In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744
{"virtuozzo": [{"lastseen": "2023-09-26T22:35:27", "description": "The cumulative Virtuozzo ReadyKernel patch was updated with security and stability fixes. The patch applies to the kernels 3.10.0-1062.12.1.vz7.131.10 (Virtuozzo Hybrid Server 7.0.13), 3.10.0-1127.8.2.vz7.151.14 (Virtuozzo Hybrid Server 7.0.14).\n**Vulnerability id:** CVE-2020-0305\n[3.10.0-1062.12.1.vz7.131.10 to 3.10.0-1127.8.2.vz7.151.14] Possible use-after-free error due to a race condition in cdev_get(). It was discovered that use-after-free condition was possible in cdev_get() if multiple processes simultaneously accessed a character device in a certain way. A local attacker could potentially exploit this to crash the kernel.\n\n", "cvss3": {"exploitabilityScore": 0.5, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 6.4, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-08-06T00:00:00", "type": "virtuozzo", "title": "Kernel security update: Virtuozzo ReadyKernel patch 113.10 for Virtuozzo Hybrid Server 7.0", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-0305"], "modified": "2020-08-06T00:00:00", "id": "VZA-2020-056", "href": "https://help.virtuozzo.com/s/article/VZA-2020-056", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-09-26T22:35:27", "description": "The cumulative Virtuozzo ReadyKernel patch was updated with security and stability fixes. The patch applies to the kernels 3.10.0-862.20.2.vz7.73.29 (Virtuozzo Hybrid Server 7.0.9 and Virtuozzo Infrastructure Platform 2.5), 3.10.0-957.10.1.vz7.85.17 (Virtuozzo Hybrid Server 7.0.10), 3.10.0-957.12.2.vz7.86.2 (Virtuozzo Hybrid Server 7.0.10 HF1), 3.10.0-957.12.2.vz7.96.21 (Virtuozzo Hybrid Server 7.0.11 and Virtuozzo Infrastructure Platform 3.0), 3.10.0-1062.4.2.vz7.116.7 (Virtuozzo Hybrid Server 7.0.12 HF1 and Virtuozzo Hybrid Infrastructure 3.5).\n**Vulnerability id:** CVE-2020-0305\n[3.10.0-957.10.1.vz7.85.17 to 3.10.0-1062.4.2.vz7.116.7] Possible use-after-free error due to a race condition in cdev_get(). It was discovered that use-after-free condition was possible in cdev_get() if multiple processes simultaneously accessed a character device in a certain way. A local attacker could potentially exploit this to crash the kernel.\n\n", "cvss3": {"exploitabilityScore": 0.5, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 6.4, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-08-06T00:00:00", "type": "virtuozzo", "title": "Kernel security update: Virtuozzo ReadyKernel patch 113.0 for Virtuozzo Hybrid Server 7.0, Virtuozzo Infrastructure Platform 2.5, 3.0 and Virtuozzo Hybrid Infrastructure 3.5", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-0305"], "modified": "2020-08-06T00:00:00", "id": "VZA-2020-055", "href": "https://help.virtuozzo.com/s/article/VZA-2020-055", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}}], "debiancve": [{"lastseen": "2023-09-26T16:06:45", "description": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "cvss3": {"exploitabilityScore": 0.5, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 6.4, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-07-17T20:15:00", "type": "debiancve", "title": "CVE-2020-0305", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-0305"], "modified": "2020-07-17T20:15:00", "id": "DEBIANCVE:CVE-2020-0305", "href": "https://security-tracker.debian.org/tracker/CVE-2020-0305", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}}], "veracode": [{"lastseen": "2023-04-18T12:41:18", "description": "kernel is vulnerable to privilege escalation. A use-after-free flaw was found in the way the Linux kernel's filesystem subsystem handled a race condition in the cdev_get of char_dev.c function.This flaw allows a privileged local user to starve the resources, causing potentially escalating their privileges in the system\n", "cvss3": {"exploitabilityScore": 0.5, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 6.4, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-05T03:09:52", "type": "veracode", "title": "Privilege Escalation", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-0305"], "modified": "2023-02-03T17:34:59", "id": "VERACODE:27771", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-27771/summary", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}}], "prion": [{"lastseen": "2023-08-16T08:38:05", "description": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "cvss3": {"exploitabilityScore": 0.5, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 6.4, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-07-17T20:15:00", "type": "prion", "title": "CVE-2020-0305", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-0305"], "modified": "2023-02-03T16:23:00", "id": "PRION:CVE-2020-0305", "href": "https://kb.prio-n.com/vulnerability/CVE-2020-0305", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}}], "ubuntucve": [{"lastseen": "2023-09-23T16:26:24", "description": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race\ncondition. This could lead to local escalation of privilege with System\nexecution privileges needed. User interaction is not needed for\nexploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "cvss3": {"exploitabilityScore": 0.5, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 6.4, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-07-17T00:00:00", "type": "ubuntucve", "title": "CVE-2020-0305", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-0305"], "modified": "2020-07-17T00:00:00", "id": "UB:CVE-2020-0305", "href": "https://ubuntu.com/security/CVE-2020-0305", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}}], "redhatcve": [{"lastseen": "2023-09-22T03:00:56", "description": "A use-after-free flaw was found in the way the Linux kernel's filesystem subsystem handled a race condition in the chrdev_open function. This flaw allows a privileged local user to starve the resources, causing a denial of service or potentially escalating their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.\n#### Mitigation\n\nMitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. \n\n", "cvss3": {"exploitabilityScore": 0.5, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 6.4, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-07-23T16:37:52", "type": "redhatcve", "title": "CVE-2020-0305", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-0305"], "modified": "2023-04-06T06:37:28", "id": "RH:CVE-2020-0305", "href": "https://access.redhat.com/security/cve/cve-2020-0305", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2023-05-18T15:06:58", "description": "The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\nThis update is signed with the new UEFI signing key for openSUSE. It contains rebuilds of all available KMP packages also rebuilt with the new UEFi signing key. (boo#1174543)\n\nThe following security bugs were fixed :\n\n - CVE-2020-14356: A use after free vulnerability in cgroup BPF component was fixed (bsc#1175213).\n\n - CVE-2020-14331: A buffer over write in vgacon_scroll was fixed (bnc#1174205).\n\n - CVE-2020-16166: The Linux kernel allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n\n - CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth® BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\n - CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\n - CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n\nThe following non-security bugs were fixed :\n\n - 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).\n\n - ACPICA: Dispatcher: add status checks (git-fixes).\n\n - ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).\n\n - ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).\n\n - ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).\n\n - af_key: pfkey_dump needs parameter validation (git-fixes).\n\n - agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n\n - ALSA: asihpi: delete duplicated word (git-fixes).\n\n - ALSA: atmel: Remove invalid 'fall through' comments (git-fixes).\n\n - ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).\n\n - ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).\n\n - ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).\n\n - ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).\n\n - ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).\n\n - ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).\n\n - ALSA: echoaudio: Race conditions around 'opencount' (git-fixes).\n\n - ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).\n\n - ALSA: echoaudio: Remove redundant check (git-fixes).\n\n - ALSA: firewire: fix kernel-doc (git-fixes).\n\n - ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).\n\n - ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).\n\n - ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).\n\n - ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).\n\n - ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).\n\n - ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n\n - ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).\n\n - ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).\n\n - ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).\n\n - ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).\n\n - ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).\n\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).\n\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).\n\n - ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).\n\n - ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).\n\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).\n\n - ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (git-fixes).\n\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).\n\n - ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).\n\n - ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).\n\n - ALSA: hda/realtek - Fix unused variable warning (git-fixes).\n\n - ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).\n\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).\n\n - ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).\n\n - ALSA: hda/tegra: Disable sync-write operation (git-fixes).\n\n - ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n\n - ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n\n - ALSA: isa: delete repeated words in comments (git-fixes).\n\n - ALSA: isa/gus: remove 'set but not used' warning (git-fixes).\n\n - ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).\n\n - ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).\n\n - ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n\n - ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).\n\n - ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).\n\n - ALSA: pci/asihpi: fix kernel-doc (git-fixes).\n\n - ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).\n\n - ALSA: pci/au88x0: remove 'defined but not used' warnings (git-fixes).\n\n - ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).\n\n - ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).\n\n - ALSA: pci: delete repeated words in comments (git-fixes).\n\n - ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/fm801: fix kernel-doc (git-fixes).\n\n - ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).\n\n - ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).\n\n - ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).\n\n - ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).\n\n - ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).\n\n - ALSA: seq: oss: Serialize ioctls (git-fixes).\n\n - ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).\n\n - ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).\n\n - ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n\n - ALSA: usb-audio: add startech usb audio dock name (git-fixes).\n\n - ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).\n\n - ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).\n\n - ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).\n\n - ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).\n\n - ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n\n - ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n\n - ALSA: usb-audio: Fix some typos (git-fixes).\n\n - ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (git-fixes).\n\n - ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).\n\n - ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).\n\n - ALSA: vx_core: remove warning for empty loop body (git-fixes).\n\n - ALSA: xen: remove 'set but not used' warning (git-fixes).\n\n - ALSA: xen: Remove superfluous fall through comments (git-fixes).\n\n - apparmor: ensure that dfa state tables have entries (git-fixes).\n\n - apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).\n\n - apparmor: Fix memory leak of profile proxy (git-fixes).\n\n - apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).\n\n - apparmor: remove useless aafs_create_symlink (git-fixes).\n\n - appletalk: Fix atalk_proc_init() return path (git-fixes).\n\n - arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).\n\n - arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).\n\n - arm64: csum: Fix handling of bad packets (bsc#1175192).\n\n - arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).\n\n - arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).\n\n - arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).\n\n - arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).\n\n - arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).\n\n - arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).\n\n - arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).\n\n - arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).\n\n - arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).\n\n - arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).\n\n - arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).\n\n - arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).\n\n - arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).\n\n - arm64: dts: rockchip: Replace RK805 PMIC node name with 'pmic' on rk3328 boards (none bsc#1175014).\n\n - arm64: dts: uDPU: fix broken ethernet (bsc#1175344).\n\n - arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).\n\n - arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n\n - arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).\n\n - arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).\n\n - arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).\n\n - arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).\n\n - arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).\n\n - arm64: kexec_file: print appropriate variable (bsc#1175187).\n\n - arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).\n\n - arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).\n\n - arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).\n\n - arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).\n\n - arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).\n\n - arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none bsc#1175018).\n\n - arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).\n\n - arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).\n\n - arm64: vdso: do not free unallocated pages (bsc#1175181).\n\n - arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).\n\n - arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).\n\n - arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).\n\n - ARM: percpu.h: fix build error (git-fixes).\n\n - arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n\n - ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).\n\n - ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).\n\n - ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).\n\n - ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).\n\n - ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).\n\n - ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).\n\n - ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).\n\n - ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).\n\n - ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).\n\n - ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).\n\n - ASoC: rt286: fix unexpected interrupt happens (git-fixes).\n\n - ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).\n\n - ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n\n - ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n\n - ASoC: rt5682: Report the button event in the headset type only (git-fixes).\n\n - ASoC: SOF: nocodec: add missing .owner field (git-fixes).\n\n - ASoC: topology: fix kernel oops on route addition error (git-fixes).\n\n - ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).\n\n - ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).\n\n - ASoC: wm8974: remove unsupported clock mode (git-fixes).\n\n - ath10k: Acquire tx_lock in tx error paths (git-fixes).\n\n - ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).\n\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n\n - ath9k: Fix regression with Atheros 9271 (git-fixes).\n\n - atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).\n\n - AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n\n - AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n\n - AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n\n - ax88172a: fix ax88172a_unbind() failures (git-fixes).\n\n - b43: Remove uninitialized_var() usage (git-fixes).\n\n - blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).\n\n - Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).\n\n - Bluetooth: btusb: fix up firmware download sequence (git-fixes).\n\n - Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).\n\n - Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).\n\n - Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).\n\n - Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).\n\n - Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).\n\n - bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n\n - bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n\n - bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).\n\n - bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).\n\n - bpfilter: fix up a sparse annotation (bsc#1155518).\n\n - bpfilter: Initialize pos variable (bsc#1155518).\n\n - bpfilter: reject kernel addresses (bsc#1155518).\n\n - bpfilter: switch to kernel_write (bsc#1155518).\n\n - bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).\n\n - bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).\n\n - brcmfmac: Set timeout value when configuring power save (bsc#1173468).\n\n - brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n\n - bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).\n\n - bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).\n\n - btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).\n\n - btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).\n\n - btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).\n\n - btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).\n\n - btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n\n - btrfs: delete the ordered isize update code (bsc#1175377).\n\n - btrfs: do not set path->leave_spinning for truncate (bsc#1175377).\n\n - btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n\n - btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n\n - btrfs: fix block group leak when removing fails (bsc#1175149).\n\n - btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n\n - btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n\n - btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n\n - btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).\n\n - btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n\n - btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n\n - btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n\n - btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).\n\n - btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n\n - btrfs: fix race between block group removal and block group creation (bsc#1175149).\n\n - btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).\n\n - btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n\n - btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n\n - btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n\n - btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n\n - btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n\n - btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: introduce per-inode file extent tree (bsc#1175377).\n\n - btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n\n - btrfs: move extent_io_tree defs to their own header (bsc#1175377).\n\n - btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).\n\n - btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n\n - btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n\n - btrfs: qgroup: try to flush qgroup space when we get\n -EDQUOT (bsc#1120163).\n\n - btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).\n\n - btrfs: Remove leftover of in-band dedupe (bsc#1175149).\n\n - btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).\n\n - btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).\n\n - btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).\n\n - btrfs: separate out the extent io init function (bsc#1175377).\n\n - btrfs: separate out the extent leak code (bsc#1175377).\n\n - btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).\n\n - btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).\n\n - btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n\n - btrfs: use the file extent tree infrastructure (bsc#1175377).\n\n - bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).\n\n - cfg80211: check vendor command doit pointer before use (git-fixes).\n\n - clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).\n\n - clk: at91: clk-generated: check best_rate against ranges (git-fixes).\n\n - clk: at91: clk-generated: continue if\n __clk_determine_rate() returns error (git-fixes).\n\n - clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).\n\n - clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).\n\n - clk: at91: sam9x60-pll: use logical or for range check (git-fixes).\n\n - clk: at91: sckc: register slow_rc with accuracy option (git-fixes).\n\n - clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).\n\n - clk: bcm63xx-gate: fix last clock availability (git-fixes).\n\n - clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).\n\n - clk: iproc: round clock rate to the closest (git-fixes).\n\n - clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).\n\n - clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).\n\n - clk: rockchip: Revert 'fix wrong mmc sample phase shift for rk3328' (git-fixes).\n\n - clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).\n\n - clk: spear: Remove uninitialized_var() usage (git-fixes).\n\n - clk: st: Remove uninitialized_var() usage (git-fixes).\n\n - console: newport_con: fix an issue about leak related system resources (git-fixes).\n\n - crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).\n\n - crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).\n\n - crypto: ccp - Fix use of merged scatterlists (git-fixes).\n\n - crypto: ccree - fix resource leak on error path (git-fixes).\n\n - crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n\n - crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n\n - crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n\n - dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).\n\n - Delete patches.suse/apparmor-Fix-memory-leak-of-profile-proxy.p atch (bsc#1174627)\n\n - devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n\n - devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).\n\n - /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n\n - /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n\n - devres: keep both device name and resource name in pretty name (git-fixes).\n\n - dlm: remove BUG() before panic() (git-fixes).\n\n - dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).\n\n - dmaengine: dw: Initialize channel before each transfer (git-fixes).\n\n - dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).\n\n - dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n\n - dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).\n\n - dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).\n\n - dmaengine: ioat setting ioat timeout as module parameter (git-fixes).\n\n - dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).\n\n - dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).\n\n - dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).\n\n - dm: do not use waitqueue for request-based DM (bsc#1165933).\n\n - docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)\n\n - dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).\n\n - dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).\n\n - drbd: Remove uninitialized_var() usage (git-fixes).\n\n - driver core: Avoid binding drivers to dead devices (git-fixes).\n\n - drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).\n\n - drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).\n\n - drm/amd/display: Clear dm_state for fast updates (git-fixes).\n\n - drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).\n\n - drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).\n\n - drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) 	* refreshed for context changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0\n\n - drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).\n\n - drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).\n\n - drm/amdgpu: fix preemption unit test (git-fixes).\n\n - drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).\n\n - drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n\n - drm/amdgpu/sdma5: fix wptr overwritten in ->get_wptr() (git-fixes).\n\n - drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).\n\n - drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)\n\n - drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).\n\n - drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n\n - drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) 	* refreshed for context changes\n\n - drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) 	* refreshed for context changes\n\n - drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) 	* move drm_mipi_dbi.c -> tinydrm/mipi-dbi.c\n\n - drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n\n - drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).\n\n - drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).\n\n - drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).\n\n - drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).\n\n - drm: hold gem reference until object is no longer accessed (git-fixes).\n\n - drm/i915: Actually emit the await_start (bsc#1174737).\n\n - drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).\n\n - drm/i915: Do not poison i915_request.link on removal (bsc#1174737).\n\n - drm/i915: Drop no-semaphore boosting (bsc#1174737).\n\n - drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).\n\n - drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) 	* context changes\n\n - drm/i915: Flush execution tasklets before checking request status (bsc#1174737).\n\n - drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).\n\n - drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).\n\n - drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).\n\n - drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).\n\n - drm/i915/gt: Move new timelines to the end of active_list (git-fixes).\n\n - drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) 	* context changes\n\n - drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).\n\n - drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).\n\n - drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).\n\n - drm/i915: Keep track of request among the scheduling lists (bsc#1174737).\n\n - drm/i915: Lock signaler timeline while navigating (bsc#1174737).\n\n - drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).\n\n - drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).\n\n - drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).\n\n - drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) 	* context changes\n\n - drm/i915: Peel dma-fence-chains for await (bsc#1174737).\n\n - drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).\n\n - drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).\n\n - drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).\n\n - drm/i915: Rely on direct submission to the queue (bsc#1174737).\n\n - drm/i915: Remove wait priority boosting (bsc#1174737).\n\n - drm/i915: Reorder await_execution before await_request (bsc#1174737).\n\n - drm/i915: Return early for await_start on same timeline (bsc#1174737).\n\n - drm/i915: Use EAGAIN for trylock failures (bsc#1174737).\n\n - drm/imx: fix use after free (git-fixes).\n\n - drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).\n\n - drm/imx: tve: fix regulator_disable error path (git-fixes).\n\n - drm/ingenic: Fix incorrect assumption about plane->index (bsc#1152489) 	* refreshed for context changes\n\n - drm: mcde: Fix display initialization problem (git-fixes).\n\n - drm/mediatek: Check plane visibility in atomic_update (git-fixes).\n\n - drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n\n - drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).\n\n - drm/msm: fix potential memleak in error branch (git-fixes).\n\n - drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n\n - drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n\n - drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).\n\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).\n\n - drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).\n\n - drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n\n - drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n\n - drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n\n - drm/radeon: fix double free (git-fixes).\n\n - drm/stm: repair runtime power management (git-fixes).\n\n - drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).\n\n - drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).\n\n - drm/tegra: hub: Do not enable orphaned window group (git-fixes).\n\n - drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed for context changes\n\n - drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).\n\n - drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).\n\n - exfat: add missing brelse() calls on error paths (git-fixes).\n\n - exfat: fix incorrect update of stream entry in\n __exfat_truncate() (git-fixes).\n\n - exfat: fix memory leak in exfat_parse_param() (git-fixes).\n\n - exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).\n\n - fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins (git-fixes).\n\n - firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).\n\n - firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).\n\n - firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).\n\n - firmware: Fix a reference count leak (git-fixes).\n\n - firmware_loader: fix memory leak for paged buffer (bsc#1175367).\n\n - firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).\n\n - firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).\n\n - firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).\n\n - firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).\n\n - firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).\n\n - firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).\n\n - firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).\n\n - firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).\n\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n\n - fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file\n\n - fuse: copy_file_range should truncate cache (git-fixes).\n\n - fuse: fix copy_file_range cache issues (git-fixes).\n\n - fuse: Fix parameter for FS_IOC_(GET,SET)FLAGS (bsc#1175176).\n\n - fuse: fix weird page warning (bsc#1175175).\n\n - geneve: fix an uninitialized value in geneve_changelink() (git-fixes).\n\n - genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).\n\n - genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).\n\n - genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).\n\n - gfs2: Another gfs2_find_jhead fix (bsc#1174824).\n\n - gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).\n\n - go7007: add sanity checking for endpoints (git-fixes).\n\n - gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n\n - gpio: arizona: put pm_runtime in case of failure (git-fixes).\n\n - gpio: max77620: Fix missing release of interrupt (git-fixes).\n\n - gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).\n\n - gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).\n\n - gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).\n\n - gpu: host1x: Detach driver on unregister (git-fixes).\n\n - habanalabs: increase timeout during reset (git-fixes).\n\n - HID: alps: support devices with report id 2 (git-fixes).\n\n - HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n\n - HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).\n\n - HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).\n\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n\n - HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).\n\n - HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).\n\n - HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).\n\n - HID: steam: fixes race in handling device list (git-fixes).\n\n - hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).\n\n - hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).\n\n - hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n\n - hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).\n\n - hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).\n\n - hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).\n\n - hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).\n\n - i2c: also convert placeholder function to return errno (git-fixes).\n\n - i2c: eg20t: Load module automatically if ID matches (git-fixes).\n\n - i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).\n\n - i2c: iproc: fix race between client unreg and isr (git-fixes).\n\n - i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).\n\n - i2c: rcar: avoid race when unregistering slave (git-fixes).\n\n - i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).\n\n - i2c: slave: add sanity check when unregistering (git-fixes).\n\n - i2c: slave: improve sanity check when registering (git-fixes).\n\n - i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).\n\n - i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).\n\n - i40iw: fix NULL pointer dereference on a null wqe pointer (git-fixes).\n\n - i40iw: Report correct firmware version (git-fixes).\n\n - IB/cma: Fix ports memory leak in cma_configfs (git-fixes).\n\n - IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).\n\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n\n - IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n\n - IB/hfi1: Ensure pq is not left on waitlist (git-fixes).\n\n - IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).\n\n - IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).\n\n - IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).\n\n - IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).\n\n - IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).\n\n - IB/mad: Fix use after free when destroying MAD agent (git-fixes).\n\n - IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).\n\n - IB/mlx5: Fix 50G per lane indication (git-fixes).\n\n - IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).\n\n - IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).\n\n - IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).\n\n - ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n\n - IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).\n\n - IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).\n\n - IB/rdmavt: Delete unused routine (git-fixes).\n\n - IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).\n\n - IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).\n\n - ide: Remove uninitialized_var() usage (git-fixes).\n\n - ieee802154: fix one possible memleak in adf7242_probe (git-fixes).\n\n - iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).\n\n - iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).\n\n - iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).\n\n - iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).\n\n - iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).\n\n - iio: improve IIO_CONCENTRATION channel type description (git-fixes).\n\n - iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).\n\n - iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).\n\n - iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).\n\n - iio:pressure:ms5611 Fix buffer element alignment (git-fixes).\n\n - iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).\n\n - Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).\n\n - Input: elan_i2c - only increment wakeup count on touch (git-fixes).\n\n - Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).\n\n - Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).\n\n - Input: mms114 - add extra compatible for mms345l (git-fixes).\n\n - Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).\n\n - Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).\n\n - integrity: remove redundant initialization of variable ret (git-fixes).\n\n - intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).\n\n - intel_th: pci: Add Emmitsburg PCH support (git-fixes).\n\n - intel_th: pci: Add Jasper Lake CPU support (git-fixes).\n\n - intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).\n\n - io-mapping: indicate mapping failure (git-fixes).\n\n - iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).\n\n - iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).\n\n - iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).\n\n - ionic: centralize queue reset code (bsc#1167773).\n\n - ionic: fix up filter locks and debug msgs (bsc#1167773).\n\n - ionic: keep rss hash after fw update (bsc#1167773).\n\n - ionic: unlock queue mutex in error path (bsc#1167773).\n\n - ionic: update filter id after replay (bsc#1167773).\n\n - ionic: update the queue count on open (bsc#1167773).\n\n - ionic: use mutex to protect queue operations (bsc#1167773).\n\n - ionic: use offset for ethtool regs data (bsc#1167773).\n\n - irqchip/gic: Atomically update affinity (bsc#1175195).\n\n - kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.pat ch (bsc1174263).\n\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n\n - kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).\n\n - kABI workaround for enum cpuhp_state (git-fixes).\n\n - kABI workaround for struct kvm_device (git-fixes). Just change an variable to 'const' type in kvm_device.\n\n - kABI workaround for struct kvm_vcpu_arch (git-fixes).\n\n - kernel.h: remove duplicate include of asm/div64.h (git-fixes).\n\n - keys: asymmetric: fix error return code in software_key_query() (git-fixes).\n\n - kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).\n\n - KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n\n - KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Annotate hyp NMI-related functions as\n __always_inline (bsc#1175190).\n\n - KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).\n\n - KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).\n\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).\n\n - KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).\n\n - KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).\n\n - KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).\n\n - KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).\n\n - KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).\n\n - KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).\n\n - KVM: nVMX: always update CR3 in VMCS (git-fixes).\n\n - KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).\n\n - KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).\n\n - l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n\n - l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n\n - leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n\n - leds: core: Flush scheduled work for system suspend (git-fixes).\n\n - leds: da903x: fix use-after-free on unbind (git-fixes).\n\n - leds: gpio: Fix semantic error (git-fixes).\n\n - leds: lm3533: fix use-after-free on unbind (git-fixes).\n\n - leds: lm355x: avoid enum conversion warning (git-fixes).\n\n - leds: lm36274: fix use-after-free on unbind (git-fixes).\n\n - leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n\n - libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).\n\n - lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).\n\n - liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n\n - locktorture: Print ratio of acquisitions, not failures (bsc#1149032).\n\n - mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n\n - mac80211: fix misplaced while instead of if (git-fixes).\n\n - mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n\n - mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n\n - media: cec: silence shift wrapping warning in\n __cec_s_log_addrs() (git-fixes).\n\n - media: cxusb-analog: fix V4L2 dependency (git-fixes).\n\n - media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n\n - media: firewire: Using uninitialized values in node_probe() (git-fixes).\n\n - media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).\n\n - media: media-request: Fix crash if memory allocation fails (git-fixes).\n\n - media: nuvoton-cir: remove setting tx carrier functions (git-fixes).\n\n - media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n\n - media: sur40: Remove uninitialized_var() usage (git-fixes).\n\n - media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).\n\n - mei: bus: do not clean driver pointer (git-fixes).\n\n - mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n\n - mfd: dln2: Run event handler loop under spinlock (git-fixes).\n\n - mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).\n\n - mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).\n\n - mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).\n\n - mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).\n\n - mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).\n\n - mm: Fix protection usage propagation (bsc#1174002).\n\n - mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).\n\n - mtd: properly check all write ioctls for permissions (git-fixes).\n\n - mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).\n\n - mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).\n\n - mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).\n\n - mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).\n\n - mwifiex: Prevent memory corruption handling keys (git-fixes).\n\n - nbd: Fix memory leak in nbd_add_socket (git-fixes).\n\n - ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n\n - net/bpfilter: Initialize pos in\n __bpfilter_process_sockopt (bsc#1155518).\n\n - net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).\n\n - net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n\n - netdevsim: fix unbalaced locking in nsim_create() (git-fixes).\n\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n\n - net: ena: add reserved PCI device ID (bsc#1174852).\n\n - net: ena: add support for reporting of packet drops (bsc#1174852).\n\n - net: ena: add support for the rx offset feature (bsc#1174852).\n\n - net: ena: add support for traffic mirroring (bsc#1174852).\n\n - net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n\n - net: ena: allow setting the hash function without changing the key (bsc#1174852).\n\n - net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).\n\n - net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n\n - net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n\n - net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n\n - net: ena: changes to RSS hash key allocation (bsc#1174852).