ID ALAS2-2020-1440 Type amazon Reporter Amazon Modified 2020-06-16T18:21:00
Description
Issue Overview:
A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat. (CVE-2020-12826 __)
An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body. (CVE-2020-12657 __)
Affected Packages:
kernel
Issue Correction:
Run yum update kernel to update your system.
{"cve": [{"lastseen": "2020-12-09T22:03:06", "description": "A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.", "edition": 20, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "LOW", "integrityImpact": "LOW", "baseScore": 5.3, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.4}, "published": "2020-05-12T19:15:00", "title": "CVE-2020-12826", "type": "cve", "cwe": ["CWE-190"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-12826"], "modified": "2020-06-22T22:15:00", "cpe": ["cpe:/o:redhat:enterprise_linux:5.0", "cpe:/o:canonical:ubuntu_linux:20.04", "cpe:/o:redhat:enterprise_linux:7.0", "cpe:/a:redhat:enterprise_mrg:2.0", "cpe:/o:redhat:enterprise_linux:8.0", "cpe:/o:redhat:enterprise_linux:6.0"], "id": "CVE-2020-12826", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-12826", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"]}, {"lastseen": "2020-12-09T22:03:06", "description": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "edition": 20, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-05-05T07:15:00", "title": "CVE-2020-12657", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-12657"], "modified": "2020-06-13T09:15:00", "cpe": [], "id": "CVE-2020-12657", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-12657", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": []}], "nessus": [{"lastseen": "2020-07-03T09:02:18", "description": "A signal access-control issue was discovered in the Linux kernel\nbefore 5.6.5, aka CID-7395ea4e65c2. Because exec_id in\ninclude/linux/sched.h is only 32 bits, an integer overflow can\ninterfere with a do_notify_parent protection mechanism. A child\nprocess can send an arbitrary signal to a parent process in a\ndifferent security domain. Exploitation limitations include the amount\nof elapsed time before an integer overflow occurs, and the lack of\nscenarios where signals to a parent process present a substantial\noperational threat. (CVE-2020-12826)\n\nAn issue was discovered in the Linux kernel before 5.6.5. There is a\nuse-after-free in block/bfq-iosched.c related to\nbfq_idle_slice_timer_body. (CVE-2020-12657)", "edition": 3, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-06-18T00:00:00", "title": "Amazon Linux 2 : kernel (ALAS-2020-1440)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-12826", "CVE-2020-13817", "CVE-2020-12657"], "modified": "2020-06-18T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:kernel-tools-debuginfo", "p-cpe:/a:amazon:linux:kernel", "p-cpe:/a:amazon:linux:kernel-livepatch-4.14.177-139.253", "p-cpe:/a:amazon:linux:python-perf", "cpe:/o:amazon:linux:2", "p-cpe:/a:amazon:linux:perf", "p-cpe:/a:amazon:linux:kernel-tools", "p-cpe:/a:amazon:linux:python-perf-debuginfo", "p-cpe:/a:amazon:linux:kernel-devel", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:amazon:linux:kernel-debuginfo", "p-cpe:/a:amazon:linux:perf-debuginfo", "p-cpe:/a:amazon:linux:kernel-tools-devel", "p-cpe:/a:amazon:linux:kernel-headers"], "id": "AL2_ALAS-2020-1440.NASL", "href": "https://www.tenable.com/plugins/nessus/137571", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux 2 Security Advisory ALAS-2020-1440.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(137571);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/01\");\n\n script_cve_id(\"CVE-2020-12657\", \"CVE-2020-12826\");\n script_xref(name:\"ALAS\", value:\"2020-1440\");\n\n script_name(english:\"Amazon Linux 2 : kernel (ALAS-2020-1440)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Amazon Linux 2 host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"A signal access-control issue was discovered in the Linux kernel\nbefore 5.6.5, aka CID-7395ea4e65c2. Because exec_id in\ninclude/linux/sched.h is only 32 bits, an integer overflow can\ninterfere with a do_notify_parent protection mechanism. A child\nprocess can send an arbitrary signal to a parent process in a\ndifferent security domain. Exploitation limitations include the amount\nof elapsed time before an integer overflow occurs, and the lack of\nscenarios where signals to a parent process present a substantial\noperational threat. (CVE-2020-12826)\n\nAn issue was discovered in the Linux kernel before 5.6.5. There is a\nuse-after-free in block/bfq-iosched.c related to\nbfq_idle_slice_timer_body. (CVE-2020-12657)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/AL2/ALAS-2020-1440.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Run 'yum update kernel' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-13817\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-livepatch-4.14.177-139.253\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux:2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/18\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"hotfixes.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"2\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux 2\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (get_one_kb_item(\"Host/kpatch/kernel-cves\"))\n{\n set_hotfix_type(\"kpatch\");\n cve_list = make_list(\"CVE-2020-12657\", \"CVE-2020-12826\");\n if (hotfix_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"kpatch hotfix for ALAS-2020-1440\");\n }\n else\n {\n __rpm_report = hotfix_reporting_text();\n }\n}\n\nflag = 0;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-4.14.177-139.253.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-debuginfo-4.14.177-139.253.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-4.14.177-139.253.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-devel-4.14.177-139.253.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"kernel-headers-4.14.177-139.253.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-livepatch-4.14.177-139.253-1.0-0.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-tools-4.14.177-139.253.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-tools-debuginfo-4.14.177-139.253.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-tools-devel-4.14.177-139.253.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"perf-4.14.177-139.253.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"perf-debuginfo-4.14.177-139.253.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"python-perf-4.14.177-139.253.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-4.14.177-139.253.amzn2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debuginfo / kernel-debuginfo-common-x86_64 / etc\");\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-09-14T13:15:07", "description": "A NULL pointer dereference flaw was found in the Linux kernel's\nSELinux subsystem in versions before 5.7. This flaw occurs while\nimporting the Commercial IP Security Option (CIPSO) protocol's\ncategory bitmap into the SELinux extensible bitmap via the'\nebitmap_netlbl_import' routine. While processing the CIPSO restricted\nbitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the\nsecurity attribute to indicate that the category bitmap is present,\neven if it has not been allocated. This issue leads to a NULL pointer\ndereference issue while importing the same category bitmap into\nSELinux. This flaw allows a remote network user to crash the system\nkernel, resulting in a denial of service. (CVE-2020-10711)\n\nAn issue was discovered in the Linux kernel before 5.6.5. There is a\nuse-after-free in block/bfq-iosched.c related to\nbfq_idle_slice_timer_body. (CVE-2020-12657)\n\nA signal access-control issue was discovered in the Linux kernel\nbefore 5.6.5, aka CID-7395ea4e65c2. Because exec_id in\ninclude/linux/sched.h is only 32 bits, an integer overflow can\ninterfere with a do_notify_parent protection mechanism. A child\nprocess can send an arbitrary signal to a parent process in a\ndifferent security domain. Exploitation limitations include the amount\nof elapsed time before an integer overflow occurs, and the lack of\nscenarios where signals to a parent process present a substantial\noperational threat. (CVE-2020-12826)", "edition": 3, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-20T00:00:00", "title": "Amazon Linux AMI : kernel (ALAS-2020-1382)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-10711", "CVE-2020-12826", "CVE-2020-12657"], "modified": "2020-07-20T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:kernel-tools-debuginfo", "p-cpe:/a:amazon:linux:kernel", "p-cpe:/a:amazon:linux:perf", "p-cpe:/a:amazon:linux:kernel-tools", "p-cpe:/a:amazon:linux:kernel-devel", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:amazon:linux:kernel-debuginfo", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-i686", "p-cpe:/a:amazon:linux:perf-debuginfo", "p-cpe:/a:amazon:linux:kernel-tools-devel", "p-cpe:/a:amazon:linux:kernel-headers", "cpe:/o:amazon:linux"], "id": "ALA_ALAS-2020-1382.NASL", "href": "https://www.tenable.com/plugins/nessus/138631", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2020-1382.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(138631);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/22\");\n\n script_cve_id(\"CVE-2020-10711\", \"CVE-2020-12657\", \"CVE-2020-12826\");\n script_xref(name:\"ALAS\", value:\"2020-1382\");\n\n script_name(english:\"Amazon Linux AMI : kernel (ALAS-2020-1382)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"A NULL pointer dereference flaw was found in the Linux kernel's\nSELinux subsystem in versions before 5.7. This flaw occurs while\nimporting the Commercial IP Security Option (CIPSO) protocol's\ncategory bitmap into the SELinux extensible bitmap via the'\nebitmap_netlbl_import' routine. While processing the CIPSO restricted\nbitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the\nsecurity attribute to indicate that the category bitmap is present,\neven if it has not been allocated. This issue leads to a NULL pointer\ndereference issue while importing the same category bitmap into\nSELinux. This flaw allows a remote network user to crash the system\nkernel, resulting in a denial of service. (CVE-2020-10711)\n\nAn issue was discovered in the Linux kernel before 5.6.5. There is a\nuse-after-free in block/bfq-iosched.c related to\nbfq_idle_slice_timer_body. (CVE-2020-12657)\n\nA signal access-control issue was discovered in the Linux kernel\nbefore 5.6.5, aka CID-7395ea4e65c2. Because exec_id in\ninclude/linux/sched.h is only 32 bits, an integer overflow can\ninterfere with a do_notify_parent protection mechanism. A child\nprocess can send an arbitrary signal to a parent process in a\ndifferent security domain. Exploitation limitations include the amount\nof elapsed time before an integer overflow occurs, and the lack of\nscenarios where signals to a parent process present a substantial\noperational threat. (CVE-2020-12826)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2020-1382.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Run 'yum update kernel' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-i686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"kernel-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-debuginfo-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", cpu:\"i686\", reference:\"kernel-debuginfo-common-i686-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-devel-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-headers-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-debuginfo-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-devel-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"perf-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"perf-debuginfo-4.14.177-107.254.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debuginfo / kernel-debuginfo-common-i686 / etc\");\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-09-14T13:15:03", "description": "A NULL pointer dereference flaw was found in the Linux kernel's\nSELinux subsystem. This flaw occurs while importing the Commercial IP\nSecurity Option (CIPSO) protocol's category bitmap into the SELinux\nextensible bitmap via the' ebitmap_netlbl_import' routine. While\nprocessing the CIPSO restricted bitmap tag in the\n'cipso_v4_parsetag_rbm' routine, it sets the security attribute to\nindicate that the category bitmap is present, even if it has not been\nallocated. This issue leads to a NULL pointer dereference issue while\nimporting the same category bitmap into SELinux. This flaw allows a\nremote network user to crash the system kernel, resulting in a denial\nof service. (CVE-2020-10711)\n\nA flaw was found in the Linux kernel loose validation of child/parent\nprocess identification handling while filtering signal handlers. A\nlocal attacker is able to abuse this flaw to bypass checks to send any\nsignal to a privileged process. (CVE-2020-12826)\n\nA flaw was found in the Linux kernel's implementation of the BFQ IO\nscheduler. This flaw allows a local user able to groom system memory\nto cause kernel memory corruption and possible privilege escalation by\nabusing a race condition in the IO scheduler. (CVE-2020-12657)", "edition": 6, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-05-15T00:00:00", "title": "Amazon Linux AMI : kernel (ALAS-2020-1366)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-10711", "CVE-2020-12826", "CVE-2020-12657"], "modified": "2020-05-15T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:kernel-tools-debuginfo", "p-cpe:/a:amazon:linux:kernel", "p-cpe:/a:amazon:linux:perf", "p-cpe:/a:amazon:linux:kernel-tools", "p-cpe:/a:amazon:linux:kernel-devel", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:amazon:linux:kernel-debuginfo", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-i686", "p-cpe:/a:amazon:linux:perf-debuginfo", "p-cpe:/a:amazon:linux:kernel-tools-devel", "p-cpe:/a:amazon:linux:kernel-headers", "cpe:/o:amazon:linux"], "id": "ALA_ALAS-2020-1366.NASL", "href": "https://www.tenable.com/plugins/nessus/136627", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2020-1366.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(136627);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/22\");\n\n script_cve_id(\"CVE-2020-10711\", \"CVE-2020-12657\", \"CVE-2020-12826\");\n script_xref(name:\"ALAS\", value:\"2020-1366\");\n\n script_name(english:\"Amazon Linux AMI : kernel (ALAS-2020-1366)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"A NULL pointer dereference flaw was found in the Linux kernel's\nSELinux subsystem. This flaw occurs while importing the Commercial IP\nSecurity Option (CIPSO) protocol's category bitmap into the SELinux\nextensible bitmap via the' ebitmap_netlbl_import' routine. While\nprocessing the CIPSO restricted bitmap tag in the\n'cipso_v4_parsetag_rbm' routine, it sets the security attribute to\nindicate that the category bitmap is present, even if it has not been\nallocated. This issue leads to a NULL pointer dereference issue while\nimporting the same category bitmap into SELinux. This flaw allows a\nremote network user to crash the system kernel, resulting in a denial\nof service. (CVE-2020-10711)\n\nA flaw was found in the Linux kernel loose validation of child/parent\nprocess identification handling while filtering signal handlers. A\nlocal attacker is able to abuse this flaw to bypass checks to send any\nsignal to a privileged process. (CVE-2020-12826)\n\nA flaw was found in the Linux kernel's implementation of the BFQ IO\nscheduler. This flaw allows a local user able to groom system memory\nto cause kernel memory corruption and possible privilege escalation by\nabusing a race condition in the IO scheduler. (CVE-2020-12657)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2020-1366.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Run 'yum update kernel' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-12657\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-i686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"kernel-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-debuginfo-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", cpu:\"i686\", reference:\"kernel-debuginfo-common-i686-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-devel-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-headers-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-debuginfo-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-devel-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"perf-4.14.177-107.254.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"perf-debuginfo-4.14.177-107.254.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debuginfo / kernel-debuginfo-common-i686 / etc\");\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-05T15:46:51", "description": "It was discovered that the btrfs implementation in the Linux kernel\ndid not properly detect that a block was marked dirty in some\nsituations. An attacker could use this to specially craft a file\nsystem image that, when unmounted, could cause a denial of service\n(system crash). (CVE-2019-19377)\n\nIt was discovered that the linux kernel did not properly validate\ncertain mount options to the tmpfs virtual memory file system. A local\nattacker with the ability to specify mount options could use this to\ncause a denial of service (system crash). (CVE-2020-11565)\n\nIt was discovered that the block layer in the Linux kernel contained a\nrace condition leading to a use-after-free vulnerability. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or execute arbitrary code. (CVE-2020-12657).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 4, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2020-05-20T00:00:00", "title": "Ubuntu 20.04 : Linux kernel vulnerabilities (USN-4367-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-12826", "CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "modified": "2020-05-20T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-kvm", "cpe:/o:canonical:ubuntu_linux:20.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-osp1", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-raspi", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oem", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gke"], "id": "UBUNTU_USN-4367-1.NASL", "href": "https://www.tenable.com/plugins/nessus/136732", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4367-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(136732);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2019-19377\", \"CVE-2020-11565\", \"CVE-2020-12657\", \"CVE-2020-12826\");\n script_xref(name:\"USN\", value:\"4367-1\");\n\n script_name(english:\"Ubuntu 20.04 : Linux kernel vulnerabilities (USN-4367-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that the btrfs implementation in the Linux kernel\ndid not properly detect that a block was marked dirty in some\nsituations. An attacker could use this to specially craft a file\nsystem image that, when unmounted, could cause a denial of service\n(system crash). (CVE-2019-19377)\n\nIt was discovered that the linux kernel did not properly validate\ncertain mount options to the tmpfs virtual memory file system. A local\nattacker with the ability to specify mount options could use this to\ncause a denial of service (system crash). (CVE-2020-11565)\n\nIt was discovered that the block layer in the Linux kernel contained a\nrace condition leading to a use-after-free vulnerability. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or execute arbitrary code. (CVE-2020-12657).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/4367-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-19377\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-raspi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-osp1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/05/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2020-2021 Canonical, Inc. / NASL script (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(20\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 20.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-19377\", \"CVE-2020-11565\", \"CVE-2020-12657\", \"CVE-2020-12826\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-4367-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-1011-aws\", pkgver:\"5.4.0-1011.11\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-1011-gcp\", pkgver:\"5.4.0-1011.11\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-1011-kvm\", pkgver:\"5.4.0-1011.11\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-1011-oracle\", pkgver:\"5.4.0-1011.11\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-1011-raspi\", pkgver:\"5.4.0-1011.11\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-1012-azure\", pkgver:\"5.4.0-1012.12\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-26-generic\", pkgver:\"5.4.0-26.30\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-31-generic\", pkgver:\"5.4.0-31.35\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-31-generic-lpae\", pkgver:\"5.4.0-31.35\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-31-lowlatency\", pkgver:\"5.4.0-31.35\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-aws\", pkgver:\"5.4.0.1011.14\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-azure\", pkgver:\"5.4.0.1012.14\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-gcp\", pkgver:\"5.4.0.1011.12\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-generic\", pkgver:\"5.4.0.26.33\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-generic-lpae\", pkgver:\"5.4.0.31.36\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-gke\", pkgver:\"5.4.0.1011.12\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-kvm\", pkgver:\"5.4.0.1011.12\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-lowlatency\", pkgver:\"5.4.0.31.36\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-oem\", pkgver:\"5.4.0.31.36\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-oem-osp1\", pkgver:\"5.4.0.31.36\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-oracle\", pkgver:\"5.4.0.1011.12\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-raspi\", pkgver:\"5.4.0.1011.11\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-raspi2\", pkgver:\"5.4.0.1011.11\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-virtual\", pkgver:\"5.4.0.26.33\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-5.4-aws / linux-image-5.4-azure / linux-image-5.4-gcp / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-19T05:31:33", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:2427 advisory.\n\n - kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "edition": 4, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-06-09T00:00:00", "title": "RHEL 8 : kernel (RHSA-2020:2427)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-12657"], "modified": "2020-06-09T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers", "cpe:/o:redhat:rhel_tus:8.2", "cpe:/a:redhat:enterprise_linux:8::crb", "p-cpe:/a:redhat:enterprise_linux:bpftool", "cpe:/a:redhat:rhel_eus:8.4::crb", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules", "cpe:/o:redhat:rhel_eus:8.4", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel", "cpe:/a:redhat:rhel_eus:8.2::crb", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel", "cpe:/o:redhat:rhel_eus:8.2::baseos", "cpe:/o:redhat:enterprise_linux:8::baseos", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "cpe:/o:redhat:rhel_e4s:8.2", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "cpe:/a:redhat:rhel_e4s:8.2::crb", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "cpe:/o:redhat:rhel_aus:8.2::baseos", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs", "p-cpe:/a:redhat:enterprise_linux:kernel-tools", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra", "cpe:/o:redhat:rhel_tus:8.2::baseos", "cpe:/o:redhat:rhel_aus:8.2", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-core", "cpe:/a:redhat:rhel_tus:8.2::crb", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:rhel_eus:8.2", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-core", "cpe:/a:redhat:rhel_aus:8.2::crb", "p-cpe:/a:redhat:enterprise_linux:python3-perf", "cpe:/o:redhat:rhel_eus:8.4::baseos"], "id": "REDHAT-RHSA-2020-2427.NASL", "href": "https://www.tenable.com/plugins/nessus/137278", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:2427. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(137278);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/18\");\n\n script_cve_id(\"CVE-2020-12657\");\n script_xref(name:\"RHSA\", value:\"2020:2427\");\n\n script_name(english:\"RHEL 8 : kernel (RHSA-2020:2427)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:2427 advisory.\n\n - kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/416.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12657\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:2427\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1832866\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-12657\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(416);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.2::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.2::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.2::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.4::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.2::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:enterprise_linux:8::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_aus:8.2::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_e4s:8.2::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.2::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.4::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_tus:8.2::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python3-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/RedHat/release');\nif (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nrepositories = {\n 'enterprise_linux_8_baseos': [\n 'rhel-8-for-aarch64-baseos-debug-rpms',\n 'rhel-8-for-aarch64-baseos-rpms',\n 'rhel-8-for-aarch64-baseos-source-rpms',\n 'rhel-8-for-s390x-baseos-debug-rpms',\n 'rhel-8-for-s390x-baseos-rpms',\n 'rhel-8-for-s390x-baseos-source-rpms',\n 'rhel-8-for-x86_64-baseos-debug-rpms',\n 'rhel-8-for-x86_64-baseos-rpms',\n 'rhel-8-for-x86_64-baseos-source-rpms'\n ],\n 'enterprise_linux_8_crb': [\n 'codeready-builder-for-rhel-8-aarch64-debug-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-source-rpms',\n 'codeready-builder-for-rhel-8-aarch64-rpms',\n 'codeready-builder-for-rhel-8-aarch64-source-rpms',\n 'codeready-builder-for-rhel-8-s390x-debug-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-source-rpms',\n 'codeready-builder-for-rhel-8-s390x-rpms',\n 'codeready-builder-for-rhel-8-s390x-source-rpms',\n 'codeready-builder-for-rhel-8-x86_64-debug-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-source-rpms',\n 'codeready-builder-for-rhel-8-x86_64-rpms',\n 'codeready-builder-for-rhel-8-x86_64-source-rpms'\n ],\n 'rhel_eus_8_2_baseos': [\n 'rhel-8-for-aarch64-baseos-eus-debug-rpms',\n 'rhel-8-for-aarch64-baseos-eus-rpms',\n 'rhel-8-for-aarch64-baseos-eus-source-rpms',\n 'rhel-8-for-s390x-baseos-eus-debug-rpms',\n 'rhel-8-for-s390x-baseos-eus-rpms',\n 'rhel-8-for-s390x-baseos-eus-source-rpms',\n 'rhel-8-for-x86_64-baseos-aus-debug-rpms',\n 'rhel-8-for-x86_64-baseos-aus-rpms',\n 'rhel-8-for-x86_64-baseos-aus-source-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-debug-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-source-rpms',\n 'rhel-8-for-x86_64-baseos-eus-debug-rpms',\n 'rhel-8-for-x86_64-baseos-eus-rpms',\n 'rhel-8-for-x86_64-baseos-eus-source-rpms',\n 'rhel-8-for-x86_64-baseos-tus-debug-rpms',\n 'rhel-8-for-x86_64-baseos-tus-rpms',\n 'rhel-8-for-x86_64-baseos-tus-source-rpms'\n ],\n 'rhel_eus_8_2_crb': [\n 'codeready-builder-for-rhel-8-aarch64-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-source-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-source-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-source-rpms'\n ]\n};\n\nfound_repos = NULL;\nhost_repo_list = get_kb_list('Host/RedHat/repo-list/*');\nif (!(empty_or_null(host_repo_list))) {\n found_repos = make_list();\n foreach repo_key (keys(repositories)) {\n foreach repo ( repositories[repo_key] ) {\n if (get_kb_item('Host/RedHat/repo-list/' + repo)) {\n append_element(var:found_repos, value:repo_key);\n break;\n }\n }\n }\n if(empty_or_null(found_repos)) audit(AUDIT_RHSA_NOT_AFFECTED, 'RHSA-2020:2427');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n rm_kb_item(name:'Host/uptrack-uname-r');\n cve_list = make_list('CVE-2020-12657');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2020:2427');\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\npkgs = [\n {'reference':'bpftool-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'bpftool-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'bpftool-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-abi-whitelists-4.18.0-193.6.3.el8_2', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-core-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-core-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-core-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-cross-headers-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-cross-headers-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-cross-headers-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-core-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-core-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-core-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-devel-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-devel-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-devel-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-modules-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-modules-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-modules-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-modules-extra-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-modules-extra-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-modules-extra-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-devel-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-devel-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-devel-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-headers-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-headers-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-headers-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-modules-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-modules-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-modules-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-modules-extra-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-modules-extra-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-modules-extra-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-libs-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-libs-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-libs-devel-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-libs-devel-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-zfcpdump-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-zfcpdump-core-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-zfcpdump-devel-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-zfcpdump-modules-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-zfcpdump-modules-extra-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'perf-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'perf-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'perf-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'python3-perf-4.18.0-193.6.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'python3-perf-4.18.0-193.6.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'python3-perf-4.18.0-193.6.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n repo_list = NULL;\n if (!empty_or_null(package_array['repo_list'])) repo_list = package_array['repo_list'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n repocheck = FALSE;\n if (empty_or_null(found_repos))\n {\n repocheck = TRUE;\n }\n else\n {\n foreach repo (repo_list) {\n if (contains_element(var:found_repos, value:repo))\n {\n repocheck = TRUE;\n break;\n }\n }\n }\n if (repocheck && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n if (empty_or_null(host_repo_list)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'bpftool / kernel / kernel-abi-whitelists / kernel-core / etc');\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-19T05:31:33", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:2428 advisory.\n\n - kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "edition": 4, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-06-09T00:00:00", "title": "RHEL 8 : kernel-rt (RHSA-2020:2428)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-12657"], "modified": "2020-06-09T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra", "cpe:/a:redhat:rhel_e4s:8.2::realtime", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug", "cpe:/o:redhat:rhel_tus:8.2", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel", "cpe:/a:redhat:rhel_aus:8.2::nfv", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm", "cpe:/a:redhat:rhel_tus:8.2::realtime", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-core", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm", "cpe:/o:redhat:rhel_eus:8.4", "cpe:/a:redhat:rhel_eus:8.2::realtime", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel", "cpe:/o:redhat:rhel_e4s:8.2", "cpe:/a:redhat:rhel_tus:8.2::nfv", "cpe:/a:redhat:rhel_eus:8.2::nfv", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra", "cpe:/a:redhat:rhel_aus:8.2::realtime", "cpe:/a:redhat:rhel_eus:8.4::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-rt", "cpe:/a:redhat:rhel_eus:8.4::realtime", "cpe:/o:redhat:rhel_aus:8.2", "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:rhel_e4s:8.2::nfv", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:rhel_eus:8.2", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules"], "id": "REDHAT-RHSA-2020-2428.NASL", "href": "https://www.tenable.com/plugins/nessus/137274", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:2428. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(137274);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/18\");\n\n script_cve_id(\"CVE-2020-12657\");\n script_xref(name:\"RHSA\", value:\"2020:2428\");\n\n script_name(english:\"RHEL 8 : kernel-rt (RHSA-2020:2428)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:2428 advisory.\n\n - kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/416.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12657\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:2428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1832866\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-12657\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(416);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:enterprise_linux:8::nfv\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:enterprise_linux:8::realtime\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_aus:8.2::nfv\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_aus:8.2::realtime\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_e4s:8.2::nfv\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_e4s:8.2::realtime\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.2::nfv\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.2::realtime\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.4::nfv\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.4::realtime\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_tus:8.2::nfv\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_tus:8.2::realtime\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/RedHat/release');\nif (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nrepositories = {\n 'enterprise_linux_8_nfv': [\n 'rhel-8-for-x86_64-nfv-debug-rpms',\n 'rhel-8-for-x86_64-nfv-rpms',\n 'rhel-8-for-x86_64-nfv-source-rpms',\n 'rhel-8-for-x86_64-nfv-tus-debug-rpms',\n 'rhel-8-for-x86_64-nfv-tus-rpms',\n 'rhel-8-for-x86_64-nfv-tus-source-rpms'\n ],\n 'enterprise_linux_8_realtime': [\n 'rhel-8-for-x86_64-rt-debug-rpms',\n 'rhel-8-for-x86_64-rt-rpms',\n 'rhel-8-for-x86_64-rt-source-rpms',\n 'rhel-8-for-x86_64-rt-tus-debug-rpms',\n 'rhel-8-for-x86_64-rt-tus-rpms',\n 'rhel-8-for-x86_64-rt-tus-source-rpms'\n ]\n};\n\nfound_repos = NULL;\nhost_repo_list = get_kb_list('Host/RedHat/repo-list/*');\nif (!(empty_or_null(host_repo_list))) {\n found_repos = make_list();\n foreach repo_key (keys(repositories)) {\n foreach repo ( repositories[repo_key] ) {\n if (get_kb_item('Host/RedHat/repo-list/' + repo)) {\n append_element(var:found_repos, value:repo_key);\n break;\n }\n }\n }\n if(empty_or_null(found_repos)) audit(AUDIT_RHSA_NOT_AFFECTED, 'RHSA-2020:2428');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n rm_kb_item(name:'Host/uptrack-uname-r');\n cve_list = make_list('CVE-2020-12657');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2020:2428');\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\npkgs = [\n {'reference':'kernel-rt-4.18.0-193.6.3.rt13.59.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-core-4.18.0-193.6.3.rt13.59.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-debug-4.18.0-193.6.3.rt13.59.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-debug-core-4.18.0-193.6.3.rt13.59.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-debug-devel-4.18.0-193.6.3.rt13.59.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-debug-kvm-4.18.0-193.6.3.rt13.59.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-debug-modules-4.18.0-193.6.3.rt13.59.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-debug-modules-extra-4.18.0-193.6.3.rt13.59.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-devel-4.18.0-193.6.3.rt13.59.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-kvm-4.18.0-193.6.3.rt13.59.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-modules-4.18.0-193.6.3.rt13.59.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-modules-extra-4.18.0-193.6.3.rt13.59.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n repo_list = NULL;\n if (!empty_or_null(package_array['repo_list'])) repo_list = package_array['repo_list'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n repocheck = FALSE;\n if (empty_or_null(found_repos))\n {\n repocheck = TRUE;\n }\n else\n {\n foreach repo (repo_list) {\n if (contains_element(var:found_repos, value:repo))\n {\n repocheck = TRUE;\n break;\n }\n }\n }\n if (repocheck && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n if (empty_or_null(host_repo_list)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-rt / kernel-rt-core / kernel-rt-debug / kernel-rt-debug-core / etc');\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-19T05:31:51", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:2667 advisory.