily": "scanner", "description": "This security update of XEN fixes various bugs and security issues.\n\n - Upstream patch 26088-xend-xml-filesize-check.patch\n\n - bnc#787163 - CVE-2012-4544: xen: Domain builder Out-of-\n memory due to malicious kernel/ramdisk (XSA 25)\n CVE-2012-4544-xsa25.patch\n\n - bnc#779212 - CVE-2012-4411: XEN / qemu: guest\n administrator can access qemu monitor console (XSA-19)\n CVE-2012-4411-xsa19.patch\n\n - bnc#786516 - CVE-2012-4535: xen: Timer overflow DoS\n vulnerability CVE-2012-4535-xsa20.patch\n\n - bnc#786518 - CVE-2012-4536: xen: pirq range check DoS\n vulnerability CVE-2012-4536-xsa21.patch\n\n - bnc#786517 - CVE-2012-4537: xen: Memory mapping failure\n DoS vulnerability CVE-2012-4537-xsa22.patch\n\n - bnc#786519 - CVE-2012-4538: xen: Unhooking empty PAE\n entries DoS vulnerability CVE-2012-4538-xsa23.patch\n\n - bnc#786520 - CVE-2012-4539: xen: Grant table hypercall\n infinite loop DoS vulnerability\n CVE-2012-4539-xsa24.patch\n\n - bnc#784087 - L3: Xen BUG at io_apic.c:129\n 26102-x86-IOAPIC-legacy-not-first.patch\n\n - Upstream patches from Jan\n 26054-x86-AMD-perf-ctr-init.patch\n 26055-x86-oprof-hvm-mode.patch\n 26056-page-alloc-flush-filter.patch\n 26061-x86-oprof-counter-range.patch\n 26062-ACPI-ERST-move-data.patch\n 26063-x86-HPET-affinity-lock.patch\n 26093-HVM-PoD-grant-mem-type.patch\n\n - Upstream patches from Jan\n 25931-x86-domctl-iomem-mapping-checks.patch\n 25952-x86-MMIO-remap-permissions.patch\n\n-------------------------------------------------------------------\nMon Sep 24 16:41:58 CEST 2012 - ohering@suse.de\n\n - use BuildRequires: gcc46 only in sles11sp2 or 12.1 to\n fix build in 11.4\n\n-------------------------------------------------------------------\nThu Sep 20 10:03:40 MDT 2012 - carnold@novell.com\n\n - Upstream patches from Jan\n 25808-domain_create-return-value.patch\n 25814-x86_64-set-debugreg-guest.patch\n 25815-x86-PoD-no-bug-in-non-translated.patch\n 25816-x86-hvm-map-pirq-range-check.patch\n 25833-32on64-bogus-pt_base-adjust.patch\n 25834-x86-S3-MSI-resume.patch\n 25835-adjust-rcu-lock-domain.patch\n 25836-VT-d-S3-MSI-resume.patch 25850-tmem-xsa-15-1.patch\n 25851-tmem-xsa-15-2.patch 25852-tmem-xsa-15-3.patch\n 25853-tmem-xsa-15-4.patch 25854-tmem-xsa-15-5.patch\n 25855-tmem-xsa-15-6.patch 25856-tmem-xsa-15-7.patch\n 25857-tmem-xsa-15-8.patch 25858-tmem-xsa-15-9.patch\n 25859-tmem-missing-break.patch 25860-tmem-cleanup.patch\n 25883-pt-MSI-cleanup.patch\n 25927-x86-domctl-ioport-mapping-range.patch\n 25929-tmem-restore-pool-version.patch\n\n - bnc#778105 - first XEN-PV VM fails to spawn xend:\n Increase wait time for disk to appear in host bootloader\n Modified existing xen-domUloader.diff\n\n - Upstream patches from Jan\n 25752-ACPI-pm-op-valid-cpu.patch\n 25754-x86-PoD-early-access.patch\n 25755-x86-PoD-types.patch\n 25756-x86-MMIO-max-mapped-pfn.patch\n 25757-x86-EPT-PoD-1Gb-assert.patch\n 25764-x86-unknown-cpu-no-sysenter.patch\n 25765-x86_64-allow-unsafe-adjust.patch\n 25771-grant-copy-status-paged-out.patch\n 25773-x86-honor-no-real-mode.patch\n 25786-x86-prefer-multiboot-meminfo-over-e801.patch\n\n - bnc#777890 - CVE-2012-3497: xen: multiple TMEM hypercall\n vulnerabilities (XSA-15)\n CVE-2012-3497-tmem-xsa-15-1.patch\n CVE-2012-3497-tmem-xsa-15-2.patch\n CVE-2012-3497-tmem-xsa-15-3.patch\n CVE-2012-3497-tmem-xsa-15-4.patch\n CVE-2012-3497-tmem-xsa-15-5.patch\n CVE-2012-3497-tmem-xsa-15-6.patch\n CVE-2012-3497-tmem-xsa-15-7.patch\n CVE-2012-3497-tmem-xsa-15-8.patch\n CVE-2012-3497-tmem-xsa-15-9.patch\n tmem-missing-break.patch", "modified": "2019-11-02T00:00:00", "id": "OPENSUSE-2012-812.NASL", "href": "https://www.tenable.com/plugins/nessus/74821", "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : XEN (openSUSE-SU-2012:1573-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2012-812.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(74821);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2018/11/10 11:50:00\");\n\n script_cve_id(\"CVE-2007-0998\", \"CVE-2012-2625\", \"CVE-2012-2934\", \"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3497\", \"CVE-2012-3498\", \"CVE-2012-3515\", \"CVE-2012-4411\", \"CVE-2012-4535\", \"CVE-2012-4536\", \"CVE-2012-4537\", \"CVE-2012-4538\", \"CVE-2012-4539\", \"CVE-2012-4544\");\n\n script_name(english:\"openSUSE Security Update : XEN (openSUSE-SU-2012:1573-1)\");\n script_summary(english:\"Check for the openSUSE-2012-812 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This security update of XEN fixes various bugs and security issues.\n\n - Upstream patch 26088-xend-xml-filesize-check.patch\n\n - bnc#787163 - CVE-2012-4544: xen: Domain builder Out-of-\n memory due to malicious kernel/ramdisk (XSA 25)\n CVE-2012-4544-xsa25.patch\n\n - bnc#779212 - CVE-2012-4411: XEN / qemu: guest\n administrator can access qemu monitor console (XSA-19)\n CVE-2012-4411-xsa19.patch\n\n - bnc#786516 - CVE-2012-4535: xen: Timer overflow DoS\n vulnerability CVE-2012-4535-xsa20.patch\n\n - bnc#786518 - CVE-2012-4536: xen: pirq range check DoS\n vulnerability CVE-2012-4536-xsa21.patch\n\n - bnc#786517 - CVE-2012-4537: xen: Memory mapping failure\n DoS vulnerability CVE-2012-4537-xsa22.patch\n\n - bnc#786519 - CVE-2012-4538: xen: Unhooking empty PAE\n entries DoS vulnerability CVE-2012-4538-xsa23.patch\n\n - bnc#786520 - CVE-2012-4539: xen: Grant table hypercall\n infinite loop DoS vulnerability\n CVE-2012-4539-xsa24.patch\n\n - bnc#784087 - L3: Xen BUG at io_apic.c:129\n 26102-x86-IOAPIC-legacy-not-first.patch\n\n - Upstream patches from Jan\n 26054-x86-AMD-perf-ctr-init.patch\n 26055-x86-oprof-hvm-mode.patch\n 26056-page-alloc-flush-filter.patch\n 26061-x86-oprof-counter-range.patch\n 26062-ACPI-ERST-move-data.patch\n 26063-x86-HPET-affinity-lock.patch\n 26093-HVM-PoD-grant-mem-type.patch\n\n - Upstream patches from Jan\n 25931-x86-domctl-iomem-mapping-checks.patch\n 25952-x86-MMIO-remap-permissions.patch\n\n-------------------------------------------------------------------\nMon Sep 24 16:41:58 CEST 2012 - ohering@suse.de\n\n - use BuildRequires: gcc46 only in sles11sp2 or 12.1 to\n fix build in 11.4\n\n-------------------------------------------------------------------\nThu Sep 20 10:03:40 MDT 2012 - carnold@novell.com\n\n - Upstream patches from Jan\n 25808-domain_create-return-value.patch\n 25814-x86_64-set-debugreg-guest.patch\n 25815-x86-PoD-no-bug-in-non-translated.patch\n 25816-x86-hvm-map-pirq-range-check.patch\n 25833-32on64-bogus-pt_base-adjust.patch\n 25834-x86-S3-MSI-resume.patch\n 25835-adjust-rcu-lock-domain.patch\n 25836-VT-d-S3-MSI-resume.patch 25850-tmem-xsa-15-1.patch\n 25851-tmem-xsa-15-2.patch 25852-tmem-xsa-15-3.patch\n 25853-tmem-xsa-15-4.patch 25854-tmem-xsa-15-5.patch\n 25855-tmem-xsa-15-6.patch 25856-tmem-xsa-15-7.patch\n 25857-tmem-xsa-15-8.patch 25858-tmem-xsa-15-9.patch\n 25859-tmem-missing-break.patch 25860-tmem-cleanup.patch\n 25883-pt-MSI-cleanup.patch\n 25927-x86-domctl-ioport-mapping-range.patch\n 25929-tmem-restore-pool-version.patch\n\n - bnc#778105 - first XEN-PV VM fails to spawn xend:\n Increase wait time for disk to appear in host bootloader\n Modified existing xen-domUloader.diff\n\n - Upstream patches from Jan\n 25752-ACPI-pm-op-valid-cpu.patch\n 25754-x86-PoD-early-access.patch\n 25755-x86-PoD-types.patch\n 25756-x86-MMIO-max-mapped-pfn.patch\n 25757-x86-EPT-PoD-1Gb-assert.patch\n 25764-x86-unknown-cpu-no-sysenter.patch\n 25765-x86_64-allow-unsafe-adjust.patch\n 25771-grant-copy-status-paged-out.patch\n 25773-x86-honor-no-real-mode.patch\n 25786-x86-prefer-multiboot-meminfo-over-e801.patch\n\n - bnc#777890 - CVE-2012-3497: xen: multiple TMEM hypercall\n vulnerabilities (XSA-15)\n CVE-2012-3497-tmem-xsa-15-1.patch\n CVE-2012-3497-tmem-xsa-15-2.patch\n CVE-2012-3497-tmem-xsa-15-3.patch\n CVE-2012-3497-tmem-xsa-15-4.patch\n CVE-2012-3497-tmem-xsa-15-5.patch\n CVE-2012-3497-tmem-xsa-15-6.patch\n CVE-2012-3497-tmem-xsa-15-7.patch\n CVE-2012-3497-tmem-xsa-15-8.patch\n CVE-2012-3497-tmem-xsa-15-9.patch\n tmem-missing-break.patch\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=764077\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=771099\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=776755\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777090\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777091\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777890\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=778105\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=779212\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=784087\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=786516\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=786517\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=786518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=786519\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=786520\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=787163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2012-11/msg00085.