\n\n - net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n\n - net: ena: cosmetic: code reorderings (bsc#1174852).\n\n - net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n\n - net: ena: cosmetic: fix line break issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spacing issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n\n - net: ena: cosmetic: minor code changes (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n\n - net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n\n - net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n\n - net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n\n - net: ena: drop superfluous prototype (bsc#1174852).\n\n - net: ena: enable support of rss hash key and function changes (bsc#1174852).\n\n - net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n\n - net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n\n - net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n\n - net: ena: fix continuous keep-alive resets (bsc#1174852).\n\n - net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n\n - net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n\n - net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n\n - net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n\n - net: ena: Make some functions static (bsc#1174852).\n\n - net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n\n - net: ena: reduce driver load time (bsc#1174852).\n\n - net: ena: remove code that does nothing (bsc#1174852).\n\n - net: ena: remove set but not used variable 'hash_key' (bsc#1174852).\n\n - net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n\n - net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n\n - net: ena: support new LLQ acceleration mode (bsc#1174852).\n\n - net: ena: use explicit variable size for clarity (bsc#1174852).\n\n - net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n\n - net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).\n\n - netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).\n\n - netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).\n\n - netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).\n\n - netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).\n\n - net: Fix a documentation bug wrt.\n ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n\n - net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).\n\n - net: hns3: check reset pending after FLR prepare (bsc#1154353).\n\n - net: hns3: fix error handling for desc filling (git-fixes).\n\n - net: hns3: fix for not calculating TX BD send size correctly (git-fixes).\n\n - net: hns3: fix return value error when query MAC link status fail (git-fixes).\n\n - net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).\n\n - net: lan78xx: add missing endpoint sanity check (git-fixes).\n\n - net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n\n - net: lan78xx: replace bogus endpoint lookup (git-fixes).\n\n - net: macb: call pm_runtime_put_sync on failure path (git-fixes).\n\n - net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).\n\n - net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).\n\n - net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).\n\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).\n\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).\n\n - net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).\n\n - net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).\n\n - net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).\n\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).\n\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).\n\n - net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).\n\n - net: phy: Check harder for errors in get_phy_id() (git-fixes).\n\n - net: phy: fix memory leak in device-create error path (git-fixes).\n\n - net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).\n\n - net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).\n\n - net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).\n\n - net/smc: fix restoring of fallback changes (git-fixes).\n\n - net: stmmac: do not attach interface until resume finishes (bsc#1174072).\n\n - net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).\n\n - net: stmmac: dwc-qos: use generic device api (bsc#1174072).\n\n - net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).\n\n - net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).\n\n - net/tls: fix encryption error checking (git-fixes).\n\n - net/tls: free record only on encryption error (git-fixes).\n\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n\n - nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n\n - nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).\n\n - nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).\n\n - NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).\n\n - NTB: Fix static check warning in perf_clear_test (git-fixes).\n\n - NTB: Fix the default port and peer numbers for legacy drivers (git-fixes).\n\n - ntb: hw: remove the code that sets the DMA mask (git-fixes).\n\n - NTB: ntb_pingpong: Choose doorbells based on port number (git-fixes).\n\n - NTB: ntb_test: Fix bug when counting remote files (git-fixes).\n\n - NTB: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).\n\n - NTB: perf: Do not require one more memory window than number of peers (git-fixes).\n\n - NTB: perf: Fix race condition when run with ntb_test (git-fixes).\n\n - NTB: perf: Fix support for hardware that does not have port numbers (git-fixes).\n\n - ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).\n\n - NTB: Revert the change to use the NTB device dev for DMA allocations (git-fixes).\n\n - ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).\n\n - ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).\n\n - ovl: inode reference leak in ovl_is_inuse true case (git-fixes).\n\n - padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).\n\n - padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).\n\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n\n - PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n\n - PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).\n\n - PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).\n\n - PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).\n\n - PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).\n\n - PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n\n - PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n\n - PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).\n\n - PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n\n - PCI: qcom: Add missing reset for ipq806x (git-fixes).\n\n - PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n\n - PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n\n - PCI: rcar: Fix runtime PM imbalance on error (git-fixes).\n\n - PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n\n - pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n\n - PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n\n - PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n\n - PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).\n\n - percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).\n\n - phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).\n\n - phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).\n\n - phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).\n\n - phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n\n - pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n\n - pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n\n - pinctrl: single: fix function name in documentation (git-fixes).\n\n - pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n\n - platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).\n\n - platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n\n - platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n\n - platform/x86: ISST: Increase timeout (bsc#1174185).\n\n - PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).\n\n - powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n\n - powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n\n - powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n\n - powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n\n - powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n\n - powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).\n\n - powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n\n - powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n\n - powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n\n - powerpc/pseries: PCIE PHB reset (bsc#1174689).\n\n - powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n\n - powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n\n - powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n\n - powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n\n - power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n\n - pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n\n - qed: suppress 'do not support RoCE & iWARP' flooding on HW init (git-fixes).\n\n - qed: suppress false-positives interrupt error messages on HW init (git-fixes).\n\n - r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).\n\n - r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).\n\n - r8169: fix resume on cable plug-in (bsc#1175296).\n\n - r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).\n\n - r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).\n\n - r8169: read common register for PCI commit (bsc#1175296).\n\n - random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).\n\n - random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).\n\n - random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).\n\n - RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).\n\n - RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).\n\n - RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).\n\n - RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).\n\n - RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).\n\n - RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).\n\n - RDMA/cm: Remove a race freeing timewait_info (git-fixes).\n\n - RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).\n\n - RDMA/core: Fix double destruction of uobject (git-fixes).\n\n - RDMA/core: Fix double put of resource (git-fixes).\n\n - RDMA/core: Fix missing error check on dev_set_name() (git-fixes).\n\n - RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).\n\n - RDMA/core: Fix race between destroy and release FD object (git-fixes).\n\n - RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).\n\n - RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).\n\n - RDMA/counter: Query a counter before release (git-fixes).\n\n - RDMA/efa: Set maximum pkeys device attribute (git-fixes).\n\n - RDMA/hns: Bugfix for querying qkey (git-fixes).\n\n - RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).\n\n - RDMA/iwcm: Fix iwcm work deallocation (git-fixes).\n\n - RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).\n\n - RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).\n\n - RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).\n\n - RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).\n\n - RDMA/mlx5: Add init2init as a modify command (git-fixes).\n\n - RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).\n\n - RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).\n\n - RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).\n\n - RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).\n\n - RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).\n\n - RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).\n\n - RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).\n\n - RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).\n\n - RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).\n\n - RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).\n\n - RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).\n\n - RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).\n\n - RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).\n\n - RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).\n\n - RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).\n\n - RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).\n\n - RDMA/rxe: Set default vendor ID (git-fixes).\n\n - RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).\n\n - RDMA/siw: Fix failure handling during device creation (git-fixes).\n\n - RDMA/siw: Fix passive connection establishment (git-fixes).\n\n - RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).\n\n - RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).\n\n - RDMA/siw: Fix reporting vendor_part_id (git-fixes).\n\n - RDMA/siw: Fix setting active_mtu attribute (git-fixes).\n\n - RDMA/siw: Fix setting active_(speed, width) attributes (git-fixes).\n\n - RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).\n\n - RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).\n\n - regmap: debugfs: check count when read regmap file (git-fixes).\n\n - regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).\n\n - regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n\n - regmap: fix alignment issue (git-fixes).\n\n - regmap: Fix memory leak from regmap_register_patch (git-fixes).\n\n - regulator: gpio: Honor regulator-boot-on property (git-fixes).\n\n - remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).\n\n - remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).\n\n - remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).\n\n - Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (git-fixes).\n\n - Revert 'drm/amd/display: Expose connector VRR range via debugfs' (bsc#1152489) 	* refreshed for context changes\n\n - Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (git-fixes).\n\n - Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).\n\n - Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).\n\n - Revert 'thermal: mediatek: fix register index error' (git-fixes).\n\n - rhashtable: Document the right function parameters (bsc#1174880).\n\n - rhashtable: drop duplicated word in <linux/rhashtable.h> (bsc#1174880).\n\n - rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).\n\n - rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).\n\n - rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).\n\n - RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).\n\n - rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.\n\n - rpm/modules.fips: add ecdh_generic (boo#1173813)\n\n - rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (bsc#1154353).\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).\n\n - rtw88: fix LDPC field for RA info (git-fixes).\n\n - rtw88: fix short GI capability based on current bandwidth (git-fixes).\n\n - s390: fix syscall_get_error for compat processes (git-fixes).\n\n - s390/ism: fix error return code in ism_probe() (git-fixes).\n\n - s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).\n\n - s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).\n\n - s390/qdio: consistently restore the IRQ handler (git-fixes).\n\n - s390/qdio: put thinint indicator after early error (git-fixes).\n\n - s390/qdio: tear down thinint indicator after early error (git-fixes).\n\n - s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n\n - sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).\n\n - scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).\n\n - scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).\n\n - scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).\n\n - scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).\n\n - scsi: libfc: free response frame from GPN_ID (bsc#1173849).\n\n - scsi: libfc: Handling of extra kref (bsc#1173849).\n\n - scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).\n\n - scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).\n\n - scsi: libfc: Skip additional kref updating work event (bsc#1173849).\n\n - scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).\n\n - scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).\n\n - selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).\n\n - selinux: fall back to ref-walk if audit is required (bsc#1174333).\n\n - selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).\n\n - seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).\n\n - serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).\n\n - serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).\n\n - serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).\n\n - serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).\n\n - serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).\n\n - serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).\n\n - serial: tegra: fix CREAD handling for PIO (git-fixes).\n\n - SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n\n - soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).\n\n - soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).\n\n - spi: davinci: Remove uninitialized_var() usage (git-fixes).\n\n - spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n\n - spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).\n\n - spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).\n\n - spi: rockchip: Fix error in SPI slave pio read (git-fixes).\n\n - spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n\n - spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).\n\n - spi: spi-geni-qcom: Actually use our FIFO (git-fixes).\n\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).\n\n - spi: sun4i: update max transfer size reported (git-fixes).\n\n - staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n\n - staging: comedi: verify array index is correct before using it (git-fixes).\n\n - Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).\n\n - staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n\n - staging: rtl8712: handle firmware load failure (git-fixes).\n\n - staging: vchiq_arm: Add a matching unregister call (git-fixes).\n\n - staging: wlan-ng: properly check endpoint types (git-fixes).\n\n - SUNRPC dont update timeout value on connection reset (bsc#1174263).\n\n - sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).\n\n - tcp: md5: allow changing MD5 keys in all socket states (git-fixes).\n\n - thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).\n\n - thermal: int3403_thermal: Downgrade error message (git-fixes).\n\n - thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).\n\n - tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).\n\n - tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).\n\n - tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (git-fixes).\n\n - tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n\n - ubsan: check panic_on_warn (bsc#1174805).\n\n - udp: Copy has_conns in reuseport_grow() (git-fixes).\n\n - udp: Improve load balancing for SO_REUSEPORT (git-fixes).\n\n - uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).\n\n - USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).\n\n - usb: chipidea: core: add wakeup support for extcon (git-fixes).\n\n - usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).\n\n - usb: dwc2: Fix shutdown callback in platform (git-fixes).\n\n - usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).\n\n - usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).\n\n - usb: dwc3: pci: add support for the Intel Tiger Lake PCH\n -H variant (git-fixes).\n\n - usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).\n\n - usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).\n\n - usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).\n\n - usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).\n\n - usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).\n\n - usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).\n\n - usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).\n\n - usb: hso: check for return value in hso_serial_common_create() (git-fixes).\n\n - usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n\n - USB: iowarrior: fix up report size handling for some devices (git-fixes).\n\n - usbip: tools: fix module name in man page (git-fixes).\n\n - usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).\n\n - USB: serial: ch341: add new Product ID for CH340 (git-fixes).\n\n - USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n\n - USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n\n - USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).\n\n - USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n\n - USB: serial: iuu_phoenix: fix memory corruption (git-fixes).\n\n - USB: serial: option: add GosunCn GM500 series (git-fixes).\n\n - USB: serial: option: add Quectel EG95 LTE modem (git-fixes).\n\n - USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n\n - usb: tegra: Fix allocation for the FPCI context (git-fixes).\n\n - usb: xhci: define IDs for various ASMedia host controllers (git-fixes).\n\n - usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n\n - usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n\n - usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).\n\n - video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n\n - video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).\n\n - virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n\n - virt: vbox: Fix guest capabilities mask check (git-fixes).\n\n - virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).\n\n - vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n\n - vt: Reject zero-sized screen buffer size (git-fixes).\n\n - vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).\n\n - watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).\n\n - watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).\n\n - watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).\n\n - watchdog: initialize device before misc_register (git-fixes).\n\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n\n - wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n\n - wireless: Use offsetof instead of custom macro (git-fixes).\n\n - wl1251: fix always return 0 error (git-fixes).\n\n - workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).\n\n - xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).\n\n - xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).\n\n - xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).\n\n - xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).\n\n - xfs: fix inode allocation block res calculation precedence (git-fixes).\n\n - xfs: fix reflink quota reservation accounting error (git-fixes).\n\n - xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).", "cvss3": {}, "published": "2020-08-24T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2020-1236)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10781", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-15780", "CVE-2020-16166"], "modified": "2022-05-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:bbswitch", "p-cpe:/a:novell:opensuse:bbswitch-debugsource", "p-cpe:/a:novell:opensuse:drbd-debugsource", "p-cpe:/a:novell:opensuse:bbswitch-kmp-default", "p-cpe:/a:novell:opensuse:drbd-kmp-default", "p-cpe:/a:novell:opensuse:bbswitch-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:drbd-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:bbswitch-kmp-preempt", "p-cpe:/a:novell:opensuse:drbd-kmp-preempt", "p-cpe:/a:novell:opensuse:bbswitch-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:drbd-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-debugsource", "p-cpe:/a:novell:opensuse:hdjmod-kmp-default", "p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:crash", "p-cpe:/a:novell:opensuse:hdjmod-kmp-preempt", "p-cpe:/a:novell:opensuse:crash-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:crash-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:crash-devel", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:crash-eppic", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:crash-eppic-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:crash-gcore", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:crash-gcore-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-default", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-preempt", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:crash-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:dpdk", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:dpdk-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:dpdk-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:dpdk-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:dpdk-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:dpdk-examples", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:dpdk-examples-debuginfo", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:dpdk-kmp-default", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-preempt", "p-cpe:/a:novell:opensuse:dpdk-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-preempt-debuginfo", "p-cpe:/a:novell:opensuse:dpdk-kmp-preempt", "p-cpe:/a:novell:opensuse:kernel-preempt-debugsource", "p-cpe:/a:novell:opensuse:kernel-preempt-devel", "p-cpe:/a:novell:opensuse:dpdk-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:kernel-preempt-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:dpdk-tools", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:libdpdk-20_0", "p-cpe:/a:novell:opensuse:dpdk-tools-debuginfo", "p-cpe:/a:novell:opensuse:drbd", "p-cpe:/a:novell:opensuse:libdpdk-20_0-debuginfo", "p-cpe:/a:novell:opensuse:openafs-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:mhvtl", "p-cpe:/a:novell:opensuse:mhvtl-debuginfo", "p-cpe:/a:novell:opensuse:mhvtl-debugsource", "p-cpe:/a:novell:opensuse:openafs-kmp-preempt", "p-cpe:/a:novell:opensuse:mhvtl-kmp-default", "p-cpe:/a:novell:opensuse:openafs-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:mhvtl-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:mhvtl-kmp-preempt", "p-cpe:/a:novell:opensuse:openafs-server", "p-cpe:/a:novell:opensuse:mhvtl-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:openafs-server-debuginfo", "p-cpe:/a:novell:opensuse:openafs", "p-cpe:/a:novell:opensuse:openafs-authlibs", "p-cpe:/a:novell:opensuse:pcfclock", "p-cpe:/a:novell:opensuse:openafs-authlibs-debuginfo", "p-cpe:/a:novell:opensuse:openafs-authlibs-devel", "p-cpe:/a:novell:opensuse:pcfclock-debuginfo", "p-cpe:/a:novell:opensuse:openafs-client", "p-cpe:/a:novell:opensuse:pcfclock-debugsource", "p-cpe:/a:novell:opensuse:openafs-client-debuginfo", "p-cpe:/a:novell:opensuse:openafs-debuginfo", "p-cpe:/a:novell:opensuse:openafs-debugsource", "p-cpe:/a:novell:opensuse:openafs-devel", "p-cpe:/a:novell:opensuse:pcfclock-kmp-default", "p-cpe:/a:novell:opensuse:openafs-devel-debuginfo", "p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:openafs-fuse_client", "p-cpe:/a:novell:opensuse:pcfclock-kmp-preempt", "p-cpe:/a:novell:opensuse:openafs-fuse_client-debuginfo", "p-cpe:/a:novell:opensuse:pcfclock-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:openafs-kernel-source", "p-cpe:/a:novell:opensuse:openafs-kmp-default", "p-cpe:/a:novell:opensuse:python3-virtualbox", "p-cpe:/a:novell:opensuse:python3-virtualbox-debuginfo", "p-cpe:/a:novell:opensuse:rtl8812au", "p-cpe:/a:novell:opensuse:rtl8812au-debugsource", "p-cpe:/a:novell:opensuse:rtl8812au-kmp-default", "p-cpe:/a:novell:opensuse:rtl8812au-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-websrv", "p-cpe:/a:novell:opensuse:rtl8812au-kmp-preempt", "p-cpe:/a:novell:opensuse:rtl8812au-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons", "p-cpe:/a:novell:opensuse:xtables-addons-debuginfo", "p-cpe:/a:novell:opensuse:sysdig", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-default", "p-cpe:/a:novell:opensuse:sysdig-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:sysdig-debugsource", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-preempt", "p-cpe:/a:novell:opensuse:sysdig-kmp-default", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:sysdig-kmp-default-debuginfo", "cpe:/o:novell:opensuse:15.2", "p-cpe:/a:novell:opensuse:sysdig-kmp-preempt", "p-cpe:/a:novell:opensuse:sysdig-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:v4l2loopback-debugsource", "p-cpe:/a:novell:opensuse:v4l2loopback-kmp-default", "p-cpe:/a:novell:opensuse:v4l2loopback-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:v4l2loopback-kmp-preempt", "p-cpe:/a:novell:opensuse:v4l2loopback-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:v4l2loopback-utils", "p-cpe:/a:novell:opensuse:vhba-kmp-default", "p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:vhba-kmp-preempt", "p-cpe:/a:novell:opensuse:vhba-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox", "p-cpe:/a:novell:opensuse:virtualbox-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-debugsource", "p-cpe:/a:novell:opensuse:virtualbox-devel", "p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons", "p-cpe:/a:novell:opensuse:virtualbox-guest-source", "p-cpe:/a:novell:opensuse:virtualbox-guest-tools", "p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-guest-x11", "p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-host-source", "p-cpe:/a:novell:opensuse:virtualbox-kmp-default", "p-cpe:/a:novell:opensuse:virtualbox-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt", "p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-qt", "p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-vnc"], "id": "OPENSUSE-2020-1236.NASL", "href": "https://www.tenable.com/plugins/nessus/139766", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2020-1236.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139766);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/13\");\n\n script_cve_id(\"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10781\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-15780\", \"CVE-2020-16166\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2020-1236)\");\n script_summary(english:\"Check for the openSUSE-2020-1236 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The openSUSE Leap 15.2 kernel was updated to receive various security\nand bugfixes.\n\nThis update is signed with the new UEFI signing key for openSUSE. It\ncontains rebuilds of all available KMP packages also rebuilt with the\nnew UEFi signing key. (boo#1174543)\n\nThe following security bugs were fixed :\n\n - CVE-2020-14356: A use after free vulnerability in cgroup\n BPF component was fixed (bsc#1175213).\n\n - CVE-2020-14331: A buffer over write in vgacon_scroll was\n fixed (bnc#1174205).\n\n - CVE-2020-16166: The Linux kernel allowed remote\n attackers to make observations that help to obtain\n sensitive information about the internal state of the\n network RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and kernel/time/timer.c\n (bnc#1174757).\n\n - CVE-2020-10135: Legacy pairing and secure-connections\n pairing authentication in Bluetooth® BR/EDR Core\n Specification v5.2 and earlier may have allowed an\n unauthenticated user to complete authentication without\n pairing credentials via adjacent access. An\n unauthenticated, adjacent attacker could impersonate a\n Bluetooth BR/EDR master or slave to pair with a\n previously paired remote device to successfully complete\n the authentication procedure without knowing the link\n key (bnc#1171988).\n\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a\n possible use-after-free due to a race condition. This\n could lead to local escalation of privilege with System\n execution privileges needed. User interaction is not\n needed for exploitation (bnc#1174462).\n\n - CVE-2020-15780: An issue was discovered in\n drivers/acpi/acpi_configfs.c in the Linux kernel\n Injection of malicious ACPI tables via configfs could be\n used by attackers to bypass lockdown and secure boot\n restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\n - CVE-2020-10781: zram sysfs resource consumption was\n fixed (bnc#1173074).\n\nThe following non-security bugs were fixed :\n\n - 9p/trans_fd: Fix concurrency del of req_list in\n p9_fd_cancelled/p9_read_work (git-fixes).\n\n - ACPICA: Dispatcher: add status checks (git-fixes).\n\n - ACPI/IORT: Fix PMCG node single ID mapping handling\n (git-fixes).\n\n - ACPI: video: Use native backlight on Acer Aspire 5783z\n (git-fixes).\n\n - ACPI: video: Use native backlight on Acer TravelMate\n 5735Z (git-fixes).\n\n - af_key: pfkey_dump needs parameter validation\n (git-fixes).\n\n - agp/intel: Fix a memory leak on module initialisation\n failure (git-fixes).\n\n - ALSA: asihpi: delete duplicated word (git-fixes).\n\n - ALSA: atmel: Remove invalid 'fall through' comments\n (git-fixes).\n\n - ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).\n\n - ALSA: echoaduio: Drop superfluous volatile modifier\n (git-fixes).\n\n - ALSA: echoaudio: Address bugs in the interrupt handling\n (git-fixes).\n\n - ALSA: echoaudio: Fix potential Oops in snd_echo_resume()\n (git-fixes).\n\n - ALSA: echoaudio: Prevent races in calls to\n set_audio_format() (git-fixes).\n\n - ALSA: echoaudio: Prevent some noise on unloading the\n module (git-fixes).\n\n - ALSA: echoaudio: Race conditions around 'opencount'\n (git-fixes).\n\n - ALSA: echoaudio: re-enable IRQs on failure path\n (git-fixes).\n\n - ALSA: echoaudio: Remove redundant check (git-fixes).\n\n - ALSA: firewire: fix kernel-doc (git-fixes).\n\n - ALSA: hda: Add support for Loongson 7A1000 controller\n (git-fixes).\n\n - ALSA: hda/ca0132 - Add new quirk ID for Recon3D\n (git-fixes).\n\n - ALSA: hda/ca0132 - Fix AE-5 microphone selection\n commands (git-fixes).\n\n - ALSA: hda/ca0132 - Fix ZxR Headphone gain control get\n value (git-fixes).\n\n - ALSA: hda: Enable sync-write operation as default for\n all controllers (git-fixes).\n\n - ALSA: hda: fix NULL pointer dereference during suspend\n (git-fixes).\n\n - ALSA: hda: fix snd_hda_codec_cleanup() documentation\n (git-fixes).\n\n - ALSA: hda - fix the micmute led status for Lenovo\n ThinkCentre AIO (git-fixes).\n\n - ALSA: hda/hdmi: Add quirk to force connectivity\n (git-fixes).\n\n - ALSA: hda/hdmi: Fix keep_power assignment for\n non-component devices (git-fixes).\n\n - ALSA: hda/hdmi: Use force connectivity quirk on another\n HP desktop (git-fixes).\n\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H\n and EKL (jsc#SLE-13261).\n\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H\n and EKL (jsc#SLE-13261).\n\n - ALSA: hda/realtek: Add alc269/alc662 pin-tables for\n Loongson-3 laptops (git-fixes).\n\n - ALSA: hda/realtek - change to suitable link model for\n ASUS platform (git-fixes).\n\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate\n B311R-31 with ALC256 (git-fixes).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG\n Zephyrus G14(G401) series with ALC289 (git-fixes).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG\n Zephyrus G15(GA502) series with ALC289 (git-fixes).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and\n UX534 (git-fixes).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563\n (git-fixes).\n\n - ALSA: hda/realtek: Fix add a 'ultra_low_power' function\n for intel reference board (alc256) (git-fixes).\n\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding\n quirk for Samsung Notebook Pen S (git-fixes).\n\n - ALSA: hda/realtek - Fixed HP right speaker no sound\n (git-fixes).\n\n - ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged\n (git-fixes).\n\n - ALSA: hda/realtek - Fix unused variable warning\n (git-fixes).\n\n - ALSA: hda/realtek - fixup for yet another Intel\n reference board (git-fixes).\n\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS\n ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).\n\n - ALSA: hda - reverse the setting value in the\n micmute_led_set (git-fixes).\n\n - ALSA: hda/tegra: Disable sync-write operation\n (git-fixes).\n\n - ALSA: hda: Workaround for spurious wakeups on some Intel\n platforms (git-fixes).\n\n - ALSA: info: Drop WARN_ON() from buffer NULL sanity check\n (git-fixes).\n\n - ALSA: isa: delete repeated words in comments\n (git-fixes).\n\n - ALSA: isa/gus: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: isa/gus: remove -Wmissing-prototypes warnings\n (git-fixes).\n\n - ALSA: line6: add hw monitor volume control for POD HD500\n (git-fixes).\n\n - ALSA: line6: Perform sanity check for each URB creation\n (git-fixes).\n\n - ALSA: line6: Sync the pending work cancel at\n disconnection (git-fixes).\n\n - ALSA: line6: Use kmemdup in podhd_set_monitor_level()\n (git-fixes).\n\n - ALSA: pci/asihpi: fix kernel-doc (git-fixes).\n\n - ALSA: pci/asihpi: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/asihpi: remove 'set but not used' warnings\n (git-fixes).\n\n - ALSA: pci/au88x0: remove 'defined but not used' warnings\n (git-fixes).\n\n - ALSA: pci/aw2-saa7146: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).\n\n - ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).\n\n - ALSA: pci: delete repeated words in comments\n (git-fixes).\n\n - ALSA: pci/echoaudio: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/emu10k1: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/es1938: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/fm801: fix kernel-doc (git-fixes).\n\n - ALSA: pci/korg1212: remove 'set but not used' warnings\n (git-fixes).\n\n - ALSA: pci/oxygen/xonar_wm87x6: remove always true\n condition (git-fixes).\n\n - ALSA: pci/rme9652/hdspm: remove always true condition\n (git-fixes).\n\n - ALSA: pci/via82xx: remove 'set but not used' warnings\n (git-fixes).\n\n - ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).\n\n - ALSA: seq: oss: Serialize ioctls (git-fixes).\n\n - ALSA: usb-audio: Add implicit feedback quirk for SSL2\n (git-fixes).\n\n - ALSA: usb-audio: add quirk for Pioneer DDJ-RB\n (git-fixes).\n\n - ALSA: usb-audio: Add registration quirk for Kingston\n HyperX Cloud Flight S (git-fixes).\n\n - ALSA: usb-audio: add startech usb audio dock name\n (git-fixes).\n\n - ALSA: usb-audio: Add support for Lenovo ThinkStation\n P620 (git-fixes).\n\n - ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume\n knob support (git-fixes).\n\n - ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume\n control (git-fixes).\n\n - ALSA: usb-audio: endpoint : remove needless check before\n usb_free_coherent() (git-fixes).\n\n - ALSA: usb-audio: fix overeager device match for\n MacroSilicon MS2109 (bsc#1174625).\n\n - ALSA: usb-audio: Fix race against the error recovery URB\n submission (git-fixes).\n\n - ALSA: usb-audio: Fix some typos (git-fixes).\n\n - ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus'\n (git-fixes).\n\n - ALSA: usb-audio: work around streaming quirk for\n MacroSilicon MS2109 (git-fixes).\n\n - ALSA: usb/line6: remove 'defined but not used' warning\n (git-fixes).\n\n - ALSA: vx_core: remove warning for empty loop body\n (git-fixes).\n\n - ALSA: xen: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: xen: Remove superfluous fall through comments\n (git-fixes).\n\n - apparmor: ensure that dfa state tables have entries\n (git-fixes).\n\n - apparmor: fix introspection of of task mode for\n unconfined tasks (git-fixes).\n\n - apparmor: Fix memory leak of profile proxy (git-fixes).\n\n - apparmor: Fix use-after-free in aa_audit_rule_init\n (git-fixes).\n\n - apparmor: remove useless aafs_create_symlink\n (git-fixes).\n\n - appletalk: Fix atalk_proc_init() return path\n (git-fixes).\n\n - arm64: armv8_deprecated: Fix undef_hook mask for thumb\n setend (bsc#1175180).\n\n - arm64: cacheflush: Fix KGDB trap detection\n (bsc#1175188).\n\n - arm64: csum: Fix handling of bad packets (bsc#1175192).\n\n - arm64: dts: allwinner: a64: Remove unused SPDIF sound\n card (none bsc#1175016).\n\n - arm64: dts: clearfog-gt-8k: set gigabit PHY reset\n deassert delay (bsc#1175347).\n\n - arm64: dts: exynos: Fix silent hang after boot on\n Espresso (bsc#1175346).\n\n - arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range\n (none bsc#1175019).\n\n - arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY\n (bsc#1175345).\n\n - arm64: dts: librem5-devkit: add a vbus supply to usb0\n (none bsc#1175013).\n\n - arm64: dts: ls1028a: delete extraneous #interrupt-cells\n for ENETC RCIE (none bsc#1175012).\n\n - arm64: dts: ls1043a-rdb: correct RGMII delay mode to\n rgmii-id (bsc#1174398).\n\n - arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID\n mode (bsc#1174398).\n\n - arm64: dts: qcom: msm8998-clamshell: Fix label on l15\n regulator (git-fixes).\n\n - arm64: dts: rockchip: fix rk3399-puma gmac reset gpio\n (none bsc#1175021).\n\n - arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio\n (none bsc#1175020).\n\n - arm64: dts: rockchip: Rename dwc3 device nodes on rk3399\n to make dtc happy (none bsc#1175015).\n\n - arm64: dts: rockchip: Replace RK805 PMIC node name with\n 'pmic' on rk3328 boards (none bsc#1175014).\n\n - arm64: dts: uDPU: fix broken ethernet (bsc#1175344).\n\n - arm64: dts: uniphier: Set SCSSI clock and reset IDs for\n each channel (none bsc#1175011).\n\n - arm64: errata: use arm_smccc_1_1_get_conduit()\n (bsc#1174906).\n\n - arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).\n\n - arm64: fix the flush_icache_range arguments in\n machine_kexec (bsc#1175184).\n\n - arm64: hugetlb: avoid potential NULL dereference\n (bsc#1175183).\n\n - arm64: hw_breakpoint: Do not invoke overflow handler on\n uaccess watchpoints (bsc#1175189).\n\n - arm64: insn: Fix two bugs in encoding 32-bit logical\n immediates (bsc#1175186).\n\n - arm64: kexec_file: print appropriate variable\n (bsc#1175187).\n\n - arm64: kgdb: Fix single-step exception handling oops\n (bsc#1175191).\n\n - arm64: Retrieve stolen time as paravirtualized guest\n (bsc#1172197 jsc#SLE-13593).\n\n - arm64: Retrieve stolen time as paravirtualized guest\n (bsc#1172197 jsc#SLE-13593).\n\n - arm64: tegra: Enable I2C controller for EEPROM (none\n bsc#1175010).\n\n - arm64: tegra: Fix ethernet phy-mode for Jetson Xavier\n (none bsc#1175017).\n\n - arm64: tegra: Fix flag for 64-bit resources in 'ranges'\n property (none bsc#1175018).\n\n - arm64: tegra: Fix Tegra194 PCIe compatible string (none\n bsc#1175009).\n\n - arm64: vdso: Add -fasynchronous-unwind-tables to cflags\n (bsc#1175182).\n\n - arm64: vdso: do not free unallocated pages\n (bsc#1175181).\n\n - arm/arm64: Make use of the SMCCC 1.1 wrapper\n (bsc#1174906).\n\n - arm/arm64: Provide a wrapper for SMCCC 1.1 calls\n (bsc#1174906).\n\n - arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()\n (bsc#1174906).\n\n - ARM: percpu.h: fix build error (git-fixes).\n\n - arm: spectre-v2: use arm_smccc_1_1_get_conduit()\n (bsc#1174906).\n\n - ASoC: codecs: max98373: Removed superfluous volume\n control from chip default (git-fixes).\n\n - ASoc: codecs: max98373: remove Idle_bias_on to let codec\n suspend (git-fixes).\n\n - ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK\n (git-fixes).\n\n - ASoC: hdac_hda: fix deadlock after PCM open error\n (git-fixes).\n\n - ASoC: Intel: bxt_rt298: add missing .owner field\n (git-fixes).\n\n - ASoC: Intel: bytcht_es8316: Add missed put_device()\n (git-fixes).\n\n - ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).\n\n - ASoC: meson: axg-tdm-interface: fix link fmt setup\n (git-fixes).\n\n - ASoC: meson: fixes the missed kfree() for\n axg_card_add_tdm_loopback (git-fixes).\n\n - ASoC: rockchip: add format and rate constraints on\n rk3399 (git-fixes).\n\n - ASoC: rt286: fix unexpected interrupt happens\n (git-fixes).\n\n - ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and\n enable it on the Lenovo Miix 2 10 (git-fixes).\n\n - ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n\n - ASoC: rt5670: Fix dac- and adc- vol-tlv values being off\n by a factor of 10 (git-fixes).\n\n - ASoC: rt5682: Report the button event in the headset\n type only (git-fixes).\n\n - ASoC: SOF: nocodec: add missing .owner field\n (git-fixes).\n\n - ASoC: topology: fix kernel oops on route addition error\n (git-fixes).