\n\n - kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "edition": 4, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-06-25T00:00:00", "title": "RHEL 8 : kernel (RHSA-2020:2667)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-12657"], "modified": "2020-06-25T00:00:00", "cpe": ["cpe:/o:redhat:rhel_eus:8.1", "p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers", "p-cpe:/a:redhat:enterprise_linux:bpftool", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra", "cpe:/o:redhat:rhel_e4s:8.1::baseos", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "cpe:/o:redhat:rhel_e4s:8.1", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs", "p-cpe:/a:redhat:enterprise_linux:kernel-tools", "p-cpe:/a:redhat:enterprise_linux:kernel", "cpe:/a:redhat:rhel_eus:8.1::crb", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra", "p-cpe:/a:redhat:enterprise_linux:perf", "cpe:/o:redhat:rhel_eus:8.1::baseos", "p-cpe:/a:redhat:enterprise_linux:kernel-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-core", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core", "cpe:/a:redhat:rhel_e4s:8.1::crb", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-core", "p-cpe:/a:redhat:enterprise_linux:python3-perf"], "id": "REDHAT-RHSA-2020-2667.NASL", "href": "https://www.tenable.com/plugins/nessus/137832", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:2667. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(137832);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/18\");\n\n script_cve_id(\"CVE-2020-12657\");\n script_xref(name:\"RHSA\", value:\"2020:2667\");\n\n script_name(english:\"RHEL 8 : kernel (RHSA-2020:2667)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:2667 advisory.\n\n - kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/416.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12657\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:2667\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1832866\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-12657\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(416);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.1::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.1::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_e4s:8.1::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.1::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python3-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/RedHat/release');\nif (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8\\.1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 8.1', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nrepositories = {\n 'rhel_e4s_8_1_baseos': [\n 'rhel-8-for-x86_64-baseos-e4s-debug-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-source-rpms'\n ],\n 'rhel_eus_8_1_baseos': [\n 'rhel-8-for-aarch64-baseos-eus-debug-rpms',\n 'rhel-8-for-aarch64-baseos-eus-rpms',\n 'rhel-8-for-aarch64-baseos-eus-source-rpms',\n 'rhel-8-for-s390x-baseos-eus-debug-rpms',\n 'rhel-8-for-s390x-baseos-eus-rpms',\n 'rhel-8-for-s390x-baseos-eus-source-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-debug-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-source-rpms',\n 'rhel-8-for-x86_64-baseos-eus-debug-rpms',\n 'rhel-8-for-x86_64-baseos-eus-rpms',\n 'rhel-8-for-x86_64-baseos-eus-source-rpms'\n ],\n 'rhel_eus_8_1_crb': [\n 'codeready-builder-for-rhel-8-aarch64-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-source-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-source-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-source-rpms'\n ]\n};\n\nfound_repos = NULL;\nhost_repo_list = get_kb_list('Host/RedHat/repo-list/*');\nif (!(empty_or_null(host_repo_list))) {\n found_repos = make_list();\n foreach repo_key (keys(repositories)) {\n foreach repo ( repositories[repo_key] ) {\n if (get_kb_item('Host/RedHat/repo-list/' + repo)) {\n append_element(var:found_repos, value:repo_key);\n break;\n }\n }\n }\n if(empty_or_null(found_repos)) audit(AUDIT_RHSA_NOT_AFFECTED, 'RHSA-2020:2667');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n rm_kb_item(name:'Host/uptrack-uname-r');\n cve_list = make_list('CVE-2020-12657');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2020:2667');\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\npkgs = [\n {'reference':'bpftool-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'bpftool-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'bpftool-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-abi-whitelists-4.18.0-147.20.1.el8_1', 'sp':'1', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-core-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-core-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-core-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-cross-headers-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-cross-headers-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-cross-headers-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-core-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-core-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-core-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-devel-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-devel-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-devel-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-modules-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-modules-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-modules-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-modules-extra-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-modules-extra-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-modules-extra-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-devel-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-devel-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-devel-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-headers-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-headers-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-headers-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-modules-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-modules-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-modules-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-modules-extra-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-modules-extra-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-modules-extra-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-libs-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-libs-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-libs-devel-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-libs-devel-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-zfcpdump-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-zfcpdump-core-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-zfcpdump-devel-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-zfcpdump-modules-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-zfcpdump-modules-extra-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'perf-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'perf-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'perf-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'python3-perf-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'python3-perf-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'python3-perf-4.18.0-147.20.1.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n repo_list = NULL;\n if (!empty_or_null(package_array['repo_list'])) repo_list = package_array['repo_list'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n repocheck = FALSE;\n if (empty_or_null(found_repos))\n {\n repocheck = TRUE;\n }\n else\n {\n foreach repo (repo_list) {\n if (contains_element(var:found_repos, value:repo))\n {\n repocheck = TRUE;\n break;\n }\n }\n }\n if (repocheck && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n if (empty_or_null(host_repo_list)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'bpftool / kernel / kernel-abi-whitelists / kernel-core / etc');\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-09-14T17:30:45", "description": "From Red Hat Security Advisory 2020:2427 :\n\nThe remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in\nthe RHSA-2020:2427 advisory.\n\n - kernel: use-after-free in block/bfq-iosched.c related to\n bfq_idle_slice_timer_body (CVE-2020-12657)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.", "edition": 3, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-06-12T00:00:00", "title": "Oracle Linux 8 : kernel (ELSA-2020-2427)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-12657"], "modified": "2020-06-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-debug-core", "p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-modules-extra", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-tools", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:python3-perf", "p-cpe:/a:oracle:linux:bpftool", "cpe:/o:oracle:linux:8", "p-cpe:/a:oracle:linux:kernel-core", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-modules", "p-cpe:/a:oracle:linux:kernel-debug-modules-extra", "p-cpe:/a:oracle:linux:kernel-debug-modules", "p-cpe:/a:oracle:linux:kernel-tools-libs", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-cross-headers", "p-cpe:/a:oracle:linux:kernel-abi-whitelists", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-tools-libs-devel"], "id": "ORACLELINUX_ELSA-2020-2427.NASL", "href": "https://www.tenable.com/plugins/nessus/137384", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:2427 and \n# Oracle Linux Security Advisory ELSA-2020-2427 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(137384);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/18\");\n\n script_cve_id(\"CVE-2020-12657\");\n script_xref(name:\"RHSA\", value:\"2020:2427\");\n\n script_name(english:\"Oracle Linux 8 : kernel (ELSA-2020-2427)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"From Red Hat Security Advisory 2020:2427 :\n\nThe remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in\nthe RHSA-2020:2427 advisory.\n\n - kernel: use-after-free in block/bfq-iosched.c related to\n bfq_idle_slice_timer_body (CVE-2020-12657)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2020-June/010030.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-cross-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python3-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:8\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 8\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2020-12657\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2020-2427\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"4.18\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"bpftool-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-abi-whitelists-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-abi-whitelists-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-core-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-core-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-cross-headers-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-cross-headers-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-debug-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-debug-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-debug-core-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-debug-core-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-debug-devel-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-debug-devel-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-debug-modules-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-debug-modules-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-debug-modules-extra-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-debug-modules-extra-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-devel-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-devel-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-doc-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-doc-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-headers-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-headers-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-modules-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-modules-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-modules-extra-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-modules-extra-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-tools-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-tools-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-tools-libs-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-tools-libs-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-tools-libs-devel-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"perf-4.18.0-193.6.3.el8_2\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"python3-perf-4.18.0-193.6.3.el8_2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-05T15:46:55", "description": "It was discovered that the btrfs implementation in the Linux kernel\ndid not properly detect that a block was marked dirty in some\nsituations. An attacker could use this to specially craft a file\nsystem image that, when unmounted, could cause a denial of service\n(system crash). (CVE-2019-19377)\n\nTristan Madani discovered that the file locking implementation in the\nLinux kernel contained a race condition. A local attacker could\npossibly use this to cause a denial of service or expose sensitive\ninformation. (CVE-2019-19769)\n\nIt was discovered that the Serial CAN interface driver in the Linux\nkernel did not properly initialize data. A local attacker could use\nthis to expose sensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate\ncertain mount options to the tmpfs virtual memory file system. A local\nattacker with the ability to specify mount options could use this to\ncause a denial of service (system crash). (CVE-2020-11565)\n\nIt was discovered that the OV51x USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2020-11608)\n\nIt was discovered that the STV06XX USB Camera device driver in the\nLinux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2020-11609)\n\nIt was discovered that the Xirlink C-It USB Camera device driver in\nthe Linux kernel did not properly validate device metadata. A\nphysically proximate attacker could use this to cause a denial of\nservice (system crash). (CVE-2020-11668)\n\nIt was discovered that the block layer in the Linux kernel contained a\nrace condition leading to a use-after-free vulnerability. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or execute arbitrary code. (CVE-2020-12657).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 4, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2020-05-21T00:00:00", "title": "Ubuntu 18.04 LTS / 19.10 : Linux kernel vulnerabilities (USN-4369-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-11494", "CVE-2020-12826", "CVE-2020-11609", "CVE-2019-19769", "CVE-2020-11608", "CVE-2020-11668", "CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "modified": "2020-05-21T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp-edge", "p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gke-5.3", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-aws-edge", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gkeop-5.3", "cpe:/o:canonical:ubuntu_linux:19.10", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-azure-edge", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-gke", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-snapdragon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gke"], "id": "UBUNTU_USN-4369-1.NASL", "href": "https://www.tenable.com/plugins/nessus/136759", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4369-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(136759);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2019-19377\", \"CVE-2019-19769\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12657\", \"CVE-2020-12826\");\n script_xref(name:\"USN\", value:\"4369-1\");\n\n script_name(english:\"Ubuntu 18.04 LTS / 19.10 : Linux kernel vulnerabilities (USN-4369-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that the btrfs implementation in the Linux kernel\ndid not properly detect that a block was marked dirty in some\nsituations. An attacker could use this to specially craft a file\nsystem image that, when unmounted, could cause a denial of service\n(system crash). (CVE-2019-19377)\n\nTristan Madani discovered that the file locking implementation in the\nLinux kernel contained a race condition. A local attacker could\npossibly use this to cause a denial of service or expose sensitive\ninformation. (CVE-2019-19769)\n\nIt was discovered that the Serial CAN interface driver in the Linux\nkernel did not properly initialize data. A local attacker could use\nthis to expose sensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate\ncertain mount options to the tmpfs virtual memory file system. A local\nattacker with the ability to specify mount options could use this to\ncause a denial of service (system crash). (CVE-2020-11565)\n\nIt was discovered that the OV51x USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2020-11608)\n\nIt was discovered that the STV06XX USB Camera device driver in the\nLinux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2020-11609)\n\nIt was discovered that the Xirlink C-It USB Camera device driver in\nthe Linux kernel did not properly validate device metadata. A\nphysically proximate attacker could use this to cause a denial of\nservice (system crash). (CVE-2020-11668)\n\nIt was discovered that the block layer in the Linux kernel contained a\nrace condition leading to a use-after-free vulnerability. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or execute arbitrary code. (CVE-2020-12657).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/4369-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-19377\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-snapdragon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-aws-edge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-azure-edge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp-edge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gke-5.3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gkeop-5.3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:19.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/05/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2020-2021 Canonical, Inc. / NASL script (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(18\\.04|19\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 18.04 / 19.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-19377\", \"CVE-2019-19769\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12657\", \"CVE-2020-12826\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-4369-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-1018-oracle\", pkgver:\"5.3.0-1018.20~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-1019-aws\", pkgver:\"5.3.0-1019.21~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-1020-gcp\", pkgver:\"5.3.0-1020.22~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-1020-gke\", pkgver:\"5.3.0-1020.22~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-1022-azure\", pkgver:\"5.3.0-1022.23~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-53-generic\", pkgver:\"5.3.0-53.47~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-53-generic-lpae\", pkgver:\"5.3.0-53.47~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-53-lowlatency\", pkgver:\"5.3.0-53.47~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-aws\", pkgver:\"5.3.0.1019.20\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-aws-edge\", pkgver:\"5.3.0.1019.20\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-azure\", pkgver:\"5.3.0.1022.22\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-azure-edge\", pkgver:\"5.3.0.1022.22\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-gcp\", pkgver:\"5.3.0.1020.19\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-gcp-edge\", pkgver:\"5.3.0.1020.19\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-generic-hwe-18.04\", pkgver:\"5.3.0.53.109\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-generic-lpae-hwe-18.04\", pkgver:\"5.3.0.53.109\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-gke-5.3\", pkgver:\"5.3.0.1020.10\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-gkeop-5.3\", pkgver:\"5.3.0.53.109\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-lowlatency-hwe-18.04\", pkgver:\"5.3.0.53.109\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-oracle\", pkgver:\"5.3.0.1018.19\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-snapdragon-hwe-18.04\", pkgver:\"5.3.0.53.109\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-virtual-hwe-18.04\", pkgver:\"5.3.0.53.109\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-5.3.0-1017-kvm\", pkgver:\"5.3.0-1017.19\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-5.3.0-1018-oracle\", pkgver:\"5.3.0-1018.20\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-5.3.0-1019-aws\", pkgver:\"5.3.0-1019.21\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-5.3.0-1020-gcp\", pkgver:\"5.3.0-1020.22\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-5.3.0-1022-azure\", pkgver:\"5.3.0-1022.23\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-5.3.0-1025-raspi2\", pkgver:\"5.3.0-1025.27\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-5.3.0-53-generic\", pkgver:\"5.3.0-53.47\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-5.3.0-53-generic-lpae\", pkgver:\"5.3.0-53.47\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-5.3.0-53-lowlatency\", pkgver:\"5.3.0-53.47\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-5.3.0-53-snapdragon\", pkgver:\"5.3.0-53.47\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-aws\", pkgver:\"5.3.0.1019.31\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-azure\", pkgver:\"5.3.0.1022.41\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-gcp\", pkgver:\"5.3.0.1020.31\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-generic\", pkgver:\"5.3.0.53.45\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-generic-lpae\", pkgver:\"5.3.0.53.45\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-gke\", pkgver:\"5.3.0.1020.31\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-kvm\", pkgver:\"5.3.0.1017.19\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-lowlatency\", pkgver:\"5.3.0.53.45\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-oracle\", pkgver:\"5.3.0.1018.33\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-raspi2\", pkgver:\"5.3.0.1025.22\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-snapdragon\", pkgver:\"5.3.0.53.45\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"linux-image-virtual\", pkgver:\"5.3.0.53.45\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-5.3-aws / linux-image-5.3-azure / linux-image-5.3-gcp / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-29T07:37:28", "description": "USN-4367-1 fixed vulnerabilities in the 5.4 Linux kernel.\nUnfortunately, that update introduced a regression in overlayfs. This\nupdate corrects the problem.\n\nWe apologize for the inconvenience.\n\nIt was discovered that the btrfs implementation in the Linux kernel\ndid not properly detect that a block was marked dirty in some\nsituations. An attacker could use this to specially craft a file\nsystem image that, when unmounted, could cause a denial of service\n(system crash). (CVE-2019-19377)\n\nIt was discovered that the linux kernel did not properly validate\ncertain mount options to the tmpfs virtual memory file system. A local\nattacker with the ability to specify mount options could use this to\ncause a denial of service (system crash). (CVE-2020-11565)\n\nIt was discovered that the block layer in the Linux kernel contained a\nrace condition leading to a use-after-free vulnerability. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or execute arbitrary code. (CVE-2020-12657).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 4, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2020-05-29T00:00:00", "title": "Ubuntu 20.04 : Linux kernel regression (USN-4367-2)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "modified": "2020-05-29T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual", "cpe:/o:canonical:ubuntu_linux:20.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-osp1", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oem", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic"], "id": "UBUNTU_USN-4367-2.NASL", "href": "https://www.tenable.com/plugins/nessus/136965", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4367-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(136965);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/28\");\n\n script_cve_id(\"CVE-2019-19377\", \"CVE-2020-11565\", \"CVE-2020-12657\");\n script_xref(name:\"USN\", value:\"4367-2\");\n\n script_name(english:\"Ubuntu 20.04 : Linux kernel regression (USN-4367-2)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"USN-4367-1 fixed vulnerabilities in the 5.4 Linux kernel.\nUnfortunately, that update introduced a regression in overlayfs. This\nupdate corrects the problem.\n\nWe apologize for the inconvenience.\n\nIt was discovered that the btrfs implementation in the Linux kernel\ndid not properly detect that a block was marked dirty in some\nsituations. An attacker could use this to specially craft a file\nsystem image that, when unmounted, could cause a denial of service\n(system crash). (CVE-2019-19377)\n\nIt was discovered that the linux kernel did not properly validate\ncertain mount options to the tmpfs virtual memory file system. A local\nattacker with the ability to specify mount options could use this to\ncause a denial of service (system crash). (CVE-2020-11565)\n\nIt was discovered that the block layer in the Linux kernel contained a\nrace condition leading to a use-after-free vulnerability. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or execute arbitrary code. (CVE-2020-12657).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/4367-2/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-19377\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-osp1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/05/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(20\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 20.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-19377\", \"CVE-2020-11565\", \"CVE-2020-12657\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-4367-2\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-33-generic\", pkgver:\"5.4.0-33.37\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-33-generic-lpae\", pkgver:\"5.4.0-33.37\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-33-lowlatency\", pkgver:\"5.4.0-33.37\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-generic\", pkgver:\"5.4.0.33.38\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-generic-lpae\", pkgver:\"5.4.0.33.38\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-lowlatency\", pkgver:\"5.4.0.33.38\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-oem\", pkgver:\"5.4.0.33.38\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-oem-osp1\", pkgver:\"5.4.0.33.38\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-virtual\", pkgver:\"5.4.0.33.38\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-5.4-generic / linux-image-5.4-generic-lpae / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "amazon": [{"lastseen": "2020-11-10T12:35:04", "bulletinFamily": "unix", "cvelist": ["CVE-2020-10711", "CVE-2020-12826", "CVE-2020-12657"], "description": "**Issue Overview:**\n\nA NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service. ([CVE-2020-10711 __](<https://access.redhat.com/security/cve/CVE-2020-10711>))\n\nA flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process. ([CVE-2020-12826 __](<https://access.redhat.com/security/cve/CVE-2020-12826>))\n\nA flaw was found in the Linux kernel's implementation of the BFQ IO scheduler. This flaw allows a local user able to groom system memory to cause kernel memory corruption and possible privilege escalation by abusing a race condition in the IO scheduler. ([CVE-2020-12657 __](<https://access.redhat.com/security/cve/CVE-2020-12657>))\n\n \n**Affected Packages:** \n\n\nkernel\n\n \n**Issue Correction:** \nRun _yum update kernel_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n i686: \n kernel-debuginfo-common-i686-4.14.177-107.254.amzn1.i686 \n kernel-headers-4.14.177-107.254.amzn1.i686 \n kernel-devel-4.14.177-107.254.amzn1.i686 \n kernel-tools-4.14.177-107.254.amzn1.i686 \n kernel-tools-devel-4.14.177-107.254.amzn1.i686 \n kernel-debuginfo-4.14.177-107.254.amzn1.i686 \n kernel-4.14.177-107.254.amzn1.i686 \n perf-4.14.177-107.254.amzn1.i686 \n perf-debuginfo-4.14.177-107.254.amzn1.i686 \n kernel-tools-debuginfo-4.14.177-107.254.amzn1.i686 \n \n src: \n kernel-4.14.177-107.254.amzn1.src \n \n x86_64: \n kernel-debuginfo-common-x86_64-4.14.177-107.254.amzn1.x86_64 \n kernel-tools-debuginfo-4.14.177-107.254.amzn1.x86_64 \n kernel-4.14.177-107.254.amzn1.x86_64 \n kernel-devel-4.14.177-107.254.amzn1.x86_64 \n kernel-tools-devel-4.14.177-107.254.amzn1.x86_64 \n kernel-headers-4.14.177-107.254.amzn1.x86_64 \n perf-4.14.177-107.254.amzn1.x86_64 \n kernel-debuginfo-4.14.177-107.254.amzn1.x86_64 \n perf-debuginfo-4.14.177-107.254.amzn1.x86_64 \n kernel-tools-4.14.177-107.254.amzn1.x86_64 \n \n \n", "edition": 6, "modified": "2020-05-11T20:43:00", "published": "2020-05-11T20:43:00", "id": "ALAS-2020-1366", "href": "https://alas.aws.amazon.com/ALAS-2020-1366.html", "title": "Important: kernel", "type": "amazon", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-10T12:34:50", "bulletinFamily": "unix", "cvelist": ["CVE-2020-10711", "CVE-2020-12826", "CVE-2020-12657"], "description": "**Issue Overview:**\n\nA NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service. ([CVE-2020-10711 __](<https://access.redhat.com/security/cve/CVE-2020-10711>))\n\nAn issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body. ([CVE-2020-12657 __](<https://access.redhat.com/security/cve/CVE-2020-12657>))\n\nA signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat. ([CVE-2020-12826 __](<https://access.redhat.com/security/cve/CVE-2020-12826>))\n\n \n**Affected Packages:** \n\n\nkernel\n\n \n**Issue Correction:** \nRun _yum update kernel_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n i686: \n kernel-debuginfo-common-i686-4.14.177-107.254.amzn1.i686 \n kernel-headers-4.14.177-107.254.amzn1.i686 \n kernel-devel-4.14.177-107.254.amzn1.i686 \n kernel-tools-4.14.177-107.254.amzn1.i686 \n kernel-tools-devel-4.14.177-107.254.amzn1.i686 \n kernel-debuginfo-4.14.177-107.254.amzn1.i686 \n kernel-4.14.177-107.254.amzn1.i686 \n perf-4.14.177-107.254.amzn1.i686 \n perf-debuginfo-4.14.177-107.254.amzn1.i686 \n kernel-tools-debuginfo-4.14.177-107.254.amzn1.i686 \n \n src: \n kernel-4.14.177-107.254.amzn1.src \n \n x86_64: \n kernel-debuginfo-common-x86_64-4.14.177-107.254.amzn1.x86_64 \n kernel-tools-debuginfo-4.14.177-107.254.amzn1.x86_64 \n kernel-4.14.177-107.254.amzn1.x86_64 \n kernel-devel-4.14.177-107.254.amzn1.x86_64 \n kernel-tools-devel-4.14.177-107.254.amzn1.x86_64 \n kernel-headers-4.14.177-107.254.amzn1.x86_64 \n perf-4.14.177-107.254.amzn1.x86_64 \n kernel-debuginfo-4.14.177-107.254.amzn1.x86_64 \n perf-debuginfo-4.14.177-107.254.amzn1.x86_64 \n kernel-tools-4.14.177-107.254.amzn1.x86_64 \n \n \n", "edition": 3, "modified": "2020-06-23T06:02:00", "published": "2020-06-23T06:02:00", "id": "ALAS-2020-1382", "href": "https://alas.aws.amazon.com/ALAS-2020-1382.html", "title": "Important: kernel", "type": "amazon", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-15T01:35:22", "bulletinFamily": "unix", "cvelist": ["CVE-2020-12826", "CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "description": "It was discovered that the btrfs implementation in the Linux kernel did not \nproperly detect that a block was marked dirty in some situations. An \nattacker could use this to specially craft a file system image that, when \nunmounted, could cause a denial of service (system crash). (CVE-2019-19377)\n\nIt was discovered that the linux kernel did not properly validate certain \nmount options to the tmpfs virtual memory file system. A local attacker \nwith the ability to specify mount options could use this to cause a denial \nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the block layer in the Linux kernel contained a race \ncondition leading to a use-after-free vulnerability. A local attacker could \npossibly use this to cause a denial of service (system crash) or execute \narbitrary code. (CVE-2020-12657)", "edition": 5, "modified": "2020-05-24T00:00:00", "published": "2020-05-24T00:00:00", "id": "USN-4367-1", "href": "https://ubuntu.com/security/notices/USN-4367-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-18T01:40:00", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11494", "CVE-2020-12826", "CVE-2020-11609", "CVE-2019-19769", "CVE-2020-11608", "CVE-2020-11668", "CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "description": "It was discovered that the btrfs implementation in the Linux kernel did not \nproperly detect that a block was marked dirty in some situations. An \nattacker could use this to specially craft a file system image that, when \nunmounted, could cause a denial of service (system crash). (CVE-2019-19377)\n\nTristan Madani discovered that the file locking implementation in the Linux \nkernel contained a race condition. A local attacker could possibly use this \nto cause a denial of service or expose sensitive information. \n(CVE-2019-19769)\n\nIt was discovered that the Serial CAN interface driver in the Linux kernel \ndid not properly initialize data. A local attacker could use this to expose \nsensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate certain \nmount options to the tmpfs virtual memory file system. A local attacker \nwith the ability to specify mount options could use this to cause a denial \nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the OV51x USB Camera device driver in the Linux \nkernel did not properly validate device metadata. A physically proximate \nattacker could use this to cause a denial of service (system crash). \n(CVE-2020-11608)\n\nIt was discovered that the STV06XX USB Camera device driver in the Linux \nkernel did not properly validate device metadata. A physically proximate \nattacker could use this to cause a denial of service (system crash). \n(CVE-2020-11609)\n\nIt was discovered that the Xirlink C-It USB Camera device driver in the \nLinux kernel did not properly validate device metadata. A physically \nproximate attacker could use this to cause a denial of service (system \ncrash). (CVE-2020-11668)\n\nIt was discovered that the block layer in the Linux kernel contained a race \ncondition leading to a use-after-free vulnerability. A local attacker could \npossibly use this to cause a denial of service (system crash) or execute \narbitrary code. (CVE-2020-12657)", "edition": 5, "modified": "2020-05-24T00:00:00", "published": "2020-05-24T00:00:00", "id": "USN-4369-1", "href": "https://ubuntu.com/security/notices/USN-4369-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-02T11:37:34", "bulletinFamily": "unix", "cvelist": ["CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "description": "USN-4367-1 fixed vulnerabilities in the 5.4 Linux kernel. Unfortunately, \nthat update introduced a regression in overlayfs. This update corrects \nthe problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nIt was discovered that the btrfs implementation in the Linux kernel did not \nproperly detect that a block was marked dirty in some situations. An \nattacker could use this to specially craft a file system image that, when \nunmounted, could cause a denial of service (system crash). (CVE-2019-19377)\n\nIt was discovered that the linux kernel did not properly validate certain \nmount options to the tmpfs virtual memory file system. A local attacker \nwith the ability to specify mount options could use this to cause a denial \nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the block layer in the Linux kernel contained a race \ncondition leading to a use-after-free vulnerability. A local attacker could \npossibly use this to cause a denial of service (system crash) or execute \narbitrary code. (CVE-2020-12657)", "edition": 2, "modified": "2020-05-28T00:00:00", "published": "2020-05-28T00:00:00", "id": "USN-4367-2", "href": "https://ubuntu.com/security/notices/USN-4367-2", "title": "Linux kernel regression", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-02T11:32:56", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11494", "CVE-2020-11565", "CVE-2020-11669", "CVE-2020-12657"], "description": "It was discovered that the Serial CAN interface driver in the Linux kernel \ndid not properly initialize data. A local attacker could use this to expose \nsensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate certain \nmount options to the tmpfs virtual memory file system. A local attacker \nwith the ability to specify mount options could use this to cause a denial \nof service (system crash). (CVE-2020-11565)\n\nDavid Gibson discovered that the Linux kernel on Power9 CPUs did not \nproperly save and restore Authority Mask registers state in some \nsituations. A local attacker in a guest VM could use this to cause a denial \nof service (host system crash). (CVE-2020-11669)\n\nIt was discovered that the block layer in the Linux kernel contained a race \ncondition leading to a use-after-free vulnerability. A local attacker could \npossibly use this to cause a denial of service (system crash) or execute \narbitrary code. (CVE-2020-12657)", "edition": 5, "modified": "2020-05-28T00:00:00", "published": "2020-05-28T00:00:00", "id": "USN-4363-1", "href": "https://ubuntu.com/security/notices/USN-4363-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-02T11:41:18", "bulletinFamily": "unix", "cvelist": ["CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12826", "CVE-2020-0543", "CVE-2020-12464", "CVE-2019-19319", "CVE-2020-1749", "CVE-2020-10751"], "description": "It was discovered that the ext4 file system implementation in the Linux \nkernel did not properly handle setxattr operations in some situations. A \nlocal attacker could use this to cause a denial of service (system crash) \nor possibly execute arbitrary code. (CVE-2019-19319)\n\nIt was discovered that memory contents previously stored in \nmicroarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY \nread operations on Intel client and Xeon E3 processors may be briefly \nexposed to processes on the same or different processor cores. A local \nattacker could use this to expose sensitive information. (CVE-2020-0543)\n\nPiotr Krysiuk discovered that race conditions existed in the file system \nimplementation in the Linux kernel. A local attacker could use this to \ncause a denial of service (system crash). (CVE-2020-12114)\n\nIt was discovered that the USB