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected XEN packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-doc-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-doc-pdf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-domU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/11/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-debugsource-4.1.3_04-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-devel-4.1.3_04-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-kmp-default-debuginfo-4.1.3_04_k3.4.11_2.16-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-kmp-desktop-debuginfo-4.1.3_04_k3.4.11_2.16-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-kmp-pae-debuginfo-4.1.3_04_k3.4.11_2.16-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-libs-4.1.3_04-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-libs-debuginfo-4.1.3_04-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-tools-domU-4.1.3_04-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xen-tools-domU-debuginfo-4.1.3_04-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-4.1.3_04-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-doc-html-4.1.3_04-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-doc-pdf-4.1.3_04-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-libs-32bit-4.1.3_04-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-libs-debuginfo-32bit-4.1.3_04-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-tools-4.1.3_04-5.13.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xen-tools-debuginfo-4.1.3_04-5.13.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"XEN\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:00:32", "bulletinFamily": "scanner", "description": "This security update of XEN fixes various bugs and security issues.\n\n - Upstream patch 26088-xend-xml-filesize-check.patch\n\n - bnc#787163 - CVE-2012-4544: xen: Domain builder Out-of-\n memory due to malicious kernel/ramdisk (XSA 25)\n CVE-2012-4544-xsa25.patch\n\n - bnc#779212 - CVE-2012-4411: XEN / qemu: guest\n administrator can access qemu monitor console (XSA-19)\n CVE-2012-4411-xsa19.patch\n\n - bnc#786516 - CVE-2012-4535: xen: Timer overflow DoS\n vulnerability CVE-2012-4535-xsa20.patch\n\n - bnc#786518 - CVE-2012-4536: xen: pirq range check DoS\n vulnerability CVE-2012-4536-xsa21.patch\n\n - bnc#786517 - CVE-2012-4537: xen: Memory mapping failure\n DoS vulnerability CVE-2012-4537-xsa22.patch\n\n - bnc#786519 - CVE-2012-4538: xen: Unhooking empty PAE\n entries DoS vulnerability CVE-2012-4538-xsa23.patch\n\n - bnc#786520 - CVE-2012-4539: xen: Grant table hypercall\n infinite loop DoS vulnerability\n CVE-2012-4539-xsa24.patch\n\n - bnc#784087 - L3: Xen BUG at io_apic.c:129\n 26102-x86-IOAPIC-legacy-not-first.patch\n\n - Upstream patches from Jan\n 26054-x86-AMD-perf-ctr-init.patch\n 26055-x86-oprof-hvm-mode.patch\n 26056-page-alloc-flush-filter.patch\n 26061-x86-oprof-counter-range.patch\n 26062-ACPI-ERST-move-data.patch\n 26063-x86-HPET-affinity-lock.patch\n 26093-HVM-PoD-grant-mem-type.patch\n\n - Upstream patches from Jan\n 25931-x86-domctl-iomem-mapping-checks.patch\n 25952-x86-MMIO-remap-permissions.patch\n\n - Upstream patches from Jan\n 25808-domain_create-return-value.patch\n 25814-x86_64-set-debugreg-guest.patch\n 25815-x86-PoD-no-bug-in-non-translated.patch\n 25816-x86-hvm-map-pirq-range-check.patch\n 25833-32on64-bogus-pt_base-adjust.patch\n 25834-x86-S3-MSI-resume.patch\n 25835-adjust-rcu-lock-domain.patch\n 25836-VT-d-S3-MSI-resume.patch 25850-tmem-xsa-15-1.patch\n 25851-tmem-xsa-15-2.patch 25852-tmem-xsa-15-3.patch\n 25853-tmem-xsa-15-4.patch 25854-tmem-xsa-15-5.patch\n 25855-tmem-xsa-15-6.patch 25856-tmem-xsa-15-7.patch\n 25857-tmem-xsa-15-8.patch 25858-tmem-xsa-15-9.patch\n 25859-tmem-missing-break.patch 25860-tmem-cleanup.patch\n 25883-pt-MSI-cleanup.patch\n 25927-x86-domctl-ioport-mapping-range.patch\n 25929-tmem-restore-pool-version.patch\n\n - bnc#778105 - first XEN-PV VM fails to spawn xend:\n Increase wait time for disk to appear in host bootloader\n Modified existing xen-domUloader.diff\n\n - Upstream patches from Jan\n 25752-ACPI-pm-op-valid-cpu.patch\n 25754-x86-PoD-early-access.patch\n 25755-x86-PoD-types.patch\n 25756-x86-MMIO-max-mapped-pfn.patch\n 25757-x86-EPT-PoD-1Gb-assert.patch\n 25764-x86-unknown-cpu-no-sysenter.patch\n 25765-x86_64-allow-unsafe-adjust.patch\n 25771-grant-copy-status-paged-out.patch\n 25773-x86-honor-no-real-mode.patch\n 25786-x86-prefer-multiboot-meminfo-over-e801.patch\n\n - bnc#777890 - CVE-2012-3497: xen: multiple TMEM hypercall\n vulnerabilities (XSA-15)\n CVE-2012-3497-tmem-xsa-15-1.patch\n CVE-2012-3497-tmem-xsa-15-2.patch\n CVE-2012-3497-tmem-xsa-15-3.patch\n CVE-2012-3497-tmem-xsa-15-4.patch\n CVE-2012-3497-tmem-xsa-15-5.patch\n CVE-2012-3497-tmem-xsa-15-6.patch\n CVE-2012-3497-tmem-xsa-15-7.patch\n CVE-2012-3497-tmem-xsa-15-8.patch\n CVE-2012-3497-tmem-xsa-15-9.patch\n tmem-missing-break.patch", "modified": "2019-11-02T00:00:00", "id": "OPENSUSE-2012-811.NASL", "href": "https://www.tenable.com/plugins/nessus/74820", "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : XEN (openSUSE-SU-2012:1572-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2012-811.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(74820);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2018/11/10 11:50:00\");\n\n script_cve_id(\"CVE-2007-0998\", \"CVE-2012-2625\", \"CVE-2012-2934\", \"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3497\", \"CVE-2012-3498\", \"CVE-2012-3515\", \"CVE-2012-4411\", \"CVE-2012-4535\", \"CVE-2012-4536\", \"CVE-2012-4537\", \"CVE-2012-4538\", \"CVE-2012-4539\", \"CVE-2012-4544\");\n\n script_name(english:\"openSUSE Security Update : XEN (openSUSE-SU-2012:1572-1)\");\n script_summary(english:\"Check for the openSUSE-2012-811 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This security update of XEN fixes various bugs and security issues.\n\n - Upstream patch 26088-xend-xml-filesize-check.patch\n\n - bnc#787163 - CVE-2012-4544: xen: Domain builder Out-of-\n memory due to malicious kernel/ramdisk (XSA 25)\n CVE-2012-4544-xsa25.patch\n\n - bnc#779212 - CVE-2012-4411: XEN / qemu: guest\n administrator can access qemu monitor console (XSA-19)\n CVE-2012-4411-xsa19.patch\n\n - bnc#786516 - CVE-2012-4535: xen: Timer overflow DoS\n vulnerability CVE-2012-4535-xsa20.patch\n\n - bnc#786518 - CVE-2012-4536: xen: pirq range check DoS\n vulnerability CVE-2012-4536-xsa21.patch\n\n - bnc#786517 - CVE-2012-4537: xen: Memory mapping failure\n DoS vulnerability CVE-2012-4537-xsa22.patch\n\n - bnc#786519 - CVE-2012-4538: xen: Unhooking empty PAE\n entries DoS vulnerability CVE-2012-4538-xsa23.patch\n\n - bnc#786520 - CVE-2012-4539: xen: Grant table hypercall\n infinite loop DoS vulnerability\n CVE-2012-4539-xsa24.patch\n\n - bnc#784087 - L3: Xen BUG at io_apic.c:129\n 26102-x86-IOAPIC-legacy-not-first.patch\n\n - Upstream patches from Jan\n 26054-x86-AMD-perf-ctr-init.patch\n 26055-x86-oprof-hvm-mode.patch\n 26056-page-alloc-flush-filter.patch\n 26061-x86-oprof-counter-range.patch\n 26062-ACPI-ERST-move-data.patch\n 26063-x86-HPET-affinity-lock.patch\n 26093-HVM-PoD-grant-mem-type.patch\n\n - Upstream patches from Jan\n 25931-x86-domctl-iomem-mapping-checks.patch\n 25952-x86-MMIO-remap-permissions.patch\n\n - Upstream patches from Jan\n 25808-domain_create-return-value.patch\n 25814-x86_64-set-debugreg-guest.patch\n 25815-x86-PoD-no-bug-in-non-translated.patch\n 25816-x86-hvm-map-pirq-range-check.patch\n 25833-32on64-bogus-pt_base-adjust.patch\n 25834-x86-S3-MSI-resume.patch\n 25835-adjust-rcu-lock-domain.patch\n 25836-VT-d-S3-MSI-resume.patch 25850-tmem-xsa-15-1.patch\n 25851-tmem-xsa-15-2.patch 25852-tmem-xsa-15-3.patch\n 25853-tmem-xsa-15-4.patch 25854-tmem-xsa-15-5.patch\n 25855-tmem-xsa-15-6.patch 25856-tmem-xsa-15-7.patch\n 25857-tmem-xsa-15-8.patch 25858-tmem-xsa-15-9.patch\n 25859-tmem-missing-break.patch 25860-tmem-cleanup.patch\n 25883-pt-MSI-cleanup.patch\n 25927-x86-domctl-ioport-mapping-range.patch\n 25929-tmem-restore-pool-version.patch\n\n - bnc#778105 - first XEN-PV VM fails to spawn xend:\n Increase wait time for disk to appear in host bootloader\n Modified existing xen-domUloader.diff\n\n - Upstream patches from Jan\n 25752-ACPI-pm-op-valid-cpu.patch\n 25754-x86-PoD-early-access.patch\n 25755-x86-PoD-types.patch\n 25756-x86-MMIO-max-mapped-pfn.patch\n 25757-x86-EPT-PoD-1Gb-assert.patch\n 25764-x86-unknown-cpu-no-sysenter.patch\n 25765-x86_64-allow-unsafe-adjust.patch\n 25771-grant-copy-status-paged-out.patch\n 25773-x86-honor-no-real-mode.patch\n 25786-x86-prefer-multiboot-meminfo-over-e801.patch\n\n - bnc#777890 - CVE-2012-3497: xen: multiple TMEM hypercall\n vulnerabilities (XSA-15)\n CVE-2012-3497-tmem-xsa-15-1.patch\n CVE-2012-3497-tmem-xsa-15-2.patch\n CVE-2012-3497-tmem-xsa-15-3.patch\n CVE-2012-3497-tmem-xsa-15-4.patch\n CVE-2012-3497-tmem-xsa-15-5.patch\n CVE-2012-3497-tmem-xsa-15-6.patch\n CVE-2012-3497-tmem-xsa-15-7.patch\n CVE-2012-3497-tmem-xsa-15-8.patch\n CVE-2012-3497-tmem-xsa-15-9.patch\n tmem-missing-break.patch\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=764077\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=771099\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=776755\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=776995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777090\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777091\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=777890\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=778105\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=779212\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=784087\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=786516\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=786517\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=786518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=786519\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=786520\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=787163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2012-11/msg00084.