\n\n - ASoC: topology: fix tlvs in error handling for\n widget_dmixer (git-fixes).\n\n - ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).\n\n - ASoC: wm8974: remove unsupported clock mode (git-fixes).\n\n - ath10k: Acquire tx_lock in tx error paths (git-fixes).\n\n - ath10k: enable transmit data ack RSSI for QCA9884\n (git-fixes).\n\n - ath9k: Fix general protection fault in\n ath9k_hif_usb_rx_cb (git-fixes).\n\n - ath9k: Fix regression with Atheros 9271 (git-fixes).\n\n - atm: fix atm_dev refcnt leaks in\n atmtcp_remove_persistent (git-fixes).\n\n - AX.25: Fix out-of-bounds read in ax25_connect()\n (git-fixes).\n\n - AX.25: Prevent integer overflows in connect and sendmsg\n (git-fixes).\n\n - AX.25: Prevent out-of-bounds read in ax25_sendmsg()\n (git-fixes).\n\n - ax88172a: fix ax88172a_unbind() failures (git-fixes).\n\n - b43: Remove uninitialized_var() usage (git-fixes).\n\n - blk-mq: consider non-idle request as 'inflight' in\n blk_mq_rq_inflight() (bsc#1165933).\n\n - Bluetooth: btmtksdio: fix up firmware download sequence\n (git-fixes).\n\n - Bluetooth: btusb: fix up firmware download sequence\n (git-fixes).\n\n - Bluetooth: fix kernel oops in store_pending_adv_report\n (git-fixes).\n\n - Bluetooth: Fix slab-out-of-bounds read in\n hci_extended_inquiry_result_evt() (git-fixes).\n\n - Bluetooth: Fix update of connection state in\n `hci_encrypt_cfm` (git-fixes).\n\n - Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct\n flags (git-fixes).\n\n - Bluetooth: hci_serdev: Only unregister device if it was\n registered (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in\n hci_inquiry_result_evt() (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in\n hci_inquiry_result_with_rssi_evt() (git-fixes).\n\n - bnxt_en: Init ethtool link settings after reading\n updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n\n - bnxt_en: Init ethtool link settings after reading\n updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n\n - bpf: Do not allow btf_ctx_access with __int128 types\n (bsc#1155518).\n\n - bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).\n\n - bpfilter: fix up a sparse annotation (bsc#1155518).\n\n - bpfilter: Initialize pos variable (bsc#1155518).\n\n - bpfilter: reject kernel addresses (bsc#1155518).\n\n - bpfilter: switch to kernel_write (bsc#1155518).\n\n - bpf: net: Avoid copying sk_user_data of reuseport_array\n during sk_clone (bsc#1155518).\n\n - bpf: net: Avoid incorrect bpf_sk_reuseport_detach call\n (bsc#1155518).\n\n - brcmfmac: Set timeout value when configuring power save\n (bsc#1173468).\n\n - brcmfmac: Transform compatible string for FW loading\n (bsc#1169771).\n\n - bridge: Avoid infinite loop when suppressing NS messages\n with invalid options (networking-stable-20_06_10).\n\n - bridge: mcast: Fix MLD2 Report IPv6 payload length check\n (git-fixes).\n\n - btmrvl: Fix firmware filename for sd8977 chipset\n (git-fixes).\n\n - btmrvl: Fix firmware filename for sd8997 chipset\n (git-fixes).\n\n - btrfs: add assertions for tree == inode->io_tree to\n extent IO helpers (bsc#1174438).\n\n - btrfs: avoid unnecessary splits when setting bits on an\n extent io tree (bsc#1175377).\n\n - btrfs: change timing for qgroup reserved space for\n ordered extents to fix reserved space leak\n (bsc#1172247).\n\n - btrfs: delete the ordered isize update code\n (bsc#1175377).\n\n - btrfs: do not set path->leave_spinning for truncate\n (bsc#1175377).\n\n - btrfs: drop argument tree from\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: file: reserve qgroup space after the hole punch\n range is locked (bsc#1172247).\n\n - btrfs: fix a block group ref counter leak after failure\n to remove block group (bsc#1175149).\n\n - btrfs: fix block group leak when removing fails\n (bsc#1175149).\n\n - btrfs: fix bytes_may_use underflow when running balance\n and scrub in parallel (bsc#1175149).\n\n - btrfs: fix corrupt log due to concurrent fsync of inodes\n with shared extents (bsc#1175149).\n\n - btrfs: fix data block group relocation failure due to\n concurrent scrub (bsc#1175149).\n\n - btrfs: fix deadlock during fast fsync when logging\n prealloc extents beyond eof (bsc#1175377).\n\n - btrfs: fix double free on ulist after backref resolution\n failure (bsc#1175149).\n\n - btrfs: fix failure of RWF_NOWAIT write into prealloc\n extent beyond eof (bsc#1174438).\n\n - btrfs: fix fatal extent_buffer readahead vs releasepage\n race (bsc#1175149).\n\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT\n write (bsc#1174438).\n\n - btrfs: fix lost i_size update after cloning inline\n extent (bsc#1175377).\n\n - btrfs: fix page leaks after failure to lock page for\n delalloc (bsc#1175149).\n\n - btrfs: fix race between block group removal and block\n group creation (bsc#1175149).\n\n - btrfs: fix race between shrinking truncate and fiemap\n (bsc#1175377).\n\n - btrfs: fix RWF_NOWAIT write not failling when we need to\n cow (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks\n and waiting for IO (bsc#1174438).\n\n - btrfs: fix space_info bytes_may_use underflow after\n nocow buffered write (bsc#1175149).\n\n - btrfs: fix space_info bytes_may_use underflow during\n space cache writeout (bsc#1175149).\n\n - btrfs: fix wrong file range cleanup after an error\n filling dealloc range (bsc#1175149).\n\n - btrfs: inode: fix NULL pointer dereference if inode does\n not need compression (bsc#1174484).\n\n - btrfs: inode: move qgroup reserved space release to the\n callers of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: inode: refactor the parameters of\n insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: introduce per-inode file extent tree\n (bsc#1175377).\n\n - btrfs: make btrfs_ordered_extent naming consistent with\n btrfs_file_extent_item (bsc#1172247).\n\n - btrfs: move extent_io_tree defs to their own header\n (bsc#1175377).\n\n - btrfs: Move free_pages_out label in inline extent\n handling branch in compress_file_range (bsc#1175263).\n\n - btrfs: qgroup: allow to unreserve range without\n releasing other ranges (bsc#1120163).\n\n - btrfs: qgroup: fix data leak caused by race between\n writeback and truncate (bsc#1172247).\n\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of\n reserve retry-after-EDQUOT (bsc#1120163).\n\n - btrfs: qgroup: try to flush qgroup space when we get\n -EDQUOT (bsc#1120163).\n\n - btrfs: Remove delalloc_end argument from\n extent_clear_unlock_delalloc (bsc#1175149).\n\n - btrfs: Remove leftover of in-band dedupe (bsc#1175149).\n\n - btrfs: remove unnecessary delalloc mutex for inodes\n (bsc#1175377).\n\n - btrfs: Rename btrfs_join_transaction_nolock\n (bsc#1175377).\n\n - btrfs: replace all uses of btrfs_ordered_update_i_size\n (bsc#1175377).\n\n - btrfs: separate out the extent io init function\n (bsc#1175377).\n\n - btrfs: separate out the extent leak code (bsc#1175377).\n\n - btrfs: trim: fix underflow in trim length to prevent\n access beyond device boundary (bsc#1175263).\n\n - btrfs: use btrfs_ordered_update_i_size in\n clone_finish_inode_update (bsc#1175377).\n\n - btrfs: use correct count in btrfs_file_write_iter()\n (bsc#1174438).\n\n - btrfs: use the file extent tree infrastructure\n (bsc#1175377).\n\n - bus: ti-sysc: Do not disable on suspend for no-idle\n (git-fixes).\n\n - cfg80211: check vendor command doit pointer before use\n (git-fixes).\n\n - clk: actions: Fix h_clk for Actions S500 SoC\n (git-fixes).\n\n - clk: at91: clk-generated: check best_rate against ranges\n (git-fixes).\n\n - clk: at91: clk-generated: continue if\n __clk_determine_rate() returns error (git-fixes).\n\n - clk: at91: sam9x60: fix main rc oscillator frequency\n (git-fixes).\n\n - clk: at91: sam9x60-pll: check fcore against ranges\n (git-fixes).\n\n - clk: at91: sam9x60-pll: use logical or for range check\n (git-fixes).\n\n - clk: at91: sckc: register slow_rc with accuracy option\n (git-fixes).\n\n - clk: bcm2835: Do not use prediv with bcm2711's PLLs\n (bsc#1174865).\n\n - clk: bcm63xx-gate: fix last clock availability\n (git-fixes).\n\n - clk: clk-atlas6: fix return value check in\n atlas6_clk_init() (git-fixes).\n\n - clk: iproc: round clock rate to the closest (git-fixes).\n\n - clk: qcom: gcc-sdm660: Add missing modem reset\n (git-fixes).\n\n - clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk\n (git-fixes).\n\n - clk: rockchip: Revert 'fix wrong mmc sample phase shift\n for rk3328' (git-fixes).\n\n - clk: scmi: Fix min and max rate when registering clocks\n with discrete rates (git-fixes).\n\n - clk: spear: Remove uninitialized_var() usage\n (git-fixes).\n\n - clk: st: Remove uninitialized_var() usage (git-fixes).\n\n - console: newport_con: fix an issue about leak related\n system resources (git-fixes).\n\n - crc-t10dif: Fix potential crypto notify dead-lock\n (git-fixes).\n\n - crypto: caam - Fix argument type in\n handle_imx6_err005766 (git-fixes).\n\n - crypto: ccp - Fix use of merged scatterlists\n (git-fixes).\n\n - crypto: ccree - fix resource leak on error path\n (git-fixes).\n\n - crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP\n was not specified (git-fixes).\n\n - crypto: hisilicon - do not sleep of\n CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n\n - crypto: qat - fix double free in\n qat_uclo_create_batch_init_list (git-fixes).\n\n - dccp: Fix possible memleak in dccp_init and dccp_fini\n (networking-stable-20_06_16).\n\n - Delete\n patches.suse/apparmor-Fix-memory-leak-of-profile-proxy.p\n atch (bsc#1174627)\n\n - devinet: fix memleak in inetdev_init()\n (networking-stable-20_06_07).\n\n - devlink: ignore -EOPNOTSUPP errors on dumpit\n (bsc#1154353).\n\n - /dev/mem: Add missing memory barriers for devmem_inode\n (git-fixes).\n\n - /dev/mem: Revoke mappings when a driver claims the\n region (git-fixes).\n\n - devres: keep both device name and resource name in\n pretty name (git-fixes).\n\n - dlm: remove BUG() before panic() (git-fixes).\n\n - dmaengine: dmatest: stop completed threads when running\n without set channel (git-fixes).\n\n - dmaengine: dw: Initialize channel before each transfer\n (git-fixes).\n\n - dmaengine: fsl-edma-common: correct DSIZE_32BYTE\n (git-fixes).\n\n - dmaengine: fsl-edma: Fix NULL pointer exception in\n fsl_edma_tx_handler (git-fixes).\n\n - dmaengine: fsl-edma: fix wrong tcd endianness for\n big-endian cpu (git-fixes).\n\n - dmaengine: imx-sdma: Fix: Remove 'always true'\n comparison (git-fixes).\n\n - dmaengine: ioat setting ioat timeout as module parameter\n (git-fixes).\n\n - dmaengine: mcf-edma: Fix NULL pointer exception in\n mcf_edma_tx_handler (git-fixes).\n\n - dmaengine: sh: usb-dmac: set tx_result parameters\n (git-fixes).\n\n - dmaengine: tegra210-adma: Fix runtime PM imbalance on\n error (git-fixes).\n\n - dm: do not use waitqueue for request-based DM\n (bsc#1165933).\n\n - docs: fix memory.low description in cgroup-v2.rst\n (git-fixes). (SLE documentation might refer to\n cgroup-v2.rst.)\n\n - dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).\n\n - dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).\n\n - drbd: Remove uninitialized_var() usage (git-fixes).\n\n - driver core: Avoid binding drivers to dead devices\n (git-fixes).\n\n - drivers/firmware/psci: Fix memory leakage in\n alloc_init_cpu_groups() (git-fixes).\n\n - drivers/net/wan: lapb: Corrected the usage of skb_cow\n (git-fixes).\n\n - drm/amd/display: Clear dm_state for fast updates\n (git-fixes).\n\n - drm/amd/display: Use kfree() to free rgb_user in\n calculate_user_regamma_ramp() (git-fixes).\n\n - drm/amdgpu/atomfirmware: fix vram_info fetching for\n renoir (git-fixes).\n\n - drm/amdgpu/display: use blanked rather than plane state\n for sync (bsc#1152489) 	* refreshed for context\n changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0\n\n - drm/amdgpu: do not do soft recovery if gpu_recovery=0\n (git-fixes).\n\n - drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\n (git-fixes).\n\n - drm/amdgpu: fix preemption unit test (git-fixes).\n\n - drm/amdgpu/gfx10: fix race condition for kiq\n (git-fixes).\n\n - drm/amdgpu: Prevent kernel-infoleak in\n amdgpu_info_ioctl() (git-fixes).\n\n - drm/amdgpu/sdma5: fix wptr overwritten in ->get_wptr()\n (git-fixes).\n\n - drm/amdgpu: use %u rather than %d for sclk/mclk\n (git-fixes).\n\n - drm/amd/powerplay: fix a crash when overclocking Vega M\n (bsc#1152472)\n\n - drm/amd/powerplay: fix a crash when overclocking Vega M\n (git-fixes).\n\n - drm/arm: fix unintentional integer overflow on left\n shift (git-fixes).\n\n - drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc\n ptr in (bsc#1152472) 	* refreshed for context changes\n\n - drm/bridge: sil_sii8620: initialize return of\n sii8620_readb (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Clear old error bits before\n AUX transfers (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment\n for local array (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock\n choice (bsc#1152489) 	* refreshed for context changes\n\n - drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472)\n 	* move drm_mipi_dbi.c -> tinydrm/mipi-dbi.c\n\n - drm/etnaviv: Fix error path on failure to enable bus clk\n (git-fixes).\n\n - drm/exynos: fix ref count leak in mic_pre_enable\n (git-fixes).\n\n - drm/exynos: Properly propagate return value in\n drm_iommu_attach_device() (git-fixes).\n\n - drm: fix drm_dp_mst_port refcount leaks in\n drm_dp_mst_allocate_vcpi (git-fixes).\n\n - drm/gem: Fix a leak in drm_gem_objects_lookup()\n (git-fixes).\n\n - drm: hold gem reference until object is no longer\n accessed (git-fixes).\n\n - drm/i915: Actually emit the await_start (bsc#1174737).\n\n - drm/i915: Copy across scheduler behaviour flags across\n submit fences (bsc#1174737).\n\n - drm/i915: Do not poison i915_request.link on removal\n (bsc#1174737).\n\n - drm/i915: Drop no-semaphore boosting (bsc#1174737).\n\n - drm/i915: Eliminate the trylock for awaiting an earlier\n request (bsc#1174737).\n\n - drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489)\n 	* context changes\n\n - drm/i915: Flush execution tasklets before checking\n request status (bsc#1174737).\n\n - drm/i915: Flush tasklet submission before sleeping on\n i915_request_wait (bsc#1174737).\n\n - drm/i915/gt: Close race between engine_park and\n intel_gt_retire_requests (git-fixes).\n\n - drm/i915/gt: Flush submission tasklet before\n waiting/retiring (bsc#1174737).\n\n - drm/i915/gt: Ignore irq enabling on the virtual engines\n (git-fixes).\n\n - drm/i915/gt: Move new timelines to the end of\n active_list (git-fixes).\n\n - drm/i915/gt: Only swap to a random sibling once upon\n creation (bsc#1152489) 	* context changes\n\n - drm/i915/gt: Unlock engine-pm after queuing the kernel\n context switch (git-fixes).\n\n - drm/i915: Ignore submit-fences on the same timeline\n (bsc#1174737).\n\n - drm/i915: Improve the start alignment of bonded pairs\n (bsc#1174737).\n\n - drm/i915: Keep track of request among the scheduling\n lists (bsc#1174737).\n\n - drm/i915: Lock signaler timeline while navigating\n (bsc#1174737).\n\n - drm/i915: Mark i915_request.timeline as a volatile, rcu\n pointer (bsc#1174737).\n\n - drm/i915: Mark racy read of intel_engine_cs.saturated\n (bsc#1174737).\n\n - drm/i915: Mark up unlocked update of\n i915_request.hwsp_seqno (bsc#1174737).\n\n - drm/i915: Move cec_notifier to\n intel_hdmi_connector_unregister, v2. (bsc#1152489) 	*\n context changes\n\n - drm/i915: Peel dma-fence-chains for await (bsc#1174737).\n\n - drm/i915: Prevent using semaphores to chain up to\n external fences (bsc#1174737).\n\n - drm/i915: Protect i915_request_await_start from early\n waits (bsc#1174737).\n\n - drm/i915: Pull waiting on an external dma-fence into its\n routine (bsc#1174737).\n\n - drm/i915: Rely on direct submission to the queue\n (bsc#1174737).\n\n - drm/i915: Remove wait priority boosting (bsc#1174737).\n\n - drm/i915: Reorder await_execution before await_request\n (bsc#1174737).\n\n - drm/i915: Return early for await_start on same timeline\n (bsc#1174737).\n\n - drm/i915: Use EAGAIN for trylock failures (bsc#1174737).\n\n - drm/imx: fix use after free (git-fixes).\n\n - drm/imx: imx-ldb: Disable both channels for split mode\n in enc->disable() (git-fixes).\n\n - drm/imx: tve: fix regulator_disable error path\n (git-fixes).\n\n - drm/ingenic: Fix incorrect assumption about plane->index\n (bsc#1152489) 	* refreshed for context changes\n\n - drm: mcde: Fix display initialization problem\n (git-fixes).\n\n - drm/mediatek: Check plane visibility in atomic_update\n (git-fixes).\n\n - drm/mipi: use dcs write for\n mipi_dsi_dcs_set_tear_scanline (git-fixes).\n\n - drm/msm/dpu: allow initialization of encoder locks\n during encoder init (git-fixes).\n\n - drm/msm: fix potential memleak in error branch\n (git-fixes).\n\n - drm/nouveau/fbcon: fix module unload when fbcon init has\n failed for some reason (git-fixes).\n\n - drm/nouveau/fbcon: zero-initialise the mode_cmd2\n structure (git-fixes).\n\n - drm/nouveau/i2c/g94-: increase\n NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).\n\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA\n panel (git-fixes).\n\n - drm: panel-orientation-quirks: Use generic\n orientation-data for Acer S1003 (git-fixes).\n\n - drm/panel: otm8009a: Drop unnessary\n backlight_device_unregister() (git-fixes).\n\n - drm: panel: simple: Fix bpc for LG LB070WV8 panel\n (git-fixes).\n\n - drm/radeon: fix array out-of-bounds read and write\n issues (git-fixes).\n\n - drm/radeon: fix double free (git-fixes).\n\n - drm/stm: repair runtime power management (git-fixes).\n\n - drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).\n\n - drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on\n A20 (git-fixes).\n\n - drm/tegra: hub: Do not enable orphaned window group\n (git-fixes).\n\n - drm/vgem: Replace opencoded version of\n drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed\n for context changes\n\n - drm/vmwgfx: Fix two list_for_each loop exit tests\n (git-fixes).\n\n - drm/vmwgfx: Use correct vmw_legacy_display_unit pointer\n (git-fixes).\n\n - exfat: add missing brelse() calls on error paths\n (git-fixes).\n\n - exfat: fix incorrect update of stream entry in\n __exfat_truncate() (git-fixes).\n\n - exfat: fix memory leak in exfat_parse_param()\n (git-fixes).\n\n - exfat: move setting VOL_DIRTY over\n exfat_remove_entries() (git-fixes).\n\n - fbdev: Detect integer underflow at 'struct\n fbcon_ops'->clear_margins (git-fixes).\n\n - firmware: arm_scmi: Fix SCMI genpd domain probing\n (git-fixes).\n\n - firmware: arm_scmi: Keep the discrete clock rates sorted\n (git-fixes).\n\n - firmware: arm_sdei: use common SMCCC_CONDUIT_*\n (bsc#1174906).\n\n - firmware: Fix a reference count leak (git-fixes).\n\n - firmware_loader: fix memory leak for paged buffer\n (bsc#1175367).\n\n - firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).\n\n - firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).\n\n - firmware: smccc: Add function to fetch SMCCC version\n (bsc#1174906).\n\n - firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to\n identify SMCCC v1.1 and above (bsc#1174906).\n\n - firmware: smccc: Add the definition for SMCCCv1.2\n version/error codes (bsc#1174906).\n\n - firmware: smccc: Drop smccc_version enum and use\n ARM_SMCCC_VERSION_1_x instead (bsc#1174906).\n\n - firmware: smccc: Refactor SMCCC specific bits into\n separate file (bsc#1174906).\n\n - firmware: smccc: Update link to latest SMCCC\n specification (bsc#1174906).\n\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n\n - fsl/fman: detect FMan erratum A050385 (bsc#1174396)\n Update arm64 config file\n\n - fuse: copy_file_range should truncate cache (git-fixes).\n\n - fuse: fix copy_file_range cache issues (git-fixes).\n\n - fuse: Fix parameter for FS_IOC_(GET,SET)FLAGS\n (bsc#1175176).\n\n - fuse: fix weird page warning (bsc#1175175).\n\n - geneve: fix an uninitialized value in\n geneve_changelink() (git-fixes).\n\n - genirq/affinity: Improve __irq_build_affinity_masks()\n (bsc#1174897 ltc#187090).\n\n - genirq/affinity: Remove const qualifier from\n node_to_cpumask argument (bsc#1174897 ltc#187090).\n\n - genirq/affinity: Spread vectors on node according to\n nr_cpu ratio (bsc#1174897 ltc#187090).\n\n - gfs2: Another gfs2_find_jhead fix (bsc#1174824).\n\n - gfs2: fix gfs2_find_jhead that returns uninitialized\n jhead with seq 0 (bsc#1174825).\n\n - go7007: add sanity checking for endpoints (git-fixes).\n\n - gpio: arizona: handle pm_runtime_get_sync failure case\n (git-fixes).\n\n - gpio: arizona: put pm_runtime in case of failure\n (git-fixes).\n\n - gpio: max77620: Fix missing release of interrupt\n (git-fixes).\n\n - gpio: pca953x: disable regmap locking for automatic\n address incrementing (git-fixes).\n\n - gpio: pca953x: Fix GPIO resource leak on Intel Galileo\n Gen 2 (git-fixes).\n\n - gpio: pca953x: Override IRQ for one of the expanders on\n Galileo Gen 2 (git-fixes).\n\n - gpu: host1x: Detach driver on unregister (git-fixes).\n\n - habanalabs: increase timeout during reset (git-fixes).\n\n - HID: alps: support devices with report id 2 (git-fixes).\n\n - HID: apple: Disable Fn-key key-re-mapping on clone\n keyboards (git-fixes).\n\n - HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor\n override (git-fixes).\n\n - HID: logitech-hidpp: avoid repeated 'multiplier = ' log\n messages (git-fixes).\n\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n\n - HID: quirks: Always poll Obins Anne Pro 2 keyboard\n (git-fixes).\n\n - HID: quirks: Ignore Simply Automated UPB PIM\n (git-fixes).\n\n - HID: quirks: Remove ITE 8595 entry from\n hid_have_special_driver (git-fixes).\n\n - HID: steam: fixes race in handling device list\n (git-fixes).\n\n - hippi: Fix a size used in a 'pci_free_consistent()' in\n an error handling path (git-fixes).\n\n - hwmon: (adm1275) Make sure we are reading enough data\n for different chips (git-fixes).\n\n - hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow\n (git-fixes).\n\n - hwmon: (emc2103) fix unable to change fan pwm1_enable\n attribute (git-fixes).\n\n - hwmon: (nct6775) Accept PECI Calibration as temperature\n source for NCT6798D (git-fixes).\n\n - hwmon: (scmi) Fix potential buffer overflow in\n scmi_hwmon_probe() (git-fixes).\n\n - hwrng: ks-sa - Fix runtime PM imbalance on error\n (git-fixes).\n\n - i2c: also convert placeholder function to return errno\n (git-fixes).\n\n - i2c: eg20t: Load module automatically if ID matches\n (git-fixes).\n\n - i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).\n\n - i2c: iproc: fix race between client unreg and isr\n (git-fixes).\n\n - i2c: rcar: always clear ICSAR to avoid side effects\n (git-fixes).\n\n - i2c: rcar: avoid race when unregistering slave\n (git-fixes).\n\n - i2c: rcar: slave: only send STOP event when we have been\n addressed (git-fixes).\n\n - i2c: slave: add sanity check when unregistering\n (git-fixes).\n\n - i2c: slave: improve sanity check when registering\n (git-fixes).\n\n - i40iw: Do an RCU lookup in i40iw_add_ipv4_addr\n (git-fixes).\n\n - i40iw: Fix error handling in i40iw_manage_arp_cache()\n (git-fixes).\n\n - i40iw: fix NULL pointer dereference on a null wqe\n pointer (git-fixes).\n\n - i40iw: Report correct firmware version (git-fixes).\n\n - IB/cma: Fix ports memory leak in cma_configfs\n (git-fixes).\n\n - IB/core: Fix potential NULL pointer dereference in pkey\n cache (git-fixes).\n\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut\n down (bsc#1174409).\n\n - IB/hfi1: Do not destroy link_wq when the device is shut\n down (bsc#1174409).\n\n - IB/hfi1: Ensure pq is not left on waitlist (git-fixes).\n\n - IB/hfi1: Fix another case where pq is left on waitlist\n (bsc#1174411).\n\n - IB/hfi1: Fix memory leaks in sysfs registration and\n unregistration (git-fixes).\n\n - IB/hfi1: Fix module use count flaw due to leftover\n module put calls (bsc#1174407).\n\n - IB/hfi1, qib: Ensure RCU is locked when accessing list\n (git-fixes).\n\n - IB/ipoib: Fix double free of skb in case of multicast\n traffic in CM mode (git-fixes).\n\n - IB/mad: Fix use after free when destroying MAD agent\n (git-fixes).\n\n - IB/mlx4: Test return value of calls to\n ib_get_cached_pkey (git-fixes).\n\n - IB/mlx5: Fix 50G per lane indication (git-fixes).\n\n - IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP\n command (git-fixes).\n\n - IB/mlx5: Fix missing congestion control debugfs on rep\n rdma device (git-fixes).\n\n - IB/mlx5: Replace tunnel mpls capability bits for\n tunnel_offloads (git-fixes).\n\n - ibmvnic: Fix IRQ mapping disposal in error path\n (bsc#1175112 ltc#187459).\n\n - IB/qib: Call kobject_put() when kobject_init_and_add()\n fails (git-fixes).\n\n - IB/rdmavt: Always return ERR_PTR from\n rvt_create_mmap_info() (git-fixes).\n\n - IB/rdmavt: Delete unused routine (git-fixes).\n\n - IB/rdmavt: Fix RQ counting issues causing use of an\n invalid RWQE (bsc#1174770).\n\n - IB/sa: Resolv use-after-free in ib_nl_make_request()\n (git-fixes).\n\n - ide: Remove uninitialized_var() usage (git-fixes).\n\n - ieee802154: fix one possible memleak in adf7242_probe\n (git-fixes).\n\n - iio: adc: ad7780: Fix a resource handling path in\n 'ad7780_probe()' (git-fixes).\n\n - iio: core: add missing IIO_MOD_H2/ETHANOL string\n identifiers (git-fixes).\n\n - iio:health:afe4404 Fix timestamp alignment and prevent\n data leak (git-fixes).\n\n - iio:humidity:hdc100x Fix alignment and data leak issues\n (git-fixes).\n\n - iio:humidity:hts221 Fix alignment and data leak issues\n (git-fixes).\n\n - iio: improve IIO_CONCENTRATION channel type description\n (git-fixes).\n\n - iio:magnetometer:ak8974: Fix alignment and data leak\n issues (git-fixes).\n\n - iio: magnetometer: ak8974: Fix runtime PM imbalance on\n error (git-fixes).\n\n - iio: mma8452: Add missed iio_device_unregister() call in\n mma8452_probe() (git-fixes).\n\n - iio:pressure:ms5611 Fix buffer element alignment\n (git-fixes).\n\n - iio: pressure: zpa2326: handle pm_runtime_get_sync\n failure (git-fixes).\n\n - Input: elan_i2c - add more hardware ID for Lenovo\n laptops (git-fixes).\n\n - Input: elan_i2c - only increment wakeup count on touch\n (git-fixes).\n\n - Input: goodix - fix touch coordinates on Cube I15-TC\n (git-fixes).\n\n - Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux\n list (git-fixes).\n\n - Input: mms114 - add extra compatible for mms345l\n (git-fixes).\n\n - Input: sentelic - fix error return when fsp_reg_write\n fails (git-fixes).\n\n - Input: synaptics - enable InterTouch for ThinkPad X1E\n 1st gen (git-fixes).\n\n - integrity: remove redundant initialization of variable\n ret (git-fixes).\n\n - intel_th: Fix a NULL dereference when hub driver is not\n loaded (git-fixes).\n\n - intel_th: pci: Add Emmitsburg PCH support (git-fixes).\n\n - intel_th: pci: Add Jasper Lake CPU support (git-fixes).\n\n - intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).\n\n - io-mapping: indicate mapping failure (git-fixes).\n\n - iommu/arm-smmu-v3: Do not reserve implementation defined\n register space (bsc#1174126).\n\n - iommu/vt-d: Enable PCI ACS for platform opt in hint\n (bsc#1174127).\n\n - iommu/vt-d: Update scalable mode paging structure\n coherency (bsc#1174128).\n\n - ionic: centralize queue reset code (bsc#1167773).\n\n - ionic: fix up filter locks and debug msgs (bsc#1167773).\n\n - ionic: keep rss hash after fw update (bsc#1167773).\n\n - ionic: unlock queue mutex in error path (bsc#1167773).\n\n - ionic: update filter id after replay (bsc#1167773).\n\n - ionic: update the queue count on open (bsc#1167773).\n\n - ionic: use mutex to protect queue operations\n (bsc#1167773).\n\n - ionic: use offset for ethtool regs data (bsc#1167773).\n\n - irqchip/gic: Atomically update affinity (bsc#1175195).\n\n - kabi fix for\n SUNRPC-dont-update-timeout-value-on-connection-reset.pat\n ch (bsc1174263).\n\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip\n (kabi).\n\n - kABI: restore signature of xfrm_policy_bysel_ctx() and\n xfrm_policy_byid() (bsc#1174645).\n\n - kABI workaround for enum cpuhp_state (git-fixes).\n\n - kABI workaround for struct kvm_device (git-fixes). Just\n change an variable to 'const' type in kvm_device.\n\n - kABI workaround for struct kvm_vcpu_arch (git-fixes).\n\n - kernel.h: remove duplicate include of asm/div64.h\n (git-fixes).\n\n - keys: asymmetric: fix error return code in\n software_key_query() (git-fixes).\n\n - kobject: Avoid premature parent object freeing in\n kobject_cleanup() (git-fixes).\n\n - KVM: Allow kvm_device_ops to be const (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: Allow kvm_device_ops to be const (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Annotate hyp NMI-related functions as\n __always_inline (bsc#1175190).\n\n - KVM: arm64: Correct PSTATE on exception entry\n (bsc#1133021).\n\n - KVM: arm64: Document PV-time interface (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Document PV-time interface (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).\n\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts\n (bsc#1133021).\n\n - KVM: arm64: Provide VCPU attributes for stolen time\n (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Provide VCPU attributes for stolen time\n (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than\n SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than\n SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Stop writing aarch32's CSSELR into ACTLR\n (bsc#1133021).\n\n - KVM: arm64: Support stolen time reporting via shared\n structure (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Support stolen time reporting via shared\n structure (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Use the correct timer structure to access\n the physical counter (bsc#1133021).\n\n - KVM: arm/arm64: Correct AArch32 SPSR on exception entry\n (bsc#1133021).\n\n - KVM: arm/arm64: Correct CPSR on exception entry\n (bsc#1133021).\n\n - KVM: arm/arm64: Factor out hypercall handling from PSCI\n code (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm/arm64: Factor out hypercall handling from PSCI\n code (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm: vgic: Fix limit condition when writing to\n GICD_IACTIVER (bsc#1133021).\n\n - KVM: Implement kvm_put_guest() (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: nVMX: always update CR3 in VMCS (git-fixes).\n\n - KVM: Play nice with read-only memslots when querying\n host page size (bsc#1133021).\n\n - KVM: s390: Remove false WARN_ON_ONCE for the PQAP\n instruction (bsc#1133021).\n\n - l2tp: add sk_family checks to l2tp_validate_socket\n (networking-stable-20_06_07).\n\n - l2tp: do not use inet_hash()/inet_unhash()\n (networking-stable-20_06_07).\n\n - leds: 88pm860x: fix use-after-free on unbind\n (git-fixes).\n\n - leds: core: Flush scheduled work for system suspend\n (git-fixes).\n\n - leds: da903x: fix use-after-free on unbind (git-fixes).\n\n - leds: gpio: Fix semantic error (git-fixes).\n\n - leds: lm3533: fix use-after-free on unbind (git-fixes).\n\n - leds: lm355x: avoid enum conversion warning (git-fixes).\n\n - leds: lm36274: fix use-after-free on unbind (git-fixes).\n\n - leds: wm831x-status: fix use-after-free on unbind\n (git-fixes).\n\n - libbpf: Wrap source argument of BPF_CORE_READ macro in\n parentheses (bsc#1155518).\n\n - lib: Reduce user_access_begin() boundaries in\n strncpy_from_user() and strnlen_user() (bsc#1174331).\n\n - liquidio: Fix wrong return value in cn23xx_get_pf_num()\n (git-fixes).\n\n - locktorture: Print ratio of acquisitions, not failures\n (bsc#1149032).\n\n - mac80211: allow rx of mesh eapol frames with default rx\n key (git-fixes).\n\n - mac80211: fix misplaced while instead of if (git-fixes).\n\n - mac80211: mesh: Free ie data when leaving mesh\n (git-fixes).\n\n - mac80211: mesh: Free pending skb when destroying a mpath\n (git-fixes).\n\n - media: cec: silence shift wrapping warning in\n __cec_s_log_addrs() (git-fixes).\n\n - media: cxusb-analog: fix V4L2 dependency (git-fixes).\n\n - media: exynos4-is: Add missed check for\n pinctrl_lookup_state() (git-fixes).\n\n - media: firewire: Using uninitialized values in\n node_probe() (git-fixes).\n\n - media: marvell-ccic: Add missed\n v4l2_async_notifier_cleanup() (git-fixes).\n\n - media: media-request: Fix crash if memory allocation\n fails (git-fixes).\n\n - media: nuvoton-cir: remove setting tx carrier functions\n (git-fixes).\n\n - media: omap3isp: Add missed v4l2_ctrl_handler_free() for\n preview_init_entities() (git-fixes).\n\n - media: sur40: Remove uninitialized_var() usage\n (git-fixes).\n\n - media: vsp1: dl: Fix NULL pointer dereference on unbind\n (git-fixes).\n\n - mei: bus: do not clean driver pointer (git-fixes).\n\n - mfd: arizona: Ensure 32k clock is put on driver unbind\n and error (git-fixes).\n\n - mfd: dln2: Run event handler loop under spinlock\n (git-fixes).\n\n - mfd: intel-lpss: Add Intel Jasper Lake PCI IDs\n (jsc#SLE-12602).\n\n - mlxsw: core: Fix wrong SFP EEPROM reading for upper\n pages 1-3 (bsc#1154488).\n\n - mlxsw: core: Use different get_trend() callbacks for\n different thermal zones (networking-stable-20_06_10).\n\n - mmc: meson-gx: limit segments to 1 when\n dram-access-quirk is needed (git-fixes).\n\n - mmc: sdhci: do not enable card detect interrupt for gpio\n cd type (git-fixes).\n\n - mm: Fix protection usage propagation (bsc#1174002).\n\n - mm/mmap.c: close race between munmap() and\n expand_upwards()/downwards() (bsc#1174527).\n\n - mtd: properly check all write ioctls for permissions\n (git-fixes).\n\n - mtd: rawnand: fsl_upm: Remove unused mtd var\n (git-fixes).\n\n - mtd: rawnand: qcom: avoid write to unavailable register\n (git-fixes).\n\n - mwifiex: Fix firmware filename for sd8977 chipset\n (git-fixes).\n\n - mwifiex: Fix firmware filename for sd8997 chipset\n (git-fixes).\n\n - mwifiex: Prevent memory corruption handling keys\n (git-fixes).\n\n - nbd: Fix memory leak in nbd_add_socket (git-fixes).\n\n - ndctl/papr_scm,uapi: Add support for PAPR nvdimm\n specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n\n - net: be more gentle about silly gso requests coming from\n user (networking-stable-20_06_07).\n\n - net/bpfilter: Initialize pos in\n __bpfilter_process_sockopt (bsc#1155518).\n\n - net/bpfilter: split __bpfilter_process_sockopt\n (bsc#1155518).\n\n - net: check untrusted gso_size at kernel entry\n (networking-stable-20_06_07).\n\n - netdevsim: fix unbalaced locking in nsim_create()\n (git-fixes).\n\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n\n - net: ena: add reserved PCI device ID (bsc#1174852).\n\n - net: ena: add support for reporting of packet drops\n (bsc#1174852).\n\n - net: ena: add support for the rx offset feature\n (bsc#1174852).\n\n - net: ena: add support for traffic mirroring\n (bsc#1174852).\n\n - net: ena: add unmask interrupts statistics to ethtool\n (bsc#1174852).\n\n - net: ena: allow setting the hash function without\n changing the key (bsc#1174852).\n\n - net: ena: avoid memory access violation by validating\n req_id properly (bsc#1174852).\n\n - net: ena: avoid unnecessary admin command when RSS\n function set fails (bsc#1174852).\n\n - net: ena: avoid unnecessary rearming of interrupt vector\n when busy-polling (bsc#1174852).\n\n - net: ena: change default RSS hash function to Toeplitz\n (bsc#1174852).\n\n - net: ena: changes to RSS hash key allocation\n (bsc#1174852).\n\n - net: ena: cosmetic: change ena_com_stats_admin stats to\n u64 (bsc#1174852).\n\n - net: ena: cosmetic: code reorderings (bsc#1174852).\n\n - net: ena: cosmetic: extract code to\n ena_indirection_table_set() (bsc#1174852).\n\n - net: ena: cosmetic: fix line break issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spacing issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spelling and grammar mistakes in\n comments (bsc#1174852).\n\n - net: ena: cosmetic: minor code changes (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary code\n (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary spaces and tabs\n in ena_com.h macros (bsc#1174852).\n\n - net: ena: cosmetic: rename\n ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n\n - net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n\n - net: ena: cosmetic: set queue sizes to u32 for\n consistency (bsc#1174852).\n\n - net: ena: drop superfluous prototype (bsc#1174852).\n\n - net: ena: enable support of rss hash key and function\n changes (bsc#1174852).\n\n - net: ena: ethtool: clean up minor indentation issue\n (bsc#1174852).\n\n - net: ena: ethtool: remove redundant non-zero check on rc\n (bsc#1174852).\n\n - net/ena: Fix build warning in ena_xdp_set()\n (bsc#1174852).\n\n - net: ena: fix continuous keep-alive resets\n (bsc#1174852).\n\n - net: ena: fix ena_com_comp_status_to_errno() return\n value (bsc#1174852).\n\n - net: ena: fix error returning in\n ena_com_get_hash_function() (bsc#1174852).\n\n - net: ena: fix request of incorrect number of IRQ vectors\n (bsc#1174852).\n\n - net: ena: Fix using plain integer as NULL pointer in\n ena_init_napi_in_range (bsc#1174852).\n\n - net: ena: Make some functions static (bsc#1174852).\n\n - net: ena: move llq configuration from ena_probe to\n ena_device_init() (bsc#1174852).\n\n - net: ena: reduce driver load time (bsc#1174852).\n\n - net: ena: remove code that does nothing (bsc#1174852).\n\n - net: ena: remove set but not used variable 'hash_key'\n (bsc#1174852).\n\n - net: ena: rename ena_com_free_desc to make API more\n uniform (bsc#1174852).\n\n - net: ena: simplify\n ena_com_update_intr_delay_resolution() (bsc#1174852).\n\n - net: ena: support new LLQ acceleration mode\n (bsc#1174852).\n\n - net: ena: use explicit variable size for clarity\n (bsc#1174852).\n\n - net: ena: use SHUTDOWN as reset reason when closing\n interface (bsc#1174852).\n\n - net_failover: fixed rollback in net_failover_open()\n (networking-stable-20_06_10).\n\n - netfilter: ip6tables: Add a .pre_exit hook in all\n ip6table_foo.c (bsc#1171857).\n\n - netfilter: ip6tables: Split ip6t_unregister_table() into\n pre_exit and exit helpers (bsc#1171857).\n\n - netfilter: iptables: Add a .pre_exit hook in all\n iptable_foo.c (bsc#1171857).\n\n - netfilter: iptables: Split ipt_unregister_table() into\n pre_exit and exit helpers (bsc#1171857).\n\n - net: Fix a documentation bug wrt.\n ip_unprivileged_port_start (git-fixes). (SLES tuning\n guide refers to ip-sysctl.txt.)\n\n - net: fsl/fman: treat all RGMII modes in\n memac_adjust_link() (bsc#1174398).\n\n - net: hns3: check reset pending after FLR prepare\n (bsc#1154353).\n\n - net: hns3: fix error handling for desc filling\n (git-fixes).\n\n - net: hns3: fix for not calculating TX BD send size\n correctly (git-fixes).\n\n - net: hns3: fix return value error when query MAC link\n status fail (git-fixes).\n\n - net: ipv4: Fix wrong type conversion from hint to rt in\n ip_route_use_hint() (bsc#1154353).\n\n - net: lan78xx: add missing endpoint sanity check\n (git-fixes).\n\n - net: lan78xx: fix transfer-buffer memory leak\n (git-fixes).\n\n - net: lan78xx: replace bogus endpoint lookup (git-fixes).\n\n - net: macb: call pm_runtime_put_sync on failure path\n (git-fixes).\n\n - net/mlx5: drain health workqueue in case of driver load\n error (networking-stable-20_06_16).\n\n - net/mlx5e: Fix CPU mapping after function reload to\n avoid aRFS RX crash (jsc#SLE-8464).\n\n - net/mlx5e: Fix CPU mapping after function reload to\n avoid aRFS RX crash (jsc#SLE-8464).\n\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a\n VF dev (jsc#SLE-8464).\n\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a\n VF dev (jsc#SLE-8464).\n\n - net/mlx5e: Fix repeated XSK usage on one channel\n (networking-stable-20_06_16).\n\n - net/mlx5e: Fix VXLAN configuration restore after\n function reload (jsc#SLE-8464).\n\n - net/mlx5e: Fix VXLAN configuration restore after\n function reload (jsc#SLE-8464).\n\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the\n mode (jsc#SLE-8464).\n\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the\n mode (jsc#SLE-8464).\n\n - net/mlx5: Fix fatal error handling during device load\n (networking-stable-20_06_16).\n\n - net: phy: Check harder for errors in get_phy_id()\n (git-fixes).\n\n - net: phy: fix memory leak in device-create error path\n (git-fixes).\n\n - net: phy: realtek: add support for configuring the RX\n delay on RTL8211F (bsc#1174398).\n\n - net, sk_msg: Clear sk_user_data pointer on clone if\n tagged (bsc#1155518).\n\n - net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data\n (bsc#1155518).\n\n - net/smc: fix restoring of fallback changes (git-fixes).\n\n - net: stmmac: do not attach interface until resume\n finishes (bsc#1174072).\n\n - net: stmmac: dwc-qos: avoid clk and reset for acpi\n device (bsc#1174072).\n\n - net: stmmac: dwc-qos: use generic device api\n (bsc#1174072).\n\n - net: stmmac: enable timestamp snapshot for required PTP\n packets in dwmac v5.10a (networking-stable-20_06_07).\n\n - net: stmmac: platform: fix probe for ACPI devices\n (bsc#1174072).\n\n - net/tls: fix encryption error checking (git-fixes).\n\n - net/tls: free record only on encryption error\n (git-fixes).\n\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition\n (networking-stable-20_06_07).\n\n - nfc: nci: add missed destroy_workqueue in\n nci_register_device (git-fixes).\n\n - nfc: s3fwrn5: add missing release on skb in\n s3fwrn5_recv_frame (git-fixes).\n\n - nfp: flower: fix used time of merge flow statistics\n (networking-stable-20_06_07).\n\n - NFS: Fix interrupted slots by sending a solo SEQUENCE\n operation (bsc#1174264).\n\n - NTB: Fix static check warning in perf_clear_test\n (git-fixes).\n\n - NTB: Fix the default port and peer numbers for legacy\n drivers (git-fixes).\n\n - ntb: hw: remove the code that sets the DMA mask\n (git-fixes).\n\n - NTB: ntb_pingpong: Choose doorbells based on port number\n (git-fixes).\n\n - NTB: ntb_test: Fix bug when counting remote files\n (git-fixes).\n\n - NTB: ntb_tool: reading the link file should not end in a\n NULL byte (git-fixes).\n\n - NTB: perf: Do not require one more memory window than\n number of peers (git-fixes).\n\n - NTB: perf: Fix race condition when run with ntb_test\n (git-fixes).\n\n - NTB: perf: Fix support for hardware that does not have\n port numbers (git-fixes).\n\n - ntb_perf: pass correct struct device to\n dma_alloc_coherent (git-fixes).\n\n - NTB: Revert the change to use the NTB device dev for DMA\n allocations (git-fixes).\n\n - ntb_tool: pass correct struct device to\n dma_alloc_coherent (git-fixes).\n\n - ocfs2: avoid inode removal while nfsd is accessing it\n (bsc#1172963).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: fix remounting needed after setfacl command\n (bsc#1173954).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - omapfb: dss: Fix max fclk divider for omap36xx\n (git-fixes).\n\n - ovl: inode reference leak in ovl_is_inuse true case\n (git-fixes).\n\n - padata: add separate cpuhp node for CPUHP_PADATA_DEAD\n (git-fixes).\n\n - padata: kABI fixup for struct padata_instance splitting\n nodes (git-fixes).\n\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER\n ownership (bsc#1174356).\n\n - PCI/AER: Use only _OSC to determine AER ownership\n (bsc#1174356).\n\n - PCI/ASPM: Add missing newline in sysfs 'policy'\n (git-fixes).\n\n - PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085\n PCIe-to-PCI bridge (git-fixes).\n\n - PCI: cadence: Fix updating Vendor ID and Subsystem\n Vendor ID register (git-fixes).\n\n - PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events\n (bsc#1174513).\n\n - PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n\n - PCI: hotplug: ACPI: Fix context refcounting in\n acpiphp_grab_context() (git-fixes).\n\n - PCI: hv: Add support for protocol 1.3 and support\n PCI_BUS_RELATIONS2 (bsc#1172201).\n\n - PCI: qcom: Add missing ipq806x clocks in PCIe driver\n (git-fixes).\n\n - PCI: qcom: Add missing reset for ipq806x (git-fixes).\n\n - PCI: qcom: Add support for tx term offset for rev 2.1.0\n (git-fixes).\n\n - PCI: qcom: Define some PARF params needed for ipq8064\n SoC (git-fixes).\n\n - PCI: rcar: Fix runtime PM imbalance on error\n (git-fixes).