susbsystem's scatter-gather implementation \nin the Linux kernel did not properly take data references in some \nsituations, leading to a use-after-free. A physically proximate attacker \ncould use this to cause a denial of service (system crash) or possibly \nexecute arbitrary code. (CVE-2020-12464)\n\nIt was discovered that the DesignWare SPI controller driver in the Linux \nkernel contained a race condition. A local attacker could possibly use this \nto cause a denial of service (system crash). (CVE-2020-12769)\n\nIt was discovered that the exit signaling implementation in the Linux \nkernel contained an integer overflow. A local attacker could use this to \ncause a denial of service (arbitrary application crash). (CVE-2020-12826)\n\nXiumei Mu discovered that the IPSec implementation in the Linux kernel did \nnot properly encrypt IPv6 traffic in some situations. An attacker could use \nthis to expose sensitive information. (CVE-2020-1749)\n\nDmitry Vyukov discovered that the SELinux netlink security hook in the \nLinux kernel did not validate messages in some situations. A privileged \nattacker could use this to bypass SELinux netlink restrictions. \n(CVE-2020-10751)", "edition": 3, "modified": "2020-06-11T00:00:00", "published": "2020-06-11T00:00:00", "id": "USN-4391-1", "href": "https://ubuntu.com/security/notices/USN-4391-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-02T11:35:39", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11494", "CVE-2020-11609", "CVE-2019-19769", "CVE-2020-11608", "CVE-2020-11668", "CVE-2020-11565", "CVE-2020-11669", "CVE-2020-12657"], "description": "Tristan Madani discovered that the file locking implementation in the Linux \nkernel contained a race condition. A local attacker could possibly use this \nto cause a denial of service or expose sensitive information. \n(CVE-2019-19769)\n\nIt was discovered that the Serial CAN interface driver in the Linux kernel \ndid not properly initialize data. A local attacker could use this to expose \nsensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate certain \nmount options to the tmpfs virtual memory file system. A local attacker \nwith the ability to specify mount options could use this to cause a denial \nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the OV51x USB Camera device driver in the Linux \nkernel did not properly validate device metadata. A physically proximate \nattacker could use this to cause a denial of service (system crash). \n(CVE-2020-11608)\n\nIt was discovered that the STV06XX USB Camera device driver in the Linux \nkernel did not properly validate device metadata. A physically proximate \nattacker could use this to cause a denial of service (system crash). \n(CVE-2020-11609)\n\nIt was discovered that the Xirlink C-It USB Camera device driver in the \nLinux kernel did not properly validate device metadata. A physically \nproximate attacker could use this to cause a denial of service (system \ncrash). (CVE-2020-11668)\n\nDavid Gibson discovered that the Linux kernel on Power9 CPUs did not \nproperly save and restore Authority Mask registers state in some \nsituations. A local attacker in a guest VM could use this to cause a denial \nof service (host system crash). (CVE-2020-11669)\n\nIt was discovered that the block layer in the Linux kernel contained a race \ncondition leading to a use-after-free vulnerability. A local attacker could \npossibly use this to cause a denial of service (system crash) or execute \narbitrary code. (CVE-2020-12657)", "edition": 2, "modified": "2020-05-19T00:00:00", "published": "2020-05-19T00:00:00", "id": "USN-4368-1", "href": "https://ubuntu.com/security/notices/USN-4368-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-07-02T11:45:13", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11494", "CVE-2020-11609", "CVE-2019-19769", "CVE-2020-11608", "CVE-2020-11668", "CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "description": "USN-4369-1 fixed vulnerabilities in the 5.3 Linux kernel. Unfortunately, \nthat update introduced a regression in overlayfs. This update corrects \nthe problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nIt was discovered that the btrfs implementation in the Linux kernel did not \nproperly detect that a block was marked dirty in some situations. An \nattacker could use this to specially craft a file system image that, when \nunmounted, could cause a denial of service (system crash). (CVE-2019-19377)\n\nTristan Madani discovered that the file locking implementation in the Linux \nkernel contained a race condition. A local attacker could possibly use this \nto cause a denial of service or expose sensitive information. \n(CVE-2019-19769)\n\nIt was discovered that the Serial CAN interface driver in the Linux kernel \ndid not properly initialize data. A local attacker could use this to expose \nsensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate certain \nmount options to the tmpfs virtual memory file system. A local attacker \nwith the ability to specify mount options could use this to cause a denial \nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the OV51x USB Camera device driver in the Linux \nkernel did not properly validate device metadata. A physically proximate \nattacker could use this to cause a denial of service (system crash). \n(CVE-2020-11608)\n\nIt was discovered that the STV06XX USB Camera device driver in the Linux \nkernel did not properly validate device metadata. A physically proximate \nattacker could use this to cause a denial of service (system crash). \n(CVE-2020-11609)\n\nIt was discovered that the Xirlink C-It USB Camera device driver in the \nLinux kernel did not properly validate device metadata. A physically \nproximate attacker could use this to cause a denial of service (system \ncrash). (CVE-2020-11668)\n\nIt was discovered that the block layer in the Linux kernel contained a race \ncondition leading to a use-after-free vulnerability. A local attacker could \npossibly use this to cause a denial of service (system crash) or execute \narbitrary code. (CVE-2020-12657)", "edition": 2, "modified": "2020-05-28T00:00:00", "published": "2020-05-28T00:00:00", "id": "USN-4369-2", "href": "https://ubuntu.com/security/notices/USN-4369-2", "title": "Linux kernel regression", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2020-06-15T19:52:41", "bulletinFamily": "unix", "cvelist": ["CVE-2020-12657"], "description": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2020-06-15T22:48:52", "published": "2020-06-15T22:37:55", "id": "RHSA-2020:2567", "href": "https://access.redhat.com/errata/RHSA-2020:2567", "type": "redhat", "title": "(RHSA-2020:2567) Important: kpatch-patch security update", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-23T13:53:19", "bulletinFamily": "unix", "cvelist": ["CVE-2020-12657"], "description": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2020-06-23T16:52:09", "published": "2020-06-23T16:34:58", "id": "RHSA-2020:2669", "href": "https://access.redhat.com/errata/RHSA-2020:2669", "type": "redhat", "title": "(RHSA-2020:2669) Important: kpatch-patch security update", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-09T19:52:27", "bulletinFamily": "unix", "cvelist": ["CVE-2020-0543", "CVE-2020-12657"], "description": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel: hw: provide reporting and microcode mitigation toggle for CVE-2020-0543 / Special Register Buffer Data Sampling (SRBDS) (BZ#1827193)\n\n* kernel-rt: update RT source tree to the RHEL-8.2.z1 source tree (BZ#1816271)", "modified": "2020-06-09T22:16:23", "published": "2020-06-09T21:42:14", "id": "RHSA-2020:2428", "href": "https://access.redhat.com/errata/RHSA-2020:2428", "type": "redhat", "title": "(RHSA-2020:2428) Important: kernel-rt security and bug fix update", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-09T19:53:13", "bulletinFamily": "unix", "cvelist": ["CVE-2020-0543", "CVE-2020-12657"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel: hw: provide reporting and microcode mitigation toggle for CVE-2020-0543 / Special Register Buffer Data Sampling (SRBDS) (BZ#1827191)\n\n* ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets (BZ#1821375)\n\n* IB/core: deadlock on rdma_nl_mutex when netlink triggers on-demand modprobe rdma_cm (BZ#1821381)\n\n* dm: fix excessive bio splitting that results in performance regressions (BZ#1821382)\n\n* system time jumps when hotplug vcpu on a long uptime guest (BZ#1822498)\n\n* [DELL 8.2 BUG]Ethernet : e1000e doesn't work after S2I (BZ#1825262)\n\n* NFSv3 sec=krb5p fails against an ONTAP server (BZ#1826219)\n\n* Stand-alone CPU Linpack test reports bad residual on HPC Cluster node(s) while running RHEL 8 (BZ#1827619)\n\n* [DELL 8.2 BUG]bluetooth Scanning block S3 and Suspend to idle (BZ#1827620)\n\n* RHEL8.2 Beta - SMC-R connection with vlan-id fails (BZ#1827631)\n\n* RHEL8.1 - RHEL8.1 kernel 4.18.0-147.3.1.el8.bz181950_test001.ppc64le+debug failed during LPM test (p8/p9):idahop08:LPM (vtpm) (BZ#1827632)\n\n* missing version.h dependency for modpost may cause build to fail (BZ#1828229)\n\n* efi: kernel panic during ltp fs test - read_all -d /sys -q -r 10 (BZ#1829527)\n\n* Let \"isolcpus=\" skip unknown sub-parameters (BZ#1832367)\n\n* RHEL8.0 - Very bad performance with small blocks in FC-IO found by SAP HANA on POWER tests on RHEL8.0 (compared to RHEL7.4) (BZ#1834517)\n\n* [FJ8.2 Bug]: [REG] NFS-client panic at nfs4_get_valid_delegation+0x1c/0x40 [nfsv4] (BZ#1837969)\n\n* [RHEL-8.3] upstream bonding driver refresh (BZ#1838477)\n\n* Enable xt_u32 module (BZ#1840799)\n\n* Move xt_u32 module to kernel-modules-extra (BZ#1840800)", "modified": "2020-06-09T22:52:01", "published": "2020-06-09T21:42:37", "id": "RHSA-2020:2427", "href": "https://access.redhat.com/errata/RHSA-2020:2427", "type": "redhat", "title": "(RHSA-2020:2427) Important: kernel security and bug fix update", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-23T19:53:51", "bulletinFamily": "unix", "cvelist": ["CVE-2020-0543", "CVE-2020-12657"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [FJ8.2 Bug]: kernel: retrieving process core dump of the init process (PID 1) fails (BZ#1821377)\n\n* Stand-alone CPU Linpack test reports bad residual on HPC Cluster node(s) while running RHEL 8 (BZ#1827618)\n\n* missing version.h dependency for modpost may cause build to fail (BZ#1828228)\n\n* RHEL8.2 Pre-Beta - net/ibmvnic: Fix typo in retry check (BZ#1828708)\n\n* efi: kernel panic during ltp fs test - read_all -d /sys -q -r 10 (BZ#1829526)\n\n* RHEL8.2 Beta - SMC-R connection with vlan-id fails (BZ#1830895)\n\n* RHEL8.1 - RHEL8.1 kernel 4.18.0-147.3.1.el8.bz181950_test001.ppc64le+debug failed during LPM test (p8/p9):idahop08:LPM (vtpm) (BZ#1831663)\n\n* s390/pci: fix bugs related to MIO instruction usage (BZ#1834690)\n\n* RHEL8.2 Alpha - ISST-LTE:PowerVM: vNIC DLPAR crashes the LPAR (ibmvnic) (BZ#1836232)\n\n* kernel: hw: provide reporting and microcode mitigation toggle for CVE-2020-0543 / Special Register Buffer Data Sampling (SRBDS) (BZ#1840685)\n\n* [Hyper-V][RHEL8.2] Update netvsc driver (BZ#1842485)\n\n* block layer: update to v5.3 (BZ#1842872)\n\n* netfilter: backports from upstream (BZ#1845041)", "modified": "2020-06-23T16:52:06", "published": "2020-06-23T16:34:48", "id": "RHSA-2020:2667", "href": "https://access.redhat.com/errata/RHSA-2020:2667", "type": "redhat", "title": "(RHSA-2020:2667) Important: kernel security and bug fix update", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-09T19:51:46", "bulletinFamily": "unix", "cvelist": ["CVE-2019-18660", "CVE-2020-0543", "CVE-2020-10711", "CVE-2020-11884", "CVE-2020-12657"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)\n\n* Kernel: s390: page table upgrade in secondary address mode may lead to privilege escalation (CVE-2020-11884)\n\n* kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)\n\n* kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure (CVE-2019-18660)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel: hw: provide reporting and microcode mitigation toggle for CVE-2020-0543 / Special Register Buffer Data Sampling (SRBDS) (BZ#1840684)\n\n* missing version.h dependency for modpost may cause build to fail (BZ#1828227)\n\n* efi: kernel panic during ltp fs test - read_all -d /sys -q -r 10 (BZ#1829525)", "modified": "2020-06-09T22:37:01", "published": "2020-06-09T22:18:09", "id": "RHSA-2020:2429", "href": "https://access.redhat.com/errata/RHSA-2020:2429", "type": "redhat", "title": "(RHSA-2020:2429) Important: kernel security and bug fix update", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-04T02:33:21", "bulletinFamily": "unix", "cvelist": ["CVE-2019-15917", "CVE-2019-15925", "CVE-2019-16231", "CVE-2019-16233", "CVE-2019-18808", "CVE-2019-18809", "CVE-2019-19046", "CVE-2019-19056", "CVE-2019-19062", "CVE-2019-19063", "CVE-2019-19068", "CVE-2019-19072", "CVE-2019-19319", "CVE-2019-19332", "CVE-2019-19447", "CVE-2019-19524", "CVE-2019-19533", "CVE-2019-19537", "CVE-2019-19543", "CVE-2019-19767", "CVE-2019-19770", "CVE-2019-20054", "CVE-2019-20636", "CVE-2019-9455", "CVE-2019-9458", "CVE-2020-0305", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10774", "CVE-2020-10942", "CVE-2020-11565", "CVE-2020-11668", "CVE-2020-12655", "CVE-2020-12659", "CVE-2020-12770", "CVE-2020-12826", "CVE-2020-14381", "CVE-2020-25641", "CVE-2020-8647", "CVE-2020-8648", "CVE-2020-8649"], "description": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)\n\n* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)\n\n* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)\n\n* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)\n\n* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)\n\n* kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c (CVE-2019-19319)\n\n* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)\n\n* kernel: use-after-free in ext4_put_super (CVE-2019-19447)\n\n* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)\n\n* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)\n\n* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)\n\n* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)\n\n* kernel: use-after-free in debugfs_remove (CVE-2019-19770)\n\n* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)\n\n* kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c (CVE-2020-0305)\n\n* kernel: out-of-bounds read in in vc_do_resize (CVE-2020-8647)\n\n* kernel: use-after-free in n_tty_receive_buf_common (CVE-2020-8648)\n\n* kernel: invalid read location in vgacon_invert_region (CVE-2020-8649)\n\n* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)\n\n* kernel: SELinux netlink permission check bypass (CVE-2020-10751)\n\n* kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c (CVE-2020-11565)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: out-of-bounds write in xdp_umem_reg (CVE-2020-12659)\n\n* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)\n\n* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)\n\n* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\n* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)\n\n* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)\n\n* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)\n\n* kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c (CVE-2019-18809)\n\n* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() (CVE-2019-19056)\n\n* kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS (CVE-2019-19062)\n\n* kernel: Two memory leaks in the rtl_usb_probe() (CVE-2019-19063)\n\n* kernel: A memory leak in the rtl8xxxu_submit_int_urb() (CVE-2019-19068)\n\n* kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS (CVE-2019-19072)\n\n* kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)\n\n* kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c (CVE-2019-20054)\n\n* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)\n\n* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)\n\n* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)", "modified": "2020-11-04T05:06:01", "published": "2020-11-03T17:20:02", "id": "RHSA-2020:4609", "href": "https://access.redhat.com/errata/RHSA-2020:4609", "type": "redhat", "title": "(RHSA-2020:4609) Moderate: kernel-rt security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-29T19:44:14", "bulletinFamily": "unix", "cvelist": ["CVE-2017-18551", "CVE-2018-20836", "CVE-2019-15217", "CVE-2019-15807", "CVE-2019-15917", "CVE-2019-16231", "CVE-2019-16233", "CVE-2019-16994", "CVE-2019-17053", "CVE-2019-17055", "CVE-2019-18808", "CVE-2019-19046", "CVE-2019-19055", "CVE-2019-19058", "CVE-2019-19059", "CVE-2019-19062", "CVE-2019-19063", "CVE-2019-19332", "CVE-2019-19447", "CVE-2019-19523", "CVE-2019-19524", "CVE-2019-19530", "CVE-2019-19534", "CVE-2019-19537", "CVE-2019-19767", "CVE-2019-19807", "CVE-2019-20054", "CVE-2019-20095", "CVE-2019-20636", "CVE-2019-9454", "CVE-2019-9458", "CVE-2020-10690", "CVE-2020-10732", "CVE-2020-10742", "CVE-2020-10751", "CVE-2020-10942", "CVE-2020-11565", "CVE-2020-12770", "CVE-2020-12826", "CVE-2020-14305", "CVE-2020-1749", "CVE-2020-2732", "CVE-2020-8647", "CVE-2020-8649", "CVE-2020-9383"], "description": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)\n\n* kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c (CVE-2017-18551)\n\n* kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free (CVE-2018-20836)\n\n* kernel: out of bounds write in i2c driver leads to local escalation of privilege (CVE-2019-9454)\n\n* kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)\n\nSpace precludes documenting all of the security fixes in this advisory. See the descriptions of the remaining security fixes in the related Knowledge Article:\n\nhttps://access.redhat.com/articles/5442481\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.", "modified": "2020-09-29T22:42:38", "published": "2020-09-29T22:41:41", "id": "RHSA-2020:4062", "href": "https://access.redhat.com/errata/RHSA-2020:4062", "type": "redhat", "title": "(RHSA-2020:4062) Important: kernel-rt security and bug fix update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-04T02:31:24", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12614", "CVE-2019-15917", "CVE-2019-15925", "CVE-2019-16231", "CVE-2019-16233", "CVE-2019-18808", "CVE-2019-18809", "CVE-2019-19046", "CVE-2019-19056", "CVE-2019-19062", "CVE-2019-19063", "CVE-2019-19068", "CVE-2019-19072", "CVE-2019-19319", "CVE-2019-19332", "CVE-2019-19447", "CVE-2019-19524", "CVE-2019-19533", "CVE-2019-19537", "CVE-2019-19543", "CVE-2019-19767", "CVE-2019-19770", "CVE-2019-20054", "CVE-2019-20636", "CVE-2019-9455", "CVE-2019-9458", "CVE-2020-0305", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10773", "CVE-2020-10774", "CVE-2020-10942", "CVE-2020-11565", "CVE-2020-11668", "CVE-2020-12465", "CVE-2020-12655", "CVE-2020-12659", "CVE-2020-12770", "CVE-2020-12826", "CVE-2020-14381", "CVE-2020-25641", "CVE-2020-8647", "CVE-2020-8648", "CVE-2020-8649"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in the video driver leads to local privilege escalation (CVE-2019-9458)\n\n* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)\n\n* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)\n\n* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)\n\n* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)\n\n* kernel: out-of-bounds write in ext4_xattr_set_entry (CVE-2019-19319)\n\n* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)\n\n* kernel: use-after-free in ext4_put_super (CVE-2019-19447)\n\n* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)\n\n* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)\n\n* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)\n\n* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)\n\n* kernel: use-after-free in debugfs_remove (CVE-2019-19770)\n\n* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)\n\n* kernel: possible use-after-free due to a race condition in cdev_get (CVE-2020-0305)\n\n* kernel: out-of-bounds read in in vc_do_resize function (CVE-2020-8647)\n\n* kernel: use-after-free in n_tty_receive_buf_common function (CVE-2020-8648)\n\n* kernel: invalid read location in vgacon_invert_region function (CVE-2020-8649)\n\n* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)\n\n* kernel: SELinux netlink permission check bypass (CVE-2020-10751)\n\n* kernel: out-of-bounds write in mpol_parse_str (CVE-2020-11565)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: buffer overflow in mt76_add_fragment function (CVE-2020-12465)\n\n* kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption (CVE-2020-12659)\n\n* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)\n\n* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)\n\n* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\n* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)\n\n* kernel: null pointer dereference in dlpar_parse_cc_property (CVE-2019-12614)\n\n* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)\n\n* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)\n\n* kernel: memory leak in af9005_identify_state() function (CVE-2019-18809)\n\n* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function (CVE-2019-19056)\n\n* kernel: memory leak in the crypto_report() function (CVE-2019-19062)\n\n* kernel: Two memory leaks in the rtl_usb_probe() function (CVE-2019-19063)\n\n* kernel: A memory leak in the rtl8xxxu_submit_int_urb() function (CVE-2019-19068)\n\n* kernel: A memory leak in the predicate_parse() function (CVE-2019-19072)\n\n* kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)\n\n* kernel: Null pointer dereference in drop_sysctl_table() (CVE-2019-20054)\n\n* kernel: kernel stack information leak on s390/s390x (CVE-2020-10773)\n\n* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)\n\n* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)\n\n* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)", "modified": "2020-11-04T05:03:54", "published": "2020-11-03T17:03:57", "id": "RHSA-2020:4431", "href": "https://access.redhat.com/errata/RHSA-2020:4431", "type": "redhat", "title": "(RHSA-2020:4431) Moderate: kernel security, bug fix, and enhancement update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-29T19:44:05", "bulletinFamily": "unix", "cvelist": ["CVE-2017-18551", "CVE-2018-20836", "CVE-2019-12614", "CVE-2019-15217", "CVE-2019-15807", "CVE-2019-15917", "CVE-2019-16231", "CVE-2019-16233", "CVE-2019-16994", "CVE-2019-17053", "CVE-2019-17055", "CVE-2019-18808", "CVE-2019-19046", "CVE-2019-19055", "CVE-2019-19058", "CVE-2019-19059", "CVE-2019-19062", "CVE-2019-19063", "CVE-2019-19332", "CVE-2019-19447", "CVE-2019-19523", "CVE-2019-19524", "CVE-2019-19530", "CVE-2019-19534", "CVE-2019-19537", "CVE-2019-19767", "CVE-2019-19807", "CVE-2019-20054", "CVE-2019-20095", "CVE-2019-20636", "CVE-2019-9454", "CVE-2019-9458", "CVE-2020-10690", "CVE-2020-10732", "CVE-2020-10742", "CVE-2020-10751", "CVE-2020-10942", "CVE-2020-11565", "CVE-2020-12770", "CVE-2020-12826", "CVE-2020-14305", "CVE-2020-1749", "CVE-2020-2732", "CVE-2020-8647", "CVE-2020-8649", "CVE-2020-9383"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)\n\n* kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c (CVE-2017-18551)\n\n* kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free (CVE-2018-20836)\n\n* kernel: out of bounds write in i2c driver leads to local escalation of privilege (CVE-2019-9454)\n\n* kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)\n\nSpace precludes documenting all of the security fixes in this advisory. See the descriptions of the remaining security fixes in the related Knowledge Article:\n\nhttps://access.redhat.com/articles/5442421\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.", "modified": "2020-09-29T22:43:41", "published": "2020-09-29T22:42:12", "id": "RHSA-2020:4060", "href": "https://access.redhat.com/errata/RHSA-2020:4060", "type": "redhat", "title": "(RHSA-2020:4060) Important: kernel security, bug fix, and enhancement update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2020-06-03T15:51:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "description": "The remote host is missing an update for the ", "modified": "2020-05-29T00:00:00", "published": "2020-05-29T00:00:00", "id": "OPENVAS:1361412562310844451", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844451", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4367-2)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844451\");\n script_version(\"2020-05-29T08:53:11+0000\");\n script_cve_id(\"CVE-2019-19377\", \"CVE-2020-11565\", \"CVE-2020-12657\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-29 08:53:11 +0000 (Fri, 29 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-29 03:00:39 +0000 (Fri, 29 May 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4367-2)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU20\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4367-2\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-May/005455.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4367-2 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"USN-4367-1 fixed vulnerabilities in the 5.4 Linux kernel. Unfortunately,\nthat update introduced a regression in overlayfs. This update corrects\nthe problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nIt was discovered that the btrfs implementation in the Linux kernel did not\nproperly detect that a block was marked dirty in some situations. An\nattacker could use this to specially craft a file system image that, when\nunmounted, could cause a denial of service (system crash). (CVE-2019-19377)\n\nIt was discovered that the linux kernel did not properly validate certain\nmount options to the tmpfs virtual memory file system. A local attacker\nwith the ability to specify mount options could use this to cause a denial\nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the block layer in the Linux kernel contained a race\ncondition leading to a use-after-free vulnerability. A local attacker could\npossibly use this to cause a denial of service (system crash) or execute\narbitrary code. (CVE-2020-12657)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 20.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU20.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-33-generic\", ver:\"5.4.0-33.37\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-33-generic-lpae\", ver:\"5.4.0-33.37\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-33-lowlatency\", ver:\"5.4.0-33.37\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.4.0.33.38\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.4.0.33.38\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.4.0.33.38\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"5.4.0.33.38\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem-osp1\", ver:\"5.4.0.33.38\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.4.0.33.38\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-28T13:50:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "description": "The remote host is missing an update for the ", "modified": "2020-05-27T00:00:00", "published": "2020-05-20T00:00:00", "id": "OPENVAS:1361412562310844438", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844438", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4367-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844438\");\n script_version(\"2020-05-27T04:05:03+0000\");\n script_cve_id(\"CVE-2019-19377\", \"CVE-2020-11565\", \"CVE-2020-12657\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-27 04:05:03 +0000 (Wed, 27 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-20 03:00:24 +0000 (Wed, 20 May 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4367-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU20\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4367-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-May/005441.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4367-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the btrfs implementation in the Linux kernel did not\nproperly detect that a block was marked dirty in some situations. An\nattacker could use this to specially craft a file system image that, when\nunmounted, could cause a denial of service (system crash). (CVE-2019-19377)\n\nIt was discovered that the linux kernel did not properly validate certain\nmount options to the tmpfs virtual memory file system. A local attacker\nwith the ability to specify mount options could use this to cause a denial\nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the block layer in the Linux kernel contained a race\ncondition leading to a use-after-free vulnerability. A local attacker could\npossibly use this to cause a denial of service (system crash) or execute\narbitrary code. (CVE-2020-12657)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 20.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU20.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1011-aws\", ver:\"5.4.0-1011.11\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1011-gcp\", ver:\"5.4.0-1011.11\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1011-kvm\", ver:\"5.4.0-1011.11\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1011-oracle\", ver:\"5.4.0-1011.11\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-26-generic\", ver:\"5.4.0-26.30\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-31-generic\", ver:\"5.4.0-31.35\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-31-generic-lpae\", ver:\"5.4.0-31.35\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-31-lowlatency\", ver:\"5.4.0-31.35\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.4.0.1011.14\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.4.0.1011.12\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.4.0.26.33\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.4.0.31.36\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.4.0.1011.12\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.4.0.1011.12\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.4.0.31.36\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"5.4.0.31.36\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem-osp1\", ver:\"5.4.0.31.36\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.4.0.1011.12\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.4.0.26.33\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-28T13:50:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-11494", "CVE-2020-11565", "CVE-2020-11669", "CVE-2020-12657"], "description": "The remote host is missing an update for the ", "modified": "2020-05-27T00:00:00", "published": "2020-05-19T00:00:00", "id": "OPENVAS:1361412562310844434", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844434", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4363-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844434\");\n script_version(\"2020-05-27T04:05:03+0000\");\n script_cve_id(\"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11669\", \"CVE-2020-12657\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-27 04:05:03 +0000 (Wed, 27 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-19 03:00:36 +0000 (Tue, 19 May 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4363-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU18\\.04 LTS|UBUNTU16\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4363-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-May/005437.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4363-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the Serial CAN interface driver in the Linux kernel\ndid not properly initialize data. A local attacker could use this to expose\nsensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate certain\nmount options to the tmpfs virtual memory file system. A local attacker\nwith the ability to specify mount options could use this to cause a denial\nof service (system crash). (CVE-2020-11565)\n\nDavid Gibson discovered that the Linux kernel on Power9 CPUs did not\nproperly save and restore Authority Mask registers state in some\nsituations. A local attacker in a guest VM could use this to cause a denial\nof service (host system crash). (CVE-2020-11669)\n\nIt was discovered that the block layer in the Linux kernel contained a race\ncondition leading to a use-after-free vulnerability. A local attacker could\npossibly use this to cause a denial of service (system crash) or execute\narbitrary code. (CVE-2020-12657)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 18.04 LTS, Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-101-generic\", ver:\"4.15.0-101.102\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-101-generic-lpae\", ver:\"4.15.0-101.102\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-101-lowlatency\", ver:\"4.15.0-101.102\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1039-oracle\", ver:\"4.15.0-1039.43\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1059-gke\", ver:\"4.15.0-1059.62\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1067-aws\", ver:\"4.15.0-1067.71\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1079-snapdragon\", ver:\"4.15.0-1079.86\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1081-oem\", ver:\"4.15.0-1081.91\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-lts-18.04\", ver:\"4.15.0.1067.70\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.15.0.101.91\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.15.0.101.91\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1059.63\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-4.15\", ver:\"4.15.0.1059.63\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.15.0.101.91\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.1081.85\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle-lts-18.04\", ver:\"4.15.0.1039.48\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.15.0.101.91\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.15.0.101.91\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.15.0.101.91\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.15.0.101.91\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.15.0.1079.82\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.15.0.101.91\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-101-generic\", ver:\"4.15.0-101.102~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-101-generic-lpae\", ver:\"4.15.0-101.102~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-101-lowlatency\", ver:\"4.15.0-101.102~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1039-oracle\", ver:\"4.15.0-1039.43~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1067-aws\", ver:\"4.15.0-1067.71~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1071-gcp\", ver:\"4.15.0-1071.81~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-hwe\", ver:\"4.15.0.1067.67\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"4.15.0.1071.77\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-16.04\", ver:\"4.15.0.101.108\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-16.04\", ver:\"4.15.0.101.108\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1071.77\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-16.04\", ver:\"4.15.0.101.108\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.101.108\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"4.15.0.1039.32\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-16.04\", ver:\"4.15.0.101.108\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-10T21:45:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-11884", "CVE-2020-12659", "CVE-2020-12465", "CVE-2019-19462", "CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12826", "CVE-2020-12656", "CVE-2020-10942", "CVE-2020-10720", "CVE-2020-12464", "CVE-2020-12654", "CVE-2020-12653", "CVE-2019-19377", "CVE-2020-12652", "CVE-2020-12771", "CVE-2020-12655", "CVE-2020-12657"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-05-29T00:00:00", "published": "2020-05-26T00:00:00", "id": "OPENVAS:1361412562311220201592", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201592", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1592)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1592\");\n script_version(\"2020-05-29T10:19:35+0000\");\n script_cve_id(\"CVE-2019-19377\", \"CVE-2019-19462\", \"CVE-2020-10711\", \"CVE-2020-10720\", \"CVE-2020-10942\", \"CVE-2020-11884\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12465\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12655\", \"CVE-2020-12656\", \"CVE-2020-12657\", \"CVE-2020-12659\", \"CVE-2020-12769\", \"CVE-2020-12770\", \"CVE-2020-12771\", \"CVE-2020-12826\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-29 10:19:35 +0000 (Fri, 29 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-26 05:46:04 +0000 (Tue, 26 May 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1592)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP8\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1592\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1592\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2020-1592 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"A flaw was found in the Linux kernels implementation of GRO. This flaw allows an attacker with local access to crash the system.(CVE-2020-10720)\n\nA NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.(CVE-2020-10711)\n\nA signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.(CVE-2020-12826)\n\nAn issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.(CVE-2020-12769)\n\nAn issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.(CVE-2020-12770)\n\nAn issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.(CVE-2020-12771)\n\nThe __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a 'double fetch' vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states 'The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.'(CVE-2020-12652)\n\nAn issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.(CVE-2020-126 ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS V2.0SP8.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP8\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"bpftool\", rpm:\"bpftool~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python3-perf\", rpm:\"python3-perf~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-15T15:55:41", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12826", "CVE-2020-0543", "CVE-2020-12464", "CVE-2019-19319", "CVE-2020-1749", "CVE-2020-10751"], "description": "The remote host is missing an update for the ", "modified": "2020-06-12T00:00:00", "published": "2020-06-10T00:00:00", "id": "OPENVAS:1361412562310844461", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844461", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4391-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844461\");\n script_version(\"2020-06-12T07:11:22+0000\");\n script_cve_id(\"CVE-2019-19319\", \"CVE-2020-0543\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12769\", \"CVE-2020-12826\", \"CVE-2020-1749\", \"CVE-2020-10751\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-12 07:11:22 +0000 (Fri, 12 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-10 03:01:29 +0000 (Wed, 10 Jun 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4391-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU16\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4391-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-June/005474.