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected XEN packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-doc-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-doc-pdf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-domU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/11/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-debugsource-4.1.3_04-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-devel-4.1.3_04-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-kmp-default-4.1.3_04_k3.1.10_1.16-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-kmp-default-debuginfo-4.1.3_04_k3.1.10_1.16-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-kmp-desktop-4.1.3_04_k3.1.10_1.16-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-kmp-desktop-debuginfo-4.1.3_04_k3.1.10_1.16-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-kmp-pae-4.1.3_04_k3.1.10_1.16-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-kmp-pae-debuginfo-4.1.3_04_k3.1.10_1.16-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-libs-4.1.3_04-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-libs-debuginfo-4.1.3_04-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-tools-domU-4.1.3_04-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"xen-tools-domU-debuginfo-4.1.3_04-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-4.1.3_04-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-doc-html-4.1.3_04-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-doc-pdf-4.1.3_04-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-libs-32bit-4.1.3_04-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-libs-debuginfo-32bit-4.1.3_04-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-tools-4.1.3_04-1.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"xen-tools-debuginfo-4.1.3_04-1.21.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"XEN\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:40:41", "bulletinFamily": "scanner", "description": "The remote host is affected by the vulnerability described in GLSA-201604-03\n(Xen: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Xen. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n A local attacker could possibly cause a Denial of Service condition or\n obtain sensitive information.\n \nWorkaround :\n\n There is no known workaround at this time.", "modified": "2019-11-02T00:00:00", "id": "GENTOO_GLSA-201604-03.NASL", "href": "https://www.tenable.com/plugins/nessus/90380", "published": "2016-04-07T00:00:00", "title": "GLSA-201604-03 : Xen: Multiple vulnerabilities (Venom)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201604-03.\n#\n# The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(90380);\n script_version(\"2.6\");\n script_cvs_date(\"Date: 2019/08/12 17:35:38\");\n\n script_cve_id(\"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3497\", \"CVE-2012-3498\", \"CVE-2012-3515\", \"CVE-2012-4411\", \"CVE-2012-4535\", \"CVE-2012-4536\", \"CVE-2012-4537\", \"CVE-2012-4538\", \"CVE-2012-4539\", \"CVE-2012-6030\", \"CVE-2012-6031\", \"CVE-2012-6032\", \"CVE-2012-6033\", \"CVE-2012-6034\", \"CVE-2012-6035\", \"CVE-2012-6036\", \"CVE-2015-2151\", \"CVE-2015-3209\", \"CVE-2015-3259\", \"CVE-2015-3340\", \"CVE-2015-3456\", \"CVE-2015-4103\", \"CVE-2015-4104\", \"CVE-2015-4105\", \"CVE-2015-4106\", \"CVE-2015-4163\", \"CVE-2015-4164\", \"CVE-2015-5154\", \"CVE-2015-7311\", \"CVE-2015-7504\", \"CVE-2015-7812\", \"CVE-2015-7813\", \"CVE-2015-7814\", \"CVE-2015-7835\", \"CVE-2015-7871\", \"CVE-2015-7969\", \"CVE-2015-7970\", \"CVE-2015-7971\", \"CVE-2015-7972\", \"CVE-2015-8339\", \"CVE-2015-8340\", \"CVE-2015-8341\", \"CVE-2015-8550\", \"CVE-2015-8551\", \"CVE-2015-8552\", \"CVE-2015-8554\", \"CVE-2015-8555\", \"CVE-2016-2270\", \"CVE-2016-2271\");\n script_xref(name:\"GLSA\", value:\"201604-03\");\n\n script_name(english:\"GLSA-201604-03 : Xen: Multiple vulnerabilities (Venom)\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201604-03\n(Xen: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Xen. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n A local attacker could possibly cause a Denial of Service condition or\n obtain sensitive information.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201604-03\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Xen 4.5 users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-emulation/xen-4.5.2-r5'\n All Xen 4.6 users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-emulation/xen-4.6.0-r9'\n All Xen tools 4.5 users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-emulation/xen-tools-4.5.2-r5'\n All Xen tools 4.6 users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-emulation/xen-tools-4.6.0-r9'\n All Xen pvgrub users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-emulation/xen-pvgrub-4.6.0'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:pvgrub\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:xen-pvgrub\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:xen-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/11/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/07\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"app-emulation/xen-pvgrub\", unaffected:make_list(), vulnerable:make_list(\"lt 4.6.0\"))) flag++;\nif (qpkg_check(package:\"app-emulation/xen\", unaffected:make_list(\"ge 4.6.0-r9\", \"rge 4.5.2-r5\"), vulnerable:make_list(\"lt 4.6.0-r9\"))) flag++;\nif (qpkg_check(package:\"app-emulation/xen-tools\", unaffected:make_list(\"ge 4.6.0-r9\", \"rge 4.5.2-r5\"), vulnerable:make_list(\"lt 4.6.0-r9\"))) flag++;\nif (qpkg_check(package:\"app-emulation/pvgrub\", unaffected:make_list(\"ge 4.6.0\", \"rge 4.5.2\"), vulnerable:make_list())) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Xen\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-11-01T02:40:28", "bulletinFamily": "scanner", "description": "The remote host is affected by the vulnerability described in GLSA-201309-24\n(Xen: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Xen. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n Guest domains could possibly gain privileges, execute arbitrary code, or\n cause a Denial of Service on the host domain (Dom0). Additionally, guest\n domains could gain information about other virtual machines running on\n the same host or read arbitrary files on the host.\n \nWorkaround :\n\n The CVEs listed below do not currently have fixes, but only apply to Xen\n setups which have “tmem” specified on the hypervisor command line.\n TMEM is not currently supported for use in production systems, and\n administrators using tmem should disable it.\n Relevant CVEs:\n * CVE-2012-2497\n * CVE-2012-6030\n * CVE-2012-6031\n * CVE-2012-6032\n * CVE-2012-6033\n * CVE-2012-6034\n * CVE-2012-6035\n * CVE-2012-6036", "modified": "2019-11-02T00:00:00", "id": "GENTOO_GLSA-201309-24.NASL", "href": "https://www.tenable.com/plugins/nessus/70184", "published": "2013-09-28T00:00:00", "title": "GLSA-201309-24 : Xen: Multiple vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201309-24.\n#\n# The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(70184);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/08/12 17:35:38\");\n\n script_cve_id(\"CVE-2011-2901\", \"CVE-2011-3262\", \"CVE-2012-0217\", \"CVE-2012-0218\", \"CVE-2012-2934\", \"CVE-2012-3432\", \"CVE-2012-3433\", \"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3497\", \"CVE-2012-3498\", \"CVE-2012-3515\", \"CVE-2012-4411\", \"CVE-2012-4535\", \"CVE-2012-4536\", \"CVE-2012-4537\", \"CVE-2012-4538\", \"CVE-2012-4539\", \"CVE-2012-5510\", \"CVE-2012-5511\", \"CVE-2012-5512\", \"CVE-2012-5513\", \"CVE-2012-5514\", \"CVE-2012-5515\", \"CVE-2012-5525\", \"CVE-2012-5634\", \"CVE-2012-6030\", \"CVE-2012-6031\", \"CVE-2012-6032\", \"CVE-2012-6033\", \"CVE-2012-6034\", \"CVE-2012-6035\", \"CVE-2012-6036\", \"CVE-2012-6075\", \"CVE-2012-6333\", \"CVE-2013-0151\", \"CVE-2013-0152\", \"CVE-2013-0153\", \"CVE-2013-0154\", \"CVE-2013-0215\", \"CVE-2013-1432\", \"CVE-2013-1917\", \"CVE-2013-1918\", \"CVE-2013-1919\", \"CVE-2013-1920\", \"CVE-2013-1922\", \"CVE-2013-1952\", \"CVE-2013-1964\", \"CVE-2013-2076\", \"CVE-2013-2077\", \"CVE-2013-2078\", \"CVE-2013-2194\", \"CVE-2013-2195\", \"CVE-2013-2196\", \"CVE-2013-2211\");\n script_bugtraq_id(49370, 53856, 53955, 53961, 54691, 54942, 55400, 55406, 55410, 55412, 55413, 55414, 55442, 56498, 56794, 56796, 56797, 56798, 56799, 56803, 56805, 57159, 57223, 57420, 57494, 57495, 57742, 57745, 58880, 59070, 59291, 59292, 59293, 59615, 59617, 60277, 60278, 60282, 60701, 60702, 60703, 60721, 60799);\n script_xref(name:\"GLSA\", value:\"201309-24\");\n\n script_name(english:\"GLSA-201309-24 : Xen: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201309-24\n(Xen: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Xen. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n Guest domains could possibly gain privileges, execute arbitrary code, or\n cause a Denial of Service on the host domain (Dom0). Additionally, guest\n domains could gain information about other virtual machines running on\n the same host or read arbitrary files on the host.\n \nWorkaround :\n\n The CVEs listed below do not currently have fixes, but only apply to Xen\n setups which have “tmem” specified on the hypervisor command line.\n TMEM is not currently supported for use in production systems, and\n administrators using tmem should disable it.\n Relevant CVEs:\n * CVE-2012-2497\n * CVE-2012-6030\n * CVE-2012-6031\n * CVE-2012-6032\n * CVE-2012-6033\n * CVE-2012-6034\n * CVE-2012-6035\n * CVE-2012-6036\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201309-24\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Xen users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-emulation/xen-4.2.2-r1'\n All Xen-tools users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=app-emulation/xen-tools-4.2.2-r3'\n All Xen-pvgrub users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=app-emulation/xen-pvgrub-4.2.2-r1'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'FreeBSD Intel SYSRET Privilege Escalation');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:xen-pvgrub\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:xen-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/09/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/09/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"app-emulation/xen-pvgrub\", unaffected:make_list(\"ge 4.2.2-r1\"), vulnerable:make_list(\"lt 4.2.2-r1\"))) flag++;\nif (qpkg_check(package:\"app-emulation/xen\", unaffected:make_list(\"ge 4.2.2-r1\"), vulnerable:make_list(\"lt 4.2.2-r1\"))) flag++;\nif (qpkg_check(package:\"app-emulation/xen-tools\", unaffected:make_list(\"ge 4.2.2-r3\"), vulnerable:make_list(\"lt 4.2.2-r3\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Xen\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T11:28:41", "bulletinFamily": "unix", "description": "XEN was updated 4.1.3 to fix multiple bugs and security\n issues.\n\n The following security issues have been fixed:\n\n * CVE-2012-3494: xen: hypercall set_debugreg\n vulnerability (XSA-12)\n * CVE-2012-3495: xen: hypercall physdev_get_free_pirq\n vulnerability (XSA-13)\n * CVE-2012-3496: xen: XENMEM_populate_physmap DoS\n vulnerability (XSA-14)\n * CVE-2012-3498: xen: PHYSDEVOP_map_pirq index\n vulnerability (XSA-16)\n * CVE-2012-3515: xen: Qemu VT100 emulation\n vulnerability (XSA-17)\n\n Also the following bugs have been fixed:\n\n * pvscsi support of attaching Luns - bnc#776995\n\n The following related bugs in vm-install 0.5.12 have been\n fixed:\n\n * bnc#776300 - vm-install does not pass --extra-args in\n --upgrade\n * Add for support Open Enterprise Server 11\n * Add support for Windows 8 and Windows Server 2012\n * Add support for Ubuntu 12 (Precise Pangolin)\n", "modified": "2012-09-07T15:08:36", "published": "2012-09-07T15:08:36", "id": "SUSE-SU-2012:1132-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html", "type": "suse", "title": "Security update for Xen (important)", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:41:29", "bulletinFamily": "unix", "description": "XEN was updated to fix multiple bugs and security issues.\n\n The following security issues have been fixed:\n\n * CVE-2012-3494: xen: hypercall set_debugreg\n vulnerability (XSA-12)\n * CVE-2012-3515: xen: Qemu VT100 emulation\n vulnerability (XSA-17)\n", "modified": "2012-09-07T16:08:25", "published": "2012-09-07T16:08:25", "id": "SUSE-SU-2012:1133-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html", "title": "Security update for Xen (important)", "type": "suse", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:27:16", "bulletinFamily": "unix", "description": "Security Update for Xen\n\n Following bug and security fixes were applied:\n - bnc#776995 - attaching scsi control luns with pvscsi\n - xend/pvscsi: fix passing of SCSI control LUNs\n xen-bug776995-pvscsi-no-devname.patch\n - xend/pvscsi: fix usage of persistant device names for\n SCSI devices xen-bug776995-pvscsi-persistent-names.patch\n - xend/pvscsi: update sysfs parser for Linux 3.0\n xen-bug776995-pvscsi-sysfs-parser.patch\n\n - bnc#777090 - CVE-2012-3494: xen: hypercall set_debugreg\n vulnerability (XSA-12) CVE-2012-3494-xsa12.patch\n - bnc#777088 - CVE-2012-3495: xen: hypercall\n physdev_get_free_pirq vulnerability (XSA-13)\n CVE-2012-3495-xsa13.patch\n - bnc#777091 - CVE-2012-3496: xen: XENMEM_populate_physmap\n DoS vulnerability (XSA-14) CVE-2012-3496-xsa14.patch\n - bnc#777086 - CVE-2012-3498: xen: PHYSDEVOP_map_pirq index\n vulnerability (XSA-16) CVE-2012-3498-xsa16.patch\n - bnc#777084 - CVE-2012-3515: xen: Qemu VT100 emulation\n vulnerability (XSA-17) CVE-2012-3515-xsa17.patch\n\n - Upstream patches from Jan 25734-x86-MCG_CTL-default.patch\n 25735-x86-cpuid-masking-XeonE5.patch\n 25744-hypercall-return-long.patch\n\n - Update to Xen 4.1.3 c/s 23336\n\n\n - Upstream or pending upstream patches from Jan\n 25587-fix-off-by-one-parsing-error.patch\n 25616-x86-MCi_CTL-default.patch\n 25617-vtd-qinval-addr.patch 25688-x86-nr_irqs_gsi.patch\n\n - bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest destroy\n p2m teardown host DoS vulnerability\n CVE-2012-3433-xsa11.patch\n - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user\n mode MMIO emulation DoS\n 25682-x86-inconsistent-io-state.patch\n\n\n - bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader\n doesn't check the size of the bzip2 or lzma compressed\n kernel, leading to denial of service\n 25589-pygrub-size-limits.patch\n\n - bnc#767273 - unsupported /var/lock/subsys is still used\n by xendomains init.xendomains\n\n - bnc#766283 - opensuse 12.2 pv guests can not start after\n installation due to lack of grub2 support in the host\n 23686-pygrub-solaris.patch 23697-pygrub-grub2.patch\n 23944-pygrub-debug.patch 23998-pygrub-GPT.patch\n 23999-pygrub-grub2.patch 24000-pygrub-grub2.patch\n 24001-pygrub-grub2.patch 24002-pygrub-grub2.patch\n 24064-pygrub-HybridISO.patch 24401-pygrub-scrolling.patch\n 24402-pygrub-edit-fix.patch 24460-pygrub-extlinux.patch\n 24706-pygrub-extlinux.patch\n\n", "modified": "2012-09-14T14:09:32", "published": "2012-09-14T14:09:32", "id": "OPENSUSE-SU-2012:1172-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html", "title": "Security Update for Xen (important)", "type": "suse", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:49:16", "bulletinFamily": "unix", "description": "This security update of XEN fixes various bugs and security\n issues.\n\n - Upstream patch 26088-xend-xml-filesize-check.patch\n\n - bnc#787163 - CVE-2012-4544: xen: Domain builder Out-of-\n memory due to malicious kernel/ramdisk (XSA 25)\n CVE-2012-4544-xsa25.patch\n - bnc#779212 - CVE-2012-4411: XEN / qemu: guest\n administrator can access qemu monitor console (XSA-19)\n CVE-2012-4411-xsa19.patch\n\n\n - bnc#786516 - CVE-2012-4535: xen: Timer overflow DoS\n vulnerability CVE-2012-4535-xsa20.patch\n - bnc#786518 - CVE-2012-4536: xen: pirq range check DoS\n vulnerability CVE-2012-4536-xsa21.patch\n - bnc#786517 - CVE-2012-4537: xen: Memory mapping failure\n DoS vulnerability CVE-2012-4537-xsa22.patch\n - bnc#786519 - CVE-2012-4538: xen: Unhooking empty PAE\n entries DoS vulnerability CVE-2012-4538-xsa23.patch\n - bnc#786520 - CVE-2012-4539: xen: Grant table hypercall\n infinite loop DoS vulnerability CVE-2012-4539-xsa24.patch\n - bnc#784087 - L3: Xen BUG at io_apic.c:129\n 26102-x86-IOAPIC-legacy-not-first.patch\n - Upstream patches from Jan\n 26054-x86-AMD-perf-ctr-init.patch\n 26055-x86-oprof-hvm-mode.patch\n 26056-page-alloc-flush-filter.patch\n 26061-x86-oprof-counter-range.patch\n 26062-ACPI-ERST-move-data.patch\n 26063-x86-HPET-affinity-lock.patch\n 26093-HVM-PoD-grant-mem-type.patch\n - Upstream patches from Jan\n 25931-x86-domctl-iomem-mapping-checks.patch\n 25952-x86-MMIO-remap-permissions.patch\n\n - Upstream patches from Jan\n 25808-domain_create-return-value.patch\n 25814-x86_64-set-debugreg-guest.patch\n 25815-x86-PoD-no-bug-in-non-translated.patch\n 25816-x86-hvm-map-pirq-range-check.patch\n 25833-32on64-bogus-pt_base-adjust.patch\n 25834-x86-S3-MSI-resume.patch\n 25835-adjust-rcu-lock-domain.patch\n 25836-VT-d-S3-MSI-resume.patch 25850-tmem-xsa-15-1.patch\n 