\n\n - PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n\n - pci: Revive pci_dev __aer_firmware_first* fields for\n kABI (bsc#1174356).\n\n - PCI: switchtec: Add missing __iomem and __user tags to\n fix sparse warnings (git-fixes).\n\n - PCI: switchtec: Add missing __iomem tag to fix sparse\n warnings (git-fixes).\n\n - PCI: tegra: Revert tegra124 raw_violation_fixup\n (git-fixes).\n\n - percpu: Separate decrypted varaibles anytime encryption\n can be enabled (bsc#1174332).\n\n - phy: armada-38x: fix NETA lockup when repeatedly\n switching speeds (git-fixes).\n\n - phy: exynos5-usbdrd: Calibrating makes sense only for\n USB2.0 PHY (git-fixes).\n\n - phy: renesas: rcar-gen3-usb2: move irq registration to\n init (git-fixes).\n\n - phy: sun4i-usb: fix dereference of pointer phy0 before\n it is null checked (git-fixes).\n\n - pinctrl: amd: fix npins for uart0 in kerncz_groups\n (git-fixes).\n\n - pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH\n (git-fixes).\n\n - pinctrl: single: fix function name in documentation\n (git-fixes).\n\n - pinctrl-single: fix pcs_parse_pinconf() return value\n (git-fixes).\n\n - platform/chrome: cros_ec_ishtp: Fix a double-unlock\n issue (git-fixes).\n\n - platform/x86: intel-hid: Fix return value check in\n check_acpi_dev() (git-fixes).\n\n - platform/x86: intel-vbtn: Fix return value check in\n check_acpi_dev() (git-fixes).\n\n - platform/x86: ISST: Increase timeout (bsc#1174185).\n\n - PM: wakeup: Show statistics for deleted wakeup sources\n again (git-fixes).\n\n - powerpc/64s: Fix early_init_mmu section mismatch\n (bsc#1065729).\n\n - powerpc: Allow 4224 bytes of stack expansion for the\n signal frame (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for\n execute disable pkey (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Use PVR check instead of cpu\n feature (bsc#1065729).\n\n - powerpc/boot: Fix CONFIG_PPC_MPC52XX references\n (bsc#1065729).\n\n - powerpc: Document details on H_SCM_HEALTH hcall\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/eeh: Fix pseries_eeh_configure_bridge()\n (bsc#1174689).\n\n - powerpc/fadump: fix race between pstore write and fadump\n crash trigger (bsc#1168959 ltc#185010).\n\n - powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END\n (git-fixes).\n\n - powerpc/nvdimm: Use HCALL error as the return value\n (bsc#1175284).\n\n - powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error\n (bsc#1175284).\n\n - powerpc/papr_scm: Add support for fetching nvdimm\n 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823\n bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Fetch nvdimm health information from\n PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n\n - powerpc/papr_scm: Fetch nvdimm performance stats from\n PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n\n - powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Improve error logging and handling\n papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n\n - powerpc/papr_scm: Mark papr_scm_ndctl() as static\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/pseries/hotplug-cpu: Remove double free in error\n path (bsc#1065729).\n\n - powerpc/pseries: PCIE PHB reset (bsc#1174689).\n\n - powerpc/pseries: remove cede offline state for CPUs\n (bsc#1065729).\n\n - powerpc/rtas: do not online CPUs for partition suspend\n (bsc#1065729).\n\n - powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n\n - powerpc/xmon: Reset RCU and soft lockup watchdogs\n (bsc#1065729).\n\n - power: supply: check if calc_soc succeeded in\n pm860x_init_battery (git-fixes).\n\n - pwm: bcm-iproc: handle clk_get_rate() return\n (git-fixes).\n\n - qed: suppress 'do not support RoCE & iWARP' flooding on\n HW init (git-fixes).\n\n - qed: suppress false-positives interrupt error messages\n on HW init (git-fixes).\n\n - r8169: fix jumbo configuration for RTL8168evl\n (bsc#1175296).\n\n - r8169: fix jumbo packet handling on resume from suspend\n (bsc#1175296).\n\n - r8169: fix resume on cable plug-in (bsc#1175296).\n\n - r8169: fix rtl_hw_jumbo_disable for RTL8168evl\n (bsc#1175296).\n\n - r8169: move disabling interrupt coalescing to\n RTL8169/RTL8168 init (bsc#1175296).\n\n - r8169: read common register for PCI commit\n (bsc#1175296).\n\n - random32: move the pseudo-random 32-bit definitions to\n prandom.h (git-fixes).\n\n - random32: remove net_rand_state from the latent entropy\n gcc plugin (git-fixes).\n\n - random: fix circular include dependency on arm64 after\n addition of percpu.h (git-fixes).\n\n - RDMA/cm: Add missing locking around id.state in\n cm_dup_req_handler (git-fixes).\n\n - RDMA/cma: Protect bind_list and listen_list while\n finding matching cm id (git-fixes).\n\n - RDMA/cm: Fix an error check in cm_alloc_id_priv()\n (git-fixes).\n\n - RDMA/cm: Fix checking for allowed duplicate listens\n (git-fixes).\n\n - RDMA/cm: Fix ordering of xa_alloc_cyclic() in\n ib_create_cm_id() (git-fixes).\n\n - RDMA/cm: Read id.state under lock when doing pr_debug()\n (git-fixes).\n\n - RDMA/cm: Remove a race freeing timewait_info\n (git-fixes).\n\n - RDMA/cm: Update num_paths in cma_resolve_iboe_route\n error flow (git-fixes).\n\n - RDMA/core: Fix double destruction of uobject\n (git-fixes).\n\n - RDMA/core: Fix double put of resource (git-fixes).\n\n - RDMA/core: Fix missing error check on dev_set_name()\n (git-fixes).\n\n - RDMA/core: Fix protection fault in ib_mr_pool_destroy\n (git-fixes).\n\n - RDMA/core: Fix race between destroy and release FD\n object (git-fixes).\n\n - RDMA/core: Fix race in rdma_alloc_commit_uobject()\n (git-fixes).\n\n - RDMA/core: Prevent mixed use of FDs between shared\n ufiles (git-fixes).\n\n - RDMA/counter: Query a counter before release\n (git-fixes).\n\n - RDMA/efa: Set maximum pkeys device attribute\n (git-fixes).\n\n - RDMA/hns: Bugfix for querying qkey (git-fixes).\n\n - RDMA/hns: Fix cmdq parameter of querying pf timer\n resource (git-fixes).\n\n - RDMA/iwcm: Fix iwcm work deallocation (git-fixes).\n\n - RDMA/iw_cxgb4: Fix incorrect function parameters\n (git-fixes).\n\n - RDMA/mad: Do not crash if the rdma device does not have\n a umad interface (git-fixes).\n\n - RDMA/mad: Fix possible memory leak in\n ib_mad_post_receive_mads() (git-fixes).\n\n - RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).\n\n - RDMA/mlx5: Add init2init as a modify command\n (git-fixes).\n\n - RDMA/mlx5: Fix access to wrong pointer while performing\n flush due to error (git-fixes).\n\n - RDMA/mlx5: Fix prefetch memory leak if\n get_prefetchable_mr fails (jsc#SLE-8446).\n\n - RDMA/mlx5: Fix prefetch memory leak if\n get_prefetchable_mr fails (jsc#SLE-8446).\n\n - RDMA/mlx5: Fix the number of hwcounters of a dynamic\n counter (git-fixes).\n\n - RDMA/mlx5: Fix udata response upon SRQ creation\n (git-fixes).\n\n - RDMA/mlx5: Prevent prefetch from racing with implicit\n destruction (jsc#SLE-8446).\n\n - RDMA/mlx5: Prevent prefetch from racing with implicit\n destruction (jsc#SLE-8446).\n\n - RDMA/mlx5: Set GRH fields in query QP on RoCE\n (git-fixes).\n\n - RDMA/mlx5: Use xa_lock_irq when access to SRQ table\n (git-fixes).\n\n - RDMA/mlx5: Verify that QP is created with RQ or SQ\n (git-fixes).\n\n - RDMA/nldev: Fix crash when set a QP to a new counter but\n QPN is missing (git-fixes).\n\n - RDMA/pvrdma: Fix missing pci disable in\n pvrdma_pci_probe() (git-fixes).\n\n - RDMA/qedr: Fix KASAN: use-after-free in\n ucma_event_handler+0x532 (git-fixes).\n\n - RDMA/rvt: Fix potential memory leak caused by\n rvt_alloc_rq (git-fixes).\n\n - RDMA/rxe: Always return ERR_PTR from\n rxe_create_mmap_info() (git-fixes).\n\n - RDMA/rxe: Fix configuration of atomic queue pair\n attributes (git-fixes).\n\n - RDMA/rxe: Set default vendor ID (git-fixes).\n\n - RDMA/rxe: Set sys_image_guid to be aligned with HW IB\n devices (git-fixes).\n\n - RDMA/siw: Fix failure handling during device creation\n (git-fixes).\n\n - RDMA/siw: Fix passive connection establishment\n (git-fixes).\n\n - RDMA/siw: Fix pointer-to-int-cast warning in\n siw_rx_pbl() (git-fixes).\n\n - RDMA/siw: Fix potential siw_mem refcnt leak in\n siw_fastreg_mr() (git-fixes).\n\n - RDMA/siw: Fix reporting vendor_part_id (git-fixes).\n\n - RDMA/siw: Fix setting active_mtu attribute (git-fixes).\n\n - RDMA/siw: Fix setting active_(speed, width) attributes\n (git-fixes).\n\n - RDMA/ucma: Put a lock around every call to the rdma_cm\n layer (git-fixes).\n\n - RDMA/uverbs: Fix create WQ to use the given user handle\n (git-fixes).\n\n - regmap: debugfs: check count when read regmap file\n (git-fixes).\n\n - regmap: debugfs: Do not sleep while atomic for fast_io\n regmaps (git-fixes).\n\n - regmap: dev_get_regmap_match(): fix string comparison\n (git-fixes).\n\n - regmap: fix alignment issue (git-fixes).\n\n - regmap: Fix memory leak from regmap_register_patch\n (git-fixes).\n\n - regulator: gpio: Honor regulator-boot-on property\n (git-fixes).\n\n - remoteproc: qcom_q6v5_mss: Validate MBA firmware size\n before load (git-fixes).\n\n - remoteproc: qcom_q6v5_mss: Validate modem blob firmware\n size before load (git-fixes).\n\n - remoteproc: qcom: q6v5: Update running state before\n requesting stop (git-fixes).\n\n - Revert 'ALSA: hda: call runtime_allow() for all hda\n controllers' (git-fixes).\n\n - Revert 'drm/amd/display: Expose connector VRR range via\n debugfs' (bsc#1152489) 	* refreshed for context\n changes\n\n - Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs\n handlers' (git-fixes).\n\n - Revert 'i2c: cadence: Fix the hold bit setting'\n (git-fixes).\n\n - Revert 'RDMA/cma: Simplify rdma_resolve_addr() error\n flow' (git-fixes).\n\n - Revert 'thermal: mediatek: fix register index error'\n (git-fixes).\n\n - rhashtable: Document the right function parameters\n (bsc#1174880).\n\n - rhashtable: drop duplicated word in <linux/rhashtable.h>\n (bsc#1174880).\n\n - rhashtable: Drop raw RCU deref in nested_table_free\n (bsc#1174880).\n\n - rhashtable: Fix unprotected RCU dereference in __rht_ptr\n (bsc#1174880).\n\n - rhashtable: Restore RCU marking on rhash_lock_head\n (bsc#1174880).\n\n - RMDA/cm: Fix missing ib_cm_destroy_id() in\n ib_cm_insert_listen() (git-fixes).\n\n - rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs\n is needed for podman or docker builds when no more\n specific driver can be used (like lvm or btrfs). As the\n default build fs is ext4 currently, we need overlayfs\n kernel modules to be available.\n\n - rpm/modules.fips: add ecdh_generic (boo#1173813)\n\n - rtlwifi: rtl8192cu: Remove uninitialized_var() usage\n (git-fixes).\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink\n fails (bsc#1154353).\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink\n fails (git-fixes).\n\n - rtw88: fix LDPC field for RA info (git-fixes).\n\n - rtw88: fix short GI capability based on current\n bandwidth (git-fixes).\n\n - s390: fix syscall_get_error for compat processes\n (git-fixes).\n\n - s390/ism: fix error return code in ism_probe()\n (git-fixes).\n\n - s390/kaslr: add support for R_390_JMP_SLOT relocation\n type (git-fixes).\n\n - s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).\n\n - s390/qdio: consistently restore the IRQ handler\n (git-fixes).\n\n - s390/qdio: put thinint indicator after early error\n (git-fixes).\n\n - s390/qdio: tear down thinint indicator after early error\n (git-fixes).\n\n - s390/qeth: fix error handling for isolation mode cmds\n (git-fixes).\n\n - sched/fair: handle case of task_h_load() returning 0\n (bnc#1155798 (CPU scheduler functional and performance\n backports)).\n\n - scsi: ipr: Fix softlockup when rescanning devices in\n petitboot (jsc#SLE-13654).\n\n - scsi: ipr: Fix softlockup when rescanning devices in\n petitboot (jsc#SLE-13654).\n\n - scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).\n\n - scsi: ipr: Use scnprintf() for avoiding potential buffer\n overflow (jsc#SLE-13654).\n\n - scsi: ipr: Use scnprintf() for avoiding potential buffer\n overflow (jsc#SLE-13654).\n\n - scsi: libfc: free response frame from GPN_ID\n (bsc#1173849).\n\n - scsi: libfc: Handling of extra kref (bsc#1173849).\n\n - scsi: libfc: If PRLI rejected, move rport to PLOGI state\n (bsc#1173849).\n\n - scsi: libfc: rport state move to PLOGI if all PRLI retry\n exhausted (bsc#1173849).\n\n - scsi: libfc: Skip additional kref updating work event\n (bsc#1173849).\n\n - scsi: ufs-bsg: Fix runtime PM imbalance on error\n (git-fixes).\n\n - scsi: zfcp: Fix panic on ERP timeout for previously\n dismissed ERP action (git-fixes).\n\n - selftests/net: in rxtimestamp getopt_long needs\n terminating null entry (networking-stable-20_06_16).\n\n - selinux: fall back to ref-walk if audit is required\n (bsc#1174333).\n\n - selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC\n upon follow_link' (bsc#1174333).\n\n - seq_buf: Export seq_buf_printf (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - seq_buf: Export seq_buf_printf (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - serial: 8250: fix null-ptr-deref in\n serial8250_start_tx() (git-fixes).\n\n - serial: 8250_mtk: Fix high-speed baud rates clamping\n (git-fixes).\n\n - serial: 8250_pci: Move Pericom IDs to pci_ids.h\n (git-fixes).\n\n - serial: 8250_tegra: Create Tegra specific 8250 driver\n (bsc#1173941).\n\n - serial: amba-pl011: Make sure we initialize the\n port.lock spinlock (git-fixes).\n\n - serial: exar: Fix GPIO configuration for Sealevel cards\n based on XR17V35X (git-fixes).\n\n - serial: mxs-auart: add missed iounmap() in probe failure\n and remove (git-fixes).\n\n - serial: tegra: fix CREAD handling for PIO (git-fixes).\n\n - SMB3: Honor lease disabling for multiuser mounts\n (git-fixes).\n\n - soc/tegra: pmc: Enable PMIC wake event on Tegra210\n (bsc#1175116).\n\n - soundwire: intel: fix memory leak with devm_kasprintf\n (git-fixes).\n\n - spi: davinci: Remove uninitialized_var() usage\n (git-fixes).\n\n - spi: lantiq: fix: Rx overflow error in full duplex mode\n (git-fixes).\n\n - spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM\n (git-fixes).\n\n - spi: mediatek: use correct SPI_CFG2_REG MACRO\n (git-fixes).\n\n - spi: rockchip: Fix error in SPI slave pio read\n (git-fixes).\n\n - spi: spidev: fix a potential use-after-free in\n spidev_release() (git-fixes).\n\n - spi: spidev: fix a race between spidev_release and\n spidev_remove (git-fixes).\n\n - spi: spi-geni-qcom: Actually use our FIFO (git-fixes).\n\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of\n clock rate (git-fixes).\n\n - spi: sun4i: update max transfer size reported\n (git-fixes).\n\n - staging: comedi: addi_apci_1032: check\n INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1500: check\n INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1564: check\n INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG\n support (git-fixes).\n\n - staging: comedi: verify array index is correct before\n using it (git-fixes).\n\n - Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable\n authmode (git-fixes).\n\n - staging: rtl8192u: fix a dubious looking mask before a\n shift (git-fixes).\n\n - staging: rtl8712: handle firmware load failure\n (git-fixes).\n\n - staging: vchiq_arm: Add a matching unregister call\n (git-fixes).\n\n - staging: wlan-ng: properly check endpoint types\n (git-fixes).\n\n - SUNRPC dont update timeout value on connection reset\n (bsc#1174263).\n\n - sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).\n\n - tcp: md5: allow changing MD5 keys in all socket states\n (git-fixes).\n\n - thermal/drivers: imx: Fix missing of_node_put() at probe\n time (git-fixes).\n\n - thermal: int3403_thermal: Downgrade error message\n (git-fixes).\n\n - thermal: ti-soc-thermal: Fix reversed condition in\n ti_thermal_expose_sensor() (git-fixes).\n\n - tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).\n\n - tpm: Require that all digests are present in\n TCG_PCR_EVENT2 structures (git-fixes).\n\n - tpm_tis: extra chip->ops check on error path in\n tpm_tis_core_init (git-fixes).\n\n - tty: hvc_console, fix crashes on parallel open/close\n (git-fixes).\n\n - ubsan: check panic_on_warn (bsc#1174805).\n\n - udp: Copy has_conns in reuseport_grow() (git-fixes).\n\n - udp: Improve load balancing for SO_REUSEPORT\n (git-fixes).\n\n - uio_pdrv_genirq: Remove warning when irq is not\n specified (bsc#1174762).\n\n - USB: c67x00: fix use after free in c67x00_giveback_urb\n (git-fixes).\n\n - usb: chipidea: core: add wakeup support for extcon\n (git-fixes).\n\n - usb: core: fix quirks_param_set() writing to a const\n pointer (git-fixes).\n\n - usb: dwc2: Fix shutdown callback in platform\n (git-fixes).\n\n - usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).\n\n - usb: dwc3: pci: add support for the Intel Jasper Lake\n (git-fixes).\n\n - usb: dwc3: pci: add support for the Intel Tiger Lake PCH\n -H variant (git-fixes).\n\n - usb: dwc3: pci: Fix reference count leak in\n dwc3_pci_resume_work (git-fixes).\n\n - usb: gadget: Fix issue with config_ep_by_speed function\n (git-fixes).\n\n - usb: gadget: f_uac2: fix AC Interface Header Descriptor\n wTotalLength (git-fixes).\n\n - usb: gadget: function: fix missing spinlock in\n f_uac1_legacy (git-fixes).\n\n - usb: gadget: udc: atmel: fix uninitialized read in debug\n printk (git-fixes).\n\n - usb: gadget: udc: atmel: remove outdated comment in\n usba_ep_disable() (git-fixes).\n\n - usb: gadget: udc: gr_udc: fix memleak on error handling\n path in gr_ep_init() (git-fixes).\n\n - usb: hso: check for return value in\n hso_serial_common_create() (git-fixes).\n\n - usb: hso: Fix debug compile warning on sparc32\n (git-fixes).\n\n - USB: iowarrior: fix up report size handling for some\n devices (git-fixes).\n\n - usbip: tools: fix module name in man page (git-fixes).\n\n - usbnet: smsc95xx: Fix use-after-free after removal\n (git-fixes).\n\n - USB: serial: ch341: add new Product ID for CH340\n (git-fixes).\n\n - USB: serial: cp210x: enable usb generic\n throttle/unthrottle (git-fixes).\n\n - USB: serial: cp210x: re-enable auto-RTS on open\n (git-fixes).\n\n - USB: serial: cypress_m8: enable Simply Automated UPB PIM\n (git-fixes).\n\n - USB: serial: iuu_phoenix: fix led-activity helpers\n (git-fixes).\n\n - USB: serial: iuu_phoenix: fix memory corruption\n (git-fixes).\n\n - USB: serial: option: add GosunCn GM500 series\n (git-fixes).\n\n - USB: serial: option: add Quectel EG95 LTE modem\n (git-fixes).\n\n - USB: serial: qcserial: add EM7305 QDL product ID\n (git-fixes).\n\n - usb: tegra: Fix allocation for the FPCI context\n (git-fixes).\n\n - usb: xhci: define IDs for various ASMedia host\n controllers (git-fixes).\n\n - usb: xhci: Fix ASM2142/ASM3142 DMA addressing\n (git-fixes).\n\n - usb: xhci: Fix ASMedia ASM1142 DMA addressing\n (git-fixes).\n\n - usb: xhci-mtk: fix the failure of bandwidth allocation\n (git-fixes).\n\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking\n (bsc#1174129).\n\n - video: fbdev: sm712fb: fix an issue about iounmap for a\n wrong address (git-fixes).\n\n - video: pxafb: Fix the function used to balance a\n 'dma_alloc_coherent()' call (git-fixes).\n\n - virtio: virtio_console: add missing\n MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n\n - virt: vbox: Fix guest capabilities mask check\n (git-fixes).\n\n - virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG\n req numbers to match upstream (git-fixes).\n\n - vsock: fix timeout in vsock_accept()\n (networking-stable-20_06_07).\n\n - vt: Reject zero-sized screen buffer size (git-fixes).\n\n - vxlan: Avoid infinite loop when suppressing NS messages\n with invalid options (networking-stable-20_06_10).\n\n - watchdog: f71808e_wdt: clear watchdog timeout occurred\n flag (git-fixes).\n\n - watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support\n in watchdog_info.options (git-fixes).\n\n - watchdog: f71808e_wdt: remove use of wrong watchdog_info\n option (git-fixes).\n\n - watchdog: initialize device before misc_register\n (git-fixes).\n\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO\n (jsc#SLE-13202).\n\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO\n (jsc#SLE-13202).\n\n - wireless: Use linux/stddef.h instead of stddef.h\n (git-fixes).\n\n - wireless: Use offsetof instead of custom macro\n (git-fixes).\n\n - wl1251: fix always return 0 error (git-fixes).\n\n - workqueue: Remove unnecessary kfree() call in\n rcu_free_wq() (git-fixes).\n\n - xen/pvcalls-back: test for errors when calling\n backend_connect() (bsc#1065600).\n\n - xfrm: fix a warning in xfrm_policy_insert_list\n (bsc#1174645).\n\n - xfrm: policy: match with both mark and mask on user\n interfaces (bsc#1174645).\n\n - xfs: do not eat an EIO/ENOSPC writeback error when\n scrubbing data fork (git-fixes).\n\n - xfs: fix inode allocation block res calculation\n precedence (git-fixes).\n\n - xfs: fix reflink quota reservation accounting error\n (git-fixes).\n\n - xfs: preserve rmapbt swapext block reservation from\n freed blocks (git-fixes).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1149032\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152472\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152489\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1153274\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1154353\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1154488\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1155518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1155798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1165933\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167773\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172197\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172201\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173468\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173813\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173849\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173941\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174072\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174116\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174126\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174129\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174264\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174331\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174332\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174362\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174396\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174398\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174513\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174527\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174627\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174689\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174737\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174824\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174865\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174880\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174897\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174969\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175009\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175010\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175012\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175013\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175014\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175015\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175017\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175019\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175052\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175116\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175175\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175176\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175180\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175181\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175182\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175183\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175184\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175186\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175187\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175188\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175190\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175191\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175192\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175195\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175345\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175346\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175347\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175367\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175377\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-eppic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-eppic-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-gcore\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-gcore-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libdpdk-20_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libdpdk-20_0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-authlibs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-authlibs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-authlibs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-client-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-fuse_client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-fuse_client-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-server-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python3-virtualbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python3-virtualbox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-x11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-vnc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-websrv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-0.8-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-debugsource-0.8-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-kmp-default-debuginfo-0.8_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-kmp-preempt-debuginfo-0.8_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-debuginfo-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-debugsource-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-devel-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-eppic-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-eppic-debuginfo-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-gcore-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-gcore-debuginfo-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-kmp-default-debuginfo-7.2.8_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-kmp-preempt-debuginfo-7.2.8_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-debugsource-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-devel-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-devel-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-examples-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-examples-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-kmp-default-debuginfo-19.11.1_k5.3.18_lp152.36-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-kmp-preempt-debuginfo-19.11.1_k5.3.18_lp152.36-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-tools-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-tools-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-debugsource-9.0.22~1+git.fe2b5983-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-kmp-default-debuginfo-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-kmp-preempt-debuginfo-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-debugsource-1.28-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-kmp-default-debuginfo-1.28_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-kmp-preempt-debuginfo-1.28_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-devel-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-devel-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-docs-html-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-devel-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-macros-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-build-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-build-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-qa-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-source-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-source-vanilla-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-syms-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libdpdk-20_0-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libdpdk-20_0-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-1.62-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-debuginfo-1.62-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-debugsource-1.62-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-kmp-default-debuginfo-1.62_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-kmp-preempt-debuginfo-1.62_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-authlibs-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-authlibs-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-authlibs-devel-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-client-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-client-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-debugsource-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-devel-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-devel-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-fuse_client-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-fuse_client-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kernel-source-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kmp-default-debuginfo-1.8.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kmp-preempt-debuginfo-1.8.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-server-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-server-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-0.44-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-debuginfo-0.44-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-debugsource-0.44-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-kmp-default-debuginfo-0.44_k5.3.18_lp152.36-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-kmp-preempt-debuginfo-0.44_k5.3.18_lp152.36-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"python3-virtualbox-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"python3-virtualbox-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-debugsource-5.6.4.2+git20200318.49e98ff-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-kmp-default-debuginfo-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-kmp-preempt-debuginfo-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-0.26.5-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-debuginfo-0.26.5-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-debugsource-0.26.5-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-kmp-default-debuginfo-0.26.5_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-kmp-preempt-debuginfo-0.26.5_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-debugsource-0.12.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-kmp-default-debuginfo-0.12.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-kmp-preempt-debuginfo-0.12.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-utils-0.12.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"vhba-kmp-default-debuginfo-20200106_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"vhba-kmp-preempt-debuginfo-20200106_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-debugsource-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-devel-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-source-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-tools-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-tools-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-x11-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-x11-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-host-source-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-kmp-default-debuginfo-6.1.10_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-kmp-preempt-debuginfo-6.1.10_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-qt-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-qt-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-vnc-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-websrv-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-websrv-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-3.9-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-debuginfo-3.9-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-kmp-default-debuginfo-3.9_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-kmp-preempt-debuginfo-3.9_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bbswitch / bbswitch-debugsource / bbswitch-kmp-default / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:26:14", "description": "According to the versions of the kernel packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities :\n\n - In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions:\n Android-10Android ID: A-153467744(CVE-2020-0305)\n\n - A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-14331)\n\n - To mitigate this issue, prevent the module nouveau from being loaded. Please see <a href='https://access.redhat.com/solutions/41278'>https:\n //access.redhat.com/solutions/41278</a> for information on how to blacklist a kernel module to prevent it from loading automatically.(CVE-2020-27820)\n\n - A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-14351)\n\n - A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service.\n The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-25643)\n\n - A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.(CVE-2020-25645)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-03-10T00:00:00", "type": "nessus", "title": "EulerOS Virtualization 3.0.6.6 : kernel (EulerOS-SA-2021-1454)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-0305", "CVE-2020-12352", "CVE-2020-14331", "CVE-2020-14351", "CVE-2020-25643", "CVE-2020-25645", "CVE-2020-25705", "CVE-2020-27820"], "modified": "2022-12-05T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-debuginfo", "p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-source", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-debuginfo", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:kernel-tools-libs-devel", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:perf-debuginfo", "p-cpe:/a:huawei:euleros:python-perf", "p-cpe:/a:huawei:euleros:python-perf-debuginfo", "cpe:/o:huawei:euleros:uvp:3.0.6.6"], "id": "EULEROS_SA-2021-1454.NASL", "href": "https://www.tenable.com/plugins/nessus/147559", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(147559);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-0305\",\n \"CVE-2020-12352\",\n \"CVE-2020-14331\",\n \"CVE-2020-14351\",\n \"CVE-2020-25643\",\n \"CVE-2020-25645\",\n \"CVE-2020-25705\"\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"EulerOS Virtualization 3.0.6.6 : kernel (EulerOS-SA-2021-1454)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerabilities :\n\n - In cdev_get of char_dev.c, there is a possible\n use-after-free due to a race condition. This could lead\n to local escalation of privilege with System execution\n privileges needed. User interaction is not needed for\n exploitation.Product: AndroidVersions:\n Android-10Android ID: A-153467744(CVE-2020-0305)\n\n - A flaw was found in the Linux kernel's implementation\n of the invert video code on VGA consoles when a local\n attacker attempts to resize the console, calling an\n ioctl VT_RESIZE, which causes an out-of-bounds write to\n occur. This flaw allows a local user with access to the\n VGA console to crash the system, potentially escalating\n their privileges on the system. The highest threat from\n this vulnerability is to data confidentiality and\n integrity as well as system\n availability.(CVE-2020-14331)\n\n - To mitigate this issue, prevent the module nouveau from\n being loaded. Please see <a\n href='https://access.redhat.com/solutions/41278'>https:\n //access.redhat.com/solutions/41278</a> for information\n on how to blacklist a kernel module to prevent it from\n loading automatically.(CVE-2020-27820)\n\n - A flaw was found in the Linux kernel. A use-after-free\n memory flaw was found in the perf subsystem allowing a\n local attacker with permission to monitor perf events\n to corrupt memory and possibly escalate privileges. The\n highest threat from this vulnerability is to data\n confidentiality and integrity as well as system\n availability.(CVE-2020-14351)\n\n - A flaw was found in the HDLC_PPP module of the Linux\n kernel in versions before 5.9-rc7. Memory corruption\n and a read overflow is caused by improper input\n validation in the ppp_cp_parse_cr function which can\n cause the system to crash or cause a denial of service.\n The highest threat from this vulnerability is to data\n confidentiality and integrity as well as system\n availability.(CVE-2020-25643)\n\n - A flaw was found in the Linux kernel in versions before\n 5.9-rc7. Traffic between two Geneve endpoints may be\n unencrypted when IPsec is configured to encrypt traffic\n for the specific UDP port used by the GENEVE tunnel\n allowing anyone between the two endpoints to read the\n traffic unencrypted. The main threat from this\n vulnerability is to data\n confidentiality.(CVE-2020-25645)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-1454\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7f469041\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-25643\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-14351\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/03/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/03/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.6.6\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.6.6\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.6.6\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-862.14.1.6_122\",\n \"kernel-debuginfo-3.10.0-862.14.1.6_122\",\n \"kernel-debuginfo-common-x86_64-3.10.0-862.14.1.6_122\",\n \"kernel-devel-3.10.0-862.14.1.6_122\",\n \"kernel-headers-3.10.0-862.14.1.6_122\",\n \"kernel-source-3.10.0-862.14.1.6_122\",\n \"kernel-tools-3.10.0-862.14.1.6_122\",\n \"kernel-tools-debuginfo-3.10.0-862.14.1.6_122\",\n \"kernel-tools-libs-3.10.0-862.14.1.6_122\",\n \"kernel-tools-libs-devel-3.10.0-862.14.1.6_122\",\n \"perf-3.10.0-862.14.1.6_122\",\n \"perf-debuginfo-3.10.0-862.14.1.6_122\",\n \"python-perf-3.10.0-862.14.1.6_122\",\n \"python-perf-debuginfo-3.10.0-862.14.1.6_122\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:33:17", "description": "The remote OracleVM system is missing necessary patches to address security updates:\n\n - In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (CVE-2019-9456)\n\n - In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (CVE-2019-9458)\n\n - In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744 (CVE-2020-0305)\n\n - In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed.\n User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:\n A-152735806 (CVE-2020-0429)\n\n - In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID:\n A-119770583 (CVE-2020-27068)\n\n - The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85. (CVE-2020-28097)\n\n - net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (CVE-2021-34693)\n\n - .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.\n (CVE-2021-3609)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-09-13T00:00:00", "type": "nessus", "title": "OracleVM 3.4 : kernel-uek (OVMSA-2021-0030)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-9456", "CVE-2019-9458", "CVE-2020-0305", "CVE-2020-0429", "CVE-2020-27068", "CVE-2020-28097", "CVE-2021-34693", "CVE-2021-3609"], "modified": "2023-02-09T00:00:00", "cpe": ["p-cpe:/a:oracle:vm:kernel-uek", "p-cpe:/a:oracle:vm:kernel-uek-firmware", "cpe:/o:oracle:vm_server:3.4"], "id": "ORACLEVM_OVMSA-2021-0030.NASL", "href": "https://www.tenable.com/plugins/nessus/153221", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable, Inc.\n#\n# The package checks in this plugin were\n# extracted from OracleVM Security Advisory OVMSA-2021-0030.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(153221);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/02/09\");\n\n script_cve_id(\n \"CVE-2019-9456\",\n \"CVE-2019-9458\",\n \"CVE-2020-0305\",\n \"CVE-2020-0429\",\n \"CVE-2020-27068\",\n \"CVE-2020-28097\",\n \"CVE-2021-3609\",\n \"CVE-2021-34693\"\n );\n\n script_name(english:\"OracleVM 3.4 : kernel-uek (OVMSA-2021-0030)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote OracleVM host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote OracleVM system is missing necessary patches to address security updates:\n\n - In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds\n check. This could lead to local escalation of privilege with System execution privileges needed. User\n interaction is not needed for exploitation. (CVE-2019-9456)\n\n - In the Android kernel in the video driver there is a use after free due to a race condition. This could\n lead to local escalation of privilege with no additional execution privileges needed. User interaction is\n not needed for exploitation. (CVE-2019-9458)\n\n - In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to\n local escalation of privilege with System execution privileges needed. User interaction is not needed for\n exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744 (CVE-2020-0305)\n\n - In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a\n use after free. This could lead to local escalation of privilege with System execution privileges needed.\n User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:\n A-152735806 (CVE-2020-0429)\n\n - In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds\n check. This could lead to local information disclosure with System execution privileges needed. User\n interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID:\n A-119770583 (CVE-2020-27068)\n\n - The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a\n vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85. (CVE-2020-28097)\n\n - net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from\n kernel stack memory because parts of a data structure are uninitialized. (CVE-2021-34693)\n\n - .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse\n a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race\n condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.\n (CVE-2021-3609)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/cve/CVE-2019-9456.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/cve/CVE-2019-9458.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/cve/CVE-2020-0305.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/cve/CVE-2020-0429.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/cve/CVE-2020-27068.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/cve/CVE-2020-28097.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/cve/CVE-2021-34693.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/cve/CVE-2021-3609.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/OVMSA-2021-0030.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel-uek / kernel-uek-firmware packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-27068\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/09/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/09/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-uek-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:3.4\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"OracleVM Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleVM/release\", \"Host/OracleVM/rpm-list\");\n\n exit(0);\n}\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item(\"Host/OracleVM/release\");\nif (isnull(release) || \"OVS\" >!< release) audit(AUDIT_OS_NOT, \"OracleVM\");\nif (! preg(pattern:\"^OVS\" + \"3\\.4\" + \"(\\.