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4391-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the ext4 file system implementation in the Linux\nkernel did not properly handle setxattr operations in some situations. A\nlocal attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2019-19319)\n\nIt was discovered that memory contents previously stored in\nmicroarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY\nread operations on Intel client and Xeon E3 processors may be briefly\nexposed to processes on the same or different processor cores. A local\nattacker could use this to expose sensitive information. (CVE-2020-0543)\n\nPiotr Krysiuk discovered that race conditions existed in the file system\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash). (CVE-2020-12114)\n\nIt was discovered that the USB susbsystem's scatter-gather implementation\nin the Linux kernel did not properly take data references in some\nsituations, leading to a use-after-free. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2020-12464)\n\nIt was discovered that the DesignWare SPI controller driver in the Linux\nkernel contained a race condition. A local attacker could possibly use this\nto cause a denial of service (system crash). (CVE-2020-12769)\n\nIt was discovered that the exit signaling implementation in the Linux\nkernel contained an integer overflow. A local attacker could use this to\ncause a denial of service (arbitrary application crash). (CVE-2020-12826)\n\nXiumei Mu discovered that the IPSec implementation in the Linux kernel did\nnot properly encrypt IPv6 traffic in some situations. An attacker could use\nthis to expose sensitive information. (CVE-2020-1749)\n\nDmitry Vyukov discovered that the SELinux netlink security hook in the\nLinux kernel did not validate messages in some situations. A privileged\nattacker could use this to bypass SELinux netlink restrictions.\n(CVE-2020-10751)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1075-kvm\", ver:\"4.4.0-1075.82\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1109-aws\", ver:\"4.4.0-1109.120\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-generic\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-generic-lpae\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-lowlatency\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-powerpc-e500mc\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-powerpc-smp\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-powerpc64-emb\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-powerpc64-smp\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.4.0.1109.113\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.4.0.1075.73\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-05-28T13:50:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-11494", "CVE-2020-11609", "CVE-2019-19769", "CVE-2020-11608", "CVE-2020-11668", "CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "description": "The remote host is missing an update for the ", "modified": "2020-05-27T00:00:00", "published": "2020-05-22T00:00:00", "id": "OPENVAS:1361412562310844443", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844443", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4369-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844443\");\n script_version(\"2020-05-27T04:05:03+0000\");\n script_cve_id(\"CVE-2019-19377\", \"CVE-2019-19769\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12657\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-27 04:05:03 +0000 (Wed, 27 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-22 03:00:20 +0000 (Fri, 22 May 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4369-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU19\\.10|UBUNTU18\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4369-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-May/005444.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4369-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the btrfs implementation in the Linux kernel did not\nproperly detect that a block was marked dirty in some situations. An\nattacker could use this to specially craft a file system image that, when\nunmounted, could cause a denial of service (system crash). (CVE-2019-19377)\n\nTristan Madani discovered that the file locking implementation in the Linux\nkernel contained a race condition. A local attacker could possibly use this\nto cause a denial of service or expose sensitive information.\n(CVE-2019-19769)\n\nIt was discovered that the Serial CAN interface driver in the Linux kernel\ndid not properly initialize data. A local attacker could use this to expose\nsensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate certain\nmount options to the tmpfs virtual memory file system. A local attacker\nwith the ability to specify mount options could use this to cause a denial\nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the OV51x USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-11608)\n\nIt was discovered that the STV06XX USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-11609)\n\nIt was discovered that the Xirlink C-It USB Camera device driver in the\nLinux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2020-11668)\n\nIt was discovered that the block layer in the Linux kernel contained a race\ncondition leading to a use-after-free vulnerability. A local attacker could\npossibly use this to cause a denial of service (system crash) or execute\narbitrary code. (CVE-2020-12657)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 19.10, Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU19.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1017-kvm\", ver:\"5.3.0-1017.19\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1018-oracle\", ver:\"5.3.0-1018.20\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1019-aws\", ver:\"5.3.0-1019.21\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1020-gcp\", ver:\"5.3.0-1020.22\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1025-raspi2\", ver:\"5.3.0-1025.27\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-generic\", ver:\"5.3.0-53.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-generic-lpae\", ver:\"5.3.0-53.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-lowlatency\", ver:\"5.3.0-53.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-snapdragon\", ver:\"5.3.0-53.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.3.0.1019.31\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1020.31\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.3.0.53.45\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.3.0.53.45\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.3.0.1020.31\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.3.0.1017.19\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.3.0.53.45\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1018.33\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"5.3.0.1025.22\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"5.3.0.53.45\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.3.0.53.45\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1018-oracle\", ver:\"5.3.0-1018.20~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1019-aws\", ver:\"5.3.0-1019.21~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1020-gcp\", ver:\"5.3.0-1020.22~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1020-gke\", ver:\"5.3.0-1020.22~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-generic\", ver:\"5.3.0-53.47~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-generic-lpae\", ver:\"5.3.0-53.47~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-lowlatency\", ver:\"5.3.0-53.47~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.3.0.1019.20\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-edge\", ver:\"5.3.0.1019.20\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1020.19\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp-edge\", ver:\"5.3.0.1020.19\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-18.04\", ver:\"5.3.0.53.109\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-18.04\", ver:\"5.3.0.53.109\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.3\", ver:\"5.3.0.1020.10\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gkeop-5.3\", ver:\"5.3.0.53.109\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-18.04\", ver:\"5.3.0.53.109\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1018.19\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon-hwe-18.04\", ver:\"5.3.0.53.109\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-18.04\", ver:\"5.3.0.53.109\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-28T13:50:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-11494", "CVE-2020-11609", "CVE-2019-19769", "CVE-2020-11608", "CVE-2020-11668", "CVE-2020-11565", "CVE-2020-11669", "CVE-2020-12657"], "description": "The remote host is missing an update for the ", "modified": "2020-05-27T00:00:00", "published": "2020-05-20T00:00:00", "id": "OPENVAS:1361412562310844439", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844439", "type": "openvas", "title": "Ubuntu: Security Advisory for linux-gke-5.0 (USN-4368-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844439\");\n script_version(\"2020-05-27T04:05:03+0000\");\n script_cve_id(\"CVE-2019-19769\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-11669\", \"CVE-2020-12657\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-27 04:05:03 +0000 (Wed, 27 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-20 03:00:27 +0000 (Wed, 20 May 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux-gke-5.0 (USN-4368-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4368-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-May/005442.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-gke-5.0'\n package(s) announced via the USN-4368-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Tristan Madani discovered that the file locking implementation in the Linux\nkernel contained a race condition. A local attacker could possibly use this\nto cause a denial of service or expose sensitive information.\n(CVE-2019-19769)\n\nIt was discovered that the Serial CAN interface driver in the Linux kernel\ndid not properly initialize data. A local attacker could use this to expose\nsensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate certain\nmount options to the tmpfs virtual memory file system. A local attacker\nwith the ability to specify mount options could use this to cause a denial\nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the OV51x USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-11608)\n\nIt was discovered that the STV06XX USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-11609)\n\nIt was discovered that the Xirlink C-It USB Camera device driver in the\nLinux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2020-11668)\n\nDavid Gibson discovered that the Linux kernel on Power9 CPUs did not\nproperly save and restore Authority Mask registers state in some\nsituations. A local attacker in a guest VM could use this to cause a denial\nof service (host system crash). (CVE-2020-11669)\n\nIt was discovered that the block layer in the Linux kernel contained a race\ncondition leading to a use-after-free vulnerability. A local attacker could\npossibly use this to cause a denial of service (system crash) or execute\narbitrary code. (CVE-2020-12657)\");\n\n script_tag(name:\"affected\", value:\"'linux-gke-5.0' package(s) on Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1037-gke\", ver:\"5.0.0-1037.38\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1052-oem-osp1\", ver:\"5.0.0-1052.57\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.0\", ver:\"5.0.0.1037.25\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem-osp1\", ver:\"5.0.0.1052.55\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-06-03T15:50:43", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-11494", "CVE-2020-11609", "CVE-2019-19769", "CVE-2020-11608", "CVE-2020-11668", "CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "description": "The remote host is missing an update for the ", "modified": "2020-05-29T00:00:00", "published": "2020-05-29T00:00:00", "id": "OPENVAS:1361412562310844448", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844448", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4369-2)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844448\");\n script_version(\"2020-05-29T08:53:11+0000\");\n script_cve_id(\"CVE-2019-19377\", \"CVE-2019-19769\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12657\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-29 08:53:11 +0000 (Fri, 29 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-29 03:00:28 +0000 (Fri, 29 May 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4369-2)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU19\\.10|UBUNTU18\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4369-2\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-May/005456.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4369-2 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"USN-4369-1 fixed vulnerabilities in the 5.3 Linux kernel. Unfortunately,\nthat update introduced a regression in overlayfs. This update corrects\nthe problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nIt was discovered that the btrfs implementation in the Linux kernel did not\nproperly detect that a block was marked dirty in some situations. An\nattacker could use this to specially craft a file system image that, when\nunmounted, could cause a denial of service (system crash). (CVE-2019-19377)\n\nTristan Madani discovered that the file locking implementation in the Linux\nkernel contained a race condition. A local attacker could possibly use this\nto cause a denial of service or expose sensitive information.\n(CVE-2019-19769)\n\nIt was discovered that the Serial CAN interface driver in the Linux kernel\ndid not properly initialize data. A local attacker could use this to expose\nsensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate certain\nmount options to the tmpfs virtual memory file system. A local attacker\nwith the ability to specify mount options could use this to cause a denial\nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the OV51x USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-11608)\n\nIt was discovered that the STV06XX USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-11609)\n\nIt was discovered that the Xirlink C-It USB Camera device driver in the\nLinux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2020-11668)\n\nIt was discovered that the block layer in the Linux kernel contained a race\ncondition leading to a use-after-free vulnerability. A local attacker could\npossibly use this to cause a denial of service (system crash) or execute\narbitrary code. (CVE-2020-12657)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 19.10, Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU19.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1026-raspi2\", ver:\"5.3.0-1026.28\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-55-generic\", ver:\"5.3.0-55.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-55-generic-lpae\", ver:\"5.3.0-55.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-55-lowlatency\", ver:\"5.3.0-55.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-55-snapdragon\", ver:\"5.3.0-55.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.3.0.55.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.3.0.55.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.3.0.55.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"5.3.0.1026.23\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"5.3.0.55.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.3.0.55.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1026-raspi2\", ver:\"5.3.0-1026.28~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2-hwe-18.04\", ver:\"5.3.0.1026.15\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T19:53:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-8992", "CVE-2020-12770", "CVE-2020-9383", "CVE-2014-8181", "CVE-2017-5967", "CVE-2020-12826", "CVE-2020-10942", "CVE-2020-11609", "CVE-2019-20636", "CVE-2019-19768", "CVE-2020-12464", "CVE-2020-12654", "CVE-2020-12653", "CVE-2020-11608", "CVE-2020-11668", "CVE-2020-13143", "CVE-2020-11565", "CVE-2020-8649", "CVE-2020-12652", "CVE-2020-8647", "CVE-2019-18675", "CVE-2020-10741"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-07-03T00:00:00", "published": "2020-07-03T00:00:00", "id": "OPENVAS:1361412562311220201713", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201713", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1713)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1713\");\n script_version(\"2020-07-03T06:18:13+0000\");\n script_cve_id(\"CVE-2014-8181\", \"CVE-2017-5967\", \"CVE-2019-18675\", \"CVE-2019-19768\", \"CVE-2019-20636\", \"CVE-2020-10741\", \"CVE-2020-10942\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12770\", \"CVE-2020-12826\", \"CVE-2020-13143\", \"CVE-2020-8647\", \"CVE-2020-8649\", \"CVE-2020-8992\", \"CVE-2020-9383\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-07-03 06:18:13 +0000 (Fri, 03 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-03 06:18:13 +0000 (Fri, 03 Jul 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1713)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-3\\.0\\.6\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1713\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1713\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2020-1713 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).(CVE-2019-19768)\n\nThe Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.(CVE-2019-18675)\n\nAn issue was discovered in the Linux kernel through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.(CVE-2020-9383)\n\nThere is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.(CVE-2020-8649)\n\nThere is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.(CVE-2020-8647)\n\nThe time subsystem in the Linux kernel, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distinguished from PID values inside a PID namespace) by reading the /proc/timer_list file, related to the print_timer function in kernel/time/timer_list.c and the __timer_stats_timer_set_start_info function in kernel/time/timer.c.(CVE-2017-5967)\n\n** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2014-8181)\n\next4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.(CVE-2020-8992)\n\n** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-12826. Reason: This candidate is a duplicate of CVE-2020-12826. Notes: All CVE users should reference CVE-2020-12826 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.(CVE-2020-10741)\n\nA signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Ex ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS Virtualization 3.0.6.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-3.0.6.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-25T13:28:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-10711", "CVE-2020-12659", "CVE-2019-19462", "CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12656", "CVE-2018-1000199", "CVE-2020-11609", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10690", "CVE-2020-12654", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-12653", "CVE-2020-11608", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-12652", "CVE-2020-10757", "CVE-2020-12655", "CVE-2020-12657"], "description": "The remote host is missing an update for the ", "modified": "2020-06-24T00:00:00", "published": "2020-06-14T00:00:00", "id": "OPENVAS:1361412562310853206", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310853206", "type": "openvas", "title": "openSUSE: Security Advisory for the (openSUSE-SU-2020:0801-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.853206\");\n script_version(\"2020-06-24T03:42:18+0000\");\n script_cve_id(\"CVE-2018-1000199\", \"CVE-2019-19462\", \"CVE-2019-20806\", \"CVE-2019-20812\", \"CVE-2019-9455\", \"CVE-2020-0543\", \"CVE-2020-10690\", \"CVE-2020-10711\", \"CVE-2020-10720\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10757\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12655\", \"CVE-2020-12656\", \"CVE-2020-12657\", \"CVE-2020-12659\", \"CVE-2020-12769\", \"CVE-2020-13143\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-24 03:42:18 +0000 (Wed, 24 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-14 03:00:56 +0000 (Sun, 14 Jun 2020)\");\n script_name(\"openSUSE: Security Advisory for the (openSUSE-SU-2020:0801-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.1\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2020:0801-1\");\n script_xref(name:\"URL\", value:\"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'the'\n package(s) announced via the openSUSE-SU-2020:0801-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other than\n the one which called it. This attack is known as Special Register Buffer\n Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\n - CVE-2018-1000199: Fixed a potential local code execution via ptrace\n (bsc#1089895).\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to\n cause a denial of service (such as relay blockage) by triggering a NULL\n alloc_percpu result (bnc#1158265).\n\n - CVE-2019-20806: Fixed a null pointer dereference in\n tw5864_handle_frame() which may had lead to denial of service\n (bsc#1172199).\n\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU\n consumption and soft lockup) in a certain failure case involving\n TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\n - CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\n video driver. This could lead to local information disclosure with\n System execution privileges needed (bsc#1170345).\n\n - CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev\n (bsc#1170056).\n\n - CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem\n which could have allowed a remote network user to crash the kernel\n resulting in a denial of service (bsc#1171191).\n\n - CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n (bsc#1170778).\n\n - CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\n uninitialized data (bsc#1171220).\n\n - CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\n where it was assumed that an skb would only contain a single netlink\n message (bsc#1171189).\n\n - CVE-2020-10757: Fixed an issue where remapping hugepage DAX to anon mmap\n could have caused user PTE access (bsc#1172317).\n\n - CVE-2020-11608: An issue was discovered in\n drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences\n in ov511_mode_init_regs and ov518_mode_init_regs when there are zero\n endpoints, aka CID-998912346c0d (bnc#1168829).\n\n - CVE-2020-11609: An issue was discovered in the stv06xx subsystem in\n drivers/media/usb/gspca/stv06xx/stv06xx.c and\n drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid\n descriptors, as demonstrated by a NULL pointer dereference, aka\n CID-485b06aadb93 (bnc#1168854).\n\n - CVE-2020-12114: Fixed a pivot_root race condition which could have\n allowed ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'the' package(s) on openSUSE Leap 15.1.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.1\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs\", rpm:\"kernel-docs~4.12.14~lp151.28.52.2\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs-html\", rpm:\"kernel-docs-html~4.12.14~lp151.28.52.2\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-macros\", rpm:\"kernel-macros~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source-vanilla\", rpm:\"kernel-source-vanilla~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base\", rpm:\"kernel-debug-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base-debuginfo\", rpm:\"kernel-debug-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debugsource\", rpm:\"kernel-debug-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel-debuginfo\", rpm:\"kernel-debug-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base\", rpm:\"kernel-default-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base-debuginfo\", rpm:\"kernel-default-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debuginfo\", rpm:\"kernel-default-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debugsource\", rpm:\"kernel-default-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel-debuginfo\", rpm:\"kernel-default-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall\", rpm:\"kernel-kvmsmall~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base\", rpm:\"kernel-kvmsmall-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base-debuginfo\", rpm:\"kernel-kvmsmall-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debuginfo\", rpm:\"kernel-kvmsmall-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debugsource\", rpm:\"kernel-kvmsmall-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel\", rpm:\"kernel-kvmsmall-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel-debuginfo\", rpm:\"kernel-kvmsmall-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build\", rpm:\"kernel-obs-build~4.12.14~lp151.28.52.3\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build-debugsource\", rpm:\"kernel-obs-build-debugsource~4.12.14~lp151.28.52.3\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-qa\", rpm:\"kernel-obs-qa~4.12.14~lp151.28.52.3\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla\", rpm:\"kernel-vanilla~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base\", rpm:\"kernel-vanilla-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base-debuginfo\", rpm:\"kernel-vanilla-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debuginfo\", rpm:\"kernel-vanilla-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debugsource\", rpm:\"kernel-vanilla-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel\", rpm:\"kernel-vanilla-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel-debuginfo\", rpm:\"kernel-vanilla-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2020-06-10T23:24:39", "bulletinFamily": "unix", "cvelist": ["CVE-2020-10711", "CVE-2020-11884", "CVE-2020-0543", "CVE-2020-12657"], "description": "[4.18.0-193.6.3_2.OL8]\n- Oracle Linux certificates (Alexey Petrenko)\n- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]\n- Update x509.genkey [Orabug: 24817676]\n[4.18.0-193.6.3_2]\n- rebuild to enable xt_u32 module (Jiri Benc) [1840800 1840799 1834769 1838190]\n[4.18.0-193.6.2_2]\n- [documentation] x86/speculation: Add Ivy Bridge to affected list (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}\n- [documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}\n- [x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}\n- [x86] x86/cpu: Add 'table' argument to cpu_matches() (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}\n- [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}\n[4.18.0-193.6.1_2]\n- [char] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (Steve Best) [1827632 1808048]\n- [netdrv] bonding: fix active-backup transition after link failure (Jarod Wilson) [1838477 1819408]\n- [netdrv] bonding: fix state transition issue in link monitoring (Jarod Wilson) [1838477 1819408]\n- [kernel] sched/fair: Allow a per-CPU kthread waking a task to stack on the same CPU, to fix XFS performance regression (Phil Auld) [1834517 1745111]\n- [block] block, bfq: fix use-after-free in bfq_idle_slice_timer_body (Ming Lei) [1835531 1835532] {CVE-2020-12657}\n- [kvm] KVM: x86: use raw clock values consistently (Marcelo Tosatti) [1822498 1768622]\n- [kvm] KVM: x86: reorganize pvclock_gtod_data members (Marcelo Tosatti) [1822498 1768622]\n- [kvm] KVM: x86: switch KVMCLOCK base to monotonic raw clock (Marcelo Tosatti) [1822498 1768622]\n[4.18.0-193.5.1_2]\n- [fs] nfs: fix NULL deference in nfs4_get_valid_delegation ('J. Bruce Fields') [1837969 1831553]\n[4.18.0-193.4.1_2]\n- [bluetooth] Revert 'Bluetooth: btusb: driver to enable the usb-wakeup feature' (Gopal Tiwari) [1827620 1811534]\n- [net] netlabel: cope with NULL catmap (Paolo Abeni) [1827249 1827251] {CVE-2020-10711}\n- [mm] s390/mm: fix page table upgrade vs 2ndary address mode accesses (Vladis Dronov) [1828153 1828154] {CVE-2020-11884}\n[4.18.0-193.3.1_2]\n- [kernel] sched/isolation: Allow 'isolcpus=' to skip unknown sub-parameters (Peter Xu) [1832367 1799014]\n- [firmware] efi: fix a mistype in comments mentioning efivar_entry_iter_begin() (Vladis Dronov) [1829527 1804417]\n- [firmware] efi: add a sanity check to efivar_store_raw() (Vladis Dronov) [1829527 1804417]\n- [firmware] efi: fix a race and a buffer overflow while reading efivars via sysfs (Vladis Dronov) [1829527 1804417]\n- [net] net/smc: keep vlan_id for SMC-R in smc_listen_work() (Philipp Rudo) [1827631 1796890]\n[4.18.0-193.2.1_2]\n- [net] vti[6]: fix packet tx through bpf_redirect() in XinY cases (Sabrina Dubroca) [1821375 1795145]\n- [net] xfrm interface: fix packet tx through bpf_redirect() (Sabrina Dubroca) [1821375 1795145]\n- [net] vti[6]: fix packet tx through bpf_redirect() (Sabrina Dubroca) [1821375 1795145]\n- [scripts] redhat: fix modpost.c prerequisites (Frantisek Hrbata) [1828229 1818499]\n- [infiniband] IB/core: Avoid deadlock during netlink message handling (Kamal Heib) [1821381 1818986]\n- [infiniband] RDMA/core: Support netlink commands in non init_net net namespaces (Kamal Heib) [1821381 1818986]\n- [misc] mei: me: add comet point (lake) H device ids (Ken Cox) [1825262 1815355]\n- [misc] mei: me: add comet point (lake) LP device ids (Ken Cox) [1825262 1815355]\n- [misc] mei: define dma ring buffer sizes for PCH12 HW and newer (Ken Cox) [1825262 1815355]\n- [misc] mei: hbm: define dma ring setup protocol (Ken Cox) [1825262 1815355]\n- [net] SUNRPC: fix krb5p mount to provide large enough buffer in rq_rcvsize (Steve Dickson) [1826219 1825388]\n- [mm] mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (Rafael Aquini) [1827619 1763878]\n- [mm] mm: thp: fix flags for pmd migration when split (Rafael Aquini) [1827619 1763878]\n- [mm] mm: thp: relocate flush_cache_range() in migrate_misplaced_transhuge_page() (Rafael Aquini) [1827619 1763878]\n- [mm] mm: thp: fix mmu_notifier in migrate_misplaced_transhuge_page() (Rafael Aquini) [1827619 1763878]\n- [mm] mm: thp: fix MADV_DONTNEED vs migrate_misplaced_transhuge_page race condition (Rafael Aquini) [1827619 1763878]\n- [md] Revert 'dm: always call blk_queue_split() in dm_process_bio()' (Mike Snitzer) [1821382 1820705]", "edition": 1, "modified": "2020-06-10T00:00:00", "published": "2020-06-10T00:00:00", "id": "ELSA-2020-2427", "href": "http://linux.oracle.com/errata/ELSA-2020-2427.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-10T21:34:03", "bulletinFamily": "unix", "cvelist": ["CVE-2020-12768", "CVE-2020-12659", "CVE-2020-12465", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-12654", "CVE-2020-12653", "CVE-2019-19377", "CVE-2020-12657"], "description": "[5.4.17-2011.3.2.1uek]\n- x86/speculation: Add Ivy Bridge to affected list (Josh Poimboeuf) [Orabug: 31352779] {CVE-2020-0543}\n- x86/speculation: Add SRBDS vulnerability and mitigation documentation (Mark Gross) [Orabug: 31352779] {CVE-2020-0543}\n- x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Mark Gross) [Orabug: 31352779] {CVE-2020-0543}\n- x86/cpu: Add 'table' argument to cpu_matches() (Mark Gross) [Orabug: 31352779] {CVE-2020-0543}\n- x86/cpu: Add a steppings field to struct x86_cpu_id (Mark Gross) [Orabug: 31352779] {CVE-2020-0543}\n- x86/speculation/spectre_v2: Exclude Zhaoxin CPUs from SPECTRE_V2 (Tony W Wang-oc) [Orabug: 31352779] {CVE-2020-0543}\n[5.4.17-2011.3.2uek]\n- USB: core: Fix free-while-in-use bug in the USB S-Glibrary (Alan Stern) [Orabug: 31350962] {CVE-2020-12464}\n- mt76: fix array overflow on receiving too many fragments for a packet (Felix Fietkau) [Orabug: 31350952] {CVE-2020-12465}\n- mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv() (Qing Xu) [Orabug: 31350929] {CVE-2020-12653}\n- block, bfq: fix use-after-free in bfq_idle_slice_timer_body (Zhiqiang Liu) [Orabug: 31350910] {CVE-2020-12657}\n- xsk: Add missing check on user supplied headroom size (Magnus Karlsson) [Orabug: 31350732] {CVE-2020-12659}\n- mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status() (Qing Xu) [Orabug: 31350513] {CVE-2020-12654}\n- xen/manage: enable C_A_D to force reboot (Dongli Zhang) [Orabug: 31387411] \n- KVM: x86: Fixes posted interrupt check for IRQs delivery modes (Suravee Suthikulpanit) [Orabug: 31316437] \n- Revert 'Revert 'nvme_fc: add module to ops template to allow module references'' (James Smart) [Orabug: 31377552] \n- uek-rpm: Move grub boot menu update to posttrans stage. (Somasundaram Krishnasamy) [Orabug: 31358097] \n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (Miaohe Lin) [Orabug: 31350455] {CVE-2020-12768}\n[5.4.17-2011.3.1uek]\n- intel_idle: Use ACPI _CST for processor models without C-state tables (Rafael J. Wysocki) [Orabug: 31332120] \n- ACPI: processor: Export acpi_processor_evaluate_cst() (Rafael J. Wysocki) [Orabug: 31332120] \n- ACPI: processor: Clean up acpi_processor_evaluate_cst() (Rafael J. Wysocki) [Orabug: 31332120] \n- ACPI: processor: Introduce acpi_processor_evaluate_cst() (Rafael J. Wysocki) [Orabug: 31332120] \n- ACPI: processor: Export function to claim _CST control (Rafael J. Wysocki) [Orabug: 31332120] \n- rds: ib: Fix dysfunctional long address resolve timeout (Hakon Bugge) [Orabug: 31302704] \n- KVM: x86: Revert 'KVM: X86: Fix fpu state crash in kvm guest' (Sean Christopherson) [Orabug: 31333676] \n- KVM: x86: Ensure guests FPU state is loaded when accessing for emulation (Sean Christopherson) [Orabug: 31333676] \n- KVM: x86: Handle TIF_NEED_FPU_LOAD in kvm_{load,put}_guest_fpu() (Sean Christopherson) [Orabug: 31333676] \n- net: dsa: Do not leave DSA master with NULL netdev_ops (Florian Fainelli) [Orabug: 30456791] \n- Revert 'dsa: disable module unloading for ARM64' (Allen Pais) [Orabug: 30456791]\n[5.4.17-2011.3.0uek]\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (Robert Milkowski) [Orabug: 31304406] \n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (Robert Milkowski) [Orabug: 31304406] \n- btrfs: Dont submit any btree write bio if the fs has errors (Qu Wenruo) [Orabug: 31265336] {CVE-2019-19377} {CVE-2019-19377}", "edition": 3, "modified": "2020-06-09T00:00:00", "published": "2020-06-09T00:00:00", "id": "ELSA-2020-5714", "href": "http://linux.oracle.com/errata/ELSA-2020-5714.