25851-tmem-xsa-15-2.patch 25852-tmem-xsa-15-3.patch\n 25853-tmem-xsa-15-4.patch 25854-tmem-xsa-15-5.patch\n 25855-tmem-xsa-15-6.patch 25856-tmem-xsa-15-7.patch\n 25857-tmem-xsa-15-8.patch 25858-tmem-xsa-15-9.patch\n 25859-tmem-missing-break.patch 25860-tmem-cleanup.patch\n 25883-pt-MSI-cleanup.patch\n 25927-x86-domctl-ioport-mapping-range.patch\n 25929-tmem-restore-pool-version.patch\n\n - bnc#778105 - first XEN-PV VM fails to spawn xend:\n Increase wait time for disk to appear in host bootloader\n Modified existing xen-domUloader.diff\n\n - Upstream patches from Jan\n 25752-ACPI-pm-op-valid-cpu.patch\n 25754-x86-PoD-early-access.patch\n 25755-x86-PoD-types.patch\n 25756-x86-MMIO-max-mapped-pfn.patch\n 25757-x86-EPT-PoD-1Gb-assert.patch\n 25764-x86-unknown-cpu-no-sysenter.patch\n 25765-x86_64-allow-unsafe-adjust.patch\n 25771-grant-copy-status-paged-out.patch\n 25773-x86-honor-no-real-mode.patch\n 25786-x86-prefer-multiboot-meminfo-over-e801.patch\n - bnc#777890 - CVE-2012-3497: xen: multiple TMEM hypercall\n vulnerabilities (XSA-15)\n CVE-2012-3497-tmem-xsa-15-1.patch\n CVE-2012-3497-tmem-xsa-15-2.patch\n CVE-2012-3497-tmem-xsa-15-3.patch\n CVE-2012-3497-tmem-xsa-15-4.patch\n CVE-2012-3497-tmem-xsa-15-5.patch\n CVE-2012-3497-tmem-xsa-15-6.patch\n CVE-2012-3497-tmem-xsa-15-7.patch\n CVE-2012-3497-tmem-xsa-15-8.patch\n CVE-2012-3497-tmem-xsa-15-9.patch tmem-missing-break.patch\n\n", "modified": "2012-11-26T15:08:36", "published": "2012-11-26T15:08:36", "href": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html", "id": "OPENSUSE-SU-2012:1572-1", "title": "XEN: security and bugfix update (important)", "type": "suse", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:08:46", "bulletinFamily": "unix", "description": "This security update of XEN fixes various bugs and security\n issues.\n\n - Upstream patch 26088-xend-xml-filesize-check.patch\n\n - bnc#787163 - CVE-2012-4544: xen: Domain builder Out-of-\n memory due to malicious kernel/ramdisk (XSA 25)\n CVE-2012-4544-xsa25.patch\n - bnc#779212 - CVE-2012-4411: XEN / qemu: guest\n administrator can access qemu monitor console (XSA-19)\n CVE-2012-4411-xsa19.patch\n\n - bnc#786516 - CVE-2012-4535: xen: Timer overflow DoS\n vulnerability CVE-2012-4535-xsa20.patch\n - bnc#786518 - CVE-2012-4536: xen: pirq range check DoS\n vulnerability CVE-2012-4536-xsa21.patch\n - bnc#786517 - CVE-2012-4537: xen: Memory mapping failure\n DoS vulnerability CVE-2012-4537-xsa22.patch\n - bnc#786519 - CVE-2012-4538: xen: Unhooking empty PAE\n entries DoS vulnerability CVE-2012-4538-xsa23.patch\n - bnc#786520 - CVE-2012-4539: xen: Grant table hypercall\n infinite loop DoS vulnerability CVE-2012-4539-xsa24.patch\n - bnc#784087 - L3: Xen BUG at io_apic.c:129\n 26102-x86-IOAPIC-legacy-not-first.patch\n - Upstream patches from Jan\n 26054-x86-AMD-perf-ctr-init.patch\n 26055-x86-oprof-hvm-mode.patch\n 26056-page-alloc-flush-filter.patch\n 26061-x86-oprof-counter-range.patch\n 26062-ACPI-ERST-move-data.patch\n 26063-x86-HPET-affinity-lock.patch\n 26093-HVM-PoD-grant-mem-type.patch\n\n - Upstream patches from Jan\n 25931-x86-domctl-iomem-mapping-checks.patch\n 25952-x86-MMIO-remap-permissions.patch\n\n ------------------------------------------------------------\n ------- Mon Sep 24 16:41:58 CEST 2012 - ohering@xxxxxxx\n\n - use BuildRequires: gcc46 only in sles11sp2 or 12.1 to fix\n build in 11.4\n\n ------------------------------------------------------------\n ------- Thu Sep 20 10:03:40 MDT 2012 - carnold@xxxxxxxxxx\n\n - Upstream patches from Jan\n 25808-domain_create-return-value.patch\n 25814-x86_64-set-debugreg-guest.patch\n 25815-x86-PoD-no-bug-in-non-translated.patch\n 25816-x86-hvm-map-pirq-range-check.patch\n 25833-32on64-bogus-pt_base-adjust.patch\n 25834-x86-S3-MSI-resume.patch\n 25835-adjust-rcu-lock-domain.patch\n 25836-VT-d-S3-MSI-resume.patch 25850-tmem-xsa-15-1.patch\n 25851-tmem-xsa-15-2.patch 25852-tmem-xsa-15-3.patch\n 25853-tmem-xsa-15-4.patch 25854-tmem-xsa-15-5.patch\n 25855-tmem-xsa-15-6.patch 25856-tmem-xsa-15-7.patch\n 25857-tmem-xsa-15-8.patch 25858-tmem-xsa-15-9.patch\n 25859-tmem-missing-break.patch 25860-tmem-cleanup.patch\n 25883-pt-MSI-cleanup.patch\n 25927-x86-domctl-ioport-mapping-range.patch\n 25929-tmem-restore-pool-version.patch\n\n - bnc#778105 - first XEN-PV VM fails to spawn xend:\n Increase wait time for disk to appear in host bootloader\n Modified existing xen-domUloader.diff\n\n - Upstream patches from Jan\n 25752-ACPI-pm-op-valid-cpu.patch\n 25754-x86-PoD-early-access.patch\n 25755-x86-PoD-types.patch\n 25756-x86-MMIO-max-mapped-pfn.patch\n 25757-x86-EPT-PoD-1Gb-assert.patch\n 25764-x86-unknown-cpu-no-sysenter.patch\n 25765-x86_64-allow-unsafe-adjust.patch\n 25771-grant-copy-status-paged-out.patch\n 25773-x86-honor-no-real-mode.patch\n 25786-x86-prefer-multiboot-meminfo-over-e801.patch\n - bnc#777890 - CVE-2012-3497: xen: multiple TMEM hypercall\n vulnerabilities (XSA-15)\n CVE-2012-3497-tmem-xsa-15-1.patch\n CVE-2012-3497-tmem-xsa-15-2.patch\n CVE-2012-3497-tmem-xsa-15-3.patch\n CVE-2012-3497-tmem-xsa-15-4.patch\n CVE-2012-3497-tmem-xsa-15-5.patch\n CVE-2012-3497-tmem-xsa-15-6.patch\n CVE-2012-3497-tmem-xsa-15-7.patch\n CVE-2012-3497-tmem-xsa-15-8.patch\n CVE-2012-3497-tmem-xsa-15-9.patch tmem-missing-break.patch\n\n", "modified": "2012-11-26T15:13:15", "published": "2012-11-26T15:13:15", "id": "OPENSUSE-SU-2012:1573-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html", "type": "suse", "title": "XEN: security and bugfix update (important)", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2018-01-11T11:06:41", "bulletinFamily": "scanner", "description": "Check for the Version of Security", "modified": "2018-01-09T00:00:00", "published": "2012-12-13T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=850324", "id": "OPENVAS:850324", "title": "SuSE Update for Security openSUSE-SU-2012:1172-1 (Security)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2012_1172_1.nasl 8336 2018-01-09 07:01:48Z teissa $\n#\n# SuSE Update for Security openSUSE-SU-2012:1172-1 (Security)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Security Update for Xen\n\n Following bug and security fixes were applied:\n - bnc#776995 - attaching scsi control luns with pvscsi\n - xend/pvscsi: fix passing of SCSI control LUNs\n xen-bug776995-pvscsi-no-devname.patch\n - xend/pvscsi: fix usage of persistent device names for\n SCSI devices xen-bug776995-pvscsi-persistent-names.patch\n - xend/pvscsi: update sysfs parser for Linux 3.0\n xen-bug776995-pvscsi-sysfs-parser.patch\n\n - bnc#777090 - CVE-2012-3494: xen: hypercall set_debugreg\n vulnerability (XSA-12) CVE-2012-3494-xsa12.patch\n - bnc#777088 - CVE-2012-3495: xen: hypercall\n physdev_get_free_pirq vulnerability (XSA-13)\n CVE-2012-3495-xsa13.patch\n - bnc#777091 - CVE-2012-3496: xen: XENMEM_populate_physmap\n DoS vulnerability (XSA-14) CVE-2012-3496-xsa14.patch\n - bnc#777086 - CVE-2012-3498: xen: PHYSDEVOP_map_pirq index\n vulnerability (XSA-16) CVE-2012-3498-xsa16.patch\n - bnc#777084 - CVE-2012-3515: xen: Qemu VT100 emulation\n vulnerability (XSA-17) CVE-2012-3515-xsa17.patch\n\n - Upstream patches from Jan 25734-x86-MCG_CTL-default.patch\n 25735-x86-cpuid-masking-XeonE5.patch\n 25744-hypercall-return-long.patch\n\n - Update to Xen 4.1.3 c/s 23336\n\n\n - Upstream or pending upstream patches from Jan\n 25587-fix-off-by-one-parsing-error.patch\n 25616-x86-MCi_CTL-default.patch\n 25617-vtd-qinval-addr.patch 25688-x86-nr_irqs_gsi.patch\n\n - bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest destroy\n p2m teardown host DoS vulnerability\n CVE-2012-3433-xsa11.patch\n - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user\n mode MMIO emulation DoS\n 25682-x86-inconsistent-io-state.patch\n\n\n - bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader\n doesn't check the size of the bzip2 or lzma compressed\n kernel, leading to denial of service\n 25589-pygrub-size-limits.patch\n\n - bnc#767273 - unsupported /var/lock/subsys is still used\n by xendomains init.xendomains\n\n - bnc#766283 - opensuse 12.2 pv guests can not start after\n installation due to lack of grub2 support in the host\n 23686-pygrub-solaris.patch 23697-pygrub-grub2.patch\n 23944-pygrub-debug.patch 23998-pygrub-GPT.patch\n 23999-pygrub-grub2.patch 24000-pygrub-grub2.patch\n 24001-pygrub-grub2.patch 24002-pygrub-grub2.patch\n 24064-pygrub-HybridISO.patch 24401-pygrub-scrolling.patch\n 24402-pygrub-edit-fix.patch 24460-pygrub-extlinux.patch\n 24706-pygrub-extlinux.patch\";\n\ntag_affected = \"Security on openSUSE 12.1\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_id(850324);\n script_version(\"$Revision: 8336 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-09 08:01:48 +0100 (Tue, 09 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-13 17:01:35 +0530 (Thu, 13 Dec 2012)\");\n script_cve_id(\"CVE-2012-2625\", \"CVE-2012-3432\", \"CVE-2012-3433\", \"CVE-2012-3494\",\n \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3498\", \"CVE-2012-3515\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"openSUSE-SU\", value: \"2012:1172_1\");\n script_name(\"SuSE Update for Security openSUSE-SU-2012:1172-1 (Security)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of Security\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"openSUSE12.