[0-9]|$)\", string:release)) audit(AUDIT_OS_NOT, \"OracleVM 3.4\", \"OracleVM \" + release);\nif (!get_kb_item(\"Host/OracleVM/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"OracleVM\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['4.1.12-124.54.6.el6uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for OVMSA-2021-0030');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '4.1';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-4.1.12-124.54.6.el6uek', 'cpu':'x86_64', 'release':'3.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.54.6.el6uek', 'cpu':'x86_64', 'release':'3.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'OVS' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release && (!exists_check || rpm_exists(release:release, rpm:exists_check))) {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-firmware');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:33:16", "description": "The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2021-9442 advisory.\n\n - In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (CVE-2019-9458)\n\n - In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744 (CVE-2020-0305)\n\n - In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (CVE-2019-9456)\n\n - In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID:\n A-119770583 (CVE-2020-27068)\n\n - In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed.\n User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:\n A-152735806 (CVE-2020-0429)\n\n - The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85. (CVE-2020-28097)\n\n - net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (CVE-2021-34693)\n\n - kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-09-09T00:00:00", "type": "nessus", "title": "Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2021-9442)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-9456", "CVE-2019-9458", "CVE-2020-0305", "CVE-2020-0429", "CVE-2020-27068", "CVE-2020-28097", "CVE-2021-34693", "CVE-2021-3609"], "modified": "2023-02-09T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-firmware"], "id": "ORACLELINUX_ELSA-2021-9442.NASL", "href": "https://www.tenable.com/plugins/nessus/153172", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2021-9442.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(153172);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/02/09\");\n\n script_cve_id(\n \"CVE-2019-9456\",\n \"CVE-2019-9458\",\n \"CVE-2020-0305\",\n \"CVE-2020-0429\",\n \"CVE-2020-27068\",\n \"CVE-2020-28097\",\n \"CVE-2021-3609\",\n \"CVE-2021-34693\"\n );\n\n script_name(english:\"Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2021-9442)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe ELSA-2021-9442 advisory.\n\n - In the Android kernel in the video driver there is a use after free due to a race condition. This could\n lead to local escalation of privilege with no additional execution privileges needed. User interaction is\n not needed for exploitation. (CVE-2019-9458)\n\n - In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to\n local escalation of privilege with System execution privileges needed. User interaction is not needed for\n exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744 (CVE-2020-0305)\n\n - In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds\n check. This could lead to local escalation of privilege with System execution privileges needed. User\n interaction is not needed for exploitation. (CVE-2019-9456)\n\n - In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds\n check. This could lead to local information disclosure with System execution privileges needed. User\n interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID:\n A-119770583 (CVE-2020-27068)\n\n - In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a\n use after free. This could lead to local escalation of privilege with System execution privileges needed.\n User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:\n A-152735806 (CVE-2020-0429)\n\n - The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a\n vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85. (CVE-2020-28097)\n\n - net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from\n kernel stack memory because parts of a data structure are uninitialized. (CVE-2021-34693)\n\n - kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2021-9442.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-27068\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/09/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/09/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-firmware\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 6 / 7', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\nif ('x86_64' >!< cpu) audit(AUDIT_ARCH_NOT, 'x86_64', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['4.1.12-124.54.6.el6uek', '4.1.12-124.54.6.el7uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2021-9442');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '4.1';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-4.1.12-124.54.6.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-debug-4.1.12-124.54.6.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.1.12'},\n {'reference':'kernel-uek-debug-devel-4.1.12-124.54.6.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.1.12'},\n {'reference':'kernel-uek-devel-4.1.12-124.54.6.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.1.12'},\n {'reference':'kernel-uek-doc-4.1.12-124.54.6.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.54.6.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'},\n {'reference':'kernel-uek-4.1.12-124.54.6.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-debug-4.1.12-124.54.6.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.1.12'},\n {'reference':'kernel-uek-debug-devel-4.1.12-124.54.6.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.1.12'},\n {'reference':'kernel-uek-devel-4.1.12-124.54.6.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.1.12'},\n {'reference':'kernel-uek-doc-4.1.12-124.54.6.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.54.6.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-debug / kernel-uek-debug-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-20T14:56:11", "description": "The remote SUSE Linux SLES11 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2020:14442-1 advisory.\n\n - An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability. (CVE-2019-5108)\n\n - In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744 (CVE-2020-0305)\n\n - A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.\n (CVE-2020-10732)\n\n - A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service. (CVE-2020-10769)\n\n - A stack information leak flaw was found in s390/s390x in the Linux kernels memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data. (CVE-2020-10773)\n\n - The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a double fetch vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power. (CVE-2020-12652)\n\n - ** DISPUTED ** gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug. (CVE-2020-12656)\n\n - An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case. (CVE-2020-13974)\n\n - In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c. (CVE-2020-14416)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-06-10T00:00:00", "type": "nessus", "title": "SUSE SLES11 Security Update : kernel (SUSE-SU-2020:14442-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-5108", "CVE-2020-0305", "CVE-2020-10732", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-12652", "CVE-2020-12656", "CVE-2020-13974", "CVE-2020-14416"], "modified": "2021-06-10T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-bigmem", "p-cpe:/a:novell:suse_linux:kernel-bigmem-base", "p-cpe:/a:novell:suse_linux:kernel-bigmem-devel", "p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-ec2", "p-cpe:/a:novell:suse_linux:kernel-ec2-base", "p-cpe:/a:novell:suse_linux:kernel-ec2-devel", "p-cpe:/a:novell:suse_linux:kernel-ppc64", "p-cpe:/a:novell:suse_linux:kernel-ppc64-base", "p-cpe:/a:novell:suse_linux:kernel-pae", "p-cpe:/a:novell:suse_linux:kernel-ppc64-devel", "p-cpe:/a:novell:suse_linux:kernel-source", "p-cpe:/a:novell:suse_linux:kernel-pae-base", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-pae-devel", "p-cpe:/a:novell:suse_linux:kernel-trace", "p-cpe:/a:novell:suse_linux:kernel-trace-base", "p-cpe:/a:novell:suse_linux:kernel-trace-devel", "p-cpe:/a:novell:suse_linux:kernel-xen", "p-cpe:/a:novell:suse_linux:kernel-xen-base", "p-cpe:/a:novell:suse_linux:kernel-xen-devel", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_SU-2020-14442-1.NASL", "href": "https://www.tenable.com/plugins/nessus/150665", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# SUSE update advisory SUSE-SU-2020:14442-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(150665);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/10\");\n\n script_cve_id(\n \"CVE-2019-5108\",\n \"CVE-2020-0305\",\n \"CVE-2020-10732\",\n \"CVE-2020-10769\",\n \"CVE-2020-10773\",\n \"CVE-2020-12652\",\n \"CVE-2020-12656\",\n \"CVE-2020-13974\",\n \"CVE-2020-14416\"\n );\n script_xref(name:\"SuSE\", value:\"SUSE-SU-2020:14442-1\");\n\n script_name(english:\"SUSE SLES11 Security Update : kernel (SUSE-SU-2020:14442-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SLES11 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe SUSE-SU-2020:14442-1 advisory.\n\n - An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An\n attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations\n before the required authentication process has completed. This could lead to different denial-of-service\n scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already\n existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge\n Authentication and Association Request packets to trigger this vulnerability. (CVE-2019-5108)\n\n - In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to\n local escalation of privilege with System execution privileges needed. User interaction is not needed for\n exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744 (CVE-2020-0305)\n\n - A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an\n attacker with a local account to crash a trivial program and exfiltrate private kernel data.\n (CVE-2020-10732)\n\n - A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in\n crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4\n bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat,\n leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of\n service. (CVE-2020-10769)\n\n - A stack information leak flaw was found in s390/s390x in the Linux kernels memory manager functionality,\n where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the\n kernel data. (CVE-2020-10773)\n\n - The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows\n local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a\n double fetch vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states The security impact of this\n bug is not as bad as it could have been because these operations are all privileged and root already has\n enormous destructive power. (CVE-2020-12652)\n\n - ** DISPUTED ** gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5\n implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory\n leak. Note: This was disputed with the assertion that the issue does not grant any access not already\n available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading\n kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of\n memory they like and load that replicating the effect of this bug. (CVE-2020-12656)\n\n - An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer\n overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community\n argue that the integer overflow does not lead to a security issue in this case. (CVE-2020-13974)\n\n - In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line\n discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and\n drivers/net/can/slcan.c. (CVE-2020-14416)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1159912\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1159913\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1162002\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1171218\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1171219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1171220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1172775\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1172999\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1173265\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1174462\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1174543\");\n # https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?35e8a7af\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-5108\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-0305\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10732\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10769\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10773\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12652\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12656\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13974\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-14416\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-13974\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/12/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/06/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-bigmem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-bigmem-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-bigmem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ec2-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ec2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-pae-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-pae-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ppc64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ppc64-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ppc64-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-trace-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-trace-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES11', 'SUSE ' + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE ' + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\npkgs = [\n {'reference':'kernel-default-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-default-base-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-default-devel-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-default-man-3.0.101-108.117', 'sp':'4', 'cpu':'s390x', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-ec2-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-ec2-3.0.101-108.117', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-ec2-base-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-ec2-base-3.0.101-108.117', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-ec2-devel-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-ec2-devel-3.0.101-108.117', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-pae-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-pae-base-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-pae-devel-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-source-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-syms-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-trace-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-trace-base-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-trace-devel-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-xen-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-xen-3.0.101-108.117', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-xen-base-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-xen-base-3.0.101-108.117', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-xen-devel-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-xen-devel-3.0.101-108.117', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},\n {'reference':'kernel-default-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-default-base-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-default-devel-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-default-man-3.0.101-108.117', 'sp':'4', 'cpu':'s390x', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-ec2-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-ec2-3.0.101-108.117', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-ec2-base-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-ec2-base-3.0.101-108.117', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-ec2-devel-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-ec2-devel-3.0.101-108.117', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-pae-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-pae-base-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-pae-devel-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-source-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-syms-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-trace-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-trace-base-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-trace-devel-3.0.101-108.117', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-xen-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-xen-3.0.101-108.117', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-xen-base-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-xen-base-3.0.101-108.117', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-xen-devel-3.0.101-108.117', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'kernel-xen-devel-3.0.101-108.117', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n exists_check = NULL;\n rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && release && exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n else if (reference && release) {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n ltss_plugin_caveat = '\\n' +\n 'NOTE: This vulnerability check contains fixes that apply to\\n' +\n 'packages only available in SUSE Enterprise Linux Server LTSS\\n' +\n 'repositories. Access to these package security updates require\\n' +\n 'a paid SUSE LTSS subscription.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + ltss_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-default / kernel-default-base / kernel-default-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:51", "description": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n\nCVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\nCVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-07T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2152-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20810", "CVE-2019-20812", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10773", "CVE-2020-12771", "CVE-2020-13974", "CVE-2020-14416"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-kgraft", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_127-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_127-default-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2152-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139408", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2152-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139408);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-20810\", \"CVE-2019-20812\", \"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10773\", \"CVE-2020-12771\", \"CVE-2020-13974\", \"CVE-2020-14416\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2152-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth may have allowed an unauthenticated user\nto complete authentication without pairing credentials via adjacent\naccess. An unauthenticated, adjacent attacker could impersonate a\nBluetooth BR/EDR master or slave to pair with a previously paired\nremote device to successfully complete the authentication procedure\nwithout knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the\nSELinux subsystem. This flaw occurs while importing the Commercial IP\nSecurity Option (CIPSO) protocol's category bitmap into the SELinux\nextensible bitmap via the' ebitmap_netlbl_import' routine. This flaw\nallowed a remote network user to crash the system kernel, resulting in\na denial of service (bnc#1171191).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook\nimplementation, where it incorrectly assumed that an skb would only\ncontain a single netlink message. The hook would incorrectly only\nvalidate the first netlink message in the skb and allow or deny the\nrest of the messages within the skb with the granted permission\nwithout further processing (bnc#1171189).\n\nCVE-2019-20812: An issue was discovered in the\nprb_calc_retire_blk_tmo() function in net/packet/af_packet.c can\nresult in a denial of service (CPU consumption and soft lockup) in a\ncertain failure case involving TPACKET_V3, aka CID-b43d1f9f7067\n(bnc#1172453).\n\nCVE-2020-10732: A flaw was found in the implementation of userspace\ncore dumps. This flaw allowed an attacker with a local account to\ncrash a trivial program and exfiltrate private kernel data\n(bnc#1171220).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a\ndeadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was\nfixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the\nslip and slcan line discipline could lead to a use-after-free, aka\nCID-0ace17d56824. This affects drivers/net/slip/slip.c and\ndrivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if\nk_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call\nsnd_card_free for a failure path, which causes a memory leak, aka\nCID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1146351\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1149652\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152457\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164910\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172453\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20810/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20812/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10135/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10711/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10732/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10751/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-13974/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202152-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5ce337e5\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud Crowbar 8 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-2152=1\n\nSUSE OpenStack Cloud 8 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-8-2020-2152=1\n\nSUSE Linux Enterprise Server for SAP 12-SP3 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP3-2020-2152=1\n\nSUSE Linux Enterprise Server 12-SP3-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-2152=1\n\nSUSE Linux Enterprise Server 12-SP3-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2020-2152=1\n\nSUSE Linux Enterprise High Availability 12-SP3 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP3-2020-2152=1\n\nSUSE Enterprise Storage 5 :\n\nzypper in -t patch SUSE-Storage-5-2020-2152=1\n\nHPE Helion Openstack 8 :\n\nzypper in -t patch HPE-Helion-OpenStack-8-2020-2152=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-13974\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-kgraft\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_127-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_127-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-default-kgraft-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_180-94_127-default-1-4.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_180-94_127-default-debuginfo-1-4.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"s390x\", reference:\"kernel-default-man-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-base-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-base-debuginfo-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-debuginfo-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-debugsource-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-devel-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-syms-4.4.180-94.127.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:22", "description": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-15780: A lockdown bypass for loading unsigned modules using ACPI table injection was fixed. (bsc#1173573)\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-0305: Fixed a possible use-after-free due to a race condition incdev_get of char_dev.c. This could lead to local escalation of privilege. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bnc#1173074).\n\nCVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt ACPI variable, which could be used by attackers to bypass lockdown or secure boot restrictions (bnc#1173567).\n\nCVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c, related to invalid length checks for variable elements in a beacon head (bnc#1152107).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-14331: Fixed a buffer over write in vgacon_scrollback_update() (bnc#1174205).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-06T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2119-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-14331", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2020-08-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-azure", "p-cpe:/a:novell:suse_linux:kernel-azure-base", "p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debugsource", "p-cpe:/a:novell:suse_linux:kernel-azure-devel", "p-cpe:/a:novell:suse_linux:kernel-syms-azure", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2119-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139361", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2119-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139361);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-10781\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-14331\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2119-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-15780: A lockdown bypass for loading unsigned modules using\nACPI table injection was fixed. (bsc#1173573)\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect\n(bnc#1173514).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in\ndrivers/md/bcache/btree.c has a deadlock if a coalescing operation\nfails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the\ncmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in\nthe slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c\n(bnc#1162002).\n\nCVE-2020-0305: Fixed a possible use-after-free due to a race condition\nincdev_get of char_dev.c. This could lead to local escalation of\nprivilege. User interaction is not needed for exploitation\n(bnc#1174462).\n\nCVE-2020-10769: A buffer over-read flaw was found in\ncrypto_authenc_extractkeys in crypto/authenc.c in the IPsec\nCryptographic algorithm's module, authenc. This flaw allowed a local\nattacker with user privileges to cause a denial of service\n(bnc#1173265).\n\nCVE-2020-10781: Fixed a denial of service issue in the ZRAM\nimplementation (bnc#1173074).\n\nCVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt\nACPI variable, which could be used by attackers to bypass lockdown or\nsecure boot restrictions (bnc#1173567).\n\nCVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c,\nrelated to invalid length checks for variable elements in a beacon\nhead (bnc#1152107).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth may have allowed an unauthenticated user\nto complete authentication without pairing credentials via adjacent\naccess. An unauthenticated, adjacent attacker could impersonate a\nBluetooth BR/EDR master or slave to pair with a previously paired\nremote device to successfully complete the authentication procedure\nwithout knowing the link key (bnc#1171988).\n\nCVE-2020-14331: Fixed a buffer over write in\nvgacon_scrollback_update() (bnc#1174205).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104967\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1150660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151927\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170442\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171529\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171673\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171761\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173146\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173820\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174123\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174130\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174186\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174187\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20908/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10135/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10769/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12888/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15393/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15780/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202119-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2d509505\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-2119=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-4.12.14-16.22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-base-4.12.14-16.22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-base-debuginfo-4.12.14-16.22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-debuginfo-4.12.14-16.22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-debugsource-4.12.14-16.22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-devel-4.12.14-16.22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-syms-azure-4.12.14-16.22.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:51", "description": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14331: A buffer over write in vgacon_scroll was fixed (bnc#1174205).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n\nCVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2019-16746: net/wireless/nl80211.c did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-06T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2122-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-14331", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2020-08-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2122-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139363", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2122-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139363);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-10781\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-14331\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2122-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14331: A buffer over write in vgacon_scroll was fixed\n(bnc#1174205).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth BR/EDR Core Specification v5.2 and earlier\nmay have allowed an unauthenticated user to complete authentication\nwithout pairing credentials via adjacent access. An unauthenticated,\nadjacent attacker could impersonate a Bluetooth BR/EDR master or slave\nto pair with a previously paired remote device to successfully\ncomplete the authentication procedure without knowing the link key\n(bnc#1171988).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c\nwhere incorrect access permissions for the efivar_ssdt ACPI variable\ncould be used by attackers to bypass lockdown or secure boot\nrestrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-10781: zram sysfs resource consumption was fixed\n(bnc#1173074).\n\nCVE-2020-15780: An issue was discovered in\ndrivers/acpi/acpi_configfs.c where injection of malicious ACPI tables\nvia configfs could be used by attackers to bypass lockdown and secure\nboot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a\nmemory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a\ndeadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2019-16746: net/wireless/nl80211.c did not check the length of\nvariable elements in a beacon head, leading to a buffer overflow\n(bnc#1152107).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in\ncrypto_authenc_extractkeys in crypto/authenc.c in the IPsec\nCryptographic algorithm's module, authenc. When a payload longer than\n4 bytes, and is not following 4-byte alignment boundary guidelines, it\ncauses a buffer over-read threat, leading to a system crash. This flaw\nallowed a local attacker with user privileges to cause a denial of\nservice (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was\nfixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the\nslip and slcan line discipline could lead to a use-after-free, aka\nCID-0ace17d56824. This affects drivers/net/slip/slip.c and\ndrivers/net/can/slcan.c (bnc#1162002).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104967\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1150660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151927\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170442\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171529\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171673\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171761\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173146\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173820\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174123\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174130\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20908/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10135/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10769/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12888/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15393/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15780/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202122-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9978d396\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 12-SP5 :\n\nzypper in -t patch SUSE-SLE-WE-12-SP5-2020-2122=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SDK-12-SP5-2020-2122=1\n\nSUSE Linux Enterprise Server 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-2122=1\n\nSUSE Linux Enterprise Live Patching 12-SP5 :\n\nzypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2020-2122=1\n\nSUSE Linux Enterprise High Availability 12-SP5 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP5-2020-2122=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-default-devel-debuginfo-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-base-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-base-debuginfo-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-debuginfo-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-debugsource-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-devel-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-syms-4.12.14-122.29.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T15:04:09", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.(CVE-2020-25656)\n\n - The time subsystem in the Linux kernel through 4.9.9, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distinguished from PID values inside a PID namespace) by reading the /proc/timer_list file, related to the print_timer function in kernel/time/timer_list.c and the\n __timer_stats_timer_set_start_info function in kernel/time/timer.c.(CVE-2017-5967)\n\n - A flaw in the way reply ICMP packets are limited in the Linux kernel functionality was found that allows to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.\n Kernel versions before 5.10 may be vulnerable to this issue.(CVE-2020-25705)\n\n - In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions:\n Android-10Android ID: A-153467744(CVE-2020-0305)\n\n - In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions:\n Android kernelAndroid ID: A-140550171(CVE-2020-0427)\n\n - A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.(CVE-2020-2732)\n\n - In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel(CVE-2020-0404)\n\n - A stack information leak flaw was found in s390/s390x in the Linux kernel's memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.(CVE-2020-10773)\n\n - Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.(CVE-2020-12352)\n\n - A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-14351)\n\n - A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service.\n The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-25643)\n\n - A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.(CVE-2020-25645)\n\n - In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product:\n AndroidVersions: Android kernelAndroid ID:\n A-144161459(CVE-2020-0431)\n\n - In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product:\n AndroidVersions: Android kernelAndroid ID:\n A-151939299(CVE-2020-0433)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-02-04T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP5 : kernel (EulerOS-SA-2021-1200)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-5967", "CVE-2020-0305", "CVE-2020-0404", "CVE-2020-0427", "CVE-2020-0431", "CVE-2020-0433", "CVE-2020-10773", "CVE-2020-12352", "CVE-2020-14351", "CVE-2020-25643", "CVE-2020-25645", "CVE-2020-25656", "CVE-2020-25705", "CVE-2020-2732"], "modified": "2022-12-05T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-1200.NASL", "href": "https://www.tenable.com/plugins/nessus/146181", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(146181);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2017-5967\",\n \"CVE-2020-0305\",\n \"CVE-2020-0404\",\n \"CVE-2020-0427\",\n \"CVE-2020-0431\",\n \"CVE-2020-0433\",\n \"CVE-2020-2732\",\n \"CVE-2020-10773\",\n \"CVE-2020-12352\",\n \"CVE-2020-14351\",\n \"CVE-2020-25643\",\n \"CVE-2020-25645\",\n \"CVE-2020-25656\",\n \"CVE-2020-25705\"\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"EulerOS 2.0 SP5 : kernel (EulerOS-SA-2021-1200)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - A flaw was found in the Linux kernel. A use-after-free\n was found in the way the console subsystem was using\n ioctls KDGKBSENT and KDSKBSENT. A local user could use\n this flaw to get read memory access out of bounds. The\n highest threat from this vulnerability is to data\n confidentiality.(CVE-2020-25656)\n\n - The time subsystem in the Linux kernel through 4.9.9,\n when CONFIG_TIMER_STATS is enabled, allows local users\n to discover real PID values (as distinguished from PID\n values inside a PID namespace) by reading the\n /proc/timer_list file, related to the print_timer\n function in kernel/time/timer_list.c and the\n __timer_stats_timer_set_start_info function in\n kernel/time/timer.c.(CVE-2017-5967)\n\n - A flaw in the way reply ICMP packets are limited in the\n Linux kernel functionality was found that allows to\n quickly scan open UDP ports. This flaw allows an\n off-path remote user to effectively bypassing source\n port UDP randomization. The highest threat from this\n vulnerability is to confidentiality and possibly\n integrity, because software that relies on UDP source\n port randomization are indirectly affected as well.\n Kernel versions before 5.10 may be vulnerable to this\n issue.(CVE-2020-25705)\n\n - In cdev_get of char_dev.c, there is a possible\n use-after-free due to a race condition. This could lead\n to local escalation of privilege with System execution\n privileges needed. User interaction is not needed for\n exploitation.Product: AndroidVersions:\n Android-10Android ID: A-153467744(CVE-2020-0305)\n\n - In create_pinctrl of core.c, there is a possible out of\n bounds read due to a use after free. This could lead to\n local information disclosure with no additional\n execution privileges needed. User interaction is not\n needed for exploitation.Product: AndroidVersions:\n Android kernelAndroid ID: A-140550171(CVE-2020-0427)\n\n - A flaw was discovered in the way that the KVM\n hypervisor handled instruction emulation for an L2\n guest when nested virtualisation is enabled. Under some\n circumstances, an L2 guest may trick the L0 guest into\n accessing sensitive L1 resources that should be\n inaccessible to the L2 guest.(CVE-2020-2732)\n\n - In uvc_scan_chain_forward of uvc_driver.c, there is a\n possible linked list corruption due to an unusual root\n cause. This could lead to local escalation of privilege\n in the kernel with no additional execution privileges\n needed. User interaction is not needed for\n exploitation.Product: AndroidVersions: Android\n kernelAndroid ID: A-111893654References: Upstream\n kernel(CVE-2020-0404)\n\n - A stack information leak flaw was found in s390/s390x\n in the Linux kernel's memory manager functionality,\n where it incorrectly writes to the\n /proc/sys/vm/cmm_timeout file. This flaw allows a local\n user to see the kernel data.(CVE-2020-10773)\n\n - Improper access control in BlueZ may allow an\n unauthenticated user to potentially enable information\n disclosure via adjacent access.(CVE-2020-12352)\n\n - A flaw was found in the Linux kernel. A use-after-free\n memory flaw was found in the perf subsystem allowing a\n local attacker with permission to monitor perf events\n to corrupt memory and possibly escalate privileges. The\n highest threat from this vulnerability is to data\n confidentiality and integrity as well as system\n availability.(CVE-2020-14351)\n\n - A flaw was found in the HDLC_PPP module of the Linux\n kernel in versions before 5.9-rc7. Memory corruption\n and a read overflow is caused by improper input\n validation in the ppp_cp_parse_cr function which can\n cause the system to crash or cause a denial of service.\n The highest threat from this vulnerability is to data\n confidentiality and integrity as well as system\n availability.(CVE-2020-25643)\n\n - A flaw was found in the Linux kernel in versions before\n 5.9-rc7. Traffic between two Geneve endpoints may be\n unencrypted when IPsec is configured to encrypt traffic\n for the specific UDP port used by the GENEVE tunnel\n allowing anyone between the two endpoints to read the\n traffic unencrypted. The main threat from this\n vulnerability is to data\n confidentiality.(CVE-2020-25645)\n\n - In kbd_keycode of keyboard.c, there is a possible out\n of bounds write due to a missing bounds check. This\n could lead to local escalation of privilege with no\n additional execution privileges needed. User\n interaction is not needed for exploitation.Product:\n AndroidVersions: Android kernelAndroid ID:\n A-144161459(CVE-2020-0431)\n\n - In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is\n a possible use after free due to improper locking. This\n could lead to local escalation of privilege with no\n additional execution privileges needed. User\n interaction is not needed for exploitation.Product:\n AndroidVersions: Android kernelAndroid ID:\n A-151939299(CVE-2020-0433)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-1200\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ac6252fc\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-25643\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-14351\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/02/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/02/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-862.14.1.5.h494.eulerosv2r7\",\n \"kernel-devel-3.10.0-862.14.1.5.h494.eulerosv2r7\",\n \"kernel-headers-3.10.0-862.14.1.5.h494.eulerosv2r7\",\n \"kernel-tools-3.10.0-862.14.1.5.h494.eulerosv2r7\",\n \"kernel-tools-libs-3.10.0-862.14.1.5.h494.eulerosv2r7\",\n \"perf-3.10.0-862.14.1.5.h494.eulerosv2r7\",\n \"python-perf-3.10.0-862.14.1.5.h494.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:21", "description": "The SUSE Linux Enterprise 15 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2019-16746: An issue was discovered in net/wireless/nl80211.c which did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107 1173659).