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-11T07:29:07", "bulletinFamily": "unix", "cvelist": ["CVE-2019-19054", "CVE-2020-10711", "CVE-2020-12770", "CVE-2019-19533", "CVE-2019-19534", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10690", "CVE-2019-15220", "CVE-2020-12654", "CVE-2020-12653", "CVE-2020-12652", "CVE-2020-10757", "CVE-2019-7308", "CVE-2019-15214", "CVE-2019-3846", "CVE-2020-12655", "CVE-2020-12657", "CVE-2019-19536"], "description": "[4.14.35-1902.304.6]\n- bpf: fix sanitation rewrite in case of non-pointers (Daniel Borkmann) [Orabug: 31552243]\n[4.14.35-1902.304.5]\n- acpi: disallow loading configfs acpi tables when locked down (Jason A. Donenfeld) [Orabug: 31493187] \n- selftests/bpf: do not run test_kmod.sh for UEK5 (Alan Maguire) [Orabug: 31540213] \n- bpf: do not allow root to mangle valid pointers (Alexei Starovoitov) [Orabug: 31540213] \n- x86/mitigations: reset default value for srbds_mitigation (Mihai Carabas) [Orabug: 31515075] \n- x86/cpu: clear X86_BUG_SRBDS before late loading (Mihai Carabas) [Orabug: 31515075] \n- x86/mitigations: update MSRs on all CPUs for SRBDS (Mihai Carabas) [Orabug: 31515075] \n- p54usb: Fix race between disconnect and firmware loading (Alan Stern) [Orabug: 31351863] {CVE-2019-15220}\n- media: rc: prevent memory leak in cx23888_ir_probe (Navid Emamdoost) [Orabug: 31351671] {CVE-2019-19054}\n- mm: Fix mremap not considering huge pmd devmap (Fan Yang) [Orabug: 31452398] {CVE-2020-10757} {CVE-2020-10757}\n- tcp: implement coalescing on backlog queue (Eric Dumazet) [Orabug: 31517079] \n- tcp: drop dst in tcp_add_backlog() (Eric Dumazet) [Orabug: 31517079] \n- bpf: Fix up bpf_skb_adjust_room helper's skb csum setting (Daniel Borkmann) [Orabug: 31517079]\n[4.14.35-1902.304.4]\n- rds: Fix potential use after free in rds_ib_inc_free (Hans Westgaard Ry) [Orabug: 31504054] \n- cpu/hotplug: Fix 'SMT disabled by BIOS' detection for KVM (Josh Poimboeuf) [Orabug: 31421904] \n- RDMA/cm: Spurious WARNING triggered in cm_destroy_id() (Ka-Cheong Poon) [Orabug: 31483289] \n- RDMA/cm: Make sure the cm_id is in the IB_CM_IDLE state in destroy (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Allow ib_send_cm_sidr_rep() to be done under lock (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Allow ib_send_cm_rej() to be done under lock (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Allow ib_send_cm_drep() to be done under lock (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Allow ib_send_cm_dreq() to be done under lock (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Add some lockdep assertions for cm_id_priv->lock (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Make the destroy_id flow more robust (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Remove a race freeing timewait_info (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Use refcount_t type for refcount variable (Danit Goldberg) [Orabug: 31483289] \n- net/rds: NULL pointer de-reference in rds_ib_add_one() (Ka-Cheong Poon) [Orabug: 31501438] \n- scsi: mpt3sas: Introduce module parameter to override queue depth (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Fix memset() in non-RDPQ mode (Suganath Prabu S) [Orabug: 31486216] \n- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (Suganath Prabu S) [Orabug: 31486216] \n(Samuel Zou) [Orabug: 31486216] \n- scsi: mpt3sas: Fix double free warnings (Suganath Prabu S) [Orabug: 31486216] \n- scsi: mpt3sas: Disable DIF when prot_mask set to zero (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Capture IOC data for debugging purposes (Suganath Prabu) [Orabug: 31486216] \n- scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (Jason Yan) [Orabug: 31486216] \n- scsi: mpt3sas: Remove NULL check before freeing function (Jason Yan) [Orabug: 31486216] \n- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (Suganath Prabu) [Orabug: 31486216] \n- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (Suganath Prabu) [Orabug: 31486216] \n- scsi: mpt3sas: Separate out RDPQ allocation to new function (Suganath Prabu) [Orabug: 31486216] \n- scsi: mpt3sas: Rename function name is_MSB_are_same (Suganath Prabu) [Orabug: 31486216] \n- scsi: mpt3sas: Don't change the DMA coherent mask after allocations (Christoph Hellwig) [Orabug: 31486216] \n- scsi: mpt3sas: use true,false for bool variables (Jason Yan) [Orabug: 31486216] \n- scsi: mpt3sas: Update drive version to 33.100.00.00 (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Remove usage of device_busy counter (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Print function name in which cmd timed out (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Optimize mpt3sas driver logging (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: print in which path firmware fault occurred (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Handle CoreDump state from watchdog thread (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Add support IOCs new state named COREDUMP (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: renamed _base_after_reset_handler function (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Add support for NVMe shutdown (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Update MPI Headers to v02.00.57 (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Fix double free in attach error handling (Dan Carpenter) [Orabug: 31486216] \n- scsi: mpt3sas: change allocation option (Tomas Henzl) [Orabug: 31486216] \n- KVM: VMX: check descriptor table exits on instruction emulation (Oliver Upton) [Orabug: 31397358]\n[4.14.35-1902.304.3]\n- rebuild bumping release\n[4.14.35-1902.304.2]\n- bpf: fix sanitation of alu op with pointer / scalar type from different paths (Daniel Borkmann) [Orabug: 31350800] {CVE-2019-7308}\n- bpf: prevent out of bounds speculation on pointer arithmetic (Daniel Borkmann) [Orabug: 31350800] {CVE-2019-7308}\n- bpf: restrict unknown scalars of mixed signed bounds for unprivileged (Daniel Borkmann) [Orabug: 31350800] {CVE-2019-7308}\n- bpf: move {prev_,}insn_idx into verifier env (Daniel Borkmann) [Orabug: 31350800] {CVE-2019-7308}\n- bpf: reduce verifier memory consumption (Alexei Starovoitov) [Orabug: 31350800] {CVE-2019-7308}\n- bpf: Prevent memory disambiguation attack (Alexei Starovoitov) [Orabug: 31350800] {CVE-2019-7308}\n- Revert 'rds: Do not cancel RDMAs that have been posted to the HCA' (Gerd Rausch) [Orabug: 31476562] \n- Revert 'rds: Introduce rds_conn_to_path helper' (Gerd Rausch) [Orabug: 31476562] \n- Revert 'rds: Three cancel fixes' (Gerd Rausch) [Orabug: 31476551] \n- scsi: megaraid_sas: Update driver version to 07.714.04.00-rc1 (Chandrakanth Patil) [Orabug: 31481643] \n- scsi: megaraid_sas: TM command refire leads to controller firmware crash (Sumit Saxena) [Orabug: 31481643] \n- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (Shivasharan S) [Orabug: 31481643] \n- scsi: megaraid_sas: Remove IO buffer hole detection logic (Sumit Saxena) [Orabug: 31481643] \n- scsi: megaraid_sas: Limit device queue depth to controller queue depth (Kashyap Desai) [Orabug: 31481643] \n- scsi: megaraid: make two symbols static in megaraid_sas_base.c (Jason Yan) [Orabug: 31481643] \n- scsi: megaraid: make some symbols static in megaraid_sas_fusion.c (Jason Yan) [Orabug: 31481643] \n- scsi: megaraid_sas: Use scnprintf() for avoiding potential buffer overflow (Takashi Iwai) [Orabug: 31481643] \n- scsi: megaraid_sas: silence a warning (Tomas Henzl) [Orabug: 31481643] \n- scsi: megaraid_sas: fix indentation issue (Colin Ian King) [Orabug: 31481643] \n- scsi: megaraid_sas: fixup MSIx interrupt setup during resume (Hannes Reinecke) [Orabug: 31481643] \n- scsi: megaraid_sas: Update driver version to 07.713.01.00-rc1 (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Limit the number of retries for the IOCTLs causing firmware fault (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Re-Define enum DCMD_RETURN_STATUS (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Do not set HBA Operational if FW is not in operational state (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Do not kill HBA if JBOD Seqence map or RAID map is disabled (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Do not kill host bus adapter, if adapter is already dead (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Update optimal queue depth for SAS and NVMe devices (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Set no_write_same only for Virtual Disk (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Reset adapter if FW is not in READY state after device resume (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Make poll_aen_lock static (YueHaibing) [Orabug: 31481643] \n- scsi: megaraid_sas: remove unused variables 'debugBlk','fusion' (zhengbin) [Orabug: 31481643] \n- scsi: megaraid_sas: Unique names for MSI-X vectors (Chandrakanth Patil) [Orabug: 31481643] \n- scsi: megaraid_sas: Make some functions static (YueHaibing) [Orabug: 31481643] \n- scsi: megaraid_sas: fix spelling mistake 'megarid_sas' -> 'megaraid_sas' (Colin Ian King) [Orabug: 31481643] \n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (Tomas Bortoli) [Orabug: 31351117] {CVE-2019-19533}\n- ALSA: core: Fix card races between register and disconnect (Takashi Iwai) [Orabug: 31351890] {CVE-2019-15214}\n- ALSA: info: Fix racy addition/deletion of nodes (Takashi Iwai) [Orabug: 31351890] {CVE-2019-15214}\n- rds: Deregister all FRWR mr with free_mr (Hans Westgaard Ry) [Orabug: 31441472] \n- uek-rpm: disable CONFIG_IP_PNP (Anjali Kulkarni) [Orabug: 31454846] \n- x86/speculation: Add SRBDS vulnerability and mitigation documentation (Mark Gross) [Orabug: 31352781] {CVE-2020-0543}\n- x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Mark Gross) [Orabug: 31352781] {CVE-2020-0543}\n- x86/cpu: Add 'table' argument to cpu_matches() (Mark Gross) [Orabug: 31352781] {CVE-2020-0543}\n- x86/cpu: Add a steppings field to struct x86_cpu_id (Mark Gross) [Orabug: 31352781] {CVE-2020-0543}\n- netdev, octeon3-ethernet: move timecounter init to network driver probe() (Dave Aldridge) [Orabug: 31439190] \n- rds: Three cancel fixes (Hakon Bugge) [Orabug: 31463014] \n- can: peak_usb: fix slab info leak (Johan Hovold) [Orabug: 31351139] {CVE-2019-19534}\n- uek-rpm: use expand macro with kernel_reqprovconf (Dave Kleikamp) [Orabug: 31454052] \n- can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices (Tomas Bortoli) [Orabug: 31351248] {CVE-2019-19536}\n- net/mlx5: Decrease default mr cache size (Artemy Kovalyov) [Orabug: 31410596] \n- xfs: fix freeze hung (Junxiao Bi) [Orabug: 31245660] \n- netlabel: cope with NULL catmap (Paolo Abeni) [Orabug: 31350492] {CVE-2020-10711}\n- mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status() (Qing Xu) [Orabug: 31350516] {CVE-2020-12654}\n- scsi: sg: add sg_remove_request in sg_write (Wu Bo) [Orabug: 31350698] {CVE-2020-12770}\n- block, bfq: fix use-after-free in bfq_idle_slice_timer_body (Zhiqiang Liu) [Orabug: 31350912] {CVE-2020-12657}\n- mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv() (Qing Xu) [Orabug: 31350931] {CVE-2020-12653}\n- USB: core: Fix free-while-in-use bug in the USB S-Glibrary (Alan Stern) [Orabug: 31350965] {CVE-2020-12464}\n[4.14.35-1902.304.1]\n- xfs: add agf freeblocks verify in xfs_agf_verify (Zheng Bin) [Orabug: 31350922] {CVE-2020-12655}\n- rds: Do not cancel RDMAs that have been posted to the HCA (Hakon Bugge) [Orabug: 31396425] \n- rds: Introduce rds_conn_to_path helper (Hakon Bugge) [Orabug: 31396425] \n- mwifiex: Abort at too short BSS descriptor element (Takashi Iwai) [Orabug: 31351915] {CVE-2019-3846}\n- mwifiex: Fix possible buffer overflows at parsing bss descriptor (Takashi Iwai) [Orabug: 31351915] {CVE-2019-3846} {CVE-2019-3846}\n- bnxt_en: Fix accumulation of bp->net_stats_prev. (Vijayendra Suman) [Orabug: 31390689] \n- nfs: initiate returning delegation when reclaiming one that's been recalled (Jeff Layton) [Orabug: 31378792] \n- NFS: More excessive attribute revalidation in nfs_execute_ok() (Trond Myklebust) [Orabug: 31378792] \n- uek-rpm: Add support for building a kdump kernel on MIPS64 (Dave Kleikamp) [Orabug: 31373682] \n- uek-rpm: Add config-mips64-embedded-kdump (Henry Willard) [Orabug: 31373682] \n- uek-rpm: Don't build kernel-uek-tools or perf packages for mips64 (Dave Kleikamp) [Orabug: 31373682] \n- scsi: mptfusion: Fix double fetch bug in ioctl (Dan Carpenter) [Orabug: 31350940] {CVE-2020-12652}\n- ptp: fix the race between the release of ptp_clock and cdev (Vladis Dronov) [Orabug: 31350706] {CVE-2020-10690}\n- net/rds: suppress memory allocation failure reports (Manjunath Patil) [Orabug: 31359419]\n[4.14.35-1902.304.0]\n- mips64/octeon: Initialize netdevice in octeon_pow struct (Vijay Kumar) [Orabug: 31388199] \n- uek-rpm/ol7/config-mips64: Disable IRQSOFF_TRACER (Henry Willard) [Orabug: 31386710] \n- xen/manage: enable C_A_D to force reboot (Dongli Zhang) [Orabug: 31249146]", "edition": 1, "modified": "2020-07-10T00:00:00", "published": "2020-07-10T00:00:00", "id": "ELSA-2020-5755", "href": "http://linux.oracle.com/errata/ELSA-2020-5755.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 8.3, "vector": "AV:A/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-10-07T06:55:38", "bulletinFamily": "unix", "cvelist": ["CVE-2019-19527", "CVE-2020-10711", "CVE-2020-12770", "CVE-2020-9383", "CVE-2020-12888", "CVE-2019-15217", "CVE-2019-9454", "CVE-2019-20095", "CVE-2019-19767", "CVE-2019-16233", "CVE-2019-19534", "CVE-2019-15807", "CVE-2020-14305", "CVE-2019-19332", "CVE-2020-12826", "CVE-2019-19524", "CVE-2019-17055", "CVE-2019-19058", "CVE-2020-10942", "CVE-2019-19062", "CVE-2017-18551", "CVE-2019-20636", "CVE-2019-19523", "CVE-2020-10732", "CVE-2019-19768", "CVE-2020-0543", "CVE-2020-10690", "CVE-2019-19059", "CVE-2020-12654", "CVE-2019-19055", "CVE-2019-19063", "CVE-2019-18808", "CVE-2020-12653", "CVE-2020-1749", "CVE-2020-10742", "CVE-2020-10751", "CVE-2019-12614", "CVE-2019-19807", "CVE-2019-9458", "CVE-2020-11565", "CVE-2020-8649", "CVE-2019-16231", "CVE-2019-19447", "CVE-2020-10757", "CVE-2019-19046", "CVE-2020-8647", "CVE-2019-19530", "CVE-2019-19537", "CVE-2019-16994", "CVE-2020-2732", "CVE-2019-17053", "CVE-2019-20054", "CVE-2018-20836", "CVE-2019-15917"], "description": "[3.10.0-1160.OL7]\n- Oracle Linux certificates (Ilya Okomin)\n- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)\n- Update x509.genkey [Orabug: 24817676]\n- Conflict with shim-ia32 and shim-x64 <= 15-2.0.3\n[3.10.0-1160]\n- [kernel] modsign: Add nomokvarconfig kernel parameter (Lenny Szubowicz) [1867857]\n- [firmware] modsign: Add support for loading certs from the EFI MOK config table (Lenny Szubowicz) [1867857]\n- [kernel] modsign: Move import of MokListRT certs to separate routine (Lenny Szubowicz) [1867857]\n- [kernel] modsign: Avoid spurious error message after last MokListRTn (Lenny Szubowicz) [1867857]\n[3.10.0-1159]\n- [kernel] modsign: Import certificates from optional MokListRT (Lenny Szubowicz) [1862840]\n- [crypto] crypto/pefile: Support multiple signatures in verify_pefile_signature (Lenny Szubowicz) [1862840]\n- [crypto] crypto/pefile: Tolerate other pefile signatures after first (Lenny Szubowicz) [1862840]\n[3.10.0-1158]\n- [redhat] switch secureboot kernel image signing to release keys (Jan Stancek) []\n[3.10.0-1157]\n- [fs] signal: Dont send signals to tasks that dont exist (Vladis Dronov) [1856166]\n[3.10.0-1156]\n- [fs] gfs2: Fix regression due to unwanted gfs2_qa_put (Robert S Peterson) [1798713]\n- [include] signal: Unfairly acquire tasklist_lock in send_sigio() if irq disabled (Waiman Long) [1838799]\n- [fs] signal: Dont take tasklist_lock if PID type is PIDTYPE_PID (Waiman Long) [1838799]\n- [vfio] vfio/pci: Fix SR-IOV VF handling with MMIO blocking (Alex Williamson) [1820632] {CVE-2020-12888}\n[3.10.0-1155]\n- [x86] Revert 'x86: respect memory size limiting via mem= parameter' (Joel Savitz) [1851576]\n- [mm] Revert 'mm/memory_hotplug.c: only respect mem= parameter during boot stage' (Joel Savitz) [1851576]\n- [fs] nfsd: only WARN once on unmapped errors ('J. Bruce Fields') [1850430]\n- [powerpc] pci/of: Fix OF flags parsing for 64bit BARs (Greg Kurz) [1840114]\n- [fs] cifs: fix NULL dereference in match_prepath (Leif Sahlberg) [1759852]\n[3.10.0-1154]\n- [fs] gfs2: move privileged user check to gfs2_quota_lock_check (Robert S Peterson) [1798713]\n- [fs] gfs2: Fix problems regarding gfs2_qa_get and _put (Robert S Peterson) [1798713]\n- [fs] gfs2: dont call quota_unhold if quotas are not locked (Robert S Peterson) [1798713]\n- [fs] gfs2: Remove unnecessary gfs2_qa_{get, put} pairs (Robert S Peterson) [1798713]\n- [fs] gfs2: Split gfs2_rsqa_delete into gfs2_rs_delete and gfs2_qa_put (Robert S Peterson) [1798713]\n- [fs] gfs2: Change inode qa_data to allow multiple users (Robert S Peterson) [1798713]\n- [fs] gfs2: eliminate gfs2_rsqa_alloc in favor of gfs2_qa_alloc (Robert S Peterson) [1798713]\n- [fs] gfs2: Switch to list_{first,last}_entry (Robert S Peterson) [1798713]\n- [fs] gfs2: Clean up inode initialization and teardown (Robert S Peterson) [1798713]\n- [fs] gfs2: Minor gfs2_alloc_inode cleanup (Robert S Peterson) [1798713]\n- [fs] gfs2: Fix busy-on-umount in gfs2_atomic_open() (Andrew Price) [1812558]\n[3.10.0-1153]\n- [x86] mm: Fix mremap not considering huge pmd devmap (Rafael Aquini) [1843437] {CVE-2020-10757}\n- [mm] mm, dax: check for pmd_none() after split_huge_pmd() (Rafael Aquini) [1843437] {CVE-2020-10757}\n- [mm] mm: mremap: streamline move_page_tables()s move_huge_pmd() corner case (Rafael Aquini) [1843437] {CVE-2020-10757}\n- [mm] mm: mremap: validate input before taking lock (Rafael Aquini) [1843437] {CVE-2020-10757}\n- [wireless] mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status() (Jarod Wilson) [1844070] {CVE-2020-12654}\n- [wireless] mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv() (Jarod Wilson) [1844026] {CVE-2020-12653}\n- [net] netfilter: nf_conntrack_h323: lost .data_len definition for Q.931/ipv6 (Florian Westphal) [1845428]\n[3.10.0-1152]\n- [nvmem] nvmem: properly handle returned value nvmem_reg_read (Vladis Dronov) [1844409]\n- [mailbox] PCC: fix dereference of ERR_PTR (Vladis Dronov) [1844409]\n- [kernel] futex: Unlock hb->lock in futex_wait_requeue_pi() error path (Vladis Dronov) [1844409]\n- [fs] aio: fix inconsistent ring state (Jeff Moyer) [1845326]\n- [vfio] vfio/mdev: make create attribute static (Vladis Dronov) [1837549]\n- [vfio] treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 500 (Vladis Dronov) [1837549]\n- [vfio] vfio/mdev: Synchronize device create/remove with parent removal (Vladis Dronov) [1837549]\n- [vfio] vfio/mdev: Avoid creating sysfs remove file on stale device removal (Vladis Dronov) [1837549]\n- [vfio] vfio/mdev: Improve the create/remove sequence (Vladis Dronov) [1837549]\n- [vfio] treewide: Add SPDX license identifier - Makefile/Kconfig (Vladis Dronov) [1837549]\n- [vfio] vfio/mdev: Avoid inline get and put parent helpers (Vladis Dronov) [1837549]\n- [vfio] vfio/mdev: Fix aborting mdev child device removal if one fails (Vladis Dronov) [1837549]\n- [vfio] vfio/mdev: Follow correct remove sequence (Vladis Dronov) [1837549]\n- [vfio] vfio/mdev: Avoid masking error code to EBUSY (Vladis Dronov) [1837549]\n- [include] vfio/mdev: Drop redundant extern for exported symbols (Vladis Dronov) [1837549]\n- [vfio] vfio/mdev: Removed unused kref (Vladis Dronov) [1837549]\n- [vfio] vfio/mdev: Avoid release parent reference during error path (Vladis Dronov) [1837549]\n- [vfio] vfio/mdev: Add iommu related member in mdev_device (Vladis Dronov) [1837549]\n- [vfio] vfio/mdev: add static modifier to add_mdev_supported_type (Vladis Dronov) [1837549]\n- [vfio] vfio: mdev: make a couple of functions and structure vfio_mdev_driver static (Vladis Dronov) [1837549]\n- [char] tpm/tpm_tis: Free IRQ if probing fails (David Arcari) [1774698]\n- [kernel] audit: fix a memleak caused by auditing load module (Richard Guy Briggs) [1843370]\n- [kernel] audit: fix potential null dereference 'context->module.name' (Richard Guy Briggs) [1843370]\n- [nvme] nvme: limit number of IO queues on Dell/Samsung config (David Milburn) [1837617]\n[3.10.0-1151]\n- [netdrv] qede: Fix multicast mac configuration (Michal Schmidt) [1740064]\n- [scsi] sd_dif: avoid incorrect ref_tag errors on 4K devices larger than 2TB (Ewan Milne) [1833528]\n- [hid] HID: hiddev: do cleanup in failure of opening a device (Torez Smith) [1814257] {CVE-2019-19527}\n- [hid] HID: hiddev: avoid opening a disconnected device (Torez Smith) [1814257] {CVE-2019-19527}\n- [x86] x86: make mul_u64_u64_div_u64() 'static inline' (Oleg Nesterov) [1845864]\n- [mm] mm: page_isolation: fix potential warning from user (Rafael Aquini) [1845620]\n- [s390] s390/mm: correct return value of pmd_pfn (Claudio Imbrenda) [1841106]\n- [fs] fs/proc/vmcore.c:mmap_vmcore: skip non-ram pages reported by hypervisors (Lianbo Jiang) [1790799]\n- [kernel] kernel/sysctl.c: ignore out-of-range taint bits introduced via kernel.tainted (Rafael Aquini) [1845356]\n- [documentation] kernel: add panic_on_taint (Rafael Aquini) [1845356]\n- [fs] ext4: Remove unwanted ext4_bread() from ext4_quota_write() (Lukas Czerner) [1845379]\n- [scsi] scsi: sg: add sg_remove_request in sg_write ('Ewan D. Milne') [1840699] {CVE-2020-12770}\n- [fs] fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info() (Donghai Qiao) [1832062] {CVE-2020-10732}\n[3.10.0-1150]\n- [netdrv] net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (Alaa Hleihel) [1845020]\n- [mm] memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (Waiman Long) [1842715]\n- [mm] memcg: only free spare array when readers are done (Waiman Long) [1842715]\n- [powerpc] powerpc/crashkernel: Take 'mem=' option into account (Pingfan Liu) [1751555]\n- [infiniband] IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (Kamal Heib) [1597952]\n- [security] selinux: properly handle multiple messages in selinux_netlink_send() (Ondrej Mosnacek) [1839650] {CVE-2020-10751}\n- [netdrv] net: ena: Add PCI shutdown handler to allow safe kexec (Bhupesh Sharma) [1841578]\n- [x86] x86/speculation: Support old struct x86_cpu_id & x86_match_cpu() kABI (Waiman Long) [1827188] {CVE-2020-0543}\n- [documentation] x86/speculation: Add Ivy Bridge to affected list (Waiman Long) [1827188] {CVE-2020-0543}\n- [documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Waiman Long) [1827188] {CVE-2020-0543}\n- [x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Waiman Long) [1827188] {CVE-2020-0543}\n- [x86] x86/cpu: Add 'table' argument to cpu_matches() (Waiman Long) [1827188] {CVE-2020-0543}\n- [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Waiman Long) [1827188] {CVE-2020-0543}\n- [x86] x86/cpu/bugs: Convert to new matching macros (Waiman Long) [1827188] {CVE-2020-0543}\n- [x86] x86/cpu: Add consistent CPU match macros (Waiman Long) [1827188] {CVE-2020-0543}\n- [cpufreq] x86/devicetable: Move x86 specific macro out of generic code (Waiman Long) [1827188] {CVE-2020-0543}\nheader (Waiman Long) [1827188] {CVE-2020-0543}\n[3.10.0-1149]\n- [mm] mm/memory_hotplug.c: only respect mem= parameter during boot stage (Joel Savitz) [1838795]\n- [netdrv] qed: Reduce the severity of ptp debug message (Manish Chopra) [1703770]\n- [kernel] pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes (Jay Shin) [1836620]\n- [fs] gfs2: remove BUG_ON() from gfs2_log_alloc_bio() (Abhijith Das) [1828454]\n- [fs] gfs2: Even more gfs2_find_jhead fixes (Abhijith Das) [1828454]\n- [fs] quota: fix return value in dqget() (Eric Sandeen) [1842761]\n- [fs] proc_sysctl.c: fix potential page fault while unregistering sysctl table (Carlos Maiolino) [1843368]\n- [fs] ext4: fix error handling in ext4_ext_shift_extents (Lukas Czerner) [1843366]\n- [vhost] vhost: Check docket sk_family instead of call getname (Vladis Dronov) [1823302] {CVE-2020-10942}\n- [input] hyperv-keyboard - add module description (Mohammed Gamal) [1842689]\n- [hv] hv: Add a module description line to the hv_vmbus driver (Mohammed Gamal) [1842689]\n- [hid] hyperv: Add a module description line (Mohammed Gamal) [1842689]\n- [x86] sched/cputime: Improve cputime_adjust() (Oleg Nesterov) [1511040]\n- [acpi] ACPI: APEI: call into AER handling regardless of severity (Al Stone) [1737246]\n- [acpi] ACPI: APEI: handle PCIe AER errors in separate function (Al Stone) [1737246]\n- [acpi] ras: acpi/apei: cper: add support for generic data v3 structure (Al Stone) [1737246]\n- [acpi] ACPICA: ACPI 6.1: Updates for the HEST ACPI table (Al Stone) [1737246]\n- [acpi] ACPI / APEI: Switch to use new generic UUID API (Al Stone) [1737246]\n- [x86] x86/efi-bgrt: Quirk for BGRT when memory encryption active (Lenny Szubowicz) [1723477]\n- [scsi] scsi: megaraid_sas: Update driver version to 07.714.04.00-rc1 (Tomas Henzl) [1840550]\n- [scsi] scsi: megaraid_sas: TM command refire leads to controller firmware crash (Tomas Henzl) [1840550]\n- [scsi] scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (Tomas Henzl) [1840550]\n- [scsi] scsi: megaraid_sas: Limit device queue depth to controller queue depth (Tomas Henzl) [1840550]\n- [vfio] vfio-pci: Invalidate mmaps and block MMIO access on disabled memory (Alex Williamson) [1820632] {CVE-2020-12888}\n- [vfio] vfio-pci: Fault mmaps to enable vma tracking (Alex Williamson) [1820632] {CVE-2020-12888}\n- [vfio] vfio/type1: Support faulting PFNMAP vmas (Alex Williamson) [1820632] {CVE-2020-12888}\n- [vfio] vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (Alex Williamson) [1820632] {CVE-2020-12888}\n- [vfio] vfio/pci: call irq_bypass_unregister_producer() before freeing irq (Alex Williamson) [1820632] {CVE-2020-12888}\n- [vfio] vfio_pci: Enable memory accesses before calling pci_map_rom (Alex Williamson) [1820632] {CVE-2020-12888}\n- [fs] signal: Extend exec_id to 64bits (Chris von Recklinghausen) [1834650] {CVE-2020-12826}\n[3.10.0-1148]\n- [x86] hyper-v: Report crash data in die() when panic_on_oops is set (Mohammed Gamal) [1828450]\n- [hv] x86/hyper-v: Report crash register data when sysctl_record_panic_msg is not set (Mohammed Gamal) [1828450]\n- [x86] hyper-v: Report crash register data or kmsg before running crash kernel (Mohammed Gamal) [1828450]\n- [hv] x86/hyper-v: Trigger crash enlightenment only once during system crash (Mohammed Gamal) [1828450]\n- [hv] x86/hyper-v: Free hv_panic_page when fail to register kmsg dump (Mohammed Gamal) [1828450]\n- [hv] x86/hyper-v: Unload vmbus channel in hv panic callback (Mohammed Gamal) [1828450]\n- [hv] vmbus: Fix the issue with freeing up hv_ctl_table_hdr (Mohammed Gamal) [1828450]\n- [hv] vmus: Fix the check for return value from kmsg get dump buffer (Mohammed Gamal) [1828450]\n- [hv] Send one page worth of kmsg dump over Hyper-V during panic (Mohammed Gamal) [1828450]\n- [x86] kvm: x86: Allow suppressing prints on RDMSR/WRMSR of unhandled MSRs (Vitaly Kuznetsov) [1837412]\n- [fs] ext4: Fix race when checking i_size on direct i/o read (Lukas Czerner) [1506437]\n- [fs] copy_file_range should return ENOSYS not EOPNOTSUPP ('J. Bruce Fields') [1783554]\n- [fs] NFSv4.1 fix incorrect return value in copy_file_range ('J. Bruce Fields') [1783554]\n- [x86] Remove the unsupported check for Intel IceLake (Steve Best) [1841237]\n- [md] md/raid1: release pending accounting for an I/O only after write-behind is also finished (Nigel Croxon) [1792520]\n- [net] gre: fix uninit-value in __iptunnel_pull_header (Guillaume Nault) [1840321]\n- [net] inet: protect against too small mtu values. (Guillaume Nault) [1840321]\n- [net] Fix one possible memleak in ip_setup_cork (Guillaume Nault) [1840321]\n- [net] fix a potential recursive NETDEV_FEAT_CHANGE (Guillaume Nault) [1839130]\n- [net] fix null de-reference of device refcount (Guillaume Nault) [1839130]\n- [net] sch_choke: avoid potential panic in choke_reset() (Davide Caratti) [1839118]\n- [net] net_sched: fix datalen for ematch (Davide Caratti) [1839118]\n- [net] netem: fix error path for corrupted GSO frames (Davide Caratti) [1839118]\n- [net] avoid potential infinite loop in tc_ctl_action() (Davide Caratti) [1839118]\n- [net] net_sched: let qdisc_put() accept NULL pointer (Davide Caratti) [1839118]\n- [net] ipv4: really enforce backoff for redirects (Paolo Abeni) [1832332]\n- [net] ipv4: avoid mixed n_redirects and rate_tokens usage (Paolo Abeni) [1832332]\n- [net] ipv4: use a dedicated counter for icmp_v4 redirect packets (Paolo Abeni) [1832332]\n- [net] ipset: Update byte and packet counters regardless of whether they match (Phil Sutter) [1801366]\n- [net] xfrm: skip rt6i_idev update in xfrm6_dst_ifdown if loopback_idev is gone (Sabrina Dubroca) [1390049]\n[3.10.0-1147]\n- [nvme] nvme: fix the parameter order for nvme_get_log in nvme_get_fw_slot_info (Gopal Tiwari) [1839991]\n- [fs] pipe: actually allow root to exceed the pipe buffer limits (Jan Stancek) [1839629]\n- [scsi] Revert 'scsi: mpt3sas: Dont change the DMA coherent mask after allocations' (Tomas Henzl) [1839128]\n- [scsi] Revert 'scsi: mpt3sas: Rename function name is_MSB_are_same' (Tomas Henzl) [1839128]\n- [scsi] Revert 'scsi: mpt3sas: Separate out RDPQ allocation to new function' (Tomas Henzl) [1839128]\n- [scsi] Revert 'scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region' (Tomas Henzl) [1839128]\n- [netdrv] net/mlx5e: Avoid duplicating rule destinations (Alaa Hleihel) [1727593]\n- [netdrv] net/mlx5e: Extend encap entry with reference counter (Alaa Hleihel) [1727593]\n- [netdrv] net/mlx5e: Fix free peer_flow when refcount is 0 (Alaa Hleihel) [1727593]\n- [netdrv] net/mlx5e: Extend tc flow struct with reference counter (Alaa Hleihel) [1727593]\n- [netdrv] net/mlx5e: Dont make internal use of errno to denote missing neigh (Alaa Hleihel) [1727593]\n- [netdrv] net/mlx5e: Fix freeing flow with kfree() and not kvfree() (Alaa Hleihel) [1727593]\n- [drm] drm/nouveau/gr/gp107, gp108: implement workaround for HW hanging during init (Karol Herbst) [1834360 1834356 1833485]\n- [drm] drm/nouveau: workaround runpm fail by disabling PCI power management on certain intel bridges (Karol Herbst) [1834360 1834356 1833485]\n[3.10.0-1146]\n- [net] revert 'rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()' (Jiri Benc) [1839608]\n- [net] ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (Davide Caratti) [1838936]\n- [net] ipv6: Handle missing host route in __ipv6_ifa_notify (Davide Caratti) [1838936]\n- [net] ipv6: drop incoming packets having a v4mapped source address (Davide Caratti) [1838936]\n- [net] l2tp: fix infoleak in l2tp_ip6_recvmsg() (Andrea Claudi) [1837546]\n- [net] vti6: Fix memory leak of skb if input policy check fails (Patrick Talbert) [1836160]\n- [net] tcp: prevent bogus FRTO undos with non-SACK flows (Guillaume Nault) [1694860]\n- [scsi] scsi: smartpqi: fix controller lockup observed during force reboot (Don Brace) [1775369]\n- [fs] ext4: fix setting of referenced bit in ext4_es_lookup_extent() (Lukas Czerner) [1663720]\n- [fs] ext4: introduce aging to extent status tree (Lukas Czerner) [1663720]\n- [fs] ext4: cleanup flag definitions for extent status tree (Lukas Czerner) [1663720]\n- [fs] ext4: limit number of scanned extents in status tree shrinker (Lukas Czerner) [1663720]\n- [fs] ext4: move handling of list of shrinkable inodes into extent status code (Lukas Czerner) [1663720]\n- [fs] ext4: change LRU to round-robin in extent status tree shrinker (Lukas Czerner) [1663720]\n- [fs] ext4, jbd2: ensure panic when aborting with zero errno (Lukas Czerner) [1834783]\n- [fs] jbd2: switch to use jbd2_journal_abort() when failed to submit the commit record (Lukas Czerner) [1834783]\n- [fs] jbd2: clear JBD2_ABORT flag before journal_reset to update log tail info when load journal (Lukas Czerner) [1834783]\n- [fs] ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (Lukas Czerner) [1834783]\n- [fs] ext4: fix missing return values checks in ext4_cross_rename (Lukas Czerner) [1836819]\n- [fs] ext4: Fix POSIX ACL leak in ext4_xattr_set_acl (Lukas Czerner) [1543020]\n- [vfio] vfio-pci: Mask cap zero (Alex Williamson) [1838717]\n- [x86] Mark Intel Cooper Lake (CPX) supported (Steve Best) [1773681]\n- [fs] fs/bio-integrity: dont enable integrity for data-less bio (Ming Lei) [1835943]\n- [char] ipmi_si: Only schedule continuously in the thread in maintenance mode (Alexey Klimov) [1837127]\n- [kernel] wait/ptrace: assume __WALL if the child is traced (Oleg Nesterov) [1497808]\n- [mm] mm, hugetlb, soft_offline: save compound page order before page migration (Artem Savkov) [1751589]\n- [fs] fs/hugetlbfs/inode.c: fix hwpoison reserve accounting (Artem Savkov) [1751589]\n- [fs] mm: hwpoison: dissolve in-use hugepage in unrecoverable memory error (Artem Savkov) [1751589]\n- [mm] mm: soft-offline: dissolve free hugepage if soft-offlined (Artem Savkov) [1751589]\n- [mm] mm: hugetlb: soft-offline: dissolve source hugepage after successful migration (Artem Savkov) [1751589]\n- [mm] mm: hwpoison: change PageHWPoison behavior on hugetlb pages (Artem Savkov) [1751589]\n- [mm] mm: hugetlb: prevent reuse of hwpoisoned free hugepages (Artem Savkov) [1751589]\n- [netdrv] net/mlx5: Tidy up and fix reverse christmas ordring (Alaa Hleihel) [1831134]\n- [netdrv] net/mlx5: Expose port speed when possible (Alaa Hleihel) [1831134]\n- [include] net/mlx5: Expose link speed directly (Alaa Hleihel) [1831134]\n- [usb] USB: core: Fix races in character device registration and deregistraion (Torez Smith) [1785065] {CVE-2019-19537}\n- [usb] usb: cdc-acm: make sure a refcount is taken early enough (Torez Smith) [1802548] {CVE-2019-19530}\n- [usb] USB: adutux: fix use-after-free on disconnect (Torez Smith) [1798822] {CVE-2019-19523}\n- [media] media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap (Torez Smith) [1795597] {CVE-2019-15217}\n[3.10.0-1145]\n- [scsi] scsi: qla2xxx: Do not log message when reading port speed via sysfs (Ewan Milne) [1837543]\n- [mm] mm: dmapool: add/remove sysfs file outside of the pool lock lock (Waiman Long) [1836837]\n- [mm] Fix unbalanced mutex in dma_pool_create() (Waiman Long) [1836837]\n- [mm] mm/dmapool.c: remove redundant NULL check for dev in dma_pool_create() (Waiman Long) [1836837]\n- [x86] x86/speculation: Prevent deadlock on ssb_state::lock (Waiman Long) [1836322]\n- [netdrv] can, slip: Protect tty->disc_data in write_wakeup and close with RCU (John Linville) [1805590]\n- [netdrv] slcan: Port write_wakeup deadlock fix from slip (John Linville) [1805590]\n- [fs] ext4: fix support for inode sizes > 1024 bytes (Lukas Czerner) [1817634] {CVE-2019-19767}\n- [fs] ext4: add more paranoia checking in ext4_expand_extra_isize handling (Lukas Czerner) [1817634] {CVE-2019-19767}\n- [fs] ext4: forbid i_extra_isize not divisible by 4 (Lukas Czerner) [1817634] {CVE-2019-19767}\n- [fs] ext4: validate the debug_want_extra_isize mount option at parse time (Lukas Czerner) [1817634] {CVE-2019-19767}\n- [fs] cachefiles: Fix race between read_waiter and read_copier involving op->to_do (Dave Wysochanski) [1829662]\n- [fs] jbd2: Fix possible overflow in jbd2_log_space_left() (Lukas Czerner) [1626092]\n- [media] media: v4l: event: Add subscription to list before calling 'add' operation (Jarod Wilson) [1828802] {CVE-2019-9458}\n- [media] media: v4l: event: Prevent freeing event subscriptions while accessed (Jarod Wilson) [1828802] {CVE-2019-9458}\n- [fs] block: Prevent hung_check firing during long sync IO (Ming Lei) [1724345]\n[3.10.0-1144]\n- [crypto] crypto: user - fix memory leak in crypto_report (Vladis Dronov) [1825132] {CVE-2019-18808 CVE-2019-19062}\n- [crypto] crypto: ccp - Release all allocated memory if sha type is invalid (Vladis Dronov) [1825132] {CVE-2019-18808}\n- [net] xfrm: policy: Fix doulbe free in xfrm_policy_timer (Xin Long) [1836813]\n- [net] xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire (Xin Long) [1836813]\n- [net] xfrm: fix uctx len check in verify_sec_ctx_len (Xin Long) [1836813]\n- [net] rtnetlink: validate IFLA_MTU attribute in rtnl_create_link() (Jiri Benc) [1835352]\n- [net] rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (Jiri Benc) [1835352]\n- [net] netlink: fix uninit-value in netlink_sendmsg (Jiri Benc) [1835352]\n- [net] netlink: make sure nladdr has correct size in netlink_connect() (Jiri Benc) [1835352]\n- [net] rtnetlink: fix info leak in RTM_GETSTATS call (Jiri Benc) [1835352]\n- [net] rtnetlink: release net refcnt on error in do_setlink() (Jiri Benc) [1835352]\n- [net] bridge: deny dev_set_mac_address() when unregistering (Hangbin Liu) [1834203]\n- [net] bridge/mdb: remove wrong use of NLM_F_MULTI (Hangbin Liu) [1834203]\n- [net] udp: disable inner UDP checksum offloads in IPsec case (Sabrina Dubroca) [1826244]\n- [net] sctp: Fix SHUTDOWN CTSN Ack in the peer restart case (Xin Long) [1833869]\n- [net] sctp: Fix bundling of SHUTDOWN with COOKIE-ACK (Xin Long) [1833869]\n- [net] sctp: fix possibly using a bad saddr with a given dst (Xin Long) [1833869]\n- [net] sctp: fix refcount bug in sctp_wfree (Xin Long) [1833869]\n- [net] sctp: move the format error check out of __sctp_sf_do_9_1_abort (Xin Long) [1833869]\n- [net] sctp: free cmd->obj.chunk for the unprocessed SCTP_CMD_REPLY (Xin Long) [1833869]\n- [net] sctp: fully initialize v4 addr in some functions (Xin Long) [1833869]\n- [net] sctp: simplify addr copy (Xin Long) [1833869]\n- [net] sctp: cache netns in sctp_ep_common (Xin Long) [1833869]\n- [net] sctp: destroy bucket if failed to bind addr (Xin Long) [1833869]\n- [net] sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (Xin Long) [1833869]\n- [net] netfilter: nat: never update the UDP checksum when its 0 (Guillaume Nault) [1834278]\n- [net] esp4: add length check for UDP encapsulation (Sabrina Dubroca) [1825155]\n- [net] sit: fix memory leak in sit_init_net() (Andrea Claudi) [1830011] {CVE-2019-16994}\n- [net] sched: cbs: fix NULL dereference in case cbs_init() fails (Davide Caratti) [1830245]\n- [net] netfilter: nf_tables: use-after-free in dynamic operations (Phil Sutter) [1819087]\n- [net] tcp: tcp_v4_err() should be more careful (Marcelo Leitner) [1749964]\n- [net] tcp: remove BUG_ON from tcp_v4_err (Marcelo Leitner) [1749964]\n- [net] tcp: clear icsk_backoff in tcp_write_queue_purge() (Marcelo Leitner) [1749964]\n- [net] psample: fix skb_over_panic (Sabrina Dubroca) [1823251]\n- [net] sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key (Patrick Talbert) [1823691]\n- [netdrv] fjes: Handle workqueue allocation failure (Masayoshi Mizuma) [1830563] {CVE-2019-16231}\n[3.10.0-1143]\n- [mm] mm: mempolicy: require at least one nodeid for MPOL_PREFERRED (Rafael Aquini) [1834434] {CVE-2020-11565}\n- [fs] fs: avoid softlockups in s_inodes iterators (Jay Shin) [1760145]\n- [scsi] scsi: core: Add DID_ALLOC_FAILURE and DID_MEDIUM_ERROR to hostbyte_table (Maurizio Lombardi) [1832019]\n- [fs] locks: allow filesystems to request that ->setlease be called without i_lock (Jeff Layton) [1830606]\n- [fs] locks: move fasync setup into generic_add_lease (Jeff Layton) [1830606]\n- [fs] revert '[fs] xfs: catch bad stripe alignment configurations' (Carlos Maiolino) [1836292]\n- [scsi] scsi: scsi_debug: num_tgts must be >= 0 (Ewan Milne) [1834998]\n- [scsi] scsi: scsi_debug: Avoid PI being disabled when TPGS is enabled (Ewan Milne) [1834998]\n- [scsi] scsi: scsi_debug: Fix memory leak if LBP enabled and module is unloaded (Ewan Milne) [1834998]\n- [scsi] scsi_debug: check for bigger value first (Ewan Milne) [1834998]\n- [scsi] scsi_debug: vfree is null safe so drop the check (Ewan Milne) [1834998]\n- [scsi] scsi_debug: error message should say scsi_host_alloc not scsi_register (Ewan Milne) [1834998]\n- [fs] xfs: Fix tail rounding in xfs_alloc_file_space() (Bill ODonnell) [1833223]\n- [fs] ceph: dont drop message if it contains more data than expected (Jeff Layton) [1828340]\n- [fs] ceph: dont error out on larger-than-expected session messages (Jeff Layton) [1828340]\n- [acpi] ACPI: disable BERT by default, add parameter to enable it (Aristeu Rozanski) [1525298]\n- [acpi] ACPI: APEI: Fix possible out-of-bounds access to BERT region (Aristeu Rozanski) [1525298]\n- [acpi] ACPI / sysfs: Extend ACPI sysfs to provide access to boot error region (Aristeu Rozanski) [1525298]\n- [acpi] ACPI: APEI: Fix BERT resources conflict with ACPI NVS area (Aristeu Rozanski) [1525298]\n- [acpi] ACPI / APEI: Add Boot Error Record Table (BERT) support (Aristeu Rozanski) [1525298]\n- [acpi] ACPICA: Restore error table definitions to reduce code differences between Linux and ACPICA upstream (Aristeu Rozanski) [1525298]\n[3.10.0-1142]\n- [fs] gfs2: Another gfs2_walk_metadata fix (Andreas Grunbacher) [1822230]\n- [fs] ext4: prevent ext4_quota_write() from failing due to ENOSPC (Lukas Czerner) [1068952]\n- [fs] ext4: do not zeroout extents beyond i_disksize (Lukas Czerner) [1834320]\n- [fs] pnfs: Ensure we layoutcommit before revalidating attributes (Benjamin Coddington) [1827647]\n- [fs] nfs: flush data when locking a file to ensure cache coherence for mmap (Scott Mayhew) [1813811]\n- [fs] call fsnotify_sb_delete after evict_inodes (Jay Shin) [1760145]\n- [fs] inode: dont softlockup when evicting inodes (Jay Shin) [1760145]\n- [fs] drop_caches.c: avoid softlockups in drop_pagecache_sb() (Jay Shin) [1760145]\n- [fs] gfs2: More gfs2_find_jhead fixes (Abhijith Das) [1828454]\n- [fs] gfs2: Another gfs2_find_jhead fix (Abhijith Das) [1828454]\n- [fs] nfs: fix mount/umount race in nlmclnt (Jay Shin) [1771205]\n- [fs] nlm_shutdown_hosts_net() cleanup (Jay Shin) [1771205]\n- [scsi] scsi: megaraid: Use true, false for bool variables (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid: make two symbols static in megaraid_sas_base.c (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid: make some symbols static in megaraid_sas_fusion.c (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid: make some symbols static in megaraid_sas_fp.c (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Use scnprintf() for avoiding potential buffer overflow (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: silence a warning (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: fix indentation issue (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Limit the number of retries for the IOCTLs causing firmware fault (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Re-Define enum DCMD_RETURN_STATUS (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Do not set HBA Operational if FW is not in operational state (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Do not kill HBA if JBOD Seqence map or RAID map is disabled (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Do not kill host bus adapter, if adapter is already dead (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Update optimal queue depth for SAS and NVMe devices (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Reset adapter if FW is not in READY state after device resume (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Make poll_aen_lock static (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Fix a compilation warning (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Make a bunch of functions static (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Make some functions static (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: remove unused variables 'debugBlk', 'fusion' (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: Unique names for MSI-X vectors (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: fix panic on loading firmware crashdump (Tomas Henzl) [1827037]\n- [scsi] scsi: megaraid_sas: fix spelling mistake 'megarid_sas' -> 'megaraid_sas' (Tomas Henzl) [1827037]\n- [scsi] scsi: mpt3sas: Disable DIF