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"xen-debugsource\", rpm:\"xen-debugsource~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-devel\", rpm:\"xen-devel~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-default\", rpm:\"xen-kmp-default~4.1.3_01_k3.1.10_1.16~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-default-debuginfo\", rpm:\"xen-kmp-default-debuginfo~4.1.3_01_k3.1.10_1.16~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-desktop\", rpm:\"xen-kmp-desktop~4.1.3_01_k3.1.10_1.16~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-desktop-debuginfo\", rpm:\"xen-kmp-desktop-debuginfo~4.1.3_01_k3.1.10_1.16~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs\", rpm:\"xen-libs~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-debuginfo\", rpm:\"xen-libs-debuginfo~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-tools-domU\", rpm:\"xen-tools-domU~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-tools-domU-debuginfo\", rpm:\"xen-tools-domU-debuginfo~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen\", rpm:\"xen~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-doc-html\", rpm:\"xen-doc-html~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-doc-pdf\", rpm:\"xen-doc-pdf~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-32bit\", rpm:\"xen-libs-32bit~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-debuginfo-32bit\", rpm:\"xen-libs-debuginfo-32bit~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-tools\", rpm:\"xen-tools~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-tools-debuginfo\", rpm:\"xen-tools-debuginfo~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-debuginfo-x86\", rpm:\"xen-libs-debuginfo-x86~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-x86\", rpm:\"xen-libs-x86~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-pae\", rpm:\"xen-kmp-pae~4.1.3_01_k3.1.10_1.16~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-pae-debuginfo\", rpm:\"xen-kmp-pae-debuginfo~4.1.3_01_k3.1.10_1.16~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-10-09T15:24:08", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-10-07T00:00:00", "published": "2012-12-13T00:00:00", "id": "OPENVAS:1361412562310850324", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850324", "title": "SuSE Update for Security openSUSE-SU-2012:1172-1 (Security)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# SuSE Update for Security openSUSE-SU-2012:1172-1 (Security)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850324\");\n script_version(\"2019-10-07T14:34:48+0000\");\n script_tag(name:\"last_modification\", value:\"2019-10-07 14:34:48 +0000 (Mon, 07 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2012-12-13 17:01:35 +0530 (Thu, 13 Dec 2012)\");\n script_cve_id(\"CVE-2012-2625\", \"CVE-2012-3432\", \"CVE-2012-3433\", \"CVE-2012-3494\",\n \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3498\", \"CVE-2012-3515\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"openSUSE-SU\", value:\"2012:1172_1\");\n script_name(\"SuSE Update for Security openSUSE-SU-2012:1172-1 (Security)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Security'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE12\\.1\");\n script_tag(name:\"affected\", value:\"Security on openSUSE 12.1\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Security Update for Xen\n\n The following bug and security fixes were applied:\n\n - bnc#776995 - attaching scsi control luns with pvscsi\n\n - xend/pvscsi: fix passing of SCSI control LUNs\n xen-bug776995-pvscsi-no-devname.patch\n\n - xend/pvscsi: fix usage of persistent device names for\n SCSI devices xen-bug776995-pvscsi-persistent-names.patch\n\n - xend/pvscsi: update sysfs parser for Linux 3.0\n xen-bug776995-pvscsi-sysfs-parser.patch\n\n - bnc#777090 - CVE-2012-3494: xen: hypercall set_debugreg\n vulnerability (XSA-12) CVE-2012-3494-xsa12.patch\n\n - bnc#777088 - CVE-2012-3495: xen: hypercall\n physdev_get_free_pirq vulnerability (XSA-13)\n CVE-2012-3495-xsa13.patch\n\n - bnc#777091 - CVE-2012-3496: xen: XENMEM_populate_physmap\n DoS vulnerability (XSA-14) CVE-2012-3496-xsa14.patch\n\n - bnc#777086 - CVE-2012-3498: xen: PHYSDEVOP_map_pirq index\n vulnerability (XSA-16) CVE-2012-3498-xsa16.patch\n\n - bnc#777084 - CVE-2012-3515: xen: Qemu VT100 emulation\n vulnerability (XSA-17) CVE-2012-3515-xsa17.patch\n\n - Upstream patches from Jan 25734-x86-MCG_CTL-default.patch\n 25735-x86-cpuid-masking-XeonE5.patch\n 25744-hypercall-return-long.patch\n\n - Update to Xen 4.1.3 c/s 23336\n\n\n - Upstream or pending upstream patches from Jan\n 25587-fix-off-by-one-parsing-error.patch\n 25616-x86-MCi_CTL-default.patch\n 25617-vtd-qinval-addr.patch 25688-x86-nr_irqs_gsi.patch\n\n - bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest destroy\n p2m teardown host DoS vulnerability\n CVE-2012-3433-xsa11.patch\n\n - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user\n mode MMIO emulation DoS\n 25682-x86-inconsistent-io-state.patch\n\n\n - bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader\n doesn't check the size of the bzip2 or lzma compressed\n kernel, leading to denial of service\n 25589-pygrub-size-limits.patch\n\n - bnc#767273 - unsupported /var/lock/subsys is still used\n by xendomains init.xendomains\n\n - bnc#766283 - opensuse 12.2 pv guests can not start after\n installation due to lack of grub2 support in the host\n 23686-pygrub-solaris.patch 23697-pygrub-grub2.patch\n 23944-pygrub-debug.patch 23998-pygrub-GPT.patch\n 23999-pygrub-grub2.patch 24000-pygrub-grub2.patch\n 24001-pygrub-grub2.patch 24002-pygrub-grub2.patch\n 24064-pygrub-HybridISO.patch 24401-pygrub-scrolling.patch\n 24402-pygrub-edit-fix.patch 24460-pygrub-extlinux.patch\n 24706-pygrub-extlinux.patch\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\nres = \"\";\n\nif(release == \"openSUSE12.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"xen-debugsource\", rpm:\"xen-debugsource~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-devel\", rpm:\"xen-devel~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-default\", rpm:\"xen-kmp-default~4.1.3_01_k3.1.10_1.16~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-default-debuginfo\", rpm:\"xen-kmp-default-debuginfo~4.1.3_01_k3.1.10_1.16~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-desktop\", rpm:\"xen-kmp-desktop~4.1.3_01_k3.1.10_1.16~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-desktop-debuginfo\", rpm:\"xen-kmp-desktop-debuginfo~4.1.3_01_k3.1.10_1.16~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs\", rpm:\"xen-libs~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-debuginfo\", rpm:\"xen-libs-debuginfo~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-tools-domU\", rpm:\"xen-tools-domU~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-tools-domU-debuginfo\", rpm:\"xen-tools-domU-debuginfo~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen\", rpm:\"xen~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-doc-html\", rpm:\"xen-doc-html~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-doc-pdf\", rpm:\"xen-doc-pdf~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-32bit\", rpm:\"xen-libs-32bit~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-debuginfo-32bit\", rpm:\"xen-libs-debuginfo-32bit~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-tools\", rpm:\"xen-tools~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-tools-debuginfo\", rpm:\"xen-tools-debuginfo~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-debuginfo-x86\", rpm:\"xen-libs-debuginfo-x86~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-x86\", rpm:\"xen-libs-x86~4.1.3_01~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-pae\", rpm:\"xen-kmp-pae~4.1.3_01_k3.1.10_1.16~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-pae-debuginfo\", rpm:\"xen-kmp-pae-debuginfo~4.1.3_01_k3.1.10_1.16~1.13.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:32", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-09-22T00:00:00", "id": "OPENVAS:1361412562310864722", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864722", "title": "Fedora Update for xen FEDORA-2012-13434", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for xen FEDORA-2012-13434\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086277.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864722\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-22 11:56:53 +0530 (Sat, 22 Sep 2012)\");\n script_cve_id(\"CVE-2012-4411\", \"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\",\n \"CVE-2012-3498\", \"CVE-2012-3515\", \"CVE-2012-3433\", \"CVE-2012-3432\",\n \"CVE-2012-0217\", \"CVE-2012-0218\", \"CVE-2012-2934\", \"CVE-2012-2625\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"FEDORA\", value:\"2012-13434\");\n script_name(\"Fedora Update for xen FEDORA-2012-13434\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'xen'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC17\");\n script_tag(name:\"affected\", value:\"xen on Fedora 17\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"xen\", rpm:\"xen~4.1.3~4.