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059 (bnc#1172775).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-04T00:00:00", "type": "nessus", "title": "SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2106-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-vanilla-base", "p-cpe:/a:novell:suse_linux:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-vanilla-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-vanilla-debugsource", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2106-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139309", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2106-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139309);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-13974\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\");\n\n script_name(english:\"SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2106-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 15 GA LTSS kernel was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c\nwhere incorrect access permissions for the efivar_ssdt ACPI variable\ncould be used by attackers to bypass lockdown or secure boot\nrestrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-15780: An issue was discovered in\ndrivers/acpi/acpi_configfs.c where injection of malicious ACPI tables\nvia configfs could be used by attackers to bypass lockdown and secure\nboot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a\nmemory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a\ndeadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2019-16746: An issue was discovered in net/wireless/nl80211.c\nwhich did not check the length of variable elements in a beacon head,\nleading to a buffer overflow (bnc#1152107 1173659).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in\ncrypto_authenc_extractkeys in crypto/authenc.c in the IPsec\nCryptographic algorithm's module, authenc. When a payload longer than\n4 bytes, and is not following 4-byte alignment boundary guidelines, it\ncauses a buffer over-read threat, leading to a system crash. This flaw\nallowed a local attacker with user privileges to cause a denial of\nservice (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was\nfixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the\nslip and slcan line discipline could lead to a use-after-free, aka\nCID-0ace17d56824. This affects drivers/net/slip/slip.c and\ndrivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled\nafter it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl\ncommand. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux\nscheduler logical bug allows an attacker to turn off the SSBD\nprotection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled\nwhen STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if\nk_ascii is called several times in a row, aka CID-b86dab054059\n(bnc#1172775).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104967\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158755\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171673\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174000\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20908/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10766/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10767/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10768/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10769/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12888/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-13974/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15393/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15780/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202106-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ef3c057c\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server for SAP 15 :\n\nzypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-2106=1\n\nSUSE Linux Enterprise Server 15-LTSS :\n\nzypper in -t patch SUSE-SLE-Product-SLES-15-2020-2106=1\n\nSUSE Linux Enterprise Module for Live Patching 15 :\n\nzypper in -t patch SUSE-SLE-Module-Live-Patching-15-2020-2106=1\n\nSUSE Linux Enterprise High Performance Computing 15-LTSS :\n\nzypper in -t patch SUSE-SLE-Product-HPC-15-2020-2106=1\n\nSUSE Linux Enterprise High Performance Computing 15-ESPOS :\n\nzypper in -t patch SUSE-SLE-Product-HPC-15-2020-2106=1\n\nSUSE Linux Enterprise High Availability 15 :\n\nzypper in -t patch SUSE-SLE-Product-HA-15-2020-2106=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-16746\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"s390x\") audit(AUDIT_ARCH_NOT, \"s390x\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-base-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-debuginfo-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-debugsource-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-devel-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-devel-debuginfo-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-obs-build-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-obs-build-debugsource-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-syms-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-vanilla-base-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-vanilla-debuginfo-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-vanilla-debugsource-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"reiserfs-kmp-default-4.12.14-150.55.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"reiserfs-kmp-default-debuginfo-4.12.14-150.55.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:31", "description": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n\nCVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\nCVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-06T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2134-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20810", "CVE-2019-20812", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10773", "CVE-2020-12771", "CVE-2020-13974", "CVE-2020-14416"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_138-default", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2134-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139364", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2134-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139364);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-20810\", \"CVE-2019-20812\", \"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10773\", \"CVE-2020-12771\", \"CVE-2020-13974\", \"CVE-2020-14416\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2134-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth may have allowed an unauthenticated user\nto complete authentication without pairing credentials via adjacent\naccess. An unauthenticated, adjacent attacker could impersonate a\nBluetooth BR/EDR master or slave to pair with a previously paired\nremote device to successfully complete the authentication procedure\nwithout knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the\nSELinux subsystem. This flaw occurs while importing the Commercial IP\nSecurity Option (CIPSO) protocol's category bitmap into the SELinux\nextensible bitmap via the' ebitmap_netlbl_import' routine. This flaw\nallowed a remote network user to crash the system kernel, resulting in\na denial of service (bnc#1171191).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook\nimplementation, where it incorrectly assumed that an skb would only\ncontain a single netlink message. The hook would incorrectly only\nvalidate the first netlink message in the skb and allow or deny the\nrest of the messages within the skb with the granted permission\nwithout further processing (bnc#1171189).\n\nCVE-2019-20812: An issue was discovered in the\nprb_calc_retire_blk_tmo() function in net/packet/af_packet.c can\nresult in a denial of service (CPU consumption and soft lockup) in a\ncertain failure case involving TPACKET_V3, aka CID-b43d1f9f7067\n(bnc#1172453).\n\nCVE-2020-10732: A flaw was found in the implementation of userspace\ncore dumps. This flaw allowed an attacker with a local account to\ncrash a trivial program and exfiltrate private kernel data\n(bnc#1171220).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a\ndeadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was\nfixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the\nslip and slcan line discipline could lead to a use-after-free, aka\nCID-0ace17d56824. This affects drivers/net/slip/slip.c and\ndrivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled\nafter it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl\ncommand. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux\nscheduler logical bug allows an attacker to turn off the SSBD\nprotection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled\nwhen STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if\nk_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call\nsnd_card_free for a failure path, which causes a memory leak, aka\nCID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170383\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172049\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172453\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20810/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20812/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10135/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10711/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10732/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10751/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10766/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10767/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10768/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-13974/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202134-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a3821185\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud 7 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-7-2020-2134=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP2-2020-2134=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-2134=1\n\nSUSE Linux Enterprise Server 12-SP2-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2020-2134=1\n\nSUSE Linux Enterprise High Availability 12-SP2 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP2-2020-2134=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-13974\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_138-default\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_121-92_138-default-1-3.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-man-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-base-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-base-debuginfo-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-debuginfo-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-debugsource-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-devel-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-syms-4.4.121-92.138.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:58", "description": "The SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2019-16746: net/wireless/nl80211.c did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-06T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2121-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20810", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2020-11-30T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2121-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139362", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2121-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139362);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/30\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20810\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-13974\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2121-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c\nwhere incorrect access permissions for the efivar_ssdt ACPI variable\ncould be used by attackers to bypass lockdown or secure boot\nrestrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-15780: An issue was discovered in\ndrivers/acpi/acpi_configfs.c where injection of malicious ACPI tables\nvia configfs could be used by attackers to bypass lockdown and secure\nboot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a\nmemory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a\ndeadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2019-16746: net/wireless/nl80211.c did not check the length of\nvariable elements in a beacon head, leading to a buffer overflow\n(bnc#1152107).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in\ncrypto_authenc_extractkeys in crypto/authenc.c in the IPsec\nCryptographic algorithm's module, authenc. When a payload longer than\n4 bytes, and is not following 4-byte alignment boundary guidelines, it\ncauses a buffer over-read threat, leading to a system crash. This flaw\nallowed a local attacker with user privileges to cause a denial of\nservice (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was\nfixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the\nslip and slcan line discipline could lead to a use-after-free, aka\nCID-0ace17d56824. This affects drivers/net/slip/slip.c and\ndrivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled\nafter it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl\ncommand. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux\nscheduler logical bug allows an attacker to turn off the SSBD\nprotection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled\nwhen STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if\nk_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call\nsnd_card_free for a failure path, which causes a memory leak, aka\nCID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104967\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1150660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152472\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1161016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168081\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169194\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171673\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171761\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20810/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20908/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10766/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10767/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10768/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10769/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12888/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-13974/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15393/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15780/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202121-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f55783c2\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud Crowbar 9 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2020-2121=1\n\nSUSE OpenStack Cloud 9 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-9-2020-2121=1\n\nSUSE Linux Enterprise Server for SAP 12-SP4 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP4-2020-2121=1\n\nSUSE Linux Enterprise Server 12-SP4-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2020-2121=1\n\nSUSE Linux Enterprise Live Patching 12-SP4 :\n\nzypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2020-2121=1\n\nSUSE Linux Enterprise High Availability 12-SP4 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP4-2020-2121=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-16746\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-devel-debuginfo-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-base-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-base-debuginfo-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-debuginfo-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-debugsource-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-devel-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-syms-4.12.14-95.57.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:29", "description": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-15780: A lockdown bypass for loading unsigned modules using ACPI table injection was fixed. (bsc#1173573)\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-0305: Fixed a possible use-after-free due to a race condition incdev_get of char_dev.c. This could lead to local escalation of privilege. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bnc#1173074).\n\nCVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt ACPI variable, which could be used by attackers to bypass lockdown or secure boot restrictions (bnc#1173567).\n\nCVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).\n\nCVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c, related to invalid length checks for variable elements in a beacon head (bnc#1152107).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-04T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2107-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20810", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2107-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139310", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2107-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139310);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20810\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-10781\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-13974\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2107-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-15780: A lockdown bypass for loading unsigned modules using\nACPI table injection was fixed. (bsc#1173573)\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect\n(bnc#1173514).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in\ndrivers/md/bcache/btree.c has a deadlock if a coalescing operation\nfails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the\ncmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in\nthe slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c\n(bnc#1162002).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where\nindirect branch speculation could be enabled even though it was\ndiabled before (bnc#1172783).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local\naccount to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction\nBarrier was disabled in certain circumstances, leaving the system open\nto a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c,\nif k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-0305: Fixed a possible use-after-free due to a race condition\nincdev_get of char_dev.c. This could lead to local escalation of\nprivilege. User interaction is not needed for exploitation\n(bnc#1174462).\n\nCVE-2020-10769: A buffer over-read flaw was found in\ncrypto_authenc_extractkeys in crypto/authenc.c in the IPsec\nCryptographic algorithm's module, authenc. This flaw allowed a local\nattacker with user privileges to cause a denial of service\n(bnc#1173265).\n\nCVE-2020-10781: Fixed a denial of service issue in the ZRAM\nimplementation (bnc#1173074).\n\nCVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt\nACPI variable, which could be used by attackers to bypass lockdown or\nsecure boot restrictions (bnc#1173567).\n\nCVE-2019-20810: Fixed a memory leak in go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c because it did not call\nsnd_card_free for a failure path (bnc#1172458).\n\nCVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c,\nrelated to invalid length checks for variable elements in a beacon\nhead (bnc#1152107).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1150660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151927\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1161016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166985\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168081\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169194\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170442\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171529\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172537\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172538\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173146\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173820\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174123\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174186\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174187\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20810/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20908/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10766/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10767/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10768/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10769/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12888/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-13974/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15393/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15780/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202107-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f8d3e199\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Product-WE-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise Module for Live Patching 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP1 :\n\nzypper in -t patch\nSUSE-SLE-Module-Development-Tools-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise High Availability 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Product-HA-15-SP1-2020-2107=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-16746\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-base-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-base-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-devel-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-devel-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-obs-build-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-obs-build-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-syms-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"reiserfs-kmp-default-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"reiserfs-kmp-default-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-base-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-base-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-devel-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-devel-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-obs-build-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-obs-build-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-syms-4.12.14-197.48.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:05:59", "description": "The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c where it did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107 1173659).\n\n - CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\n - CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\n - CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth® BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown.\n Linux scheduler logical bug allowed an attacker to turn off the SSBD protection. (bnc#1172781).\n\n - CVE-2020-10767: Fixed indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).\n\n - CVE-2020-10768: Fixed indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\n - CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\n - CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x. (bnc#1172999).\n\n - CVE-2020-10781: A zram sysfs resource consumption was fixed. (bnc#1173074).\n\n - CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\n - CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row, aka CID-b86dab054059. (bnc#1172775).\n\n - CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).\n\n - CVE-2020-14331: Fixed an out of bounds write to the vgacon scrollback buffer (bsc#1174205).\n\n - CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\n - CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\n - CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\n - CVE-2020-16166: The Linux kernel allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n\nThe following non-security bugs were fixed :\n\n - ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n\n - ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n\n - ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n\n - ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n\n - ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n\n - ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n\n - ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n\n - ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n\n - ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n\n - ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n\n - ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n\n - ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n\n - ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n\n - ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n\n - ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n\n - ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n\n - ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n\n - ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n\n - ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n\n - ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (bsc#1111666).\n\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n\n - ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n\n - ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n\n - ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n\n - ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n\n - ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n\n - ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n\n - ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n\n - ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n\n - ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n\n - ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n\n - ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n\n - ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n\n - ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n\n - ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n\n - ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n\n - ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n\n - ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n\n - ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n\n - amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).\n\n - arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n\n - ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n\n - ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n\n - b43: Fix connection problem with WPA3 (bsc#1111666).\n\n - b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n\n - bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n\n - be2net: fix link failure after ethtool offline test (git-fixes).\n\n - block: Fix use-after-free in blkdev_get() (bsc#1174843).\n\n - block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n\n - block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n\n - block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n\n - Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n\n - bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n\n - bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n\n - bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n\n - bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n\n - bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n\n - bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n\n - bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n\n - bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n\n - brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n\n - brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n\n - btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).\n\n - btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n\n - btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n\n - btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n\n - btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n\n - btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n\n - btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n\n - btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n\n - btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n\n - btrfs: qgroup: try to flush qgroup space when we get\n -EDQUOT (bsc#1120163).\n\n - btrfs: Return EAGAIN if we can't start no snpashot write in check_can_nocow (bsc#1174438).\n\n - btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n\n - btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n\n - bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n\n - bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n\n - bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n\n - bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n\n - carl9170: remove P2P_GO support (bsc#1111666).\n\n - cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).\n\n - ceph: request expedited service on session's last cap flush (bsc#1167104).\n\n - cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n\n - char/random: Add a newline at the end of the file (jsc#SLE-12423).\n\n - cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n\n - cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n\n - cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n\n - clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n\n - clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n\n - clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n\n - clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n\n - compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n\n - compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549\n\n - copy_(to,from)_user(): consolidate object size checks (git fixes).\n\n - crypto: algboss - do not wait during notifier callback (bsc#1111666).\n\n - crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).\n\n - crypto: caam - update xts sector size for large input length (bsc#1111666).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).\n\n - crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n\n - crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).\n\n - crypto: rockchip - fix scatterlist nents error (git-fixes).\n\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n\n - crypto: talitos - check AES key size (git-fixes).\n\n - crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n\n - crypto: talitos - fix IPsec cipher in length (git-fixes).\n\n - crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n\n - crypto: virtio: Fix src/dst scatterlist calculation in\n __virtio_crypto_skcipher_do_req() (git-fixes).\n\n - debugfs: Check module state before warning in (full/open)_proxy_open() (bsc#1173746).\n\n - devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n\n - /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n\n - /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n\n - dlm: remove BUG() before panic() (bsc#1174844).\n\n - dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).\n\n - dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n\n - dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n\n - dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n\n - dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).\n\n - dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).\n\n - dm: various cleanups to md->queue initialization code (git fixes).\n\n - dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n\n - dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n\n - dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n\n - driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753)\n\n - Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n\n - drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n\n - drm: amd/display: fix Kconfig help text (bsc#1113956) 	* only fix DEBUG_KERNEL_DC\n\n - drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n\n - drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n\n - drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n\n - drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n\n - drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n\n - drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n\n - drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n\n - drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n\n - drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n\n - drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n\n - drm/radeon: fix double free (bsc#1113956)\n\n - drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n\n - drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n\n - drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n\n - drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n\n - e1000: Distribute switch variables for initialization (bsc#1111666).\n\n - e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n\n - e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n\n - e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n\n - EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n\n - efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n\n - efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n\n - efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n\n - efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n\n - evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n\n - evm: Fix a small race in init_desc() (bsc#1051510).\n\n - ext4: fix a data race at inode->i_blocks (bsc#1171835).\n\n - ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n\n - ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n\n - ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n\n - ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n\n - extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).\n\n - fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n\n - fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n\n - fdt: add support for rng-seed (jsc#SLE-12423).\n\n - fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n\n - firmware: imx: scu: Fix corruption of header (git-fixes).\n\n - firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n\n - fix multiplication overflow in copy_fdtable() (bsc#1173825).\n\n - Fix Patch-mainline tag in the previous zram fix patch\n\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n\n - fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n\n - gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n\n - gpu: host1x: Detach driver on unregister (bsc#1111666).\n\n - gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n\n - HID: hiddev: fix mess in hiddev_open() (git-fixes).\n\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n\n - HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n\n - HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n\n - HISI LPC: Stop using MFD APIs (bsc#1174658).\n\n - hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).\n\n - hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n\n - hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n\n - hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n\n - i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n\n - i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n\n - i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n\n - i40e: reduce stack usage in i40e_set_fc (git-fixes).\n\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n\n - IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n\n - ibmvnic: Flush existing work items before device removal (bsc#1065729).\n\n - ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n\n - iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n\n - iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n\n - iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n\n - iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n\n - iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n\n - iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n\n - iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n\n - iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n\n - ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n\n - ima: Fix ima digest hash table key calculation (bsc#1051510).\n\n - include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n\n - input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n\n - input: i8042 - Remove special PowerPC handling (git-fixes).\n\n - input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n\n - intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n\n - intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n\n - io-mapping: indicate mapping failure (git-fixes).\n\n - ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n\n - ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n\n - jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n\n - jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n\n - kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n\n - kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n\n - kABI: protect struct mlx5_cmd_work_ent (kabi).\n\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n\n - kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n\n - kvm: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n\n - kvm: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n\n - kvm: x86: Fix APIC page invalidation race (bsc#1174122).\n\n - kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n\n - kvm: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).\n\n - kvm: x86: only do L1TF workaround on affected processors (bsc#1171904).\n\n - l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n\n - l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n\n - libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n\n - libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n\n - lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n\n - lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n\n - lib: logic_pio: Fix RCU usage (bsc#1174658).\n\n - libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n\n - libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n\n - libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over\n __nd_ioctl() (bsc#1171753).\n\n - libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n\n - libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n\n - libnvdimm/label: Remove the dpa align check (bsc#1171759).\n\n - libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n\n - libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n\n - libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n\n - libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n\n - libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n\n - libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).\n\n - libnvdimm/region: Rewrite _probe_success() to\n _advance_seeds() (bsc#1171743).\n\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n\n - livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n\n - livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n\n - livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n\n - livepatch: Remove .klp.arch (bsc#1071995).\n\n - loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n\n - lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n\n - lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n\n - mac80211: add option for setting control flags (bsc#1111666).\n\n - mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n\n - mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n\n - md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n\n - md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n\n - media: cec: silence shift wrapping warning in\n __cec_s_log_addrs() (git-fixes).\n\n - media: si2157: Better check for running tuner in init (bsc#1111666).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n\n - mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n\n - mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n\n - mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n\n - mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n\n - mlxsw: spectrum: Prevent force of 56G (git-fixes).\n\n - mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n\n - mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n\n - mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n\n - mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n\n - mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n\n - mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n\n - mmc: fix compilation of user API (bsc#1051510).\n\n - mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n\n - mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n\n - Move kabi patch into the right place\n\n - Move upstreamed lpfc patches into sorted section\n\n - mvpp2: remove misleading comment (git-fixes).\n\n - net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n\n - net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n\n - net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n\n - net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n\n - net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n\n - net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n\n - net: ena: add missing ethtool TX timestamping indication (git-fixes).\n\n - net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n\n - net: ena: do not wake up tx queue when down (git-fixes).\n\n - net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n\n - net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n\n - net: ena: fix continuous keep-alive resets (git-fixes).\n\n - net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n\n - net: ena: fix default tx interrupt moderation interval (git-fixes).\n\n - net: ena: fix incorrect default RSS key (git-fixes).\n\n - net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n\n - net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n\n - net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n\n - net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n\n - net: ena: fix uses of round_jiffies() (git-fixes).\n\n - net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n\n - net: ena: reimplement set/get_coalesce() (git-fixes).\n\n - net: ena: rss: do not allocate key when not supported (git-fixes).\n\n - net: ena: rss: fix failure to get indirection table (git-fixes).\n\n - net: ena: rss: store hash function as values and not bits (git-fixes).\n\n - netfilter: connlabels: prefer static lock initialiser (git-fixes).\n\n - netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n\n - netfilter: not mark a spinlock as __read_mostly (git-fixes).\n\n - net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n\n - net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n\n - net: hns3: add support for FEC encoding control (bsc#1174070).\n\n - net: hns3: add support for multiple media type (bsc#1174070).\n\n - net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n\n - net: hns3: fix for FEC configuration (bsc#1174070).\n\n - net: hns3: fix port capbility updating issue (bsc#1174070).\n\n - net: hns3: fix port setting handle for fibre port (bsc#1174070).\n\n - net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n\n - net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n\n - net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).\n\n - net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n\n - net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n\n - net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n\n - net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n\n - net/mlx4_core: fix a memory leak bug (git-fixes).\n\n - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n\n - net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n\n - net/mlx5: Avoid panic when setting vport rate (git-fixes).