when prot_mask set to zero (Tomas Henzl) [1832868]\n- [scsi] scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (Tomas Henzl) [1832868]\n- [scsi] scsi: mpt3sas: Separate out RDPQ allocation to new function (Tomas Henzl) [1832868]\n- [scsi] scsi: mpt3sas: Rename function name is_MSB_are_same (Tomas Henzl) [1832868]\n- [scsi] scsi: mpt3sas: Dont change the DMA coherent mask after allocations (Tomas Henzl) [1832868]\n- [scsi] scsi: mpt3sas: Fix kernel panic observed on soft HBA unplug (Tomas Henzl) [1832868]\n- [scsi] scsi: mpt3sas: Fix double free in attach error handling (Tomas Henzl) [1832868]\n- [scsi] scsi: mpt3sas: Use Component img header to get Package ver (Tomas Henzl) [1832868]\n- [scsi] scsi: mpt3sas: Fix module parameter max_msix_vectors (Tomas Henzl) [1832868]\n- [scsi] scsi: mpt3sas: Reject NVMe Encap cmnds to unsupported HBA (Tomas Henzl) [1832868]\n- [netdrv] hv_netvsc: Fix error handling in netvsc_set_features() (Mohammed Gamal) [1821814]\n- [netdrv] hv_netvsc: Sync offloading features to VF NIC (Mohammed Gamal) [1821814]\n- [netdrv] hv_netvsc: Fix IP header checksum for coalesced packets (Mohammed Gamal) [1821814]\n- [netdrv] hv_netvsc: Fix rndis_per_packet_info internal field initialization (Mohammed Gamal) [1821814]\n- [netdrv] hv_netvsc: Add handler for LRO setting change (Mohammed Gamal) [1821814]\n- [netdrv] hv_netvsc: Add support for LRO/RSC in the vSwitch (Mohammed Gamal) [1821814]\n- [netdrv] hv_netvsc: Add handlers for ethtool get/set msg level (Mohammed Gamal) [1821814]\n- [netdrv] hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (Mohammed Gamal) [1821814]\n- [fs] fix mntput/mntput race (Miklos Szeredi) [1828320]\n- [wireless] rtlwifi: prevent memory leak in rtl_usb_probe (Jarod Wilson) [1829847] {CVE-2019-19063}\n- [wireless] iwlwifi: dbg_ini: fix memory leak in alloc_sgtable (Jarod Wilson) [1829375] {CVE-2019-19058}\n- [net] nl80211: fix memory leak in nl80211_get_ftm_responder_stats (Jarod Wilson) [1829289] {CVE-2019-19055}\n- [wireless] iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (Jarod Wilson) [1829393] {CVE-2019-19059}\n[3.10.0-1141]\n- [kernel] sched/fair: Scale bandwidth quota and period without losing quota/period ratio precision (Artem Savkov) [1752067]\n- [edac] EDAC: skx_common: downgrade message importance on missing PCI device (Aristeu Rozanski) [1832683]\n- [s390] s390/qdio: consider ERROR buffers for inbound-full condition (Philipp Rudo) [1831791]\n- [s390] s390/ftrace: fix potential crashes when switching tracers (Philipp Rudo) [1813124]\n- [netdrv] ibmvnic: Skip fatal error reset after passive init (Steve Best) [1830992]\n- [scsi] smartpqi: bump driver version (Don Brace) [1822762]\n- [scsi] scsi: smartpqi: add bay identifier (Don Brace) [1822762]\n- [scsi] scsi: smartpqi: add module param to hide vsep (Don Brace) [1822762]\n- [scsi] scsi: bnx2fc: Update the driver version to 2.12.13 (Nilesh Javali) [1709542]\n- [scsi] scsi: bnx2fc: fix boolreturn.cocci warnings (Nilesh Javali) [1709542]\n- [scsi] scsi: bnx2fc: Fix SCSI command completion after cleanup is posted (Nilesh Javali) [1709542]\n- [scsi] scsi: bnx2fc: Process the RQE with CQE in interrupt context (Nilesh Javali) [1709542]\n- [scsi] scsi: qla2xxx: Fix a recently introduced kernel warning (Nilesh Javali) [1828875]\n- [scsi] Fix abort timeouts in CQ Full conditions (Dick Kennedy) [1802654]\n- [input] Input: add safety guards to input_set_keycode() (Chris von Recklinghausen) [1828222] {CVE-2019-20636}\n- [scsi] scsi: libsas: delete sas port if expander discover failed (Tomas Henzl) [1829965] {CVE-2019-15807}\n- [net] netlabel: cope with NULL catmap (Paolo Abeni) [1827240] {CVE-2020-10711}\n[3.10.0-1140]\n- [netdrv] mlx5: Remove unsupported tag for ConnectX-6 Dx device (Alaa Hleihel) [1829777]\n- [fs] xfs: clear PF_MEMALLOC before exiting xfsaild thread (Brian Foster) [1827910]\n- [fs] gfs2: fix O_EXCL|O_CREAT handling on cold dcache (Andrew Price) [1812558]\n- [fs] nfs: Correct an nfs page array calculation error (Jay Shin) [1824270]\n- [infiniband] RDMA/bnxt_re: Fix stat push into dma buffer on gen p5 devices (Jonathan Toppins) [1828475 1824438]\n- [netdrv] bnxt_en: Fix allocation of zero statistics block size regression (Jonathan Toppins) [1824438]\n- [netdrv] bnxt_en: Allocate the larger per-ring statistics block for 57500 chips (Jonathan Toppins) [1824438]\n- [netdrv] bnxt_en: Expand bnxt_tpa_info struct to support 57500 chips (Jonathan Toppins) [1824438]\n- [netdrv] bnxt_en: Refactor TPA logic (Jonathan Toppins) [1824438]\n- [netdrv] bnxt_en: Add TPA structure definitions for BCM57500 chips (Jonathan Toppins) [1824438]\n- [netdrv] bnxt_en: Update firmware interface spec. to 1.10.0.89 (Jonathan Toppins) [1824438]\n- [netdrv] bnxt_en: Update firmware interface to 1.10.0.69 (Jonathan Toppins) [1824438]\n- [netdrv] bnxt_en: Update firmware interface spec. to 1.10.0.47 (Jonathan Toppins) [1824438]\n- [netdrv] bnxt_en: Refactor ethtool ring statistics logic (Jonathan Toppins) [1824438]\n- [block] blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (Ming Lei) [1825431]\n- [scsi] scsi: fnic: do not queue commands during fwreset (Govindarajulu Varadarajan) [1794150]\n- [scsi] scsi: fnic: fix invalid stack access (Govindarajulu Varadarajan) [1794150]\n- [scsi] scsi: fnic: fix use after free (Govindarajulu Varadarajan) [1794150]\n- [netdrv] enic: prevent waking up stopped tx queues over watchdog reset (Govindarajulu Varadarajan) [1794148]\n- [fs] ceph: use ceph_evict_inode to cleanup inodes resource (Jeff Layton) [1784016]\n- [fs] ceph: fix use-after-free in __ceph_remove_cap() (Jeff Layton) [1784016]\n- [fs] ceph: hold i_ceph_lock when removing caps for freeing inode (Jeff Layton) [1784016]\n- [input] Input: ff-memless - kill timer in destroy() (Chris von Recklinghausen) [1815021] {CVE-2019-19524}\n- [scsi] scsi: qla2xxx: fix a potential NULL pointer dereference ('Ewan D. Milne') [1829246] {CVE-2019-16233}\n[3.10.0-1139]\n- [fs] nfsd: Fix races between nfsd4_cb_release() and nfsd4_shutdown_callback() ('J. Bruce Fields') [1448750]\n- [fs] nfsd: minor 4.1 callback cleanup ('J. Bruce Fields') [1448750]\n- [fs] nfsd: Dont release the callback slot unless it was actually held (Benjamin Coddington) [1448750]\n- [lib] kobject: dont use WARN for registration failures (Ewan Milne) [1756495]\n- [lib] lib/kobject: Join string literals back (Ewan Milne) [1756495]\n- [scsi] scsi: ibmvfc: Dont send implicit logouts prior to NPIV login (Steve Best) [1828726]\n- [fs] nfs: Serialize O_DIRECT reads and writes (Benjamin Coddington) [1826571]\n- [mm] mm/page_owner: convert page_owner_inited to static key (Rafael Aquini) [1781726]\n- [mm] mm/page_owner: set correct gfp_mask on page_owner (Rafael Aquini) [1781726]\n- [mm] mm/page_owner: fix possible access violation (Rafael Aquini) [1781726]\n- [mm] mm/page_owner: use late_initcall to hook in enabling (Rafael Aquini) [1781726]\n- [mm] mm/page_owner: remove unnecessary stack_trace field (Rafael Aquini) [1781726]\n- [mm] mm/page_owner: correct owner information for early allocated pages (Rafael Aquini) [1781726]\n- [mm] mm/page_owner: keep track of page owners (Rafael Aquini) [1781726]\n- [documentation] Documentation: add new page_owner document (Rafael Aquini) [1781726]\n- [kernel] stacktrace: introduce snprint_stack_trace for buffer output (Rafael Aquini) [1781726]\n[3.10.0-1138]\n- [infiniband] RDMA/bnxt_re: Fix chip number validation Broadcoms Gen P5 series (Jonathan Toppins) [1823679]\n- [scsi] scsi: qla2xxx: Silence fwdump template message (Ewan Milne) [1783191]\n- [scsi] scsi: hpsa: Update driver version (Joseph Szczypek) [1808403]\n- [scsi] scsi: hpsa: correct race condition in offload enabled (Joseph Szczypek) [1808403]\n- [netdrv] bonding: fix active-backup transition after link failure (Jarod Wilson) [1712235]\n- [netdrv] bonding: fix state transition issue in link monitoring (Jarod Wilson) [1712235]\n- [netdrv] bonding: fix potential NULL deref in bond_update_slave_arr (Jarod Wilson) [1712235]\n- [netdrv] bonding: Force slave speed check after link state recovery for 802.3ad (Jarod Wilson) [1712235]\n- [i2c] i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA (Vladis Dronov) [1822641] {CVE-2017-18551}\n- [acpi] ACPI / EC: Ensure lock is acquired before accessing ec struct (Al Stone) [1811132]\n- [x86] x86/mce: Do not log spurious corrected mce errors (Prarit Bhargava) [1797205]\n- [wireless] mwifiex: Fix mem leak in mwifiex_tm_cmd (Jarod Wilson) [1804971] {CVE-2019-20095}\n- [kernel] kernel/module.c: wakeup processes in module_wq on module unload (Prarit Bhargava) [1771939]\n- [acpi] ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (Prarit Bhargava) [1790782]\n[3.10.0-1137]\n- [tty] tty/hvc: Use IRQF_SHARED for OPAL hvc consoles (Gustavo Duarte) [1600213]\n- [mm] mm/swap_slots.c: fix race conditions in swap_slots cache init (Rafael Aquini)\n- [block] loop: set PF_MEMALLOC_NOIO for the worker thread (Ming Lei) [1825950]\n- [tty] serial: 8250: drop the printk from serial8250_interrupt() (Prarit Bhargava) [1825049]\n- [net] net: linkwatch: add check for netdevice being present to linkwatch_do_dev (Alaa Hleihel) [1595302]\n[3.10.0-1136]\n- [fs] sunrpc: expiry_time should be seconds not timeval (Benjamin Coddington) [1794055]\n- [nvdimm] Revert 'driver boilerplate changes to properly manage device_rh' (Christoph von Recklinghausen) [1823750]\n- [base] call device_rh_free in device_release before driver/class/type release is called (Christoph von Recklinghausen) [1822888]\n- [md] md:md-faulty kernel panic is caused by QUEUE_FLAG_NO_SG_MERGE (Nigel Croxon) [1822462]\n- [firmware] efi: cper: print AER info of PCIe fatal error (Vladis Dronov) [1820646]\n- [scsi] qla2xxx: Update driver version to 10.01.00.22.07.9-k (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Fix message indicating vectors used by driver (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Move free of fcport out of interrupt context (Nilesh Javali) [1808129]\n- [scsi] qla2xxx: delete all sessions before unregister local nvme port (Nilesh Javali) [1808129]\n- [scsi] qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Fix a NULL pointer dereference in an error path (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Fix mtcp dump collection failure (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Fix RIDA Format-2 (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Fix stuck login session using prli_pend_timer (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Use common routine to free fcport struct (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Fix update_fcport for current_topology (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Fix fabric scan hang (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Complain if sp->done() is not called from the completion path (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Change discovery state before PLOGI (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Initialize free_work before flushing it (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Retry fabric Scan on IOCB queue full (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: initialize fc4_type_priority (Nilesh Javali) [1808129]\n- [scsi] scsi: qla2xxx: Fix a dma_pool_free() call (Nilesh Javali) [1808129]\n- [security] selinux: ensure we cleanup the internal AVC counters on error in avc_insert() (Artem Savkov) [1808675]\n- [acpi] ACPICA: Mark acpi_ut_create_internal_object_dbg() memory allocations as non-leaks (Artem Savkov) [1808675]\n- [x86] x86/microcode/AMD: Free unneeded patch before exit from update_cache() (Artem Savkov) [1808675]\n- [mm] memcg: ensure mem_cgroup_idr is updated in a coordinated manner (Aaron Tomlin) [1822405]\n- [mm] mm/page_alloc: increase default min_free_kbytes bound (Joel Savitz) [1704326]\n- [scsi] scsi: lpfc: Fix unexpected error messages during RSCN handling (Dick Kennedy) [1743667]\n- [scsi] scsi: lpfc: Fix discovery failures when target device connectivity bounces (Dick Kennedy) [1743667]\n- [scsi] scsi: lpfc: Fix devices that dont return after devloss followed by rediscovery (Dick Kennedy) [1743667]\n- [scsi] scsi: lpfc: Fix port relogin failure due to GID_FT interaction (Dick Kennedy) [1743667]\n- [video] vgacon: Fix a UAF in vgacon_invert_region (Vladis Dronov) [1818730] {CVE-2020-8647 CVE-2020-8649}\n- [x86] uprobes/x86: Fix detection of 32-bit user mode (Oleg Nesterov) [1804959]\n- [powerpc] module: Handle R_PPC64_ENTRY relocations (Yauheni Kaliuta) [1657540]\n- [scripts] recordmcount.pl: support data in text section on powerpc (Yauheni Kaliuta) [1657540]\n- [powerpc] boot: Request no dynamic linker for boot wrapper (Yauheni Kaliuta) [1657540]\n[3.10.0-1135]\n- [fs] fscache: Fix race in fscache_op_complete() due to split atomic_sub & read (Dave Wysochanski) [1683490]\n- [fs] fscache: Pass the correct cancelled indications to fscache_op_complete() (Dave Wysochanski) [1683490]\n- [char] tpm: ibmvtpm: Wait for buffer to be set before proceeding (Jerry Snitselaar) [1815536]\n- [fs] NFS: Fix a race between mmap() and O_DIRECT (Benjamin Coddington) [1813803]\n- [fs] NFS: Remove a redundant call to unmap_mapping_range() (Benjamin Coddington) [1813803]\n- [fs] NFS: Remove redundant waits for O_DIRECT in fsync() and write_begin() (Benjamin Coddington) [1813803]\n- [fs] NFS: Cleanup nfs_direct_complete() (Benjamin Coddington) [1813803]\n- [fs] NFS: Do not serialise O_DIRECT reads and writes (Benjamin Coddington) [1813803]\n- [fs] NFS: Move buffered I/O locking into nfs_file_write() (Benjamin Coddington) [1813803]\n- [fs] bdi: make inode_to_bdi() inline (Benjamin Coddington) [1813803]\n- [fs] NFS: Remove racy size manipulations in O_DIRECT (Benjamin Coddington) [1813803]\n- [fs] NFS: Dont hold the inode lock across fsync() (Benjamin Coddington) [1813803]\n- [fs] nfs: remove nfs_inode_dio_wait (Benjamin Coddington) [1813803]\n- [fs] nfs: remove nfs4_file_fsync (Benjamin Coddington) [1813803]\n- [fs] NFS: Kill NFS_INO_NFS_INO_FLUSHING: it is a performance killer (Benjamin Coddington) [1813803]\n- [fs] filesystem-dax: Fix dax_layout_busy_page() livelock (Carlos Maiolino) [1817866]\n- [block] blk-mq: fix hang caused by freeze/unfreeze sequence (Ming Lei) [1821718]\n- [fs] ceph: dont NULL terminate virtual xattrs (Jeff Layton) [1717454]\n- [fs] ceph: return -ERANGE if virtual xattr value didnt fit in buffer (Jeff Layton) [1717454]\n- [fs] ceph: make getxattr_cb return ssize_t (Jeff Layton) [1717454]\n- [fs] ceph: use bit flags to define vxattr attributes (Jeff Layton) [1717454]\n- [tty] tty: Prevent ldisc drivers from re-using stale tty fields (Vladis Dronov) [1820031]\n- [powerpc] powerpc64/kexec: Hard disable ftrace before switching to the new kernel (Jerome Marchand) [1731578]\n- [powerpc] powerpc64/ftrace: Delay enabling ftrace on secondary cpus (Jerome Marchand) [1731578]\n- [powerpc] powerpc64/ftrace: Add helpers to hard disable ftrace (Jerome Marchand) [1731578]\n- [powerpc] powerpc64/ftrace: Rearrange #ifdef sections in ftrace.h (Jerome Marchand) [1731578]\n- [powerpc] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths (Jerome Marchand) [1731578]\n- [powerpc] powerpc/ftrace: Pass the correct stack pointer for DYNAMIC_FTRACE_WITH_REGS (Jerome Marchand) [1731578]\n- [isdn] mISDN: enforce CAP_NET_RAW for raw sockets (Andrea Claudi) [1779474] {CVE-2019-17055}\n- [virtio] virtio-balloon: fix managed page counts when migrating pages between zones (David Hildenbrand) [1780330]\n[3.10.0-1134]\n- [net] netfilter: nf_log: fix uninit read in nf_log_proc_dostring (Phil Sutter) [1770232]\n- [net] netfilter: nf_log: fix error on write NONE to logger choice sysctl (Phil Sutter) [1770232]\n- [net] ethtool: convert large order kmalloc allocations to vzalloc (Davide Caratti) [1786448]\n- [net] l2tp: Allow duplicate session creation with UDP (Guillaume Nault) [1808928]\n- [net] sched: flower: insert new filter to idr after setting its mask (Davide Caratti) [1785141]\n- [net] ipv6: remove printk (Hangbin Liu) [1779533]\n- [net] netfilter: ctnetlink: netns exit must wait for callbacks (Florian Westphal) [1766816]\n- [net] raw: do not report ICMP redirects to user space (Hangbin Liu) [1758386]\n[3.10.0-1133]\n- [powerpc] powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property() (Steve Best) [1806629] {CVE-2019-12614}\n- [s390] s390/pci: Recover handle in clp_set_pci_fn() (Philipp Rudo) [1816662]\n- [fs] xfs: fix attr leaf header freemap.size underflow (Bill ODonnell) [1808671]\n- [block] floppy: check FDC index for errors before assigning it (Ming Lei) [1815403] {CVE-2020-9383}\n- [block] virtio-blk: improve virtqueue error to BLK_STS (Philipp Rudo) [1818001]\n- [block] virtio-blk: fix hw_queue stopped on arbitrary error (Philipp Rudo) [1818001]\n- [s390] dasd: fix endless loop after read unit address configuration (Philipp Rudo) [1816661]\n- [fs] CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (Leif Sahlberg) [1504193]\n- [fs] cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (Leif Sahlberg) [1504193]\n- [char] ipmi: Fix memory leak in __ipmi_bmc_register (Tony Camuso) [1812836] {CVE-2019-19046}\n- [net] ipvs: Remove noisy debug print from ip_vs_del_service (Alexey Klimov) [1769816]\n[3.10.0-1132]\n- [tools] tools/power turbostat: Support Ice Lake server (Steve Best) [1776508]\n- [nvme] nvme-fc: ensure association_id is cleared regardless of a Disconnect LS (Ewan Milne) [1816752]\n- [nvme] nvme-fc: clarify error messages (Ewan Milne) [1816752]\n- [nvme] nvme-fc: fix module unloads while lports still pending (Ewan Milne) [1816752]\n- [scsi] scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (Ewan Milne) [1816307]\n- [scsi] scsi: core: Fix a compiler warning triggered by the SCSI logging code (Ewan Milne) [1816307]\n- [scsi] scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (Ewan Milne) [1816307]\n- [scsi] scsi: core: scsi_trace: Use get_unaligned_be*() (Ewan Milne) [1816307]\n- [scsi] scsi: core: try to get module before removing device (Ewan Milne) [1816307]\n- [scsi] scsi: scsi_dh_alua: handle RTPG sense code correctly during state transitions (Ewan Milne) [1816307]\n- [scsi] scsi: device_handler: remove VLAs (Ewan Milne) [1816307]\n- [scsi] scsi: scsi_dh: Document alua_rtpg_queue() arguments (Ewan Milne) [1816307]\n- [scsi] scsi: scsi_dh_alua: skip RTPG for devices only supporting active/optimized (Ewan Milne) [1816307]\n- [scsi] scsi: scsi_dh_emc: return success in clariion_std_inquiry() (Ewan Milne) [1816307]\n- [target] scsi: target: iscsi: rename some variables to avoid confusion (Maurizio Lombardi) [1806966]\n- [target] scsi: target: iscsi: tie the challenge length to the hash digest size (Maurizio Lombardi) [1806966]\n- [target] scsi: target: iscsi: CHAP: add support for SHA1, SHA256 and SHA3-256 (Maurizio Lombardi) [1806966]\n- [target] scsi: target: compare full CHAP_A Algorithm strings (Maurizio Lombardi) [1806966]\n- [base] device_release() can call device_rh_free() too (Christoph von Recklinghausen) [1793248]\n- [nvdimm] driver boilerplate changes to properly manage device_rh (Christoph von Recklinghausen) [1793248]\n- [base] Add an interface for certain drivers who manage their own struct devices to disassociate their device_rhs (Christoph von Recklinghausen) [1793248]\n- [base] kfree(dev->device_rh) in device_create_release() (Christoph von Recklinghausen) [1793248]\n- [base] kfree and zero device_rh in device_release() (Christoph von Recklinghausen) [1793248]\n- [input] Revert 'Fix device_rh memory leak' (Christoph von Recklinghausen) [1793248]\n- [scsi] Revert 'Fix device_rh leak in scsi_alloc_target()' (Christoph von Recklinghausen) [1793248]\n- [scsi] Revert 'Fix memory leaks in scsi_alloc_sdev()' (Christoph von Recklinghausen) [1793248]\n- [nvdimm] libnvdimm/security: Consolidate 'security' operations (Jeff Moyer) [1735364]\n- [nvdimm] libnvdimm/security: Tighten scope of nvdimm->busy vs security operations (Jeff Moyer) [1735364]\n- [nvdimm] libnvdimm/security: Introduce a 'frozen' attribute (Jeff Moyer) [1735364]\n- [acpi] libnvdimm/security, acpi/nfit: unify zero-key for all security commands (Jeff Moyer) [1735364]\n- [nvdimm] libnvdimm/security: provide fix for secure-erase to use zero-key (Jeff Moyer) [1735364]\n- [block] block: fix checking return value of blk_mq_init_queue (Maxim Levitsky) [1795777]\n- [bluetooth] Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto() (Aristeu Rozanski) [1808803] {CVE-2019-15917}\n[3.10.0-1131]\n- [x86] kvm: x86: clear stale x86_emulate_ctxt->intercept value (Jon Maloy) [1806818] {CVE-2020-2732}\n- [x86] kvm: vmx: check descriptor table exits on instruction emulation (Jon Maloy) [1806818] {CVE-2020-2732}\n- [x86] kvm: nvmx: Check IO instruction VM-exit conditions (Jon Maloy) [1806818] {CVE-2020-2732}\n- [x86] kvm: nvmx: Refactor IO bitmap checks into helper function (Jon Maloy) [1806818] {CVE-2020-2732}\n- [x86] kvm: nvmx: Dont emulate instructions in guest mode (Jon Maloy) [1806818] {CVE-2020-2732}\n- [x86] kvm: x86: Fix kvm_bitmap_or_dest_vcpus() to use irq shorthand (Nitesh Narayan Lal) [1772082]\n- [x86] kvm: x86: Initializing all kvm_lapic_irq fields in ioapic_write_indirect (Nitesh Narayan Lal) [1772082]\n- [virt] kvm: x86: remove set but not used variable 'called' (Nitesh Narayan Lal) [1772082]\n- [x86] kvm: x86: Zero the IOAPIC scan request dest vCPUs bitmap (Nitesh Narayan Lal) [1772082]\n- [x86] kvm: x86: deliver KVM IOAPIC scan request to target vCPUs (Nitesh Narayan Lal) [1772082]\n- [kernel] kvm: remember position in kvm->vcpus array (Nitesh Narayan Lal) [1772082]\n- [x86] kvm: x86: Drop KVM_APIC_SHORT_MASK and KVM_APIC_DEST_MASK (Nitesh Narayan Lal) [1772082]\n- [virt] kvm: introduce kvm_make_vcpus_request_mask() API (Nitesh Narayan Lal) [1772082]\n- [virt] kvm: avoid unused variable warning for UP builds (Nitesh Narayan Lal) [1772082]\n- [kernel] smp, cpumask: Use non-atomic cpumask_{set, clear}_cpu() (Nitesh Narayan Lal) [1772082]\n- [fs] nfs: change sign of nfs_fh length ('J. Bruce Fields') [1813326]\n- [netdrv] ibmvnic: Do not process device remove during device reset (Steve Best) [1813903]\n- [x86] x86/debug: Extend the lower bound of crash kernel low reservations (Pingfan Liu) [1811511]\n- [net] tcp: make tcp_space() aware of socket backlog (Guillaume Nault) [1790840]\n- [net] ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup (Sabrina Dubroca) [1774447] {CVE-2020-1749}\n- [net] ipv6: add net argument to ip6_dst_lookup_flow (Sabrina Dubroca) [1774447] {CVE-2020-1749}\n- [net] ipv6: constify ip6_dst_lookup_{flow|tail}() sock arguments (Sabrina Dubroca) [1774447] {CVE-2020-1749}\n- [net] macvlan: return correct error value (Matteo Croce) [1654878]\n- [net] ieee802154: enforce CAP_NET_RAW for raw sockets (Andrea Claudi) [1779494] {CVE-2019-17053}\n- [net] ipv4: fix fnhe usage by non-cached routes (Hangbin Liu) [1788435]\n- [net] route: do not cache fib route info on local routes with oif (Hangbin Liu) [1788435]\n- [net] ip6_tunnel: fix potential NULL pointer dereference (Hangbin Liu) [1767045]\n- [net] net_sched: remove a bogus warning in hfsc (Davide Caratti) [1781323]\n- [netdrv] net/mlx5e: allow TSO on VXLAN over VLAN topologies (Davide Caratti) [1780646]\n[3.10.0-1130]\n- [scsi] scsi: avoid repetitive logging of device offline messages (Nilesh Javali) [1798042]\n- [scsi] qla2xxx: Fix I/Os being passed down when FC device is being deleted (Nilesh Javali) [1798042]\n- [scsi] scsi: qla2xxx: Fix unbound sleep in fcport delete path (Nilesh Javali) [1798042]\n- [scsi] scsi: qla2xxx: Fix hang in fcport delete path (Nilesh Javali) [1798042]\n- [scsi] scsi: qla2xxx: Fix stuck session in GNL (Nilesh Javali) [1798042]\n- [scsi] scsi: qla2xxx: Correct fcport flags handling (Nilesh Javali) [1798042]\n- [scsi] scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (Nilesh Javali) [1798042]\n- [scsi] iscsi: Avoid potential deadlock in iscsi_if_rx func (Oleksandr Natalenko) [1715986]\n- [netdrv] hv/netvsc: Fix NULL dereference at single queue mode fallback (Mohammed Gamal) [1806488]\n- [netdrv] hv/netvsc: fix handling of fallback to single queue mode (Mohammed Gamal) [1806488]\n- [netdrv] hv_netvsc: Fix unwanted rx_table reset (Mohammed Gamal) [1806488]\n- [netdrv] hv_netvsc: Fix tx_table init in rndis_set_subchannel() (Mohammed Gamal) [1806488]\n- [netdrv] hv_netvsc: fix typos in code comments (Mohammed Gamal) [1806488]\n- [netdrv] hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (Mohammed Gamal) [1806488]\n- [netdrv] hv_netvsc: Fix hash key value reset after other ops (Mohammed Gamal) [1806488]\n- [netdrv] hv_netvsc: Refactor assignments of struct netvsc_device_info (Mohammed Gamal) [1806488]\n- [netdrv] hv_netvsc: split sub-channel setup into async and sync (Mohammed Gamal) [1806488]\n- [netdrv] hv_netvsc: Fix send_table offset in case of a host bug (Mohammed Gamal) [1806488]\n- [netdrv] hv_netvsc: Add NetVSP v6 and v6.1 into version negotiation (Mohammed Gamal) [1806488]\n- [netdrv] hv_netvsc: Fix offset usage in netvsc_send_table() (Mohammed Gamal) [1806488]\n- [netdrv] hv_netvsc: simplify receive side calling arguments (Mohammed Gamal) [1806488]\n- [scsi] scsi: ibmvfc: Fix NULL return compiler warning (Steve Best) [1810643]\n- [scsi] scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (Steve Best) [1810643]\n- [s390] s390/vdso: add vdso support for coarse clocks (Philipp Rudo) [1791822]\n- [s390] s390/vdso: remove NULL pointer check from clock_gettime (Philipp Rudo) [1791822]\n- [s390] scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (Philipp Rudo) [1804807]\n[3.10.0-1129]\n- [tools] perf header: Use last modification time for timestamp (Michael Petlan) [1789947]\n- [tools] perf header: Fix up argument to ctime() (Michael Petlan) [1789947]\n- [hid] HID: multitouch: Add pointstick support for ALPS Touchpad (Benjamin Tissoires) [1672425]\n- [kernel] blktrace: fix dereference after null check (Ming Lei) [1798318] {CVE-2019-19768}\n- [kernel] blktrace: Protect q->blk_trace with RCU (Ming Lei) [1798318] {CVE-2019-19768}\n- [kernel] blktrace: fix trace mutex deadlock (Ming Lei) [1798318] {CVE-2019-19768}\n- [kernel] blktrace: fix unlocked registration of tracepoints (Ming Lei) [1798318] {CVE-2019-19768}\n- [kernel] blktrace: fix unlocked access to init/start-stop/teardown (Ming Lei) [1798318] {CVE-2019-19768}\n- [kernel] tracing: Handle NULL formats in hold_module_trace_bprintk_format() (Oleksandr Natalenko) [1811565]\n- [kernel] tracing: Fix trace_printk() to print when not using bprintk() (Oleksandr Natalenko) [1811565]\n- [sound] ALSA: timer: Fix incorrectly assigned timer instance (Jaroslav Kysela) [1798457] {CVE-2019-19807}\n- [x86] kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332) (Philippe Mathieu-Daud) [1783455] {CVE-2019-19332}\n- [x86] kvm: x86: do not reset microcode version on INIT or RESET (Paolo Bonzini) [1801852]\n- [x86] kvm: x86: list MSR_IA32_UCODE_REV as an emulated MSR (Paolo Bonzini) [1801852]\n- [x86] kvm: x86: Allow userspace to define the microcode version (Paolo Bonzini) [1801852]\n[3.10.0-1128]\n- [fs] ceph: only use d_name directly when parent is locked (Jeff Layton) [1699402]\n- [fs] ext4: work around deleting a file with i_nlink == 0 safely (Carlos Maiolino) [1801046]\n- [fs] xfs: attach dquots and reserve quota blocks during unwritten conversion (Carlos Maiolino) [1786005]\n- [fs] Revert 'xfs: attach dquots and reserve quota blocks during unwritten conversion' (Carlos Maiolino) [1786005]\n- [md] dm mpath: call clear_request_fn_mpio() in multipath_release_clone() (Mike Snitzer) [1806400]\n- [scsi] scsi: implement .cleanup_rq callback (Mike Snitzer) [1806400]\n- [md] blk-mq: add callback of .cleanup_rq (Mike Snitzer) [1806400]\n- [target] target: call init_timer_on_stack() to initialize login_timer (Maurizio Lombardi) [1810037]\n- [scsi] scsi: megaraid_sas: fixup MSIx interrupt setup during resume (Tomas Henzl) [1807077]\n- [tools] selftests/livepatch: Test interaction with ftrace_enabled (Yannick Cote) [1806653]\n- [tools] selftests/livepatch: Make dynamic debug setup and restore generic (Yannick Cote) [1806653]\n- [kernel] ftrace: Introduce PERMANENT ftrace_ops flag (Yannick Cote) [1806653]\n- [tools] selftests/livepatch: push and pop dynamic debug config (Yannick Cote) [1806653]", "edition": 1, "modified": "2020-10-06T00:00:00", "published": "2020-10-06T00:00:00", "id": "ELSA-2020-4060", "href": "http://linux.oracle.com/errata/ELSA-2020-4060.html", "title": "kernel security, bug fix, and enhancement update", "type": "oraclelinux", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "cloudfoundry": [{"lastseen": "2020-06-22T21:26:16", "bulletinFamily": "software", "cvelist": ["CVE-2020-11494", "CVE-2020-11565", "CVE-2020-11669", "CVE-2020-12657"], "description": "# \n\n## Severity\n\nMedium\n\n## Vendor\n\nCanonical Ubuntu\n\n## Versions Affected\n\n * Canonical Ubuntu 16.04\n\n## Description\n\nIt was discovered that the Serial CAN interface driver in the Linux kernel did not properly initialize data. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate certain mount options to the tmpfs virtual memory file system. A local attacker with the ability to specify mount options could use this to cause a denial of service (system crash). (CVE-2020-11565)\n\nDavid Gibson discovered that the Linux kernel on Power9 CPUs did not properly save and restore Authority Mask registers state in some situations. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2020-11669)\n\nIt was discovered that the block layer in the Linux kernel contained a race condition leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2020-12657)\n\nCVEs contained in this USN include: CVE-2020-11494, CVE-2020-11565, CVE-2020-11669, CVE-2020-12657.\n\n## Affected Cloud Foundry Products and Versions\n\n_Severity is medium unless otherwise noted._\n\n * Xenial Stemcells \n * 170.x versions prior to 170.220\n * 250.x versions prior to 250.199\n * 315.x versions prior to 315.184\n * 456.x versions prior to 456.113\n * 621.x versions prior to 621.75\n * All other stemcells not listed.\n\n## Mitigation\n\nUsers of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:\n\n * Xenial Stemcells \n * Upgrade 170.x versions to 170.220 or greater\n * Upgrade 250.x versions to 250.199 or greater\n * Upgrade 315.x versions to 315.184 or greater\n * Upgrade 456.x versions to 456.113 or greater\n * Upgrade 621.x versions to 621.75 or greater\n * All other stemcells should be upgraded to the latest version available on [bosh.io](<https://bosh.io/stemcells>).\n\n## References\n\n * [USN Notice](<https://usn.ubuntu.com/4363-1/>)\n * [CVE-2020-11494](<https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11494>)\n * [CVE-2020-11565](<https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11565>)\n * [CVE-2020-11669](<https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11669>)\n * [CVE-2020-12657](<https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12657>)\n\n## History\n\n2020-05-18: Initial vulnerability report published.\n", "edition": 1, "modified": "2020-06-22T00:00:00", "published": "2020-06-22T00:00:00", "id": "CFOUNDRY:9BF498B2FAF35AA57F2C51B7E395428D", "href": "https://www.cloudfoundry.org/blog/usn-4363-1/", "title": "USN-4363-1: Linux kernel vulnerabilities | Cloud Foundry", "type": "cloudfoundry", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}], "slackware": [{"lastseen": "2020-10-25T16:35:54", "bulletinFamily": "unix", "cvelist": ["CVE-2018-9517", "CVE-2019-19319", "CVE-2019-19768", "CVE-2020-0543", "CVE-2020-10690", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10942", "CVE-2020-11494", "CVE-2020-11565", "CVE-2020-11608", "CVE-2020-11609", "CVE-2020-11668", "CVE-2020-12464", "CVE-2020-12769", "CVE-2020-12770", "CVE-2020-12826", "CVE-2020-13143", "CVE-2020-1749"], "description": "New kernel packages are available for Slackware 14.2 to fix security issues.\n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n\npatches/packages/linux-4.4.227/*: Upgraded.\n These updates fix various bugs and security issues, including a mitigation\n for SRBDS (Special Register Buffer Data Sampling). SRBDS is an MDS-like\n speculative side channel that can leak bits from the random number generator\n (RNG) across cores and threads.\n Be sure to upgrade your initrd after upgrading the kernel packages.\n If you use lilo to boot your machine, be sure lilo.conf points to the correct\n kernel and initrd and run lilo as root to update the bootloader.\n If you use elilo to boot your machine, you should run eliloconfig to copy the\n kernel and initrd to the EFI System Partition.\n For more information, see:\n Fixed in 4.4.218:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942\n Fixed in 4.4.219:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565\n Fixed in 4.4.220:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826\n Fixed in 4.4.221:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464\n Fixed in 4.4.222:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751\n Fixed in 4.4.224:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12769\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770\n Fixed in 4.4.225:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9517\n Fixed in 4.4.226:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732\n Fixed in 4.4.227:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated packages for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.227/kernel-generic-4.4.227-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.227/kernel-generic-smp-4.4.227_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.227/kernel-headers-4.4.227_smp-x86-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.227/kernel-huge-4.4.227-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.227/kernel-huge-smp-4.4.227_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.227/kernel-modules-4.4.227-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.227/kernel-modules-smp-4.4.227_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.227/kernel-source-4.4.227_smp-noarch-1.txz\n\nUpdated packages for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.227/kernel-generic-4.4.227-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.227/kernel-headers-4.4.227-x86-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.227/kernel-huge-4.4.227-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.227/kernel-modules-4.4.227-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.227/kernel-source-4.4.227-noarch-1.txz\n\n\nMD5 signatures:\n\nSlackware 14.2 packages:\n9a40d88eccfd6fd52ff545cefe86f87b kernel-generic-4.4.227-i586-1.txz\nc13f5fa4ef1e1b205b55b8200a82164d kernel-generic-smp-4.4.227_smp-i686-1.txz\n98070c7ae594d9cd3c5a7d2a81aefb79 kernel-headers-4.4.227_smp-x86-1.txz\n1411df7a758aa56ab7352ab251c33187 kernel-huge-4.4.227-i586-1.txz\nedae1a14db491ed3704e97cb5f78e846 kernel-huge-smp-4.4.227_smp-i686-1.txz\n4f0b746f0eda80865a5507485f220c8c kernel-modules-4.4.227-i586-1.txz\nbc4c4a2c3cfb5c51457965dc95d44331 kernel-modules-smp-4.4.227_smp-i686-1.txz\n3dfd157f38293392f5ca8ce935e70b8c kernel-source-4.4.227_smp-noarch-1.txz\n\nSlackware x86_64 14.2 packages:\n6c8ff864c67d0f5d47b1ed13a81fc912 kernel-generic-4.4.227-x86_64-1.txz\n2a768057dd773822621dfcf069e6edea kernel-headers-4.4.227-x86-1.txz\n25480853bc1c014faed7285517aaa1b1 kernel-huge-4.4.227-x86_64-1.txz\n832fe6fa4b00c166f9467208c1e47d9d kernel-modules-4.4.227-x86_64-1.txz\n3b83ef123fbc7fe8b5d7957f1a08c3e4 kernel-source-4.4.227-noarch-1.txz\n\n\nInstallation instructions:\n\nUpgrade the packages as root:\n > upgradepkg kernel-*.txz\n\nIf you are using an initrd, you'll need to rebuild it.\n\nFor a 32-bit SMP machine, use this command (substitute the appropriate\nkernel version if you are not running Slackware 14.2):\n > /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.227-smp | bash\n\nFor a 64-bit machine, or a 32-bit uniprocessor machine, use this command\n(substitute the appropriate kernel version if you are not running\nSlackware 14.2):\n > /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.227 | bash\n\nPlease note that \"uniprocessor\" has to do with the kernel you are running,\nnot with the CPU. Most systems should run the SMP kernel (if they can)\nregardless of the number of cores the CPU has. If you aren't sure which\nkernel you are running, run \"uname -a\". If you see SMP there, you are\nrunning the SMP kernel and should use the 4.4.227-smp version when running\nmkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit\nsystems should always use 4.4.227 as the version.\n\nIf you are using lilo or elilo to boot the machine, you'll need to ensure\nthat the machine is properly prepared before rebooting.\n\nIf using LILO:\nBy default, lilo.conf contains an image= line that references a symlink\nthat always points to the correct kernel. No editing should be required\nunless your machine uses a custom lilo.conf. If that is the case, be sure\nthat the image= line references the correct kernel file. Either way,\nyou'll need to run \"lilo\" as root to reinstall the boot loader.\n\nIf using elilo:\nEnsure that the /boot/vmlinuz symlink is pointing to the kernel you wish\nto use, and then run eliloconfig to update the EFI System Partition.", "modified": "2020-06-11T21:36:19", "published": "2020-06-11T21:36:19", "id": "SSA-2020-163-01", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890", "type": "slackware", "title": "[slackware-security] Slackware 14.2 kernel", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2020-06-13T11:22:32", "bulletinFamily": "unix", "cvelist": ["CVE-2020-10711", "CVE-2020-12659", "CVE-2019-19462", "CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12656", "CVE-2018-1000199", "CVE-2020-11609", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10690", "CVE-2020-12654", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-12653", "CVE-2020-11608", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-12652", "CVE-2020-10757", "CVE-2020-12655", "CVE-2020-12657"], "description": "The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other than\n the one which called it. This attack is known as Special Register Buffer\n Data Sampling (SRBDS) or "CrossTalk" (bsc#1154824).\n - CVE-2018-1000199: Fixed a potential local code execution via ptrace\n (bsc#1089895).\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to\n cause a denial of service (such as relay blockage) by triggering a NULL\n alloc_percpu result (bnc#1158265).\n - CVE-2019-20806: Fixed a null pointer dereference in\n tw5864_handle_frame() which may had lead to denial of service\n (bsc#1172199).\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU\n consumption and soft lockup) in a certain failure case involving\n TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n - CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\n video driver. This could lead to local information disclosure with\n System execution privileges needed (bsc#1170345).\n - CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev\n (bsc#1170056).\n - CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem\n which could have allowed a remote network user to crash the kernel\n resulting in a denial of service (bsc#1171191).