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:00", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-11-15T00:00:00", "id": "OPENVAS:1361412562310864860", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864860", "title": "Fedora Update for xen FEDORA-2012-17204", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for xen FEDORA-2012-17204\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091844.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864860\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-15 11:38:40 +0530 (Thu, 15 Nov 2012)\");\n script_cve_id(\"CVE-2012-4544\", \"CVE-2012-4411\", \"CVE-2012-3494\", \"CVE-2012-3495\",\n \"CVE-2012-3496\", \"CVE-2012-3498\", \"CVE-2012-3515\", \"CVE-2012-3433\",\n \"CVE-2012-3432\", \"CVE-2012-0217\", \"CVE-2012-0218\", \"CVE-2012-2934\",\n \"CVE-2012-2625\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"FEDORA\", value:\"2012-17204\");\n script_name(\"Fedora Update for xen FEDORA-2012-17204\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'xen'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC17\");\n script_tag(name:\"affected\", value:\"xen on Fedora 17\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"xen\", rpm:\"xen~4.1.3~5.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:56", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-09-22T00:00:00", "id": "OPENVAS:1361412562310864720", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864720", "title": "Fedora Update for xen FEDORA-2012-13443", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for xen FEDORA-2012-13443\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086340.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864720\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-22 11:56:29 +0530 (Sat, 22 Sep 2012)\");\n script_cve_id(\"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3498\",\n \"CVE-2012-3515\", \"CVE-2012-4411\", \"CVE-2012-3433\", \"CVE-2012-3432\",\n \"CVE-2012-2625\", \"CVE-2012-0217\", \"CVE-2012-0218\", \"CVE-2012-2934\",\n \"CVE-2012-0029\");\n script_tag(name:\"cvss_base\", value:\"7.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:A/AC:M/Au:S/C:C/I:C/A:C\");\n script_xref(name:\"FEDORA\", value:\"2012-13443\");\n script_name(\"Fedora Update for xen FEDORA-2012-13443\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'xen'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC16\");\n script_tag(name:\"affected\", value:\"xen on Fedora 16\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"xen\", rpm:\"xen~4.1.3~2.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.4, "vector": "AV:A/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2018-01-02T10:56:31", "bulletinFamily": "scanner", "description": "Check for the Version of xen", "modified": "2018-01-02T00:00:00", "published": "2012-11-15T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=864860", "id": "OPENVAS:864860", "title": "Fedora Update for xen FEDORA-2012-17204", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for xen FEDORA-2012-17204\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"xen on Fedora 17\";\ntag_insight = \"This package contains the XenD daemon and xm command line\n tools, needed to manage virtual machines running under the\n Xen hypervisor\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091844.html\");\n script_id(864860);\n script_version(\"$Revision: 8267 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-02 07:29:17 +0100 (Tue, 02 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-15 11:38:40 +0530 (Thu, 15 Nov 2012)\");\n script_cve_id(\"CVE-2012-4544\", \"CVE-2012-4411\", \"CVE-2012-3494\", \"CVE-2012-3495\",\n \"CVE-2012-3496\", \"CVE-2012-3498\", \"CVE-2012-3515\", \"CVE-2012-3433\",\n \"CVE-2012-3432\", \"CVE-2012-0217\", \"CVE-2012-0218\", \"CVE-2012-2934\",\n \"CVE-2012-2625\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2012-17204\");\n script_name(\"Fedora Update for xen FEDORA-2012-17204\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of xen\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"xen\", rpm:\"xen~4.1.3~5.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-11T11:07:18", "bulletinFamily": "scanner", "description": "Check for the Version of xen", "modified": "2018-01-10T00:00:00", "published": "2012-09-22T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=864722", "id": "OPENVAS:864722", "title": "Fedora Update for xen FEDORA-2012-13434", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for xen FEDORA-2012-13434\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"xen on Fedora 17\";\ntag_insight = \"This package contains the XenD daemon and xm command line\n tools, needed to manage virtual machines running under the\n Xen hypervisor\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086277.html\");\n script_id(864722);\n script_version(\"$Revision: 8352 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-10 08:01:57 +0100 (Wed, 10 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-22 11:56:53 +0530 (Sat, 22 Sep 2012)\");\n script_cve_id(\"CVE-2012-4411\", \"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\",\n \"CVE-2012-3498\", \"CVE-2012-3515\", \"CVE-2012-3433\", \"CVE-2012-3432\",\n \"CVE-2012-0217\", \"CVE-2012-0218\", \"CVE-2012-2934\", \"CVE-2012-2625\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2012-13434\");\n script_name(\"Fedora Update for xen FEDORA-2012-13434\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of xen\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"xen\", rpm:\"xen~4.1.3~4.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-03T10:56:26", "bulletinFamily": "scanner", "description": "Check for the Version of xen", "modified": "2018-01-03T00:00:00", "published": "2012-09-22T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=864720", "id": "OPENVAS:864720", "title": "Fedora Update for xen FEDORA-2012-13443", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for xen FEDORA-2012-13443\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"xen on Fedora 16\";\ntag_insight = \"This package contains the XenD daemon and xm command line\n tools, needed to manage virtual machines running under the\n Xen hypervisor\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086340.html\");\n script_id(864720);\n script_version(\"$Revision: 8273 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-03 07:29:19 +0100 (Wed, 03 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-22 11:56:29 +0530 (Sat, 22 Sep 2012)\");\n script_cve_id(\"CVE-2012-3494\", \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3498\",\n \"CVE-2012-3515\", \"CVE-2012-4411\", \"CVE-2012-3433\", \"CVE-2012-3432\",\n \"CVE-2012-2625\", \"CVE-2012-0217\", \"CVE-2012-0218\", \"CVE-2012-2934\",\n \"CVE-2012-0029\");\n script_tag(name:\"cvss_base\", value:\"7.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:A/AC:M/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2012-13443\");\n script_name(\"Fedora Update for xen FEDORA-2012-13443\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of xen\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"xen\", rpm:\"xen~4.1.3~2.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.4, "vector": "AV:ADJACENT_NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-11T11:06:09", "bulletinFamily": "scanner", "description": "Check for the Version of xen", "modified": "2018-01-10T00:00:00", "published": "2012-11-23T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=864875", "id": "OPENVAS:864875", "title": "Fedora Update for xen FEDORA-2012-18249", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for xen FEDORA-2012-18249\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"xen on Fedora 16\";\ntag_insight = \"This package contains the XenD daemon and xm command line\n tools, needed to manage virtual machines running under the\n Xen hypervisor\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092624.html\");\n script_id(864875);\n script_version(\"$Revision: 8352 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-10 08:01:57 +0100 (Wed, 10 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:33:49 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4535\", \"CVE-2012-4536\", \"CVE-2012-4537\", \"CVE-2012-4538\",\n \"CVE-2012-4539\", \"CVE-2012-4544\", \"CVE-2012-3494\", \"CVE-2012-3495\",\n \"CVE-2012-3496\", \"CVE-2012-3498\", \"CVE-2012-3515\", \"CVE-2012-4411\",\n \"CVE-2012-3433\", \"CVE-2012-3432\", \"CVE-2012-2625\", \"CVE-2012-0217\",\n \"CVE-2012-0218\", \"CVE-2012-2934\", \"CVE-2012-0029\");\n script_tag(name:\"cvss_base\", value:\"7.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:A/AC:M/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2012-18249\");\n script_name(\"Fedora Update for xen FEDORA-2012-18249\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of xen\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"xen\", rpm:\"xen~4.1.3~4.