\n\n - net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n\n - net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n\n - net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n\n - net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n\n - net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n\n - net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n\n - net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n\n - net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n\n - net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n\n - net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n\n - net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n\n - netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n\n - net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n\n - net: qed: fix excessive QM ILT lines consumption (git-fixes).\n\n - net: qed: fix NVMe login fails over VFs (git-fixes).\n\n - net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n\n - net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).\n\n - net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n\n - net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n\n - net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n\n - net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n\n - net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n\n - net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n\n - net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n\n - nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n\n - NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n\n - NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n\n - nilfs2: fix NULL pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n\n - nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n\n - nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n\n - nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n\n - nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n\n - nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n\n - nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n\n - nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n\n - objtool: Clean instruction state before each function validation (bsc#1169514).\n\n - objtool: Ignore empty alternatives (bsc#1169514).\n\n - ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n\n - overflow: Fix -Wtype-limits compilation warnings (git fixes).\n\n - overflow.h: Add arithmetic shift helper (git fixes).\n\n - p54usb: add AirVasT USB stick device-id (bsc#1051510).\n\n - padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n\n - padata: reorder work kABI fixup (git-fixes).\n\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n\n - PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n\n - PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n\n - PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n\n - PCI: Fix 'try' semantics of bus and slot reset (git-fixes).\n\n - PCI: Generalize multi-function power dependency device links (bsc#1111666).\n\n - PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n\n - PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n\n - PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n\n - PCI: Program MPS for RCiEP devices (bsc#1051510).\n\n - PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n\n - pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n\n - pcm_native: result of put_user() needs to be checked (bsc#1111666).\n\n - perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n\n - perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n\n - perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n\n - perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n\n - perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).\n\n - perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).\n\n - perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n\n - perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n\n - perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n\n - perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n\n - perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n\n - perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n\n - perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n\n - perf/x86/intel: Fix PT PMI handling (git-fixes).\n\n - perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n\n - perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n\n - perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n\n - perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n\n - perf/x86/uncore: Fix event group support (git-fixes).\n\n - pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n\n - pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).\n\n - pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).\n\n - pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n\n - platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n\n - platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n\n - PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n\n - pnp: Use list_for_each_entry() instead of open coding (git fixes).\n\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n\n - powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n\n - powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n\n - powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n\n - powerpc-mm-Remove-kvm-radix-prefetch-workaround-for-.pat ch\n\n - powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n\n - powerpc-xmon-don-t-access-ASDR-in-VMs.patch\n\n - powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n\n - power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n\n - power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).\n\n - power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n\n - power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n\n - pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n\n - propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n\n - qed: reduce maximum stack frame size (git-fixes).\n\n - qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n\n - r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n\n - raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n\n - RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n\n - RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n\n - RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n\n - RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n\n - README.BRANCH: Add Takashi Iwai as primary maintainer.\n\n - regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n\n - Revert 'bcache: ignore pending signals when creating gc and allocator thread' (git fixes (block drivers)).\n\n - Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (bsc#1111666).\n\n - Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues' (git fixes (block drivers)).\n\n - Revert 'ipv6: add mtu lock check in\n __ip6_rt_update_pmtu' (networking-stable-20_05_16).\n\n - Revert pciehp patches that broke booting (bsc#1174887)\n\n - Revert 'thermal: mediatek: fix register index error' (bsc#1111666).\n\n - Revert 'tools lib traceevent: Remove unneeded qsort and uses memmove'\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).\n\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n\n - s390: fix syscall_get_error for compat processes (git-fixes).\n\n - s390/qdio: consistently restore the IRQ handler (git-fixes).\n\n - s390/qdio: lock device while installing IRQ handler (git-fixes).\n\n - s390/qdio: put thinint indicator after early error (git-fixes).\n\n - s390/qdio: tear down thinint indicator after early error (git-fixes).\n\n - s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n\n - sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n\n - sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n\n - scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n\n - scsi: aacraid: fix a signedness bug (bsc#1174296).\n\n - scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n\n - scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n\n - scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n\n - scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n\n - scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n\n - scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n\n - scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n\n - scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n\n - scsi: qedf: Add port_id getter (bsc#1150660).\n\n - scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n\n - scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n\n - sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n\n - sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n\n - spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).\n\n - spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n\n - spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n\n - spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n\n - staging: comedi: verify array index is correct before using it (bsc#1111666).\n\n - staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n\n - staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n\n - SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).\n\n - tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n\n - timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n\n - tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (bsc#1111666).\n\n - tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n\n - tracing: Fix event trigger to accept redundant spaces (git-fixes).\n\n - tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n\n - tty: n_gsm: Fix SOF skipping (bsc#1051510).\n\n - tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n\n - tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n\n - ubifs: remove broken lazytime support (bsc#1173826).\n\n - usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n\n - usb: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n\n - usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n\n - usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n\n - usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n\n - usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n\n - usb: dwc3: gadget: never call ->complete() from\n ->ep_queue() (git-fixes).\n\n - usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n\n - usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n\n - usb: ehci: reopen solution for Synopsys HC bug (git-fixes).\n\n - usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n\n - usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n\n - usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n\n - usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n\n - usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n\n - usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n\n - usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n\n - usb: musb: start session in resume for host port (bsc#1051510).\n\n - usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n\n - usb: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n\n - usb: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n\n - usb: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n\n - usb: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n\n - usb: serial: option: add GosunCn GM500 series (bsc#1111666).\n\n - usb: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n\n - usb: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n\n - usb: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n\n - vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n\n - virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n\n - virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n\n - vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n\n - vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n\n - vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n\n - vmxnet3: avoid format strint overflow warning (bsc#1172484).\n\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n\n - vmxnet3: Remove always false conditional statement (bsc#1172484).\n\n - vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).\n\n - vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).\n\n - vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n\n - vmxnet3: update to version 4 (bsc#1172484).\n\n - vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n\n - vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n\n - vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n\n - vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n\n - w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n\n - watchdog: sp805: fix restart handler (bsc#1111666).\n\n - wil6210: add general initialization/size checks (bsc#1111666).\n\n - wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n\n - wil6210: ignore HALP ICR if already handled (bsc#1111666).\n\n - wil6210: make sure Rx ring sizes are correlated (git-fixes).\n\n - work around mvfs bug (bsc#1162063).\n\n - x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n\n - x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n\n - x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n\n - x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n\n - x86/(mce,mm): Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n\n - xfrm: fix error in comment (git fixes).\n\n - xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n\n - xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n\n - vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).", "cvss3": {}, "published": "2020-08-07T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2020-1153)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20810", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13974", "CVE-2020-14331", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780", "CVE-2020-16166"], "modified": "2020-08-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "cpe:/o:novell:opensuse:15.1", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource"], "id": "OPENSUSE-2020-1153.NASL", "href": "https://www.tenable.com/plugins/nessus/139401", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2020-1153.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139401);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20810\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-10781\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-13974\", \"CVE-2020-14331\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\", \"CVE-2020-16166\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2020-1153)\");\n script_summary(english:\"Check for the openSUSE-2020-1153 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The openSUSE Leap 15.1 kernel was updated to receive various security\nand bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-16746: An issue was discovered in\n net/wireless/nl80211.c where it did not check the length\n of variable elements in a beacon head, leading to a\n buffer overflow (bnc#1152107 1173659).\n\n - CVE-2019-20810: go7007_snd_init in\n drivers/media/usb/go7007/snd-go7007.c did not call\n snd_card_free for a failure path, which causes a memory\n leak, aka CID-9453264ef586 (bnc#1172458).\n\n - CVE-2019-20908: An issue was discovered in\n drivers/firmware/efi/efi.c where Incorrect access\n permissions for the efivar_ssdt ACPI variable could be\n used by attackers to bypass lockdown or secure boot\n restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a\n possible use-after-free due to a race condition. This\n could lead to local escalation of privilege with System\n execution privileges needed. User interaction is not\n needed for exploitation (bnc#1174462).\n\n - CVE-2020-10135: Legacy pairing and secure-connections\n pairing authentication in Bluetooth® BR/EDR Core\n Specification v5.2 and earlier may have allowed an\n unauthenticated user to complete authentication without\n pairing credentials via adjacent access. An\n unauthenticated, adjacent attacker could impersonate a\n Bluetooth BR/EDR master or slave to pair with a\n previously paired remote device to successfully complete\n the authentication procedure without knowing the link\n key (bnc#1171988).\n\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown.\n Linux scheduler logical bug allowed an attacker to turn\n off the SSBD protection. (bnc#1172781).\n\n - CVE-2020-10767: Fixed indirect Branch Prediction Barrier\n is force-disabled when STIBP is unavailable or enhanced\n IBRS is available. (bnc#1172782).\n\n - CVE-2020-10768: Fixed indirect branch speculation can be\n enabled after it was force-disabled by the\n PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\n - CVE-2020-10769: A buffer over-read flaw was found in\n crypto_authenc_extractkeys in crypto/authenc.c in the\n IPsec Cryptographic algorithm's module, authenc. When a\n payload longer than 4 bytes, and is not following 4-byte\n alignment boundary guidelines, it causes a buffer\n over-read threat, leading to a system crash. This flaw\n allowed a local attacker with user privileges to cause a\n denial of service (bnc#1173265).\n\n - CVE-2020-10773: Fixed a kernel stack information leak on\n s390/s390x. (bnc#1172999).\n\n - CVE-2020-10781: A zram sysfs resource consumption was\n fixed. (bnc#1173074).\n\n - CVE-2020-12771: btree_gc_coalesce in\n drivers/md/bcache/btree.c has a deadlock if a coalescing\n operation fails (bnc#1171732).\n\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts\n to access disabled memory space (bnc#1171868).\n\n - CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer\n overflow if k_ascii was called several times in a row,\n aka CID-b86dab054059. (bnc#1172775).\n\n - CVE-2020-14331: Fixed a buffer over write in\n vgacon_scroll (bnc#1174205).\n\n - CVE-2020-14331: Fixed an out of bounds write to the\n vgacon scrollback buffer (bsc#1174205).\n\n - CVE-2020-14416: A race condition in tty->disc_data\n handling in the slip and slcan line discipline could\n lead to a use-after-free, aka CID-0ace17d56824. This\n affects drivers/net/slip/slip.c and\n drivers/net/can/slcan.c (bnc#1162002).\n\n - CVE-2020-15393: usbtest_disconnect in\n drivers/usb/misc/usbtest.c has a memory leak, aka\n CID-28ebeb8db770 (bnc#1173514).\n\n - CVE-2020-15780: An issue was discovered in\n drivers/acpi/acpi_configfs.c where injection of\n malicious ACPI tables via configfs could be used by\n attackers to bypass lockdown and secure boot\n restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\n - CVE-2020-16166: The Linux kernel allowed remote\n attackers to make observations that help to obtain\n sensitive information about the internal state of the\n network RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and kernel/time/timer.c\n (bnc#1174757).\n\nThe following non-security bugs were fixed :\n\n - ACPI: GED: add support for _Exx / _Lxx handler methods\n (bsc#1111666).\n\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx\n handling (bsc#1111666).\n\n - ACPI: NFIT: Fix unlock on error in scrub_show()\n (bsc#1171753).\n\n - ACPI: PM: Avoid using power resources if there are none\n for D0 (bsc#1051510).\n\n - ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n\n - ACPI: video: Use native backlight on Acer Aspire 5783z\n (bsc#1111666).\n\n - ACPI: video: Use native backlight on Acer TravelMate\n 5735Z (bsc#1111666).\n\n - ALSA: es1688: Add the missed snd_card_free()\n (bsc#1051510).\n\n - ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n\n - ALSA: hda: add sienna_cichlid audio asic id for\n sienna_cichlid up (bsc#1111666).\n\n - ALSA: hda: fix NULL pointer dereference during suspend\n (git-fixes).\n\n - ALSA: hda/hdmi - enable runtime pm for newer AMD display\n audio (bsc#1111666).\n\n - ALSA: hda - let hs_mic be picked ahead of hp_mic\n (bsc#1111666).\n\n - ALSA: hda/realtek - add a pintbl quirk for several\n Lenovo machines (bsc#1111666).\n\n - ALSA: hda/realtek - Add LED class support for micmute\n LED (bsc#1111666).\n\n - ALSA: hda/realtek: Add mute LED and micmute LED support\n for HP systems (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th\n gen (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for MSI GE63 laptop\n (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for MSI GL63\n (bsc#1111666).\n\n - ALSA: hda/realtek - change to suitable link model for\n ASUS platform (bsc#1111666).\n\n - ALSA: hda/realtek - Check headset type by unplug and\n resume (bsc#1111666).\n\n - ALSA: hda/realtek - Enable audio jacks of Acer\n vCopperbox with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer C20-820\n with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate\n B311R-31 with ALC256 (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer Veriton\n N4660G with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG\n Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG\n Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n\n - ALSA: hda/realtek - Enable micmute LED on and HP system\n (bsc#1111666).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and\n UX534 (bsc#1111666).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563\n (bsc#1111666).\n\n - ALSA: hda/realtek: Fix add a 'ultra_low_power' function\n for intel reference board (alc256) (bsc#1111666).\n\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding\n quirk for Samsung Notebook Pen S (bsc#1111666).\n\n - ALSA: hda/realtek - Fixed HP right speaker no sound\n (bsc#1111666).\n\n - ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th\n quirk subdevice id (bsc#1111666).\n\n - ALSA: hda/realtek - Fix unused variable warning w/o\n CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n\n - ALSA: hda/realtek - Introduce polarity for micmute LED\n GPIO (bsc#1111666).\n\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS\n ROG Zephyrus G14(GA401) series with ALC289\n (bsc#1111666).\n\n - ALSA: hda: Workaround for spurious wakeups on some Intel\n platforms (git-fixes).\n\n - ALSA: lx6464es - add support for LX6464ESe pci express\n variant (bsc#1111666).\n\n - ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n\n - ALSA: pcm: disallow linking stream to itself\n (bsc#1111666).\n\n - ALSA: usb-audio: Add duplex sound support for USB\n devices using implicit feedback (bsc#1111666).\n\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support\n (bsc#1111666).\n\n - ALSA: usb-audio: add quirk for MacroSilicon MS2109\n (bsc#1111666).\n\n - ALSA: usb-audio: Add vendor, product and profile name\n for HP Thunderbolt Dock (bsc#1111666).\n\n - ALSA: usb-audio: Clean up quirk entries with macros\n (bsc#1111666).\n\n - ALSA: usb-audio: Fix inconsistent card PM state after\n resume (bsc#1111666).\n\n - ALSA: usb-audio: Fix packet size calculation\n (bsc#1111666).\n\n - ALSA: usb-audio: Fix racy list management in output\n queue (bsc#1111666).\n\n - ALSA: usb-audio: Improve frames size computation\n (bsc#1111666).\n\n - ALSA: usb-audio: Manage auto-pm of all bundled\n interfaces (bsc#1111666).\n\n - ALSA: usb-audio: Use the new macro for HP Dock rename\n quirks (bsc#1111666).\n\n - amdgpu: a NULL ->mm does not mean a thread is a kthread\n (git-fixes).\n\n - arm64: map FDT as RW for early_init_dt_scan()\n (jsc#SLE-12423).\n\n - ath9k: Fix general protection fault in\n ath9k_hif_usb_rx_cb (bsc#1111666).\n\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx\n (bsc#1111666).\n\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg\n (bsc#1111666).\n\n - ath9x: Fix stack-out-of-bounds Write in\n ath9k_hif_usb_rx_cb (bsc#1111666).\n\n - ax25: fix setsockopt(SO_BINDTODEVICE)\n (networking-stable-20_05_27).\n\n - b43: Fix connection problem with WPA3 (bsc#1111666).\n\n - b43_legacy: Fix connection problem with WPA3\n (bsc#1111666).\n\n - bcache: Fix an error code in bch_dump_read() (git fixes\n (block drivers)).\n\n - be2net: fix link failure after ethtool offline test\n (git-fixes).\n\n - block: Fix use-after-free in blkdev_get() (bsc#1174843).\n\n - block: nr_sects_write(): Disable preemption on seqcount\n write (bsc#1173818).\n\n - block: remove QUEUE_FLAG_STACKABLE (git fixes (block\n drivers)).\n\n - block: sed-opal: fix sparse warning: convert __be64 data\n (git fixes (block drivers)).\n\n - Bluetooth: Add SCO fallback for invalid LMP parameters\n error (bsc#1111666).\n\n - bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n\n - bnxt_en: Fix ethtool selftest crash under error\n conditions (git-fixes).\n\n - bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE\n cmd fails (git-fixes).\n\n - bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n\n - bnxt_en: fix NULL dereference in case SR-IOV\n configuration fails (git-fixes).\n\n - bnxt_en: Fix VF anti-spoof filter setup\n (networking-stable-20_05_12).\n\n - bnxt_en: Fix VLAN acceleration handling in\n bnxt_fix_features() (networking-stable-20_05_12).\n\n - bnxt_en: Improve AER slot reset\n (networking-stable-20_05_12).\n\n - brcmfmac: fix wrong location to get firmware feature\n (bsc#1111666).\n\n - brcmfmac: Transform compatible string for FW loading\n (bsc#1169771).\n\n - btrfs: add assertions for tree == inode->io_tree to\n extent IO helpers (bsc#1174438).\n\n - btrfs: add new helper btrfs_lock_and_flush_ordered_range\n (bsc#1174438).\n\n - btrfs: Always use a cached extent_state in\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: change timing for qgroup reserved space for\n ordered extents to fix reserved space leak\n (bsc#1172247).\n\n - btrfs: do not zero f_bavail if we have available space\n (bsc#1168081).\n\n - btrfs: drop argument tree from\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: file: reserve qgroup space after the hole punch\n range is locked (bsc#1172247).\n\n - btrfs: fix extent_state leak in\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: fix failure of RWF_NOWAIT write into prealloc\n extent beyond eof (bsc#1174438).\n\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT\n write (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT write not failling when we need to\n cow (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks\n and waiting for IO (bsc#1174438).\n\n - btrfs: inode: move qgroup reserved space release to the\n callers of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: inode: refactor the parameters of\n insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: make btrfs_ordered_extent naming consistent with\n btrfs_file_extent_item (bsc#1172247).\n\n - btrfs: qgroup: allow to unreserve range without\n releasing other ranges (bsc#1120163).\n\n - btrfs: qgroup: Fix a bug that prevents qgroup to be\n re-enabled after disable (bsc#1172247).\n\n - btrfs: qgroup: fix data leak caused by race between\n writeback and truncate (bsc#1172247).\n\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of\n reserve retry-after-EDQUOT (bsc#1120163).\n\n - btrfs: qgroup: try to flush qgroup space when we get\n -EDQUOT (bsc#1120163).\n\n - btrfs: Return EAGAIN if we can't start no snpashot write\n in check_can_nocow (bsc#1174438).\n\n - btrfs: use correct count in btrfs_file_write_iter()\n (bsc#1174438).\n\n - btrfs: Use newly introduced\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate()\n (bsc#1171124).\n\n - bus: hisi_lpc: Add .remove method to avoid driver unbind\n crash (bsc#1174658).\n\n - bus: hisi_lpc: Do not fail probe for unrecognised child\n devices (bsc#1174658).\n\n - bus: hisi_lpc: Unregister logical PIO range to avoid\n potential use-after-free (bsc#1174658).\n\n - bus: sunxi-rsb: Return correct data when mixing 16-bit\n and 8-bit reads (bsc#1111666).\n\n - carl9170: remove P2P_GO support (bsc#1111666).\n\n - cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip\n (git-fixes).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - ceph: convert mdsc->cap_dirty to a per-session list\n (bsc#1167104).\n\n - ceph: request expedited service on session's last cap\n flush (bsc#1167104).\n\n - cgroup, blkcg: Prepare some symbols for module and\n !CONFIG_CGROUP usages (bsc#1173857).\n\n - char/random: Add a newline at the end of the file\n (jsc#SLE-12423).\n\n - cifs: get rid of unused parameter in\n reconn_setup_dfs_targets() (bsc#1144333).\n\n - cifs: handle hostnames that resolve to same ip in\n failover (bsc#1144333 bsc#1161016).\n\n - cifs: set up next DFS target before generic_ip_connect()\n (bsc#1144333 bsc#1161016).\n\n - clk: bcm2835: Fix return type of bcm2835_register_gate\n (bsc#1051510).\n\n - clk: clk-flexgen: fix clock-critical handling\n (bsc#1051510).\n\n - clk: sunxi: Fix incorrect usage of round_down()\n (bsc#1051510).\n\n - clocksource: dw_apb_timer: Make CPU-affiliation being\n optional (bsc#1111666).\n\n - compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE\n (git fixes (block drivers)).\n\n - compat_ioctl: block: handle Persistent Reservations (git\n fixes (block drivers)).\n\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH\n References: bsc#1174549\n\n - copy_(to,from)_user(): consolidate object size checks\n (git fixes).\n\n - crypto: algboss - do not wait during notifier callback\n (bsc#1111666).\n\n - crypto: algif_skcipher - Cap recv SG list at ctx->used\n (bsc#1111666).\n\n - crypto: caam - update xts sector size for large input\n length (bsc#1111666).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()'\n when ndevlist is fully iterated (bsc#1111666).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()'\n when ndevlist is fully iterated (git-fixes).\n\n - crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n\n - crypto: chelsio/chtls: properly set tp->lsndtime\n (bsc#1111666).\n\n - crypto: rockchip - fix scatterlist nents error\n (git-fixes).\n\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON()\n (git-fixes).\n\n - crypto: talitos - check AES key size (git-fixes).\n\n - crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK\n (git-fixes).\n\n - crypto: talitos - fix IPsec cipher in length\n (git-fixes).\n\n - crypto: talitos - reorder code in talitos_edesc_alloc()\n (git-fixes).\n\n - crypto: virtio: Fix src/dst scatterlist calculation in\n __virtio_crypto_skcipher_do_req() (git-fixes).\n\n - debugfs: Check module state before warning in\n (full/open)_proxy_open() (bsc#1173746).\n\n - devinet: fix memleak in inetdev_init()\n (networking-stable-20_06_07).\n\n - /dev/mem: Add missing memory barriers for devmem_inode\n (git-fixes).\n\n - /dev/mem: Revoke mappings when a driver claims the\n region (git-fixes).\n\n - dlm: remove BUG() before panic() (bsc#1174844).\n\n - dmaengine: tegra210-adma: Fix an error handling path in\n 'tegra_adma_probe()' (bsc#1111666).\n\n - dm btree: increase rebalance threshold in __rebalance2()\n (git fixes (block drivers)).\n\n - dm cache: fix a crash due to incorrect work item\n cancelling (git fixes (block drivers)).\n\n - dm crypt: fix benbi IV constructor crash if used in\n authenticated mode (git fixes (block drivers)).\n\n - dm: fix potential for q->make_request_fn NULL pointer\n (git fixes (block drivers)).\n\n - dm space map common: fix to ensure new block isn't\n already in use (git fixes (block drivers)).\n\n - dm: various cleanups to md->queue initialization code\n (git fixes).\n\n - dm verity fec: fix hash block number in\n verity_fec_decode (git fixes (block drivers)).\n\n - dm verity fec: fix memory leak in verity_fec_dtr (git\n fixes (block drivers)).\n\n - dpaa_eth: fix usage as DSA master, try 3\n (networking-stable-20_05_27).\n\n - driver-core, libnvdimm: Let device subsystems add local\n lockdep coverage (bsc#1171753)\n\n - Drivers: hv: Change flag to write log level in panic msg\n to false (bsc#1170617, bsc#1170618).\n\n - drivers: soc: ti: knav_qmss_queue: Make\n knav_gp_range_ops static (bsc#1051510).\n\n - drm: amd/display: fix Kconfig help text (bsc#1113956)\n 	* only fix DEBUG_KERNEL_DC\n\n - drm: bridge: adv7511: Extend list of audio sample rates\n (bsc#1111666).\n\n - drm/dp_mst: Increase ACT retry timeout to 3s\n (bsc#1113956) * context changes\n\n - drm: encoder_slave: fix refcouting error for modules\n (bsc#1111666).\n\n - drm: encoder_slave: fix refcouting error for modules\n (bsc#1114279)\n\n - drm/i915/icl+: Fix hotplug interrupt disabling after\n storm detection (bsc#1112178)\n\n - drm/i915: Whitelist context-local timestamp in the gen9\n cmdparser (bsc#1111666).\n\n - drm/mediatek: Check plane visibility in atomic_update\n (bsc#1113956) * context changes\n\n - drm/msm/dpu: fix error return code in dpu_encoder_init\n (bsc#1111666).\n\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA\n panel (bsc#1111666).\n\n - drm: panel-orientation-quirks: Use generic\n orientation-data for Acer S1003 (bsc#1111666).\n\n - drm/qxl: Use correct notify port address when creating\n cursor ring (bsc#1113956)\n\n - drm/radeon: fix double free (bsc#1113956)\n\n - drm/radeon: fix fb_div check in ni_init_smc_spll_table()\n (bsc#1113956)\n\n - drm/sun4i: hdmi ddc clk: Fix size of m divider\n (bsc#1111666).\n\n - drm/tegra: hub: Do not enable orphaned window group\n (bsc#1111666).\n\n - drm/vkms: Hold gem object while still in-use\n (bsc#1113956) * context changes\n\n - e1000: Distribute switch variables for initialization\n (bsc#1111666).\n\n - e1000e: Disable TSO for buffer overrun workaround\n (bsc#1051510).\n\n - e1000e: Do not wake up the system via WOL if device\n wakeup is disabled (bsc#1051510).\n\n - e1000e: Relax condition to trigger reset for ME\n workaround (bsc#1111666).\n\n - EDAC/amd64: Read back the scrub rate PCI register on\n F15h (bsc#1114279).\n\n - efi/memreserve: deal with memreserve entries in unmapped\n memory (bsc#1174685).\n\n - efi/random: Increase size of firmware supplied\n randomness (jsc#SLE-12423).\n\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader\n randomness (jsc#SLE-12423).\n\n - efi: READ_ONCE rng seed size before munmap\n (jsc#SLE-12423).\n\n - efi: Reorder pr_notice() with add_device_randomness()\n call (jsc#SLE-12423).\n\n - evm: Check also if *tfm is an error pointer in\n init_desc() (bsc#1051510).\n\n - evm: Fix a small race in init_desc() (bsc#1051510).\n\n - ext4: fix a data race at inode->i_blocks (bsc#1171835).\n\n - ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed\n eh_max (bsc#1174840).\n\n - ext4: fix partial cluster initialization when splitting\n extent (bsc#1173839).\n\n - ext4: fix race between ext4_sync_parent() and rename()\n (bsc#1173838).\n\n - ext4, jbd2: ensure panic by fix a race between jbd2\n abort and ext4 error handlers (bsc#1173833).\n\n - extcon: adc-jack: Fix an error handling path in\n 'adc_jack_probe()' (bsc#1051510).\n\n - fanotify: fix ignore mask logic for events on child and\n on dir (bsc#1172719).\n\n - fat: do not allow to mount if the FAT length == 0\n (bsc#1174845).\n\n - fdt: add support for rng-seed (jsc#SLE-12423).\n\n - fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n\n - firmware: imx: scu: Fix corruption of header\n (git-fixes).\n\n - firmware: imx: scu: Fix possible memory leak in\n imx_scu_probe() (bsc#1111666).\n\n - fix multiplication overflow in copy_fdtable()\n (bsc#1173825).\n\n - Fix Patch-mainline tag in the previous zram fix patch\n\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n\n - fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks\n (networking-stable-20_05_12).\n\n - gpiolib: Document that GPIO line names are not globally\n unique (bsc#1051510).\n\n - gpu: host1x: Detach driver on unregister (bsc#1111666).\n\n - gpu: ipu-v3: pre: do not trigger update if buffer\n address does not change (bsc#1111666).\n\n - HID: hiddev: fix mess in hiddev_open() (git-fixes).\n\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n\n - HID: sony: Fix for broken buttons on DS3 USB dongles\n (bsc#1051510).\n\n - HISI LPC: Re-Add ACPI child enumeration support\n (bsc#1174658).\n\n - HISI LPC: Stop using MFD APIs (bsc#1174658).\n\n - hv_netvsc: Fix netvsc_start_xmit's return type\n (git-fixes).\n\n - hwmon: (acpi_power_meter) Fix potential memory leak in\n acpi_power_meter_add() (bsc#1111666).\n\n - hwmon: (emc2103) fix unable to change fan pwm1_enable\n attribute (bsc#1111666).\n\n - hwmon: (max6697) Make sure the OVERT mask is set\n correctly (bsc#1111666).\n\n - i2c: algo-pca: Add 0x78 as SCL stuck low status for\n PCA9665 (bsc#1111666).\n\n - i2c: eg20t: Load module automatically if ID matches\n (bsc#1111666).\n\n - i2c: mlxcpld: check correct size of maximum RECV_LEN\n packet (bsc#1111666).\n\n - i40e: reduce stack usage in i40e_set_fc (git-fixes).\n\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut\n down (bsc#1174409).\n\n - IB/hfi1: Do not destroy link_wq when the device is shut\n down (bsc#1174409).\n\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED\n (bsc#1173280 ltc#185369).\n\n - ibmvnic: Flush existing work items before device removal\n (bsc#1065729).\n\n - ibmvnic: Harden device login requests (bsc#1170011\n ltc#183538).\n\n - iio: buffer: Do not allow buffers without any channels\n enabled to be activated (bsc#1051510).\n\n - iio:health:afe4404 Fix timestamp alignment and prevent\n data leak (bsc#1111666).\n\n - iio:humidity:hdc100x Fix alignment and data leak issues\n (bsc#1111666).\n\n - iio:magnetometer:ak8974: Fix alignment and data leak\n issues (bsc#1111666).\n\n - iio: mma8452: Add missed iio_device_unregister() call in\n mma8452_probe() (bsc#1111666).\n\n - iio: pressure: bmp280: Tolerate IRQ before registering\n (bsc#1051510).\n\n - iio:pressure:ms5611 Fix buffer element alignment\n (bsc#1111666).\n\n - iio: pressure: zpa2326: handle pm_runtime_get_sync\n failure (bsc#1111666).\n\n - ima: Directly assign the ima_default_policy pointer to\n ima_rules (bsc#1051510).\n\n - ima: Fix ima digest hash table key calculation\n (bsc#1051510).\n\n - include/asm-generic/topology.h: guard cpumask_of_node()\n macro argument (bsc#1148868).\n\n - input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux\n list (bsc#1111666).\n\n - input: i8042 - Remove special PowerPC handling\n (git-fixes).\n\n - input: synaptics - add a second working PNP_ID for\n Lenovo T470s (bsc#1111666).\n\n - intel_idle: Graceful probe failure when MWAIT is\n disabled (bsc#1174115).\n\n - intel_th: Fix a NULL dereference when hub driver is not\n loaded (bsc#1111666).\n\n - io-mapping: indicate mapping failure (git-fixes).\n\n - ipvlan: call dev_change_flags when ipvlan mode is reset\n (git-fixes).\n\n - ixgbevf: Remove limit of 10 entries for unicast filter\n list (git-fixes).\n\n - jbd2: avoid leaking transaction credits when unreserving\n handle (bsc#1173845).\n\n - jbd2: Preserve kABI when adding j_abort_mutex\n (bsc#1173833).\n\n - kabi: hv: prevent struct device_node to become defined\n (bsc#1172871).\n\n - kabi: ppc64le: prevent struct dma_map_ops to become\n defined (jsc#SLE-12423).\n\n - kABI: protect struct mlx5_cmd_work_ent (kabi).\n\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip\n (kabi).\n\n - kernfs: fix barrier usage in __kernfs_new_node()\n (bsc#1111666).\n\n - kvm: nVMX: Do not reread VMCS-agnostic state when\n switching VMCS (bsc#1114279).\n\n - kvm: nVMX: Skip IBPB when switching between vmcs01 and\n vmcs02 (bsc#1114279).\n\n - kvm: x86: Fix APIC page invalidation race (bsc#1174122).\n\n - kvm: x86: Fix L1TF mitigation for shadow MMU\n (bsc#1171904).\n\n - kvm: x86/mmu: Set mmio_value to '0' if reserved #PF\n can't be generated (bsc#1171904).\n\n - kvm: x86: only do L1TF workaround on affected processors\n (bsc#1171904).\n\n - l2tp: add sk_family checks to l2tp_validate_socket\n (networking-stable-20_06_07).\n\n - l2tp: do not use inet_hash()/inet_unhash()\n (networking-stable-20_06_07).\n\n - libceph: do not omit recovery_deletes in target_copy()\n (bsc#1174113).\n\n - libceph: ignore pool overlay and cache logic on\n redirects (bsc#1173146).\n\n - lib: logic_pio: Add logic_pio_unregister_range()\n (bsc#1174658).\n\n - lib: logic_pio: Avoid possible overlap for unregistering\n regions (bsc#1174658).\n\n - lib: logic_pio: Fix RCU usage (bsc#1174658).\n\n - libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA\n deadlock (bsc#1171753).\n\n - libnvdimm/bus: Prepare the nd_ioctl() path to be\n re-entrant (bsc#1171753).\n\n - libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over\n __nd_ioctl() (bsc#1171753).\n\n - libnvdimm: cover up changes in struct nvdimm_bus\n (bsc#1171753).\n\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n\n - libnvdimm/dax: Pick the right alignment default when\n creating dax devices (bsc#1171759).\n\n - libnvdimm/label: Remove the dpa align check\n (bsc#1171759).\n\n - libnvdimm/of_pmem: Provide a unique name for bus\n provider (bsc#1171739).\n\n - libnvdimm/pfn_dev: Add a build check to make sure we\n notice when struct page size change (bsc#1171743).\n\n - libnvdimm/pfn_dev: Add page size and struct page size to\n pfn superblock (bsc#1171759).\n\n - libnvdimm/pfn: Prevent raw mode fallback if\n pfn-infoblock valid (bsc#1171743).\n\n - libnvdimm/pmem: Advance namespace seed for specific\n probe errors (bsc#1171743).\n\n - libnvdimm/region: Initialize bad block for volatile\n namespaces (bnc#1151927 5.3.6).\n\n - libnvdimm/region: Rewrite _probe_success() to\n _advance_seeds() (bsc#1171743).\n\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align\n check (bsc#1171759).\n\n - livepatch: Apply vmlinux-specific KLP relocations early\n (bsc#1071995).\n\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n\n - livepatch: Make klp_apply_object_relocs static\n (bsc#1071995).\n\n - livepatch: Prevent module-specific KLP rela sections\n from referencing vmlinux symbols (bsc#1071995).\n\n - livepatch: Remove .klp.arch (bsc#1071995).\n\n - loop: replace kill_bdev with invalidate_bdev\n (bsc#1173820).\n\n - lpfc_debugfs: get rid of pointless access_ok()\n (bsc#1172687 bsc#1171530).\n\n - lpfc: Synchronize NVME transport and lpfc driver\n devloss_tmo (bcs#1173060).\n\n - mac80211: add option for setting control flags\n (bsc#1111666).\n\n - mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for\n nl80211 TX (bsc#1111666).\n\n - mailbox: imx: Disable the clock on\n devm_mbox_controller_register() failure (git-fixes).\n\n - md: Avoid namespace collision with bitmap API (git fixes\n (block drivers)).\n\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n\n - md: use memalloc scope APIs in\n mddev_suspend()/mddev_resume() (bsc#1166985)).\n\n - media: cec: silence shift wrapping warning in\n __cec_s_log_addrs() (git-fixes).\n\n - media: si2157: Better check for running tuner in init\n (bsc#1111666).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered\n workqueue (git-fixes).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw\n workqueue (git-fixes).\n\n - mlxsw: pci: Return error on PCI reset timeout\n (git-fixes).\n\n - mlxsw: spectrum_acl_tcam: Position vchunk in a vregion\n list properly (networking-stable-20_05_12).\n\n - mlxsw: spectrum: Disallow prio-tagged packets when PVID\n is removed (git-fixes).\n\n - mlxsw: spectrum_dpipe: Add missing error path\n (git-fixes).\n\n - mlxsw: spectrum: Prevent force of 56G (git-fixes).\n\n - mlxsw: spectrum_router: Refresh nexthop neighbour when\n it becomes dead (git-fixes).\n\n - mlxsw: spectrum_router: Remove inappropriate usage of\n WARN_ON() (git-fixes).\n\n - mlxsw: spectrum_switchdev: Add MDB entries in prepare\n phase (git-fixes).\n\n - mlxsw: spectrum_switchdev: Do not treat static FDB\n entries as sticky (git-fixes).\n\n - mmc: block: Fix request completion in the CQE timeout\n path (bsc#1111666).\n\n - mmc: block: Fix use-after-free issue for rpmb\n (bsc#1111666).\n\n - mmc: fix compilation of user API (bsc#1051510).\n\n - mmc: sdhci: do not enable card detect interrupt for gpio\n cd type (bsc#1111666).\n\n - mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12\n quirk (bsc#1111666).\n\n - Move kabi patch into the right place\n\n - Move upstreamed lpfc patches into sorted section\n\n - mvpp2: remove misleading comment (git-fixes).\n\n - net: be more gentle about silly gso requests coming from\n user (networking-stable-20_06_07).\n\n - net: check untrusted gso_size at kernel entry\n (networking-stable-20_06_07).\n\n - net/cxgb4: Check the return from t4_query_params\n properly (git-fixes).