\n - CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n (bsc#1170778).\n - CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\n uninitialized data (bsc#1171220).\n - CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\n where it was assumed that an skb would only contain a single netlink\n message (bsc#1171189).\n - CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap\n could have caused user PTE access (bsc#1172317).\n - CVE-2020-11608: An issue was discovered in\n drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences\n in ov511_mode_init_regs and ov518_mode_init_regs when there are zero\n endpoints, aka CID-998912346c0d (bnc#1168829).\n - CVE-2020-11609: An issue was discovered in the stv06xx subsystem in\n drivers/media/usb/gspca/stv06xx/stv06xx.c and\n drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid\n descriptors, as demonstrated by a NULL pointer dereference, aka\n CID-485b06aadb93 (bnc#1168854).\n - CVE-2020-12114: Fixed a pivot_root race condition which could have\n allowed local users to cause a denial of service (panic) by corrupting a\n mountpoint reference counter (bsc#1171098).\n - CVE-2020-12464: Fixed a use-after-free due to a transfer without a\n reference (bsc#1170901).\n - CVE-2020-12652: Fixed an issue which could have allowed local users to\n hold an incorrect lock during the ioctl operation and trigger a race\n condition (bsc#1171218).\n - CVE-2020-12653: Fixed an issue in the wifi driver which could have\n allowed local users to gain privileges or cause a denial of service\n (bsc#1171195).\n - CVE-2020-12654: Fixed an issue in he wifi driver which could have\n allowed a remote AP to trigger a heap-based buffer overflow\n (bsc#1171202).\n - CVE-2020-12655: Fixed an issue which could have allowed attackers to\n trigger a sync of excessive duration via an XFS v5 image with crafted\n metadata (bsc#1171217).\n - CVE-2020-12656: Fixed an improper handling of certain domain_release\n calls leadingch could have led to a memory leak (bsc#1171219).\n - CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n - CVE-2020-12659: Fixed an out-of-bounds write (by a user with the\n CAP_NET_ADMIN capability) due to improper headroom validation\n (bsc#1171214).\n - CVE-2020-12769: Fixed an issue which could have allowed attackers to\n cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one\n (bsc#1171983).\n - CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store\n in drivers/usb/gadget/configfs.c (bsc#1171982).\n\n The following non-security bugs were fixed:\n\n - ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe()\n (bsc#1051510).\n - ACPI: sysfs: Fix reference count leak in\n acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n - acpi/x86: ignore unspecified bit positions in the ACPI global lock field\n (bsc#1051510).\n - Add br_netfilter to kernel-default-base (bsc#1169020)\n - agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n - ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n - ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256\n (bsc#1051510).\n - ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n - ALSA: hda: Add driver blacklist (bsc#1051510).\n - ALSA: hda: Always use jackpoll helper for jack update after resume\n (bsc#1051510).\n - ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n - ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n - ALSA: hda: Explicitly permit using autosuspend if runtime PM is\n supported (bsc#1051510).\n - ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n - ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n - ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops\n (bsc#1051510).\n - ALSA: hda: Keep the controller initialization even if no codecs found\n (bsc#1051510).\n - ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n - ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround\n (bsc#1172017).\n - ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA\n (git-fixes).\n - ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n - ALSA: hda/realtek - Add more fixup entries for Clevo machines\n (git-fixes).\n - ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n - ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n - ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n - ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n - ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295\n (git-fixes).\n - ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295\n (git-fixes).\n - ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295\n (git-fixes).\n - ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n - ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n - ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme\n (bsc#1111666).\n - ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n - ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes\n bsc#1171293).\n - ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n - ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n - ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n - ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n - ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n - ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio\n option (git-fixes).\n - ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n - ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n - ALSA: pcm: oss: Place the plugin buffer overflow checks correctly\n (bsc#1170522).\n - ALSA: rawmidi: Fix racy buffer resize under concurrent accesses\n (git-fixes).\n - ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n - ALSA: usb-audio: Add control message quirk delay for Kingston HyperX\n headset (git-fixes).\n - ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n - ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n - ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n - ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos\n (bsc#1051510).\n - ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen\n (bsc#1051510).\n - ALSA: usb-audio: Check mapping at creating connector controls, too\n (bsc#1051510).\n - ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n - ALSA: usb-audio: Do not create jack controls for PCM terminals\n (bsc#1051510).\n - ALSA: usb-audio: Do not override ignore_ctl_error value from the map\n (bsc#1051510).\n - ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n - ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif\n (bsc#1051510).\n - ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC\n (git-fixes).\n - ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio\n (git-fixes).\n - ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n - ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry\n (bsc#1051510).\n - ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n - ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n - ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n - ASoC: fix regwmask (bsc#1051510).\n - ASoC: msm8916-wcd-digital: Reset RX interpolation path after use\n (bsc#1051510).\n - ASoC: samsung: Prevent clk_get_rate() calls in atomic context\n (bsc#1111666).\n - ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n - ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n - b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n - batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n - batman-adv: Fix refcnt leak in batadv_show_throughput_override\n (git-fixes).\n - batman-adv: Fix refcnt leak in batadv_store_throughput_override\n (git-fixes).\n - batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n - bcache: avoid unnecessary btree nodes flushing in btree_flush_write()\n (git fixes (block drivers)).\n - bcache: fix incorrect data type usage in btree_flush_write() (git fixes\n (block drivers)).\n - bcache: Revert "bcache: shrink btree node cache after bch_btree_check()"\n (git fixes (block drivers)).\n - blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n - blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n - block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n - block: drbd: remove a stray unlock in __drbd_send_protocol()\n (bsc#1171599).\n - block: fix busy device checking in blk_drop_partitions again\n (bsc#1171948).\n - block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n - block: fix memleak of bio integrity data (git fixes (block drivers)).\n - block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n - bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets()\n (networking-stable-20_03_28).\n - bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF\n (bsc#1104745).\n - bnxt_en: reinitialize IRQs when MTU is modified\n (networking-stable-20_03_14).\n - bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n - bnxt_en: Return error when allocating zero size context memory\n (bsc#1104745).\n - bonding/alb: make sure arp header is pulled before accessing it\n (networking-stable-20_03_14).\n - bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n - bpf: Forbid XADD on spilled pointers for unprivileged users\n (bsc#1083647).\n - brcmfmac: abort and release host after error (bsc#1051510).\n - btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n - btrfs: fix log context list corruption after rename whiteout error\n (bsc#1172342).\n - btrfs: fix partial loss of prealloc extent past i_size after fsync\n (bsc#1172343).\n - btrfs: relocation: add error injection points for cancelling balance\n (bsc#1171417).\n - btrfs: relocation: Check cancel request after each data page read\n (bsc#1171417).\n - btrfs: relocation: Check cancel request after each extent found\n (bsc#1171417).\n - btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to\n prevent runaway balance (bsc#1171417).\n - btrfs: relocation: Fix reloc root leakage and the NULL pointer reference\n caused by the leakage (bsc#1171417).\n - btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n - btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent\n runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n - btrfs: reloc: fix reloc root leak and NULL pointer dereference\n (bsc#1171417 bsc#1160947 bsc#1172366).\n - btrfs: setup a nofs context for memory allocation at btrfs_create_tree()\n (bsc#1172127).\n - btrfs: setup a nofs context for memory allocation at __btrfs_set_acl\n (bsc#1172127).\n - btrfs: use nofs context when initializing security xattrs to avoid\n deadlock (bsc#1172127).\n - can: add missing attribute validation for termination\n (networking-stable-20_03_14).\n - cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n - cdc-acm: introduce a cool down (git-fixes).\n - ceph: check if file lock exists before sending unlock request\n (bsc#1168789).\n - ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n - ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n - ceph: fix endianness bug when handling MDS session feature bits\n (bsc#1171695).\n - cgroup, netclassid: periodically release file_lock on classid updating\n (networking-stable-20_03_14).\n - cifs: Allocate crypto structures on the fly for calculating signatures\n of incoming packets (bsc#1144333).\n - cifs: Allocate encryption header through kmalloc (bsc#1144333).\n - cifs: allow unlock flock and OFD lock across fork (bsc#1144333).\n - cifs: check new file size when extending file by fallocate (bsc#1144333).\n - cifs: cifspdu.h: Replace zero-length array with flexible-array member\n (bsc#1144333).\n - cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n - cifs: do not share tcons with DFS (bsc#1144333).\n - cifs: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n - cifs: ensure correct super block for DFS reconnect (bsc#1144333).\n - cifs: Fix bug which the return value by asynchronous read is error\n (bsc#1144333).\n - cifs: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n - cifs: improve read performance for page size 64KB & cache=strict &\n vers=2.1+ (bsc#1144333).\n - cifs: Increment num_remote_opens stats counter even in case of\n smb2_query_dir_first (bsc#1144333).\n - cifs: minor update to comments around the cifs_tcp_ses_lock mutex\n (bsc#1144333).\n - cifs: protect updating server->dstaddr with a spinlock (bsc#1144333).\n - cifs: smb2pdu.h: Replace zero-length array with flexible-array member\n (bsc#1144333).\n - cifs: smbd: Calculate the correct maximum packet size for segmented\n SMBDirect send/receive (bsc#1144333).\n - cifs: smbd: Check and extend sender credits in interrupt context\n (bsc#1144333).\n - cifs: smbd: Check send queue size before posting a send (bsc#1144333).\n - cifs: smbd: Do not schedule work to send immediate packet on every\n receive (bsc#1144333).\n - cifs: smbd: Merge code to track pending packets (bsc#1144333).\n - cifs: smbd: Properly process errors on ib_post_send (bsc#1144333).\n - cifs: smbd: Update receive credits before sending and deal with credits\n roll back on failure before sending (bsc#1144333).\n - cifs: Warn less noisily on default mount (bsc#1144333).\n - clk: Add clk_hw_unregister_composite helper function definition\n (bsc#1051510).\n - clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n - clk: imx: make mux parent strings const (bsc#1051510).\n - clk: mediatek: correct the clocks for MT2701 HDMI PHY module\n (bsc#1051510).\n - clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n - clocksource/drivers/hyper-v: Set TSC clocksource as default w/\n InvariantTSC (bsc#1170620, bsc#1170621).\n - clocksource: dw_apb_timer_of: Fix missing clockevent timers\n (bsc#1051510).\n - component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n - coresight: do not use the BIT() macro in the UAPI header (git fixes\n (block drivers)).\n - cpufreq: s3c64xx: Remove pointless NULL check in\n s3c64xx_cpufreq_driver_init (bsc#1051510).\n - crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n - crypto: ccp - Clean up and exit correctly on allocation failure\n (git-fixes).\n - crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n - crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n - cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n - cxgb4: fix Txq restart check during backpressure (bsc#1127354\n bsc#1127371).\n - debugfs: Add debugfs_create_xul() for hexadecimal unsigned long\n (git-fixes).\n - debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n - devlink: fix return value after hitting end in region read (bsc#1109837).\n - devlink: validate length of param values (bsc#1109837).\n - devlink: validate length of region addr/len (bsc#1109837).\n - dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n - dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n - dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n - dm writecache: fix data corruption when reloading the target (git fixes\n (block drivers)).\n - dm writecache: fix incorrect flush sequence when doing SSD mode commit\n (git fixes (block drivers)).\n - dm writecache: verify watermark during resume (git fixes (block\n drivers)).\n - dm zoned: fix invalid memory access (git fixes (block drivers)).\n - dm zoned: reduce overhead of backing device checks (git fixes (block\n drivers)).\n - dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git\n fixes (block drivers)).\n - dm zoned: support zone sizes smaller than 128MiB (git fixes (block\n drivers)).\n - dp83640: reverse arguments to list_add_tail (git-fixes).\n - drivers: hv: Add a module description line to the hv_vmbus driver\n (bsc#1172249, bsc#1172251).\n - drivers/net/ibmvnic: Update VNIC protocol version reporting\n (bsc#1065729).\n - drivers: w1: add hwmon support structures (jsc#SLE-11048).\n - drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n - drivers: w1: refactor w1_slave_show to make the temp reading\n functionality separate (jsc#SLE-11048).\n - drm: amd/acp: fix broken menu structure (bsc#1114279)\n - drm/amdgpu: Correctly initialize thermal controller for GPUs with\n Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n - drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n - drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is\n (bsc#1113956)\n - drm/atomic: Take the atomic toys away from X (bsc#1112178) * \ncontext\n changes\n - drm/crc: Actually allow to change the crc source (bsc#1114279) * offset\n changes\n - drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n - drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n - drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n - drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n - drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n - drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround\n (bsc#1112178)\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of\n (bsc#1114279)\n - drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178)\n - drm/i915: properly sanity check batch_start_offset (bsc#1114279)\n - drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n - drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem\n (bsc#1114279)\n - drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n - drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n - drm/qxl: qxl_release use after free (bsc#1051510).\n - drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279)\n - drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n - drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n - drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956)\n - drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956)\n - dump_stack: avoid the livelock of the dump_lock (git fixes (block\n drivers)).\n - EDAC, sb_edac: Add support for systems with segmented PCI buses\n (bsc#1169525).\n - ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n - ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n - ext4: use non-movable memory for superblock readahead (bsc#1171952).\n - fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n - fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279)\n - fib: add missing attribute validation for tun_id\n (networking-stable-20_03_14).\n - firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n - Fix a backport bug, where btrfs_put_root() -> btrfs_put_fs_root()\n modification is not needed due to missing dependency\n - Following two patches needs to be combined as one commit (one adds\n context, later removes which affects existing patch) else commit series\n cannot be sequenced.\n - fpga: dfl: afu: Corrected error handling levels (git-fixes).\n - fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n - fs/seq_file.c: simplify seq_file iteration code and interface\n (bsc#1170125).\n - gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n - gre: fix uninit-value in __iptunnel_pull_header\n (networking-stable-20_03_14).\n - HID: hid-input: clear unmapped usages (git-fixes).\n - HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n - HID: i2c-hid: add Trekstor Primebook C11B to descriptor override\n (git-fixes).\n - HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n - HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n - HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices\n (git-fixes).\n - hrtimer: Annotate lockless access to timer->state (git fixes (block\n drivers)).\n - hsr: add restart routine into hsr_get_node_list()\n (networking-stable-20_03_28).\n - hsr: check protocol version in hsr_newlink()\n (networking-stable-20_04_17).\n - hsr: fix general protection fault in hsr_addr_is_self()\n (networking-stable-20_03_28).\n - hsr: set .netnsok flag (networking-stable-20_03_28).\n - hsr: use rcu_read_lock() in hsr_get_node_{list/status}()\n (networking-stable-20_03_28).\n - i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present\n (git-fixes).\n - i2c: acpi: put device when verifying client fails (git-fixes).\n - i2c: brcmstb: remove unused struct member (git-fixes).\n - i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n - i2c: core: decrease reference count of device node in\n i2c_unregister_device (git-fixes).\n - i2c: dev: Fix the race between the release of i2c_dev and cdev\n (bsc#1051510).\n - i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n - i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array\n (git-fixes).\n - i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n - i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n - i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n - i2c: mux: demux-pinctrl: Fix an error handling path in\n 'i2c_demux_pinctrl_probe()' (bsc#1051510).\n - i2c: st: fix missing struct parameter description (bsc#1051510).\n - IB/mlx5: Fix missing congestion control debugfs on rep rdma device\n (bsc#1103991).\n - ibmvnic: Skip fatal error reset after passive init (bsc#1171078\n ltc#184239).\n - iio:ad7797: Use correct attribute_group (bsc#1051510).\n - iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n - iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n - iio: adc: stm32-adc: Use dma_request_chan() instead\n dma_request_slave_channel() (bsc#1051510).\n - iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()'\n (bsc#1051510).\n - iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).\n - iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n - iio: xilinx-xadc: Fix clearing interrupt when enabling trigger\n (bsc#1051510).\n - iio: xilinx-xadc: Fix sequencer configuration for aux channels in\n simultaneous mode (bsc#1051510).\n - ima: Fix return value of ima_write_policy() (git-fixes).\n - input: evdev - call input_flush_device() on release(), not flush()\n (bsc#1051510).\n - input: hyperv-keyboard - add module description (bsc#1172249,\n bsc#1172251).\n - input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n - input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n - input: raydium_i2c_ts - use true and false for boolean values\n (bsc#1051510).\n - input: synaptics-rmi4 - fix error return code in rmi_driver_probe()\n (bsc#1051510).\n - input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n - input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n - input: xpad - add custom init packet for Xbox One S controllers\n (bsc#1051510).\n - iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n - iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n - iommu/amd: Do not loop forever when trying to increase address space\n (bsc#1172098).\n - iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system\n (bsc#1172099).\n - iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n - iommu/amd: Fix race in increase_address_space()/fetch_pte()\n (bsc#1172102).\n - iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n - iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n - ip6_tunnel: Allow rcv/xmit even if remote address is a local address\n (bsc#1166978).\n - ipmi: fix hung processes in __get_guid() (git-fixes).\n - ipv4: fix a RCU-list lock in fib_triestat_seq_show\n (networking-stable-20_04_02).\n - ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface\n (networking-stable-20_03_14).\n - ipv6: do not auto-add link-local address to lag ports\n (networking-stable-20_04_09).\n - ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n - ipv6: Fix nlmsg_flags when splitting a multipath route\n (networking-stable-20_03_01).\n - ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n - ipv6: Fix route replacement with dev-only route\n (networking-stable-20_03_01).\n - ipvlan: add cond_resched_rcu() while processing muticast backlog\n (networking-stable-20_03_14).\n - ipvlan: do not deref eth hdr before checking it's set\n (networking-stable-20_03_14).\n - ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast()\n (networking-stable-20_03_14).\n - iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n - ixgbe: do not check firmware errors (bsc#1170284).\n - kABI fix for early XHCI debug (git-fixes).\n - kabi for for md: improve handling of bio with REQ_PREFLUSH in\n md_flush_request() (git-fixes).\n - kabi/severities: Do not track KVM internal symbols.\n - kabi/severities: Ingnore get_dev_data() The function is internal to the\n AMD IOMMU driver and must not be called by any third party.\n - kABI workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n - keys: reaching the keys quotas correctly (bsc#1051510).\n - KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n - KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n - KVM: Check validity of resolved slot when searching memslots\n (bsc#1172104).\n - KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n - KVM: s390: vsie: Fix possible race when shadowing region 3 tables\n (git-fixes).\n - KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks\n (git-fixes).\n - KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n - KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs\n (bsc#1152489).\n - l2tp: Allow management of tunnels and session in user namespace\n (networking-stable-20_04_17).\n - libata: Remove extra scsi_host_put() in ata_scsi_add_hosts()\n (bsc#1051510).\n - libata: Return correct status in sata_pmp_eh_recover_pm() when\n ATA_DFLAG_DETACH is set (bsc#1051510).\n - lib: raid6: fix awk build warnings (git fixes (block drivers)).\n - lib/raid6/test: fix build on distros whose /bin/sh is not bash (git\n fixes (block drivers)).\n - lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes\n (block drivers)).\n - locks: print unsigned ino in /proc/locks (bsc#1171951).\n - mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n - mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n - mac80211: mesh: fix discovery timer re-arming issue / crash\n (bsc#1051510).\n - macsec: avoid to set wrong mtu (bsc#1051510).\n - macsec: restrict to ethernet devices (networking-stable-20_03_28).\n - macvlan: add cond_resched() during multicast processing\n (networking-stable-20_03_14).\n - macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n - md: improve handling of bio with REQ_PREFLUSH in md_flush_request()\n (git-fixes).\n - md/raid0: Fix an error message in raid0_make_request() (git fixes (block\n drivers)).\n - md/raid10: prevent access of uninitialized resync_pages offset\n (git-fixes).\n - media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n - media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n - media: ti-vpe: cal: fix disable_irqs to only the intended target\n (git-fixes).\n - mei: release me_cl object reference (bsc#1051510).\n - mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n - mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE\n (networking-stable-20_04_09).\n - mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n - mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n - mmc: core: Check request type before completing the request (git-fixes).\n - mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n - mmc: cqhci: Avoid false "cqhci: CQE stuck on" by not open-coding timeout\n loop (git-fixes).\n - mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n - mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n - mmc: meson-gx: simplify interrupt handler (git-fixes).\n - mmc: renesas_sdhi: limit block count to 16 bit for old revisions\n (git-fixes).\n - mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n - mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n - mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n - mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers\n (bsc#1051510).\n - mmc: sdhci: Update the tuning failed messages to pr_debug level\n (git-fixes).\n - mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n - mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card()\n (bsc#1051510).\n - mmc: tmio: fix access width of Block Count Register (git-fixes).\n - mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n - mm: thp: handle page cache THP correctly in PageTransCompoundMap (git\n fixes (block drivers)).\n - mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer\n (bsc#1051510).\n - mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n - mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n - mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n - mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n - mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n - net: bcmgenet: correct per TX/RX ring statistics\n (networking-stable-20_04_27).\n - net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n - net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n - net: dsa: bcm_sf2: Do not register slave MDIO bus with OF\n (networking-stable-20_04_09).\n - net: dsa: bcm_sf2: Ensure correct sub-node is parsed\n (networking-stable-20_04_09).\n - net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n - net: dsa: Fix duplicate frames flooded by learning\n (networking-stable-20_03_28).\n - net: dsa: mv88e6xxx: fix lockup on warm boot\n (networking-stable-20_03_14).\n - net/ethernet: add Google GVE driver (jsc#SLE-10538)\n - net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n - net: fec: validate the new settings in fec_enet_set_coalesce()\n (networking-stable-20_03_14).\n - net: fib_rules: Correctly set table field when table number exceeds 8\n bits (networking-stable-20_03_01).\n - net: fix race condition in __inet_lookup_established() (bsc#1151794).\n - net: fq: add missing attribute validation for orphan mask\n (networking-stable-20_03_14).\n - net: hns3: fix "tc qdisc del" failed issue (bsc#1109837).\n - net, ip_tunnel: fix interface lookup with no key\n (networking-stable-20_04_02).\n - net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin\n (networking-stable-20_04_17).\n - net: ipv6: do not consider routes via gateways for anycast address check\n (networking-stable-20_04_17).\n - netlink: Use netlink header as base to calculate bad attribute offset\n (networking-stable-20_03_14).\n - net: macsec: update SCI upon MAC address change\n (networking-stable-20_03_14).\n - net: memcg: fix lockdep splat in inet_csk_accept()\n (networking-stable-20_03_14).\n - net: memcg: late association of sock to memcg\n (networking-stable-20_03_14).\n - net/mlx4_en: avoid indirect call in TX completion\n (networking-stable-20_04_27).\n - net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n - net/mlx5: Expose link speed directly (bsc#1171118).\n - net/mlx5: Expose port speed when possible (bsc#1171118).\n - net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n - net: mvneta: Fix the case where the last poll did not process all rx\n (networking-stable-20_03_28).\n - net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node\n (networking-stable-20_04_27).\n - net/packet: tpacket_rcv: do not increment ring index on drop\n (networking-stable-20_03_14).\n - net: phy: restore mdio regs in the iproc mdio driver\n (networking-stable-20_03_01).\n - net: qmi_wwan: add support for ASKEY WWHC050\n (networking-stable-20_03_28).\n - net: revert default NAPI poll timeout to 2 jiffies\n (networking-stable-20_04_17).\n - net_sched: cls_route: remove the right filter from hashtable\n (networking-stable-20_03_28).\n - net_sched: sch_skbprio: add message validation to skbprio_change()\n (bsc#1109837).\n - net/x25: Fix x25_neigh refcnt leak when receiving frame\n (networking-stable-20_04_27).\n - nfc: add missing attribute validation for SE API\n (networking-stable-20_03_14).\n - nfc: add missing attribute validation for vendor subcommand\n (networking-stable-20_03_14).\n - nfc: pn544: Fix occasional HW initialization failure\n (networking-stable-20_03_01).\n - NFC: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n - nfp: abm: fix a memory leak bug (bsc#1109837).\n - nfsd4: fix up replay_matches_cache() (git-fixes).\n - nfsd: Ensure CLONE persists data and metadata changes to the target file\n (git-fixes).\n - nfsd: fix delay timer on 32-bit architectures (git-fixes).\n - nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n - nfs: Directory page cache pages need to be locked when read (git-fixes).\n - nfsd: memory corruption in nfsd4_lock() (git-fixes).\n - nfs: Do not call generic_error_remove_page() while holding locks\n (bsc#1170457).\n - nfs: Fix memory leaks and corruption in readdir (git-fixes).\n - nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n - nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n - nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n - NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n - NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n - nfs: Revalidate the file size on a fatal write error (git-fixes).\n - NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals\n (git-fixes).\n - NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n - NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).\n - NFSv4-Fix-OPEN-CLOSE-race.patch\n - NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid()\n (git-fixes).\n - NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n - NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for\n layoutreturn (git-fixes).\n - nl802154: add missing attribute validation for dev_type\n (networking-stable-20_03_14).\n - nl802154: add missing attribute validation (networking-stable-20_03_14).\n - nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n - objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n - objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n - objtool: Make BP scratch register warning more robust (bsc#1169514).\n - padata: Remove broken queue flushing (git-fixes).\n - Partially revert "kfifo: fix kfifo_alloc() and kfifo_init()" (git fixes\n (block drivers)).\n - PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2\n (bsc#1172201, bsc#1172202).\n - PCI: hv: Decouple the func definition in hv_dr_state from VSP message\n (bsc#1172201, bsc#1172202).\n - PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n - perf: Allocate context task_ctx_data for child event (git-fixes).\n - perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n - perf: Copy parent's address filter offsets on clone (git-fixes).\n - perf/core: Add sanity check to deal with pinned event failure\n (git-fixes).\n - perf/core: Avoid freeing static PMU contexts when PMU is unregistered\n (git-fixes).\n - perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n - perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n - perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n - perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n - perf/core: Fix exclusive events' grouping (git-fixes).\n - perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n - perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n - perf/core: Fix locking for children siblings group read (git-fixes).\n - perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes\n (dependent patch for 18736eef1213)).\n - perf/core: Fix perf_event_read_value() locking (git-fixes).\n - perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n - perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent\n patch)).\n - perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n - perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).\n - perf/core: Fix race between close() and fork() (git-fixes).\n - perf/core: Fix the address filtering fix (git-fixes).\n - perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n - perf/core: Force USER_DS when recording user stack data (git-fixes).\n - perf/core: Restore mmap record type correctly (git-fixes).\n - perf: Fix header.size for namespace events (git-fixes).\n - perf/ioctl: Add check for the sample_period value (git-fixes).\n - perf, pt, coresight: Fix address filters for vmas with non-zero offset\n (git-fixes).\n - perf: Return proper values for user stack errors (git-fixes).\n - pinctrl: baytrail: Enable pin configuration setting for GPIO chip\n (git-fixes).\n - pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler\n (git-fixes).\n - pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H\n (git-fixes).\n - platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA\n (bsc#1051510).\n - pnfs: Ensure we do clear the return-on-close layout stateid on fatal\n errors (git-fixes).\n - powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n - powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n - powerpc/setup_64: Set cache-line-size based on cache-block-size\n (bsc#1065729).\n - powerpc/sstep: Fix DS operand in ld encoding to appropriate value\n (bsc#1065729).\n - qede: Fix race between rdma destroy workqueue and link change event\n (networking-stable-20_03_01).\n - r8152: check disconnect status after long sleep\n (networking-stable-20_03_14).\n - raid6/ppc: Fix build for clang (git fixes (block drivers)).\n - random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n - rcu: locking and unlocking need to always be at least barriers (git\n fixes (block drivers)).\n - Redo patch for SLE15-SP1, based on feedback from IBM:\n patches.suse/s390-ftrace-fix-potential-crashes-when-switching-tracers\n (bsc#1171244 LTC#185785 git-fixes).\n - resolve KABI warning for perf-pt-coresight (git-fixes).\n - Revert "ALSA: hda/realtek: Fix pop noise on ALC225" (git-fixes).\n - Revert "drm/panel: simple: Add support for Sharp LQ150X1LG11 panels"\n (bsc#1114279) * offset changes\n - Revert "HID: i2c-hid: add Trekstor Primebook C11B to descriptor\n override" Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was\n also reverted.\n - Revert "HID: i2c-hid: override HID descriptors for certain devices" This\n broke i2c-hid.ko's build, there is no way around it without a big file\n rename or renaming the kernel module.\n - Revert "i2c-hid: properly terminate i2c_hid_dmi_desc_override_table"\n Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n - Revert "ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()"\n (bsc#1172221).\n - Revert "RDMA/cma: Simplify rdma_resolve_addr() error flow" (bsc#1103992).\n - rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n - s390/cio: avoid duplicated 'ADD' uevents (git-fixes).\n - s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n - s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n - s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762\n LTC#185291).\n - s390/diag: fix display of diagnose call statistics (git-fixes).\n - s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n - s390/gmap: return proper error code on ksm unsharing (git-fixes).\n - s390/ism: fix error return code in ism_probe() (git-fixes).\n - s390/pci: do not set affinity for floating irqs (git-fixes).\n - s390/pci: Fix possible deadlock in recover_store() (bsc#1165183\n LTC#184103).\n - s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n - s390/qeth: cancel RX reclaim work earlier (git-fixes).\n - s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n - s390/qeth: do not warn for napi with 0 budget (git-fixes).\n - s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n - s390/qeth: fix promiscuous mode after reset (git-fixes).\n - s390/qeth: fix qdio teardown after early init error (git-fixes).\n - s390/qeth: handle error due to unsupported transport mode (git-fixes).\n - s390/qeth: handle error when backing RX buffer (git-fixes).\n - s390/qeth: lock the card while changing its hsuid (git-fixes).\n - s390/qeth: support net namespaces for L3 devices (git-fixes).\n - s390/time: Fix clk type in get_tod_clock (git-fixes).