- Open Vulnerability and Assessment Language -
Element Dictionary

The following is a description of the elements, types, and attributes that compose the VMware ESX server specific system characteristic items found in Open Vulnerability and Assessment Language (OVAL). Each item is an extension of the standard test element defined in the Core Definition Schema. Through extension, each test inherits a set of elements and attributes that are shared amongst all OVAL tests. Each test is described in detail and should provide the information necessary to understand what each element and attribute represents. This document is intended for developers and assumes some familiarity with XML. A high level description of the interaction between the different tests and their relationship to the Core Definition Schema is not outlined here.

This schema was originally developed by Yuzheng Zhou and Todd Dolinsky at Hewlett-Packard. The OVAL Schema is maintained by The MITRE Corporation and developed by the public OVAL Community. For more information, including how to get involved in the project and how to submit change requests, please visit the OVAL website at http://oval.mitre.org.



< patch_item >

Installation information about a specific patch in the VMware ESX server. This information can be retrieved by the "esxupdate query | grep ESX-xxxxxxx" command.

Child Elements Type MinOccurs MaxOccurs
patch_number oval-sc:EntityItemIntType 0 1
patch_name oval-sc:EntityItemStringType 0 1
knowledge_base_id oval-sc:EntityItemIntType 0 1
bundle_id oval-sc:EntityItemIntType 0 1
classification esx-sc:EntityItemClassificationType 0 1
support_level esx-sc:EntityItemSupportLevelType 0 1
status oval-sc:EntityItemBoolType 0 1



< version_item >

Information about the release and build version of VMware ESX server. This information can be retrieved by the "vmware -v" command or by checking the /proc/vmware/version file.

Child Elements Type MinOccurs MaxOccurs
release oval-sc:EntityItemStringType 0 1
build oval-sc:EntityItemIntType 0 1

== EntityItemClassificationType ==

The EntityItemClassificationType complex type restricts a string value to a specific set of values that describe the classification of a given ESX Server patch. The empty string is also allowed to support empty emlement associated with variable references.

Value Description

Bug patches fix minor flaws that affect product functionality or behavior. Bug patches are optional. Before they are applied, one should determine whether they are necessary for your environment.

Roll‐up patches contain any number of bundles for ESX Server 3.0.3 or ESX Server 3.5 hosts. They can contain bug patches, update patches, and security patches. They do not contain upgrade bundles for minor releases or update bundles for maintenance releases.

Security patches fix one or more potential security vulnerabilities in the product. They should be implemented immediately to prevent the vulnerabilities from being exploited.

Update patches can contain new driver updates and small non‐intrusive enhancements. Before they are applied, one should determine whether they are necessary for your environment.

 

The empty string value is permitted here to allow for detailed error reporting.


== EntityItemSupportLevelType ==

The EntityItemSupportLevelType complex type restricts a string value to a specific set of values that describe the support level of a given ESX Server patch. The empty string is also allowed to support empty emlement associated with variable references.

Value Description

Custom patches are special fixes provided to a customer. They are usually specific to customer’s environment, and are most likely not required by customers not reporting the issue. Custom patches have been tested in the customer’s environment.

Debugging patches are released to all customers and are used by VMware to troubleshoot complex product issues. They can contain debug messages and code, and drivers. Debugging patches usually require VMware assistance to install.

GA patches are released to all customers and have been thoroughly tested. They contain fixes for ESX Server 3 software issues.

Hot patches are released to specific customers for solving critical problems specific to their environment. They contain fixes for security issues or problems that can potentially cause data loss or severe service disruptions. Hot patches should be implemented immediately.

 

The empty string value is permitted here to allow for detailed error reporting.