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.4, "vector": "AV:ADJACENT_NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:38", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2018-11-16T00:00:00", "published": "2012-12-13T00:00:00", "id": "OPENVAS:1361412562310850374", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850374", "title": "SuSE Update for XEN openSUSE-SU-2012:1572-1 (XEN)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2012_1572_1.nasl 12381 2018-11-16 11:16:30Z cfischer $\n#\n# SuSE Update for XEN openSUSE-SU-2012:1572-1 (XEN)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850374\");\n script_version(\"$Revision: 12381 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-16 12:16:30 +0100 (Fri, 16 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-13 17:01:50 +0530 (Thu, 13 Dec 2012)\");\n script_cve_id(\"CVE-2007-0998\", \"CVE-2012-2625\", \"CVE-2012-2934\", \"CVE-2012-3494\",\n \"CVE-2012-3495\", \"CVE-2012-3496\", \"CVE-2012-3497\", \"CVE-2012-3498\",\n \"CVE-2012-3515\", \"CVE-2012-4411\", \"CVE-2012-4535\", \"CVE-2012-4536\",\n \"CVE-2012-4537\", \"CVE-2012-4538\", \"CVE-2012-4539\", \"CVE-2012-4544\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"openSUSE-SU\", value:\"2012:1572_1\");\n script_name(\"SuSE Update for XEN openSUSE-SU-2012:1572-1 (XEN)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'XEN'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE12\\.1\");\n script_tag(name:\"affected\", value:\"XEN on openSUSE 12.1\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"This security update of XEN fixes various bugs and security\n issues.\n\n - Upstream patch 26088-xend-xml-filesize-check.patch\n\n - bnc#787163 - CVE-2012-4544: xen: Domain builder Out-of-\n memory due to malicious kernel/ramdisk (XSA 25)\n CVE-2012-4544-xsa25.patch\n\n - bnc#779212 - CVE-2012-4411: XEN / qemu: guest\n administrator can access qemu monitor console (XSA-19)\n CVE-2012-4411-xsa19.patch\n\n\n - bnc#786516 - CVE-2012-4535: xen: Timer overflow DoS\n vulnerability CVE-2012-4535-xsa20.patch\n\n - bnc#786518 - CVE-2012-4536: xen: pirq range check DoS\n vulnerability CVE-2012-4536-xsa21.patch\n\n - bnc#786517 - CVE-2012-4537: xen: Memory mapping failure\n DoS vulnerability CVE-2012-4537-xsa22.patch\n\n - bnc#786519 - CVE-2012-4538: xen: Unhooking empty PAE\n entries DoS vulnerability CVE-2012-4538-xsa23.patch\n\n - bnc#786520 - CVE-2012-4539: xen: Grant table hypercall\n infinite loop DoS vulnerability CVE-2012-4539-xsa24.patch\n\n - bnc#784087 - L3: Xen BUG at io_apic.c:129\n 26102-x86-IOAPIC-legacy-not-first.patch\n\n - Upstream patches from Jan\n 26054-x86-AMD-perf-ctr-init.patch\n 26055-x86-oprof-hvm-mode.patch\n 26056-page-alloc-flush-filter.patch\n 26061-x86-oprof-counter-range.patch\n 26062-ACPI-ERST-move-data.patch\n 26063-x86-HPET-affinity-lock.patch\n 26093-HVM-PoD-grant-mem-type.patch\n\n - Upstream patches from Jan\n 25931-x86-domctl-iomem-mapping-checks.patch\n 25952-x86-MMIO-remap-permissions.patch\n\n - Upstream patches from Jan\n 25808-domain_create-return-value.patch\n 25814-x86_64-set-debugreg-guest.patch\n 25815-x86-PoD-no-bug-in-non-translated.patch\n 25816-x86-hvm-map-pirq-range-check.patch\n 25833-32on64-bogus-pt_base-adjust.patch\n 25834-x86-S3-MSI-resume.patch\n 25835-adjust-rcu-lock-domain.patch\n 25836-VT-d-S3-MSI-resume.patch 25850-tmem-xsa-15-1.patch\n 25851-tmem-xsa-15-2.patch 25852-tmem-xsa-15-3.patch\n 25853-tmem-xsa-15-4.patch 25854-tmem-xsa-15-5.patch\n 25855-tmem-xsa-15-6.patch 25856-tmem-xsa-15-7.patch\n 25857-tmem-xsa-15-8.patch 25858-tmem-xsa-15-9.patch\n 25859-tmem-missing-break.patch 25860-tmem-cleanup.patch\n 25883-pt-MSI-cleanup.patch\n 25927-x86-domctl-ioport-mapping-range.patch\n 25929-tmem-restore-pool-version.patch\n\n - bnc#778105 - first XEN-PV VM fails to spawn xend:\n Increase wait time for disk to appear in host bootloader\n Modified existing xen-domUloader.diff\n\n - Upstream patches from Jan\n 25752-ACPI-pm-op-valid-cpu.patch\n 25754-x86-PoD-early-access.patch\n 25755-x86-PoD-types.patch\n 25756-x86-MMIO-max-mapped-pfn.patch\n 25757-x86-EPT-PoD-1Gb-assert.patch\n 25764-x86-unknown-cpu-no-sysenter.patch\n 25765-x86_64-allow-unsafe-adjust.patch\n 25771-grant ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\nres = \"\";\n\nif(release == \"openSUSE12.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"xen-debugsource\", rpm:\"xen-debugsource~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-devel\", rpm:\"xen-devel~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-default\", rpm:\"xen-kmp-default~4.1.3_04_k3.1.10_1.16~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-default-debuginfo\", rpm:\"xen-kmp-default-debuginfo~4.1.3_04_k3.1.10_1.16~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-desktop\", rpm:\"xen-kmp-desktop~4.1.3_04_k3.1.10_1.16~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-desktop-debuginfo\", rpm:\"xen-kmp-desktop-debuginfo~4.1.3_04_k3.1.10_1.16~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs\", rpm:\"xen-libs~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-debuginfo\", rpm:\"xen-libs-debuginfo~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-tools-domU\", rpm:\"xen-tools-domU~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-tools-domU-debuginfo\", rpm:\"xen-tools-domU-debuginfo~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen\", rpm:\"xen~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-doc-html\", rpm:\"xen-doc-html~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-doc-pdf\", rpm:\"xen-doc-pdf~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-32bit\", rpm:\"xen-libs-32bit~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-debuginfo-32bit\", rpm:\"xen-libs-debuginfo-32bit~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-tools\", rpm:\"xen-tools~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-tools-debuginfo\", rpm:\"xen-tools-debuginfo~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-debuginfo-x86\", rpm:\"xen-libs-debuginfo-x86~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-libs-x86\", rpm:\"xen-libs-x86~4.1.3_04~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-pae\", rpm:\"xen-kmp-pae~4.1.3_04_k3.1.10_1.16~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xen-kmp-pae-debuginfo\", rpm:\"xen-kmp-pae-debuginfo~4.1.3_04_k3.1.10_1.16~1.21.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:33", "bulletinFamily": "unix", "description": "### Background\n\nXen is a bare-metal hypervisor.\n\n### Description\n\nMultiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA local attacker could possibly cause a Denial of Service condition or obtain sensitive information. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Xen 4.5 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-emulation/xen-4.5.2-r5\"\n \n\nAll Xen 4.6 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-emulation/xen-4.6.0-r9\"\n \n\nAll Xen tools 4.5 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-emulation/xen-tools-4.5.2-r5\"\n \n\nAll Xen tools 4.6 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-emulation/xen-tools-4.6.0-r9\"\n \n\nAll Xen pvgrub users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-emulation/xen-pvgrub-4.6.0\"", "modified": "2016-04-05T00:00:00", "published": "2016-04-05T00:00:00", "id": "GLSA-201604-03", "href": "https://security.gentoo.org/glsa/201604-03", "type": "gentoo", "title": "Xen: Multiple vulnerabilities", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-06T19:46:41", "bulletinFamily": "unix", "description": "### Background\n\nXen is a bare-metal hypervisor.\n\n### Description\n\nMultiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nGuest domains could possibly gain privileges, execute arbitrary code, or cause a Denial of Service on the host domain (Dom0). Additionally, guest domains could gain information about other virtual machines running on the same host or read arbitrary files on the host. \n\n### Workaround\n\nThe CVEs listed below do not currently have fixes, but only apply to Xen setups which have \u201ctmem\u201d specified on the hypervisor command line. TMEM is not currently supported for use in production systems, and administrators using tmem should disable it. Relevant CVEs: * CVE-2012-2497 * CVE-2012-6030 * CVE-2012-6031 * CVE-2012-6032 * CVE-2012-6033 * CVE-2012-6034 * CVE-2012-6035 * CVE-2012-6036 \n\n### Resolution\n\nAll Xen users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-emulation/xen-4.2.2-r1\"\n \n\nAll Xen-tools users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=app-emulation/xen-tools-4.2.2-r3\"\n \n\nAll Xen-pvgrub users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=app-emulation/xen-pvgrub-4.2.2-r1\"", "modified": "2013-09-27T00:00:00", "published": "2013-09-27T00:00:00", "id": "GLSA-201309-24", "href": "https://security.gentoo.org/glsa/201309-24", "type": "gentoo", "title": "Xen: Multiple vulnerabilities", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}