\n - scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n - scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n - scsi: bnx2i: fix potential use after free (bsc#1171600).\n - scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601)\n - scsi: core: save/restore command resid for error handling (bsc#1171602).\n - scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n - scsi: core: try to get module before removing device (bsc#1171605).\n - scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n - scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n - scsi: esas2r: unlock on error in esas2r_nvram_read_direct()\n (bsc#1171608).\n - scsi: fnic: fix invalid stack access (bsc#1171609).\n - scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n - scsi-ibmvfc-Don-t-send-implicit-logouts-prior-to-NPI.patch\n - scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791\n ltc#185128).\n - scsi-ibmvscsi-Fix-WARN_ON-during-event-pool-release.patch\n - scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n - scsi: iscsi: Fix a potential deadlock in the timeout handler\n (bsc#1171612).\n - scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n - scsi: lpfc: Change default queue allocation for reduced memory\n consumption (bsc#1164780).\n - scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer\n dereferences (bsc#1171614).\n - scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG\n (bsc#1171615).\n - scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event\n (bsc#1164780).\n - scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n - scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type\n (bsc#1164780).\n - scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n - scsi: lpfc: Maintain atomic consistency of queue_claimed flag\n (bsc#1164780).\n - scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n - scsi: lpfc: Remove re-binding of nvme rport during registration\n (bsc#1164780).\n - scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n - scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n - scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n - scsi: megaraid_sas: Do not initiate OCR if controller is not in ready\n state (bsc#1171616).\n - scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n - scsi-qla2xxx-check-UNLOADING-before-posting-async-wo.patch\n - scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n - scsi: qla2xxx: Delete all sessions before unregister local nvme port\n (bsc#1157169).\n - scsi: qla2xxx: Do not log message when reading port speed via sysfs\n (bsc#1157169).\n - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV\n (bsc#1157169).\n - scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n - scsi: qla2xxx: Remove non functional code (bsc#1157169).\n - scsi: qla2xxx: set UNLOADING before waiting for session deletion\n (bsc#1157169).\n - scsi-qla2xxx-set-UNLOADING-before-waiting-for-sessio.patch\n - scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n - scsi: qla4xxx: fix double free bug (bsc#1171618).\n - scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI\n (bsc#1171619).\n - scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n - scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and\n WRITE(6) (bsc#1171621).\n - scsi: ufs: change msleep to usleep_range (bsc#1171622).\n - scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path\n (bsc#1171623).\n - scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic\n (bsc#1171624).\n - scsi: ufs: Fix ufshcd_probe_hba() reture value in case\n ufshcd_scsi_add_wlus() fails (bsc#1171625).\n - scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n - scsi: zfcp: fix missing erp_lock in port recovery trigger for\n point-to-point (git-fixes).\n - sctp: fix possibly using a bad saddr with a given dst\n (networking-stable-20_04_02).\n - sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n - sctp: move the format error check out of __sctp_sf_do_9_1_abort\n (networking-stable-20_03_01).\n - selftests/powerpc: Fix build errors in powerpc ptrace selftests\n (boo#1124278).\n - seq_file: fix problem when seeking mid-record (bsc#1170125).\n - serial: uartps: Move the spinlock after the read of the tx empty\n (git-fixes).\n - sfc: detach from cb_page in efx_copy_channel()\n (networking-stable-20_03_14).\n - signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig\n (bsc#1172185).\n - slcan: not call free_netdev before rtnl_unlock in slcan_open\n (networking-stable-20_03_28).\n - slip: make slhc_compress() more robust against malicious packets\n (networking-stable-20_03_14).\n - smb3: Additional compression structures (bsc#1144333).\n - smb3: Add new compression flags (bsc#1144333).\n - smb3: change noisy error message to FYI (bsc#1144333).\n - smb3: enable swap on SMB3 mounts (bsc#1144333).\n - smb3-fix-performance-regression-with-setting-mtime.patch\n - smb3: Minor cleanup of protocol definitions (bsc#1144333).\n - smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n - smb3: smbdirect support can be configured by default (bsc#1144333).\n - smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n - spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n - spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n - spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n - spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n - spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n - spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n - spi: fsl: do not map irq during probe (git-fixes).\n - spi: fsl: use platform_get_irq() instead of of_irq_to_resource()\n (git-fixes).\n - spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n - spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n - spi: spi-fsl-dspi: Replace interruptible wait queue with a simple\n completion (git-fixes).\n - spi: spi-s3c64xx: Fix system resume support (git-fixes).\n - spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n - staging: comedi: dt2815: fix writing hi byte of analog output\n (bsc#1051510).\n - staging: comedi: Fix comedi_device refcnt leak in comedi_open\n (bsc#1051510).\n - staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n - staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default\n (git-fixes).\n - staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n - staging: vt6656: Fix pairwise key entry save (git-fixes).\n - sunrpc: expiry_time should be seconds not timeval (git-fixes).\n - sunrpc: Fix a potential buffer overflow in 'svc_print_xprts()'\n (git-fixes).\n - supported.conf: Add br_netfilter to base (bsc#1169020).\n - supported.conf: support w1 core and thermometer support\n - svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path\n (bsc#1103992).\n - svcrdma: Fix leak of transport addresses (git-fixes).\n - svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n - taskstats: fix data-race (bsc#1172188).\n - tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n - tcp: repair: fix TCP_QUEUE_SEQ implementation\n (networking-stable-20_03_28).\n - team: add missing attribute validation for array index\n (networking-stable-20_03_14).\n - team: add missing attribute validation for port ifindex\n (networking-stable-20_03_14).\n - team: fix hang in team_mode_get() (networking-stable-20_04_27).\n - tools lib traceevent: Remove unneeded qsort and uses memmove instead\n (git-fixes).\n - tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n - tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n - tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n - tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n - tracing: Disable trace_printk() on post poned tests (git-fixes).\n - tracing: Fix the race between registering 'snapshot' event trigger and\n triggering 'snapshot' operation (git-fixes).\n - tty: rocket, avoid OOB access (git-fixes).\n - tun: Do not put_page() for all negative return values from XDP program\n (bsc#1109837).\n - UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n - UAS: no use logging any details in case of ENODEV (git-fixes).\n - Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n - Update config files: re-enable CONFIG_HAMRADIO and co (bsc#1170740)\n - Update\n patches.suse/powerpc-pseries-ddw-Extend-upper-limit-for-huge-DMA-.patch\n (bsc#1142685 bsc#1167867 ltc#179509 ltc#184616).\n - Update patches.suse/x86-mm-split-vmalloc_sync_all.patch (bsc#1165741,\n bsc#1166969).\n - Update references:\n patches.suse/s390-pci-do-not-set-affinity-for-floating-irqs (bsc#1171817\n LTC#185819 git-fixes).\n - usb: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair\n K70 RGB RAPIDFIRE (git-fixes).\n - usb: cdc-acm: restore capability check order (git-fixes).\n - usb: core: Fix misleading driver bug report (bsc#1051510).\n - usb: dwc3: do not set gadget->is_otg flag (git-fixes).\n - usb: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n - usb: early: Handle AMD's spec-compliant identifiers, too (git-fixes).\n - usb: f_fs: Clear OS Extended descriptor counts to zero in\n ffs_data_reset() (git-fixes).\n - usb: gadget: audio: Fix a missing error return value in audio_bind()\n (git-fixes).\n - usb: gadget: composite: Inform controller driver of self-powered\n (git-fixes).\n - usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n - usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n - usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n - usb: gadget: net2272: Fix a memory leak in an error handling path in\n 'net2272_plat_probe()' (git-fixes).\n - usb: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n - usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n - usb: gadget: udc: bdc: Remove unnecessary NULL checks in\n bdc_req_complete (git-fixes).\n - usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n - usb: hub: Fix handling of connect changes during sleep (git-fixes).\n - usbnet: silence an unnecessary warning (bsc#1170770).\n - usb: serial: garmin_gps: add sanity checking for data length (git-fixes).\n - usb: serial: option: add BroadMobi BM806U (git-fixes).\n - usb: serial: option: add support for ASKEY WWHC050 (git-fixes).\n - usb: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n - usb: serial: qcserial: Add DW5816e support (git-fixes).\n - usb: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n - usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n - usb: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n - usb: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg\n list (git-fixes).\n - video: fbdev: sis: Remove unnecessary parentheses and commented code\n (bsc#1114279)\n - video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n - vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n - vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n - vt: selection, introduce vc_is_sel (git-fixes).\n - vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n - vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n - vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console\n (git-fixes).\n - vxlan: check return value of gro_cells_init()\n (networking-stable-20_03_28).\n - w1: Add subsystem kernel public interface (jsc#SLE-11048).\n - w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n - w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n - w1: use put_device() if device_register() fail (jsc#SLE-11048).\n - watchdog: reset last_hw_keepalive time at start (git-fixes).\n - wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).\n - wil6210: remove reset file from debugfs (git-fixes).\n - wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n - workqueue: do not use wq_select_unbound_cpu() for bound works\n (bsc#1172130).\n - x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n - x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n - x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n - x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n - x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621,\n bsc#1170620).\n - x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump\n (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Report crash data in die() when panic_on_oops is set\n (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Report crash register data or kmsg before running crash\n kernel (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is\n not set (bsc#1170617, bsc#1170618).\n - x86: hyperv: report value of misc_features (git fixes).\n - x86/Hyper-V: Trigger crash enlightenment only once during system crash\n (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617,\n bsc#1170618).\n - x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n - x86/resctrl: Fix invalid attempt at removing the default resource group\n (git-fixes).\n - x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n - x86/unwind/orc: Do not skip the first frame for inactive tasks\n (bsc#1058115).\n - x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n - x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n - x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks\n (bsc#1058115).\n - x86/unwind/orc: Prevent unwinding before ORC initialization\n (bsc#1058115).\n - x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n - x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n - x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n - x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n - xen/pci: reserve MCFG areas earlier (bsc#1170145).\n - xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish\n (networking-stable-20_04_27).\n - xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n - xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n - xfs: do not ever return a stale pointer from __xfs_dir3_free_read\n (git-fixes).\n - xprtrdma: Fix completion wait during device removal (git-fixes).\n\n", "edition": 1, "modified": "2020-06-13T09:19:11", "published": "2020-06-13T09:19:11", "id": "OPENSUSE-SU-2020:0801-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html", "title": "Security update for the Linux Kernel (important)", "type": "suse", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2020-08-12T01:01:35", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11494", "CVE-2019-5108", "CVE-2020-8648", "CVE-2020-12770", "CVE-2020-9383", "CVE-2018-14610", "CVE-2015-8839", "CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12826", "CVE-2020-10942", "CVE-2020-11609", "CVE-2019-20636", "CVE-2019-19768", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10690", "CVE-2020-0009", "CVE-2020-12654", "CVE-2019-19319", "CVE-2020-12653", "CVE-2020-1749", "CVE-2020-11608", "CVE-2020-11668", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-11565", "CVE-2018-14612", "CVE-2020-8649", "CVE-2020-12652", "CVE-2019-19447", "CVE-2018-14611", "CVE-2020-8647", "CVE-2020-2732", "CVE-2018-14613"], "description": "Package : linux\nVersion : 3.16.84-1\nCVE ID : CVE-2015-8839 CVE-2018-14610 CVE-2018-14611 CVE-2018-14612\n CVE-2018-14613 CVE-2019-5108 CVE-2019-19319 CVE-2019-19447\n CVE-2019-19768 CVE-2019-20636 CVE-2020-0009 CVE-2020-0543\n CVE-2020-1749 CVE-2020-2732 CVE-2020-8647 CVE-2020-8648\n CVE-2020-8649 CVE-2020-9383 CVE-2020-10690 CVE-2020-10751\n CVE-2020-10942 CVE-2020-11494 CVE-2020-11565 CVE-2020-11608\n CVE-2020-11609 CVE-2020-11668 CVE-2020-12114 CVE-2020-12464\n CVE-2020-12652 CVE-2020-12653 CVE-2020-12654 CVE-2020-12769\n CVE-2020-12770 CVE-2020-12826 CVE-2020-13143\n\nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks.\n\nCVE-2015-8839\n\n A race condition was found in the ext4 filesystem implementation.\n A local user could exploit this to cause a denial of service\n (filesystem corruption).\n\nCVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613\n\n Wen Xu from SSLab at Gatech reported that crafted Btrfs volumes\n could trigger a crash (Oops) and/or out-of-bounds memory access.\n An attacker able to mount such a volume could use this to cause a\n denial of service or possibly for privilege escalation.\n\nCVE-2019-5108\n\n Mitchell Frank of Cisco discovered that when the IEEE 802.11\n (WiFi) stack was used in AP mode with roaming, it would trigger\n roaming for a newly associated station before the station was\n authenticated. An attacker within range of the AP could use this\n to cause a denial of service, either by filling up a switching\n table or by redirecting traffic away from other stations.\n\nCVE-2019-19319\n\n Jungyeon discovered that a crafted filesystem can cause the ext4\n implementation to deallocate or reallocate journal blocks. A user\n permitted to mount filesystems could use this to cause a denial of\n service (crash), or possibly for privilege escalation.\n\nCVE-2019-19447\n\n It was discovered that the ext4 filesystem driver did not safely\n handle unlinking of an inode that, due to filesystem corruption,\n already has a link count of 0. An attacker able to mount\n arbitrary ext4 volumes could use this to cause a denial of service\n (memory corruption or crash) or possibly for privilege escalation.\n\nCVE-2019-19768\n\n Tristan Madani reported a race condition in the blktrace debug\n facility that could result in a use-after-free. A local user able\n to trigger removal of block devices could possibly use this to\n cause a denial of service (crash) or for privilege escalation.\n\nCVE-2019-20636\n\n The syzbot tool found that the input subsystem did not fully\n validate keycode changes, which could result in a heap\n out-of-bounds write. A local user permitted to access the device\n node for an input or VT device could possibly use this to cause a\n denial of service (crash or memory corruption) or for privilege\n escalation.\n\nCVE-2020-0009\n\n Jann Horn reported that the Android ashmem driver did not prevent\n read-only files from being memory-mapped and then remapped as\n read-write. However, Android drivers are not enabled in Debian\n kernel configurations.\n\nCVE-2020-0543\n\n Researchers at VU Amsterdam discovered that on some Intel CPUs\n supporting the RDRAND and RDSEED instructions, part of a random\n value generated by these instructions may be used in a later\n speculative execution on any core of the same physical CPU.\n Depending on how these instructions are used by applications, a\n local user or VM guest could use this to obtain sensitive\n information such as cryptographic keys from other users or VMs.\n\n This vulnerability can be mitigated by a microcode update, either\n as part of system firmware (BIOS) or through the intel-microcode\n package in Debian's non-free archive section. This kernel update\n only provides reporting of the vulnerability and the option to\n disable the mitigation if it is not needed.\n\nCVE-2020-1749\n\n Xiumei Mu reported that some network protocols that can run on top\n of IPv6 would bypass the Transformation (XFRM) layer used by\n IPsec, IPcomp/IPcomp6, IPIP, and IPv6 Mobility. This could result\n in disclosure of information over the network, since it would not\n be encrypted or routed according to the system policy.\n\nCVE-2020-2732\n\n Paulo Bonzini discovered that the KVM implementation for Intel\n processors did not properly handle instruction emulation for L2\n guests when nested virtualization is enabled. This could allow an\n L2 guest to cause privilege escalation, denial of service, or\n information leaks in the L1 guest.\n\nCVE-2020-8647, CVE-2020-8649\n\n The Hulk Robot tool found a potential MMIO out-of-bounds access in\n the vgacon driver. A local user permitted to access a virtual\n terminal (/dev/tty1 etc.) on a system using the vgacon driver\n could use this to cause a denial of service (crash or memory\n corruption) or possibly for privilege escalation.\n\nCVE-2020-8648\n\n The syzbot tool found a race condition in the the virtual terminal\n driver, which could result in a use-after-free. A local user\n permitted to access a virtual terminal could use this to cause a\n denial of service (crash or memory corruption) or possibly for\n privilege escalation.\n\nCVE-2020-9383\n\n Jordy Zomer reported an incorrect range check in the floppy driver\n which could lead to a static out-of-bounds access. A local user\n permitted to access a floppy drive could use this to cause a\n denial of service (crash or memory corruption) or possibly for\n privilege escalation.\n\nCVE-2020-10690\n\n It was discovered that the PTP hardware clock subsystem did not\n properly manage device lifetimes. Removing a PTP hardware clock\n from the system while a user process was using it could lead to a\n use-after-free. The security impact of this is unclear.\n\nCVE-2020-10751\n\n Dmitry Vyukov reported that the SELinux subsystem did not properly\n handle validating multiple messages, which could allow a privileged\n attacker to bypass SELinux netlink restrictions.\n\nCVE-2020-10942\n\n It was discovered that the vhost_net driver did not properly\n validate the type of sockets set as back-ends. A local user\n permitted to access /dev/vhost-net could use this to cause a stack\n corruption via crafted system calls, resulting in denial of\n service (crash) or possibly privilege escalation.\n\nCVE-2020-11494\n\n It was discovered that the slcan (serial line CAN) network driver\n did not fully initialise CAN headers for received packets,\n resulting in an information leak from the kernel to user-space or\n over the CAN network.\n\nCVE-2020-11565\n\n Entropy Moe reported that the shared memory filesystem (tmpfs) did\n not correctly handle an "mpol" mount option specifying an empty\n node list, leading to a stack-based out-of-bounds write. If user\n namespaces are enabled, a local user could use this to cause a\n denial of service (crash) or possibly for privilege escalation.\n\nCVE-2020-11608, CVE-2020-11609, CVE-2020-11668\n\n It was discovered that the ov519, stv06xx, and xirlink_cit media\n drivers did not properly validate USB device descriptors. A\n physically present user with a specially constructed USB device\n could use this to cause a denial-of-service (crash) or possibly\n for privilege escalation.\n\nCVE-2020-12114\n\n Piotr Krysiuk discovered a race condition between the umount and\n pivot_root operations in the filesystem core (vfs). A local user\n with the CAP_SYS_ADMIN capability in any user namespace could use\n this to cause a denial of service (crash).\n\nCVE-2020-12464\n\n Kyungtae Kim reported a race condition in the USB core that can\n result in a use-after-free. It is not clear how this can be\n exploited, but it could result in a denial of service (crash or\n memory corruption) or privilege escalation.\n\nCVE-2020-12652\n\n Tom Hatskevich reported a bug in the mptfusion storage drivers.\n An ioctl handler fetched a parameter from user memory twice,\n creating a race condition which could result in incorrect locking\n of internal data structures. A local user permitted to access\n /dev/mptctl could use this to cause a denial of service (crash or\n memory corruption) or for privilege escalation.\n\nCVE-2020-12653\n\n It was discovered that the mwifiex WiFi driver did not\n sufficiently validate scan requests, resulting a potential heap\n buffer overflow. A local user with CAP_NET_ADMIN capability could\n use this to cause a denial of service (crash or memory corruption)\n or possibly for privilege escalation.\n\nCVE-2020-12654\n\n It was discovered that the mwifiex WiFi driver did not\n sufficiently validate WMM parameters received from an access point\n (AP), resulting a potential heap buffer overflow. A malicious AP\n could use this to cause a denial of service (crash or memory\n corruption) or possibly to execute code on a vulnerable system.\n\nCVE-2020-12769\n\n It was discovered that the spi-dw SPI host driver did not properly\n serialise access to its internal state. The security impact of\n this is unclear, and this driver is not included in Debian's\n binary packages.\n\nCVE-2020-12770\n\n It was discovered that the sg (SCSI generic) driver did not\n correctly release internal resources in a particular error case.\n A local user permitted to access an sg device could possibly use\n this to cause a denial of service (resource exhaustion).\n\nCVE-2020-12826\n\n Adam Zabrocki reported a weakness in the signal subsystem's\n permission checks. A parent process can choose an arbitary signal\n for a child process to send when it exits, but if the parent has\n executed a new program then the default SIGCHLD signal is sent. A\n local user permitted to run a program for several days could\n bypass this check, execute a setuid program, and then send an\n arbitrary signal to it. Depending on the setuid programs\n installed, this could have some security impact.\n\nCVE-2020-13143\n\n Kyungtae Kim reported a potential heap out-of-bounds write in\n the USB gadget subsystem. A local user permitted to write to\n the gadget configuration filesystem could use this to cause a\n denial of service (crash or memory corruption) or potentially\n for privilege escalation.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n3.16.84-1.\n\nWe recommend that you upgrade your linux packages. Binary packages for\nthe EABI ARM (armel) architecture are not yet available, and a separate\nannouncement will be made when they are.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n\n-- \nBen Hutchings - Debian developer, member of kernel, installer and LTS teams\n", "edition": 8, "modified": "2020-06-09T21:29:55", "published": "2020-06-09T21:29:55", "id": "DEBIAN:DLA-2241-1:DE3AB", "href": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202006/msg00011.html", "title": "[SECURITY] [DLA 2241-1] linux security update", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-12T00:55:40", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11494", "CVE-2019-5108", "CVE-2020-8648", "CVE-2020-12770", "CVE-2020-9383", "CVE-2018-14610", "CVE-2015-8839", "CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12826", "CVE-2020-10942", "CVE-2020-11609", "CVE-2019-20636", "CVE-2019-19768", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10690", "CVE-2020-0009", "CVE-2020-12654", "CVE-2019-19319", "CVE-2020-12653", "CVE-2020-1749", "CVE-2020-11608", "CVE-2020-11668", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-11565", "CVE-2018-14612", "CVE-2020-8649", "CVE-2020-12652", "CVE-2019-19447", "CVE-2018-14611", "CVE-2020-8647", "CVE-2020-2732", "CVE-2018-14613"], "description": "Package : linux\nVersion : 3.16.84-1\nCVE ID : CVE-2015-8839 CVE-2018-14610 CVE-2018-14611 CVE-2018-14612\n CVE-2018-14613 CVE-2019-5108 CVE-2019-19319 CVE-2019-19447\n CVE-2019-19768 CVE-2019-20636 CVE-2020-0009 CVE-2020-0543\n CVE-2020-1749 CVE-2020-2732 CVE-2020-8647 CVE-2020-8648\n CVE-2020-8649 CVE-2020-9383 CVE-2020-10690 CVE-2020-10751\n CVE-2020-10942 CVE-2020-11494 CVE-2020-11565 CVE-2020-11608\n CVE-2020-11609 CVE-2020-11668 CVE-2020-12114 CVE-2020-12464\n CVE-2020-12652 CVE-2020-12653 CVE-2020-12654 CVE-2020-12769\n CVE-2020-12770 CVE-2020-12826 CVE-2020-13143\n\nThis update is now available for all supported architectures. For\nreference the original advisory text follows.\n\nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks.\n\nCVE-2015-8839\n\n A race condition was found in the ext4 filesystem implementation.\n A local user could exploit this to cause a denial of service\n (filesystem corruption).\n\nCVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613\n\n Wen Xu from SSLab at Gatech reported that crafted Btrfs volumes\n could trigger a crash (Oops) and/or out-of-bounds memory access.\n An attacker able to mount such a volume could use this to cause a\n denial of service or possibly for privilege escalation.\n\nCVE-2019-5108\n\n Mitchell Frank of Cisco discovered that when the IEEE 802.11\n (WiFi) stack was used in AP mode with roaming, it would trigger\n roaming for a newly associated station before the station was\n authenticated. An attacker within range of the AP could use this\n to cause a denial of service, either by filling up a switching\n table or by redirecting traffic away from other stations.\n\nCVE-2019-19319\n\n Jungyeon discovered that a crafted filesystem can cause the ext4\n implementation to deallocate or reallocate journal blocks. A user\n permitted to mount filesystems could use this to cause a denial of\n service (crash), or possibly for privilege escalation.\n\nCVE-2019-19447\n\n It was discovered that the ext4 filesystem driver did not safely\n handle unlinking of an inode that, due to filesystem corruption,\n already has a link count of 0. An attacker able to mount\n arbitrary ext4 volumes could use this to cause a denial of service\n (memory corruption or crash) or possibly for privilege escalation.\n\nCVE-2019-19768\n\n Tristan Madani reported a race condition in the blktrace debug\n facility that could result in a use-after-free. A local user able\n to trigger removal of block devices could possibly use this to\n cause a denial of service (crash) or for privilege escalation.\n\nCVE-2019-20636\n\n The syzbot tool found that the input subsystem did not fully\n validate keycode changes, which could result in a heap\n out-of-bounds write. A local user permitted to access the device\n node for an input or VT device could possibly use this to cause a\n denial of service (crash or memory corruption) or for privilege\n escalation.\n\nCVE-2020-0009\n\n Jann Horn reported that the Android ashmem driver did not prevent\n read-only files from being memory-mapped and then remapped as\n read-write. However, Android drivers are not enabled in Debian\n kernel configurations.\n\nCVE-2020-0543\n\n Researchers at VU Amsterdam discovered that on some Intel CPUs\n supporting the RDRAND and RDSEED instructions, part of a random\n value generated by these instructions may be used in a later\n speculative execution on any core of the same physical CPU.\n Depending on how these instructions are used by applications, a\n local user or VM guest could use this to obtain sensitive\n information such as cryptographic keys from other users or VMs.\n\n This vulnerability can be mitigated by a microcode update, either\n as part of system firmware (BIOS) or through the intel-microcode\n package in Debian's non-free archive section. This kernel update\n only provides reporting of the vulnerability and the option to\n disable the mitigation if it is not needed.\n\nCVE-2020-1749\n\n Xiumei Mu reported that some network protocols that can run on top\n of IPv6 would bypass the Transformation (XFRM) layer used by\n IPsec, IPcomp/IPcomp6, IPIP, and IPv6 Mobility. This could result\n in disclosure of information over the network, since it would not\n be encrypted or routed according to the system policy.\n\nCVE-2020-2732\n\n Paulo Bonzini discovered that the KVM implementation for Intel\n processors did not properly handle instruction emulation for L2\n guests when nested virtualization is enabled. This could allow an\n L2 guest to cause privilege escalation, denial of service, or\n information leaks in the L1 guest.\n\nCVE-2020-8647, CVE-2020-8649\n\n The Hulk Robot tool found a potential MMIO out-of-bounds access in\n the vgacon driver. A local user permitted to access a virtual\n terminal (/dev/tty1 etc.) on a system using the vgacon driver\n could use this to cause a denial of service (crash or memory\n corruption) or possibly for privilege escalation.\n\nCVE-2020-8648\n\n The syzbot tool found a race condition in the the virtual terminal\n driver, which could result in a use-after-free. A local user\n permitted to access a virtual terminal could use this to cause a\n denial of service (crash or memory corruption) or possibly for\n privilege escalation.\n\nCVE-2020-9383\n\n Jordy Zomer reported an incorrect range check in the floppy driver\n which could lead to a static out-of-bounds access. A local user\n permitted to access a floppy drive could use this to cause a\n denial of service (crash or memory corruption) or possibly for\n privilege escalation.\n\nCVE-2020-10690\n\n It was discovered that the PTP hardware clock subsystem did not\n properly manage device lifetimes. Removing a PTP hardware clock\n from the system while a user process was using it could lead to a\n use-after-free. The security impact of this is unclear.\n\nCVE-2020-10751\n\n Dmitry Vyukov reported that the SELinux subsystem did not properly\n handle validating multiple messages, which could allow a privileged\n attacker to bypass SELinux netlink restrictions.\n\nCVE-2020-10942\n\n It was discovered that the vhost_net driver did not properly\n validate the type of sockets set as back-ends. A local user\n permitted to access /dev/vhost-net could use this to cause a stack\n corruption via crafted system calls, resulting in denial of\n service (crash) or possibly privilege escalation.\n\nCVE-2020-11494\n\n It was discovered that the slcan (serial line CAN) network driver\n did not fully initialise CAN headers for received packets,\n resulting in an information leak from the kernel to user-space or\n over the CAN network.\n\nCVE-2020-11565\n\n Entropy Moe reported that the shared memory filesystem (tmpfs) did\n not correctly handle an "mpol" mount option specifying an empty\n node list, leading to a stack-based out-of-bounds write. If user\n namespaces are enabled, a local user could use this to cause a\n denial of service (crash) or possibly for privilege escalation.\n\nCVE-2020-11608, CVE-2020-11609, CVE-2020-11668\n\n It was discovered that the ov519, stv06xx, and xirlink_cit media\n drivers did not properly validate USB device descriptors. A\n physically present user with a specially constructed USB device\n could use this to cause a denial-of-service (crash) or possibly\n for privilege escalation.\n\nCVE-2020-12114\n\n Piotr Krysiuk discovered a race condition between the umount and\n pivot_root operations in the filesystem core (vfs). A local user\n with the CAP_SYS_ADMIN capability in any user namespace could use\n this to cause a denial of service (crash).\n\nCVE-2020-12464\n\n Kyungtae Kim reported a race condition in the USB core that can\n result in a use-after-free. It is not clear how this can be\n exploited, but it could result in a denial of service (crash or\n memory corruption) or privilege escalation.\n\nCVE-2020-12652\n\n Tom Hatskevich reported a bug in the mptfusion storage drivers.\n An ioctl handler fetched a parameter from user memory twice,\n creating a race condition which could result in incorrect locking\n of internal data structures. A local user permitted to access\n /dev/mptctl could use this to cause a denial of service (crash or\n memory corruption) or for privilege escalation.\n\nCVE-2020-12653\n\n It was discovered that the mwifiex WiFi driver did not\n sufficiently validate scan requests, resulting a potential heap\n buffer overflow. A local user with CAP_NET_ADMIN capability could\n use this to cause a denial of service (crash or memory corruption)\n or possibly for privilege escalation.\n\nCVE-2020-12654\n\n It was discovered that the mwifiex WiFi driver did not\n sufficiently validate WMM parameters received from an access point\n (AP), resulting a potential heap buffer overflow. A malicious AP\n could use this to cause a denial of service (crash or memory\n corruption) or possibly to execute code on a vulnerable system.\n\nCVE-2020-12769\n\n It was discovered that the spi-dw SPI host driver did not properly\n serialise access to its internal state. The security impact of\n this is unclear, and this driver is not included in Debian's\n binary packages.\n\nCVE-2020-12770\n\n It was discovered that the sg (SCSI generic) driver did not\n correctly release internal resources in a particular error case.\n A local user permitted to access an sg device could possibly use\n this to cause a denial of service (resource exhaustion).\n\nCVE-2020-12826\n\n Adam Zabrocki reported a weakness in the signal subsystem's\n permission checks. A parent process can choose an arbitary signal\n for a child process to send when it exits, but if the parent has\n executed a new program then the default SIGCHLD signal is sent. A\n local user permitted to run a program for several days could\n bypass this check, execute a setuid program, and then send an\n arbitrary signal to it. Depending on the setuid programs\n installed, this could have some security impact.\n\nCVE-2020-13143\n\n Kyungtae Kim reported a potential heap out-of-bounds write in\n the USB gadget subsystem. A local user permitted to write to\n the gadget configuration filesystem could use this to cause a\n denial of service (crash or memory corruption) or potentially\n for privilege escalation.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n3.16.84-1.\n\nWe recommend that you upgrade your linux packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n\n-- \nBen Hutchings - Debian developer, member of kernel, installer and LTS teams\n", "edition": 7, "modified": "2020-06-10T10:55:44", "published": "2020-06-10T10:55:44", "id": "DEBIAN:DLA-2241-2:3E557", "href": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202006/msg00013.html", "title": "[SECURITY] [DLA 2241-2] linux security update", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2020-10-20T23:06:08", "bulletinFamily": "unix", "cvelist": ["CVE-2020-12770", "CVE-2020-9383", "CVE-2019-15217", "CVE-2019-9454", "CVE-2019-20095", "CVE-2019-19767", "CVE-2019-16233", "CVE-2019-19534", "CVE-2019-15807", "CVE-2020-14305", "CVE-2019-19332", "CVE-2020-12826", "CVE-2019-19524", "CVE-2019-17055", "CVE-2019-19058", "CVE-2020-10942", "CVE-2019-19062", "CVE-2017-18551", "CVE-2019-20636", "CVE-2019-19523", "CVE-2020-10732", "CVE-2020-10690", "CVE-2019-19059", "CVE-2019-19055", "CVE-2019-19063", "CVE-2019-18808", "CVE-2020-1749", "CVE-2020-10742", "CVE-2020-10751", "CVE-2019-12614", "CVE-2019-19807", "CVE-2019-9458", "CVE-2020-11565", "CVE-2020-8649", "CVE-2019-16231", "CVE-2019-19447", "CVE-2019-19046", "CVE-2020-8647", "CVE-2019-19530", "CVE-2019-19537", "CVE-2019-16994", "CVE-2020-2732", "CVE-2019-17053", "CVE-2019-20054", "CVE-2018-20836", "CVE-2019-15917"], "description": "**CentOS Errata and Security Advisory** CESA-2020:4060\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)\n\n* kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c (CVE-2017-18551)\n\n* kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free (CVE-2018-20836)\n\n* kernel: out of bounds write in i2c driver leads to local escalation of privilege (CVE-2019-9454)\n\n* kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)\n\nSpace precludes documenting all of the security fixes in this advisory. See the descriptions of the remaining security fixes in the related Knowledge Article:\n\nhttps://access.redhat.com/articles/5442421\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2020-October/012745.html\n\n**Affected packages:**\nbpftool\nkernel\nkernel-abi-whitelists\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-tools\nkernel-tools-libs\nkernel-tools-libs-devel\nperf\npython-perf\n\n**Upstream details at:**\n", "edition": 1, "modified": "2020-10-20T18:20:15", "published": "2020-10-20T18:20:15", "id": "CESA-2020:4060", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2020-October/012745.html", "title": "bpftool, kernel, perf, python security update", "type": "centos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}