\n\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n\n - net: dsa: loop: Add module soft dependency\n (networking-stable-20_05_16).\n\n - net: dsa: mt7530: fix roaming from DSA user ports\n (networking-stable-20_05_27).\n\n - net: ena: add intr_moder_rx_interval to struct\n ena_com_dev and use it (git-fixes).\n\n - net: ena: add missing ethtool TX timestamping indication\n (git-fixes).\n\n - net: ena: avoid memory access violation by validating\n req_id properly (git-fixes).\n\n - net: ena: do not wake up tx queue when down (git-fixes).\n\n - net: ena: ena-com.c: prevent NULL pointer dereference\n (git-fixes).\n\n - net: ena: ethtool: use correct value for crc32 hash\n (git-fixes).\n\n - net: ena: fix continuous keep-alive resets (git-fixes).\n\n - net: ena: fix corruption of dev_idx_to_host_tbl\n (git-fixes).\n\n - net: ena: fix default tx interrupt moderation interval\n (git-fixes).\n\n - net: ena: fix incorrect default RSS key (git-fixes).\n\n - net: ena: fix incorrectly saving queue numbers when\n setting RSS indirection table (git-fixes).\n\n - net: ena: fix issues in setting interrupt moderation\n params in ethtool (git-fixes).\n\n - net: ena: fix potential crash when rxfh key is NULL\n (git-fixes).\n\n - net: ena: fix retrieval of nonadaptive interrupt\n moderation intervals (git-fixes).\n\n - net: ena: fix uses of round_jiffies() (git-fixes).\n\n - net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE\n (git-fixes).\n\n - net: ena: reimplement set/get_coalesce() (git-fixes).\n\n - net: ena: rss: do not allocate key when not supported\n (git-fixes).\n\n - net: ena: rss: fix failure to get indirection table\n (git-fixes).\n\n - net: ena: rss: store hash function as values and not\n bits (git-fixes).\n\n - netfilter: connlabels: prefer static lock initialiser\n (git-fixes).\n\n - netfilter: ctnetlink: netns exit must wait for callbacks\n (bsc#1169795).\n\n - netfilter: not mark a spinlock as __read_mostly\n (git-fixes).\n\n - net: fix a potential recursive NETDEV_FEAT_CHANGE\n (networking-stable-20_05_16).\n\n - net: hns3: add autoneg and change speed support for\n fibre port (bsc#1174070).\n\n - net: hns3: add support for FEC encoding control\n (bsc#1174070).\n\n - net: hns3: add support for multiple media type\n (bsc#1174070).\n\n - net: hns3: fix a not link up issue when fibre port\n supports autoneg (bsc#1174070).\n\n - net: hns3: fix for FEC configuration (bsc#1174070).\n\n - net: hns3: fix port capbility updating issue\n (bsc#1174070).\n\n - net: hns3: fix port setting handle for fibre port\n (bsc#1174070).\n\n - net: hns3: fix selftest fail issue for fibre port with\n autoneg on (bsc#1174070).\n\n - net: hns3: restore the MAC autoneg state after reset\n (bsc#1174070).\n\n - net: inet_csk: Fix so_reuseport bind-address cache in\n tb->fast* (networking-stable-20_05_27).\n\n - net: ipip: fix wrong address family in init error path\n (networking-stable-20_05_27).\n\n - net: ipvlan: Fix ipvlan device tso disabled while\n NETIF_F_IP_CSUM is set (git-fixes).\n\n - net: macsec: preserve ingress frame ordering\n (networking-stable-20_05_12).\n\n - net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n\n - net/mlx4_core: fix a memory leak bug (git-fixes).\n\n - net/mlx4_core: Fix use of ENOSPC around\n mlx4_counter_alloc() (networking-stable-20_05_12).\n\n - net/mlx5: Add command entry handling completion\n (networking-stable-20_05_27).\n\n - net/mlx5: Avoid panic when setting vport rate\n (git-fixes).\n\n - net/mlx5: Continue driver initialization despite debugfs\n failure (git-fixes).\n\n - net/mlx5e: ethtool, Fix a typo in WOL function names\n (git-fixes).\n\n - net/mlx5e: Fix traffic duplication in ethtool steering\n (git-fixes).\n\n - net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n\n - net/mlx5e: Update netdev txq on completions during\n closure (networking-stable-20_05_27).\n\n - net/mlx5: Fix command entry leak in Internal Error State\n (networking-stable-20_05_12).\n\n - net/mlx5: Fix crash upon suspend/resume\n (networking-stable-20_06_07).\n\n - net/mlx5: Fix forced completion access non initialized\n command entry (networking-stable-20_05_12).\n\n - net: mvmdio: allow up to four clocks to be specified for\n orion-mdio (git-fixes).\n\n - net: mvpp2: prs: Do not override the sign bit in SRAM\n parser shift (git-fixes).\n\n - net: phy: fix aneg restart in phy_ethtool_set_eee\n (networking-stable-20_05_16).\n\n - netprio_cgroup: Fix unlimited memory leak of v2 cgroups\n (networking-stable-20_05_16).\n\n - net: qede: stop adding events on an already destroyed\n workqueue (git-fixes).\n\n - net: qed: fix excessive QM ILT lines consumption\n (git-fixes).\n\n - net: qed: fix NVMe login fails over VFs (git-fixes).\n\n - net: qrtr: Fix passing invalid reference to\n qrtr_local_enqueue() (networking-stable-20_05_27).\n\n - net: revert 'net: get rid of an signed integer overflow\n in ip_idents_reserve()' (networking-stable-20_05_27).\n\n - net sched: fix reporting the first-time use timestamp\n (networking-stable-20_05_27).\n\n - net: stricter validation of untrusted gso packets\n (networking-stable-20_05_12).\n\n - net/tls: Fix sk_psock refcnt leak in\n bpf_exec_tx_verdict() (networking-stable-20_05_12).\n\n - net/tls: Fix sk_psock refcnt leak when in\n tls_data_ready() (networking-stable-20_05_12).\n\n - net: usb: qmi_wwan: add support for DW5816e\n (networking-stable-20_05_12).\n\n - net: usb: qmi_wwan: add Telit 0x1050 composition\n (networking-stable-20_06_07).\n\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition\n (networking-stable-20_06_07).\n\n - net: vmxnet3: fix possible buffer overflow caused by bad\n DMA value in vmxnet3_get_rss() (bsc#1172484).\n\n - nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K\n (git-fixes).\n\n - NFS: Fix an RCU lock leak in\n nfs4_refresh_delegation_stateid() (bsc#1170592).\n\n - NFSv4: Retry CLOSE and DELEGRETURN on\n NFS4ERR_OLD_STATEID (bsc#1170592).\n\n - nilfs2: fix NULL pointer dereference at\n nilfs_segctor_do_construct() (bsc#1173857).\n\n - nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type\n (bsc#1111666).\n\n - nvdimm: Avoid race between probe and reading device\n attributes (bsc#1170442).\n\n - nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids()\n (bcs#1171558 bsc#1159058).\n\n - nvme: do not update multipath disk information if the\n controller is down (bcs#1171558 bsc#1159058).\n\n - nvme: fail cancelled commands with\n NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n\n - nvme-fc: Fail transport errors with NVME_SC_HOST_PATH\n (bsc#1158983 bsc#1172538).\n\n - nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send\n failed (bsc#1158983 bsc#1172538).\n\n - objtool: Clean instruction state before each function\n validation (bsc#1169514).\n\n - objtool: Ignore empty alternatives (bsc#1169514).\n\n - ocfs2: avoid inode removal while nfsd is accessing it\n (bsc#1172963).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - ocfs2: no need try to truncate file beyond i_size\n (bsc#1171841).\n\n - overflow: Fix -Wtype-limits compilation warnings (git\n fixes).\n\n - overflow.h: Add arithmetic shift helper (git fixes).\n\n - p54usb: add AirVasT USB stick device-id (bsc#1051510).\n\n - padata: ensure the reorder timer callback runs on the\n correct CPU (git-fixes).\n\n - padata: reorder work kABI fixup (git-fixes).\n\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER\n ownership (bsc#1174356).\n\n - PCI/AER: Use only _OSC to determine AER ownership\n (bsc#1174356).\n\n - PCI: Allow pci_resize_resource() for devices on root bus\n (bsc#1051510).\n\n - PCI: Fix pci_register_host_bridge() device_register()\n error handling (bsc#1051510).\n\n - PCI: Fix 'try' semantics of bus and slot reset\n (git-fixes).\n\n - PCI: Generalize multi-function power dependency device\n links (bsc#1111666).\n\n - PCI: hv: Change pci_protocol_version to per-hbus\n (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Fix the PCI HyperV probe failure path to\n release resource properly (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Introduce hv_msi_entry (bsc#1172871,\n bsc#1172872).\n\n - PCI: hv: Move hypercall related definitions into tlfs\n header (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Move retarget related structures into tlfs\n header (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Reorganize the code in preparation of\n hibernation (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Retry PCI bus D0 entry on invalid device state\n (bsc#1172871, bsc#1172872).\n\n - PCI: pciehp: Fix indefinite wait on sysfs requests\n (git-fixes).\n\n - PCI: pciehp: Support interrupts sent from D3hot\n (git-fixes).\n\n - PCI: Program MPS for RCiEP devices (bsc#1051510).\n\n - PCI/PTM: Inherit Switch Downstream Port PTM settings\n from Upstream Port (bsc#1051510).\n\n - pci: Revive pci_dev __aer_firmware_first* fields for\n kABI (bsc#1174356).\n\n - pcm_native: result of put_user() needs to be checked\n (bsc#1111666).\n\n - perf/x86/amd: Constrain Large Increment per Cycle events\n (git-fixes).\n\n - perf/x86/amd/ibs: Fix reading of the IBS OpData register\n and thus precise RIP validity (git-fixes).\n\n - perf/x86/amd/ibs: Fix sample bias for dispatched\n micro-ops (git-fixes).\n\n - perf/x86/amd/ibs: Handle erratum #420 only on the\n affected CPU family (10h) (git-fixes).\n\n - perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups'\n symbol static (git-fixes).\n\n - perf/x86/amd/uncore: Do not set 'ThreadMask' and\n 'SliceMask' for non-L3 PMCs (git-fixes stable).\n\n - perf/x86/amd/uncore: Set the thread mask for F17h L3\n PMCs (git-fixes).\n\n - perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3\n Cache perf events (git-fixes stable).\n\n - perf/x86: Enable free running PEBS for REGS_USER/INTR\n (git-fixes).\n\n - perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n\n - perf/x86/intel: Add generic branch tracing check to\n intel_pmu_has_bts() (git-fixes).\n\n - perf/x86/intel: Add proper condition to run sched_task\n callbacks (git-fixes).\n\n - perf/x86/intel/bts: Fix the use of page_private()\n (git-fixes).\n\n - perf/x86/intel: Fix PT PMI handling (git-fixes).\n\n - perf/x86/intel: Move branch tracing setup to the\n Intel-specific source file (git-fixes).\n\n - perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n\n - perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on\n SKX (git-fixes).\n\n - perf/x86/intel/uncore: Handle invalid event coding for\n free-running counter (git-fixes).\n\n - perf/x86/uncore: Fix event group support (git-fixes).\n\n - pid: Improve the comment about waiting in\n zap_pid_ns_processes (git fixes)).\n\n - pinctrl: freescale: imx: Fix an error handling path in\n 'imx_pinctrl_probe()' (bsc#1051510).\n\n - pinctrl: imxl: Fix an error handling path in\n 'imx1_pinctrl_core_probe()' (bsc#1051510).\n\n - pinctrl: samsung: Save/restore eint_mask over suspend\n for EINT_TYPE GPIOs (bsc#1051510).\n\n - platform/x86: dell-laptop: do not register micmute LED\n if there is no token (bsc#1111666).\n\n - platform/x86: hp-wmi: Convert simple_strtoul() to\n kstrtou32() (bsc#1111666).\n\n - PM / Domains: Allow genpd users to specify default\n active wakeup behavior (git-fixes).\n\n - pnp: Use list_for_each_entry() instead of open coding\n (git fixes).\n\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR\n (bsc#1065729).\n\n - powerpc/64s: Save FSCR to init_task.thread.fscr after\n feature init (bsc#1065729).\n\n - powerpc/book3s64: Export has_transparent_hugepage()\n related functions (bsc#1171759).\n\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for\n execute disable pkey (bsc#1065729).\n\n - powerpc/fadump: fix race between pstore write and fadump\n crash trigger (bsc#1168959 ltc#185010).\n\n -\n powerpc-mm-Remove-kvm-radix-prefetch-workaround-for-.pat\n ch\n\n - powerpc/xive: Clear the page tables for the ESB IO\n mapping (bsc#1085030).\n\n - powerpc-xmon-don-t-access-ASDR-in-VMs.patch\n\n - powerpc/xmon: Reset RCU and soft lockup watchdogs\n (bsc#1065729).\n\n - power: supply: bq24257_charger: Replace depends on\n REGMAP_I2C with select (bsc#1051510).\n\n - power: supply: lp8788: Fix an error handling path in\n 'lp8788_charger_probe()' (bsc#1051510).\n\n - power: supply: smb347-charger: IRQSTAT_D is volatile\n (bsc#1051510).\n\n - power: vexpress: add suppress_bind_attrs to true\n (bsc#1111666).\n\n - pppoe: only process PADT targeted at local interfaces\n (networking-stable-20_05_16).\n\n - propagate_one(): mnt_set_mountpoint() needs mount_lock\n (bsc#1174841).\n\n - qed: reduce maximum stack frame size (git-fixes).\n\n - qlcnic: fix missing release in\n qlcnic_83xx_interrupt_test (git-fixes).\n\n - r8152: support additional Microsoft Surface Ethernet\n Adapter variant (networking-stable-20_05_27).\n\n - raid5: remove gfp flags from scribble_alloc()\n (bsc#1166985).\n\n - RDMA/efa: Fix setting of wrong bit in get/set_feature\n commands (bsc#1111666)\n\n - RDMA/efa: Set maximum pkeys device attribute\n (bsc#1111666)\n\n - RDMA/efa: Support remote read access in MR registration\n (bsc#1111666)\n\n - RDMA/efa: Unified getters/setters for device structs\n bitmask access (bsc#1111666)\n\n - README.BRANCH: Add Takashi Iwai as primary maintainer.\n\n - regmap: debugfs: Do not sleep while atomic for fast_io\n regmaps (bsc#1111666).\n\n - Revert 'bcache: ignore pending signals when creating gc\n and allocator thread' (git fixes (block drivers)).\n\n - Revert commit e918e570415c ('tpm_tis: Remove the HID\n IFX0102') (bsc#1111666).\n\n - Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt\n workqueues' (git fixes (block drivers)).\n\n - Revert 'ipv6: add mtu lock check in\n __ip6_rt_update_pmtu' (networking-stable-20_05_16).\n\n - Revert pciehp patches that broke booting (bsc#1174887)\n\n - Revert 'thermal: mediatek: fix register index error'\n (bsc#1111666).\n\n - Revert 'tools lib traceevent: Remove unneeded qsort and\n uses memmove'\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink\n fails (git-fixes).\n\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n\n - s390: fix syscall_get_error for compat processes\n (git-fixes).\n\n - s390/qdio: consistently restore the IRQ handler\n (git-fixes).\n\n - s390/qdio: lock device while installing IRQ handler\n (git-fixes).\n\n - s390/qdio: put thinint indicator after early error\n (git-fixes).\n\n - s390/qdio: tear down thinint indicator after early error\n (git-fixes).\n\n - s390/qeth: fix error handling for isolation mode cmds\n (git-fixes).\n\n - sch_choke: avoid potential panic in choke_reset()\n (networking-stable-20_05_12).\n\n - sch_sfq: validate silly quantum values\n (networking-stable-20_05_12).\n\n - scripts/git_sort/git_sort.py: add\n bluetooth/bluetooth-next.git repository\n\n - scsi: aacraid: fix a signedness bug (bsc#1174296).\n\n - scsi: hisi_sas: fix calls to dma_set_mask_and_coherent()\n (bsc#1174296).\n\n - scsi: ibmvscsi: Do not send host info in adapter info\n MAD after LPM (bsc#1172759 ltc#184814).\n\n - scsi: lpfc: Add an internal trace log buffer\n (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Add blk_io_poll support for latency\n improvment (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Add support to display if adapter dumps are\n available (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Allow applications to issue Common Set\n Features mailbox command (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Avoid another null dereference in\n lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n\n - scsi: lpfc: Fix interrupt assignments when multiple\n vectors are supported on same CPU (bsc#1158983).\n\n - scsi: lpfc: Fix kdump hang on PPC (bsc#1172687\n bsc#1171530).\n\n - scsi: lpfc: Fix language in 0373 message to reflect\n non-error message (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix less-than-zero comparison of unsigned\n value (bsc#1158983).\n\n - scsi: lpfc: Fix missing MDS functionality (bsc#1172687\n bsc#1171530).\n\n - scsi: lpfc: Fix NVMe rport deregister and registration\n during ADISC (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix oops due to overrun when reading SLI3\n data (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix shost refcount mismatch when deleting\n vport (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix stack trace seen while setting rrq\n active (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix unused assignment in\n lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Update lpfc version to 12.8.0.2\n (bsc#1158983).\n\n - scsi: megaraid_sas: Fix a compilation warning\n (bsc#1174296).\n\n - scsi: mpt3sas: Fix double free in attach error handling\n (bsc#1174296).\n\n - scsi: qedf: Add port_id getter (bsc#1150660).\n\n - scsi: qla2xxx: Fix a condition in\n qla2x00_find_all_fabric_devs() (bsc#1174296).\n\n - scsi: qla2xxx: Set NVMe status code for failed NVMe FCP\n request (bsc#1158983).\n\n - sctp: Do not add the shutdown timer if its already been\n added (networking-stable-20_05_27).\n\n - sctp: Start shutdown on association restart if in\n SHUTDOWN-SENT state and socket is closed\n (networking-stable-20_05_27).\n\n - spi: dw: use 'smp_mb()' to avoid sending spi data error\n (bsc#1051510).\n\n - spi: fix initial SPI_SR value in spi-fsl-dspi\n (bsc#1111666).\n\n - spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n\n - spi: spidev: fix a race between spidev_release and\n spidev_remove (bsc#1111666).\n\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable\n devices (bsc#1111666).\n\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of\n clock rate (bsc#1111666).\n\n - staging: comedi: verify array index is correct before\n using it (bsc#1111666).\n\n - staging: rtl8712: Fix\n IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n\n - staging: sm750fb: add missing case while setting\n FB_VISUAL (bsc#1051510).\n\n - SUNRPC: The TCP back channel mustn't disappear while\n requests are outstanding (bsc#1152624).\n\n - tg3: driver sleeps indefinitely when EEH errors exceed\n eeh_max_freezes (bsc#1173284).\n\n - timers: Add a function to start/reduce a timer\n (networking-stable-20_05_27).\n\n - tpm_tis: extra chip->ops check on error path in\n tpm_tis_core_init (bsc#1111666).\n\n - tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n\n - tracing: Fix event trigger to accept redundant spaces\n (git-fixes).\n\n - tty: hvc_console, fix crashes on parallel open/close\n (git-fixes).\n\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick\n (bsc#1051510).\n\n - tty: n_gsm: Fix SOF skipping (bsc#1051510).\n\n - tty: n_gsm: Fix waking up upper tty layer when room\n available (bsc#1051510).\n\n - tunnel: Propagate ECT(1) when decapsulating as\n recommended by RFC6040 (networking-stable-20_05_12).\n\n - ubifs: remove broken lazytime support (bsc#1173826).\n\n - usb: add USB_QUIRK_DELAY_INIT for Logitech C922\n (git-fixes).\n\n - usb: c67x00: fix use after free in c67x00_giveback_urb\n (bsc#1111666).\n\n - usb: chipidea: core: add wakeup support for extcon\n (bsc#1111666).\n\n - usb: dwc2: Fix shutdown callback in platform\n (bsc#1111666).\n\n - usb: dwc2: gadget: move gadget resume after the core is\n in L0 state (bsc#1051510).\n\n - usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n\n - usb: dwc3: gadget: never call ->complete() from\n ->ep_queue() (git-fixes).\n\n - usb: dwc3: gadget: Properly handle ClearFeature(halt)\n (git-fixes).\n\n - usb: dwc3: gadget: Properly handle failed kick_transfer\n (git-fixes).\n\n - usb: ehci: reopen solution for Synopsys HC bug\n (git-fixes).\n\n - usb: gadget: fix potential double-free in m66592_probe\n (bsc#1111666).\n\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer\n before null check (bsc#1051510).\n\n - usb: gadget: udc: atmel: fix uninitialized read in debug\n printk (bsc#1111666).\n\n - usb: gadget: udc: atmel: remove outdated comment in\n usba_ep_disable() (bsc#1111666).\n\n - usb: gadget: udc: Potential Oops in error handling code\n (bsc#1111666).\n\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL\n check in s3c2410_udc_nuke (bsc#1051510).\n\n - usb: host: ehci-exynos: Fix error check in\n exynos_ehci_probe() (bsc#1111666).\n\n - usb: host: ehci-mxc: Add error handling in\n ehci_mxc_drv_probe() (bsc#1051510).\n\n - usb: musb: Fix runtime PM imbalance on error\n (bsc#1051510).\n\n - usb: musb: start session in resume for host port\n (bsc#1051510).\n\n - usbnet: smsc95xx: Fix use-after-free after removal\n (bsc#1111666).\n\n - usb: ohci-sm501: Add missed iounmap() in remove\n (bsc#1111666).\n\n - usb: serial: ch341: add new Product ID for CH340\n (bsc#1111666).\n\n - usb: serial: cypress_m8: enable Simply Automated UPB PIM\n (bsc#1111666).\n\n - usb: serial: iuu_phoenix: fix memory corruption\n (bsc#1111666).\n\n - usb: serial: option: add GosunCn GM500 series\n (bsc#1111666).\n\n - usb: serial: option: add Quectel EG95 LTE modem\n (bsc#1111666).\n\n - usb: serial: option: add Telit LE910C1-EUX compositions\n (bsc#1051510).\n\n - usb: serial: qcserial: add DW5816e QDL support\n (bsc#1051510).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal\n errors (bsc#1051510).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal\n errors (git-fixes).\n\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking\n (bsc#1174123).\n\n - vfs: Fix EOVERFLOW testing in put_compat_statfs64\n (bnc#1151927 5.3.6).\n\n - virtio-blk: handle block_device_operations callbacks\n after hot unplug (git fixes (block drivers)).\n\n - virtio: virtio_console: add missing\n MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n\n - vmxnet3: add geneve and vxlan tunnel offload support\n (bsc#1172484).\n\n - vmxnet3: add support to get/set rx flow hash\n (bsc#1172484).\n\n - vmxnet3: allow rx flow hash ops only when rss is enabled\n (bsc#1172484).\n\n - vmxnet3: avoid format strint overflow warning\n (bsc#1172484).\n\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n\n - vmxnet3: Remove always false conditional statement\n (bsc#1172484).\n\n - vmxnet3: remove redundant initialization of pointer 'rq'\n (bsc#1172484).\n\n - vmxnet3: remove unused flag 'rxcsum' from struct\n vmxnet3_adapter (bsc#1172484).\n\n - vmxnet3: Replace msleep(1) with usleep_range()\n (bsc#1172484).\n\n - vmxnet3: update to version 4 (bsc#1172484).\n\n - vmxnet3: use correct hdr reference when packet is\n encapsulated (bsc#1172484).\n\n - vsock: fix timeout in vsock_accept()\n (networking-stable-20_06_07).\n\n - vt_compat_ioctl(): clean up, use compat_ptr() properly\n (git-fixes).\n\n - vxlan: Avoid infinite loop when suppressing NS messages\n with invalid options (git-fixes).\n\n - w1: omap-hdq: cleanup to add missing newline for some\n dev_dbg (bsc#1051510).\n\n - watchdog: sp805: fix restart handler (bsc#1111666).\n\n - wil6210: add general initialization/size checks\n (bsc#1111666).\n\n - wil6210: check rx_buff_mgmt before accessing it\n (bsc#1111666).\n\n - wil6210: ignore HALP ICR if already handled\n (bsc#1111666).\n\n - wil6210: make sure Rx ring sizes are correlated\n (git-fixes).\n\n - work around mvfs bug (bsc#1162063).\n\n - x86/apic: Install an empty physflat_init_apic_ldr\n (bsc#1163309).\n\n - x86/cpu/amd: Make erratum #1054 a legacy erratum\n (bsc#1114279).\n\n - x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into\n PEBS_FREERUNNING_FLAGS (git-fixes).\n\n - x86: Fix early boot crash on gcc-10, third try\n (bsc#1114279).\n\n - x86/(mce,mm): Unmap the entire page if the whole page is\n affected and poisoned (bsc#1172257).\n\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk\n (bsc#1114279).\n\n - xfrm: fix error in comment (git fixes).\n\n - xhci: Fix enumeration issue when setting max packet size\n for FS devices (git-fixes).\n\n - xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n\n - vt: vt_ioctl: remove unnecessary console allocation\n checks (git-fixes).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1148868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1150660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1151927\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1161016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1162063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1163309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1166985\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168081\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169194\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170442\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171529\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172537\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172538\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173146\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173820\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174070\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174123\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174685\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174844\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174887\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-docs-html-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-macros-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-qa-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-vanilla-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-syms-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:07", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.(CVE-2020-36158)\n\n - A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.(CVE-2020-25656)\n\n - A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-14351)\n\n - A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.(CVE-2020-27777)\n\n - A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13.\n drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.(CVE-2020-29661)\n\n - A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13.\n drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.(CVE-2020-29660)\n\n - An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.(CVE-2019-20934)\n\n - A flaw was found in the Linux kernels implementation of MIDI, where an attacker with a local account and the permissions to issue an ioctl commands to midi devices, could trigger a use-after-free. A write to this specific memory while freed and before use could cause the flow of execution to change and possibly allow for memory corruption or privilege escalation.(CVE-2020-27786)\n\n - An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4.\n Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.(CVE-2020-29371)\n\n - In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.(CVE-2019-9456)\n\n - A stack information leak flaw was found in s390/s390x in the Linux kernel's memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.(CVE-2020-10773)\n\n - A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.(CVE-2020-12114)\n\n - An out-of-bounds memory write flaw was found in how the Linux kernel's Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720.\n This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2020-14305)\n\n - Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.(CVE-2020-15436)\n\n - The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init\n _ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.(CVE-2020-15437)\n\n - A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.(CVE-2020-28915)\n\n - A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.(CVE-2020-28974)\n\n - In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions:\n Android-10Android ID: A-153467744(CVE-2020-0305)\n\n - Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.(CVE-2020-12352)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-02-22T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP2 : kernel (EulerOS-SA-2021-1311)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20934", "CVE-2019-9456", "CVE-2020-0305", "CVE-2020-10773", "CVE-2020-12114", "CVE-2020-12352", "CVE-2020-14305", "CVE-2020-14351", "CVE-2020-15436", "CVE-2020-15437", "CVE-2020-25656", "CVE-2020-27777", "CVE-2020-27786", "CVE-2020-28915", "CVE-2020-28974", "CVE-2020-29371", "CVE-2020-29660", "CVE-2020-29661", "CVE-2020-36158"], "modified": "2021-02-24T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-debug", "p-cpe:/a:huawei:euleros:kernel-debug-devel", "p-cpe:/a:huawei:euleros:kernel-debuginfo", "p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-1311.NASL", "href": "https://www.tenable.com/plugins/nessus/146701", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(146701);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/24\");\n\n script_cve_id(\n \"CVE-2019-20934\",\n \"CVE-2019-9456\",\n \"CVE-2020-0305\",\n \"CVE-2020-10773\",\n \"CVE-2020-12114\",\n \"CVE-2020-12352\",\n \"CVE-2020-14305\",\n \"CVE-2020-14351\",\n \"CVE-2020-15436\",\n \"CVE-2020-15437\",\n \"CVE-2020-25656\",\n \"CVE-2020-27777\",\n \"CVE-2020-27786\",\n \"CVE-2020-28915\",\n \"CVE-2020-28974\",\n \"CVE-2020-29371\",\n \"CVE-2020-29660\",\n \"CVE-2020-29661\",\n \"CVE-2020-36158\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : kernel (EulerOS-SA-2021-1311)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - mwifiex_cmd_802_11_ad_hoc_start in\n drivers/net/wireless/marvell/mwifiex/join.c in the\n Linux kernel through 5.10.4 might allow remote\n attackers to execute arbitrary code via a long SSID\n value, aka CID-5c455c5ab332.(CVE-2020-36158)\n\n - A flaw was found in the Linux kernel. A use-after-free\n was found in the way the console subsystem was using\n ioctls KDGKBSENT and KDSKBSENT. A local user could use\n this flaw to get read memory access out of bounds. The\n highest threat from this vulnerability is to data\n confidentiality.(CVE-2020-25656)\n\n - A flaw was found in the Linux kernel. A use-after-free\n memory flaw was found in the perf subsystem allowing a\n local attacker with permission to monitor perf events\n to corrupt memory and possibly escalate privileges. The\n highest threat from this vulnerability is to data\n confidentiality and integrity as well as system\n availability.(CVE-2020-14351)\n\n - A flaw was found in the way RTAS handled memory\n accesses in userspace to kernel communication. On a\n locked down (usually due to Secure Boot) guest system\n running on top of PowerVM or KVM hypervisors (pseries\n platform) a root like local user could use this flaw to\n further increase their privileges to that of a running\n kernel.(CVE-2020-27777)\n\n - A locking issue was discovered in the tty subsystem of\n the Linux kernel through 5.9.13.\n drivers/tty/tty_jobctrl.c allows a use-after-free\n attack against TIOCSPGRP, aka\n CID-54ffccbf053b.(CVE-2020-29661)\n\n - A locking inconsistency issue was discovered in the tty\n subsystem of the Linux kernel through 5.9.13.\n drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may\n allow a read-after-free attack against TIOCGSID, aka\n CID-c8bcd9c5be24.(CVE-2020-29660)\n\n - An issue was discovered in the Linux kernel before\n 5.2.6. On NUMA systems, the Linux fair scheduler has a\n use-after-free in show_numa_stats() because NUMA fault\n statistics are inappropriately freed, aka\n CID-16d51a590a8c.(CVE-2019-20934)\n\n - A flaw was found in the Linux kernels implementation of\n MIDI, where an attacker with a local account and the\n permissions to issue an ioctl commands to midi devices,\n could trigger a use-after-free. A write to this\n specific memory while freed and before use could cause\n the flow of execution to change and possibly allow for\n memory corruption or privilege\n escalation.(CVE-2020-27786)\n\n - An issue was discovered in romfs_dev_read in\n fs/romfs/storage.c in the Linux kernel before 5.8.4.\n Uninitialized memory leaks to userspace, aka\n CID-bcf85fcedfdd.(CVE-2020-29371)\n\n - In the Android kernel in Pixel C USB monitor driver\n there is a possible OOB write due to a missing bounds\n check. This could lead to local escalation of privilege\n with System execution privileges needed. User\n interaction is not needed for\n exploitation.(CVE-2019-9456)\n\n - A stack information leak flaw was found in s390/s390x\n in the Linux kernel's memory manager functionality,\n where it incorrectly writes to the\n /proc/sys/vm/cmm_timeout file. This flaw allows a local\n user to see the kernel data.(CVE-2020-10773)\n\n - A pivot_root race condition in fs/namespace.c in the\n Linux kernel 4.4.x before 4.4.221, 4.9.x before\n 4.9.221, 4.14.x before 4.14.178, 4.19.x before\n 4.19.119, and 5.x before 5.3 allows local users to\n cause a denial of service (panic) by corrupting a\n mountpoint reference counter.(CVE-2020-12114)\n\n - An out-of-bounds memory write flaw was found in how the\n Linux kernel's Voice Over IP H.323 connection tracking\n functionality handled connections on ipv6 port 1720.\n This flaw allows an unauthenticated remote user to\n crash the system, causing a denial of service. The\n highest threat from this vulnerability is to\n confidentiality, integrity, as well as system\n availability.(CVE-2020-14305)\n\n - Use-after-free vulnerability in fs/block_dev.c in the\n Linux kernel before 5.8 allows local users to gain\n privileges or cause a denial of service by leveraging\n improper access to a certain error\n field.(CVE-2020-15436)\n\n - The Linux kernel before version 5.8 is vulnerable to a\n NULL pointer dereference in\n drivers/tty/serial/8250/8250_core.c:serial8250_isa_init\n _ports() that allows local users to cause a denial of\n service by using the p->serial_in pointer which\n uninitialized.(CVE-2020-15437)\n\n - A buffer over-read (at the framebuffer layer) in the\n fbcon code in the Linux kernel before 5.8.15 could be\n used by local attackers to read kernel memory, aka\n CID-6735b4632def.(CVE-2020-28915)\n\n - A slab-out-of-bounds read in fbcon in the Linux kernel\n before 5.9.7 could be used by local attackers to read\n privileged information or potentially crash the kernel,\n aka CID-3c4e0dff2095. This occurs because\n KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for\n manipulations such as font height.(CVE-2020-28974)\n\n - In cdev_get of char_dev.c, there is a possible\n use-after-free due to a race condition. This could lead\n to local escalation of privilege with System execution\n privileges needed. User interaction is not needed for\n exploitation.Product: AndroidVersions:\n Android-10Android ID: A-153467744(CVE-2020-0305)\n\n - Improper access control in BlueZ may allow an\n unauthenticated user to potentially enable information\n disclosure via adjacent access.(CVE-2020-12352)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-1311\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?a5285fd5\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/02/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/02/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-327.62.59.83.h255\",\n \"kernel-debug-3.10.0-327.62.59.83.h255\",\n \"kernel-debug-devel-3.10.0-327.62.59.83.h255\",\n \"kernel-debuginfo-3.10.0-327.62.59.83.h255\",\n \"kernel-debuginfo-common-x86_64-3.10.0-327.62.59.83.h255\",\n \"kernel-devel-3.10.0-327.62.59.83.h255\",\n \"kernel-headers-3.10.0-327.62.59.83.h255\",\n \"kernel-tools-3.10.0-327.62.59.83.h255\",\n \"kernel-tools-libs-3.10.0-327.62.59.83.h255\",\n \"perf-3.10.0-327.62.59.83.h255\",\n \"python-perf-3.10.0-327.62.59.83.h255\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-28T14:16:56", "description": "According to the versions of the kernel packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities :\n\n - A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.(CVE-2019-19078)\n\n - In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.(CVE-2020-11668)\n\n - An issue was found in Linux kernel before 5.5.4.\n mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.(CVE-2020-12654)\n\n - A flaw was found in the way the Linux kernel's networking subsystem handled the write queue between TCP disconnection and re-connections. A local attacker could use this flaw to trigger multiple use-after-free conditions potentially escalating their privileges on the system.(CVE-2019-15239)\n\n - A use-after-free flaw was found in the way the Linux kernel's filesystem subsystem handled a race condition in the chrdev_open function. This flaw allows a privileged local user to starve the resources, causing a denial of service or potentially escalating their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2020-0305)\n\n - A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.(CVE-2020-0427)\n\n - A stack information leak flaw was found in s390/s390x in the Linux kernel's memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.(CVE-2020-10773)\n\n - A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-14331)\n\n - A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-14351)\n\n - A flaw was found in the Linux kernel before 5.9-rc4.\n Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.(CVE-2020-14386)\n\n - Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.(CVE-2020-15436)\n\n - A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.(CVE-2020-25645)\n\n - A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.(CVE-2020-25656)\n\n - Bodong Zhao discovered a use-after-free in the Sun keyboard driver implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.(CVE-2020-25669)\n\n - A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.(CVE-2020-25704)\n\n - A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D:\n v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7:\n All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU:\n Version(CVE-2020-25705)\n\n - A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.(CVE-2020-28974)\n\n - An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.(CVE-2020-29370)\n\n - A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13.\n drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.(CVE-2020-29661)\n\n - A flaw was found in the USB monitor driver of the Linux kernel. This flaw allows an attacker with physical access to the system to crash the system or potentially escalate their privileges(CVE-2019-9456)\n\n - A flaw out of bounds write in the Linux kernel human interface devices subsystem was found in the way user calls find key code by index. A local user could use this flaw to crash the system or escalate privileges on the system.(CVE-2020-0431)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-07-06T00:00:00", "type": "nessus", "title": "EulerOS Virtualization 3.0.2.2 : kernel (EulerOS-SA-2021-2140)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-15239", "CVE-2019-19078", "CVE-2019-9456", "CVE-2020-0305", "CVE-2020-0427", "CVE-2020-0431", "CVE-2020-10773", "CVE-2020-11668", "CVE-2020-12654", "CVE-2020-14331", "CVE-2020-14351", "CVE-2020-14386", "CVE-2020-15436", "CVE-2020-25645", "CVE-2020-25656", "CVE-2020-25669", "CVE-2020-25704", "CVE-2020-25705", "CVE-2020-28974", "CVE-2020-29370", "CVE-2020-29661"], "modified": "2022-12-05T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:uvp:3.0.2.2"], "id": "EULEROS_SA-2021-2140.NASL", "href": "https://www.tenable.com/plugins/nessus/151419", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151419);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2019-15239\",\n \"CVE-2019-19078\",\n \"CVE-2019-9456\",\n \"CVE-2020-0305\",\n \"CVE-2020-0427\",\n \"CVE-2020-0431\",\n \"CVE-2020-10773\",\n \"CVE-2020-11668\",\n \"CVE-2020-12654\",\n \"CVE-2020-14331\",\n \"CVE-2020-14351\",\n \"CVE-2020-14386\",\n \"CVE-2020-15436\",\n \"CVE-2020-25645\",\n \"CVE-2020-25656\",\n \"CVE-2020-25669\",\n \"CVE-2020-25704\",\n \"CVE-2020-25705\",\n \"CVE-2020-28974\",\n \"CVE-2020-29370\",\n \"CVE-2020-29661\"\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"EulerOS Virtualization 3.0.2.2 : kernel (EulerOS-SA-2021-2140)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerabilities :\n\n - A memory leak in the ath10k_usb_hif_tx_sg() function in\n drivers/net/wireless/ath/ath10k/usb.c in the Linux\n kernel through 5.3.11 allows attackers to cause a\n denial of service (memory consumption) by triggering\n usb_submit_urb() failures, aka\n CID-b8d17e7d93d2.(CVE-2019-19078)\n\n - In the Linux kernel before 5.6.1,\n drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink\n camera USB driver) mishandles invalid descriptors, aka\n CID-a246b4d54770.(CVE-2020-11668)\n\n - An issue was found in Linux kernel before 5.5.4.\n mwifiex_ret_wmm_get_status() in\n drivers/net/wireless/marvell/mwifiex/wmm.c allows a\n remote AP to trigger a heap-based buffer overflow\n because of an incorrect memcpy, aka\n CID-3a9b153c5591.(CVE-2020-12654)\n\n - A flaw was found in the way the Linux kernel's\n networking subsystem handled the write queue between\n TCP disconnection and re-connections. A local attacker\n could use this flaw to trigger multiple use-after-free\n conditions potentially escalating their privileges on\n the system.(CVE-2019-15239)\n\n - A use-after-free flaw was found in the way the Linux\n kernel's filesystem subsystem handled a race condition\n in the chrdev_open function. This flaw allows a\n privileged local user to starve the resources, causing\n a denial of service or potentially escalating their\n privileges. The highest threat from this vulnerability\n is to confidentiality, integrity, as well as system\n availability.(CVE-2020-0305)\n\n - A flaw was found in the Linux pinctrl system. It is\n possible to trigger an of bounds read due to a use\n after free. This could lead to local information\n disclosure with no additional execution privileges\n needed.(CVE-2020-0427)\n\n - A stack information leak flaw was found in s390/s390x\n in the Linux kernel's memory manager functionality,\n where it incorrectly writes to the\n /proc/sys/vm/cmm_timeout file. This flaw allows a local\n user to see the kernel data.(CVE-2020-10773)\n\n - A flaw was found in the Linux kernel's implementation\n of the invert video code on VGA consoles when a local\n attacker attempts to resize the console, calling an\n ioctl VT_RESIZE, which causes an out-of-bounds write to\n occur. This flaw allows a local user with access to the\n VGA console to crash the system, potentially escalating\n their privileges on the system. The highest threat from\n this vulnerability is to data confidentiality and\n integrity as well as system\n availability.(CVE-2020-14331)\n\n - A flaw was found in the Linux kernel. A use-after-free\n memory flaw was found in the perf subsystem allowing a\n local attacker with permission to monitor perf events\n to corrupt memory and possibly escalate privileges. The\n highest threat from this vulnerability is to data\n confidentiality and integrity as well as system\n availability.(CVE-2020-14351)\n\n - A flaw was found in the Linux kernel before 5.9-rc4.\n Memory corruption can be exploited to gain root\n privileges from unprivileged processes. The highest\n threat from this vulnerability is to data\n confidentiality and integrity.(CVE-2020-14386)\n\n - Use-after-free vulnerability in fs/block_dev.c in the\n Linux kernel before 5.8 allows local users to gain\n privileges or cause a denial of service by leveraging\n improper access to a certain error\n field.(CVE-2020-15436)\n\n - A flaw was found in the Linux kernel in versions before\n 5.9-rc7. Traffic between two Geneve endpoints may be\n unencrypted when IPsec is configured to encrypt traffic\n for the specific UDP port used by the GENEVE tunnel\n allowing anyone between the two endpoints to read the\n traffic unencrypted. The main threat from this\n vulnerability is to data\n confidentiality.(CVE-2020-25645)\n\n - A flaw was found in the Linux kernel. A use-after-free\n was found in the way the console subsystem was using\n ioctls KDGKBSENT and KDSKBSENT. A local user could use\n this flaw to get read memory access out of bounds. The\n highest threat from this vulnerability is to data\n confidentiality.(CVE-2020-25656)\n\n - Bodong Zhao discovered a use-after-free in the Sun\n keyboard driver implementation in the Linux kernel. A\n local attacker could use this to cause a denial of\n service or possibly execute arbitrary\n code.(CVE-2020-25669)\n\n - A flaw memory leak in the Linux kernel performance\n monitoring subsystem was found in the way if using\n PERF_EVENT_IOC_SET_FILTER. A local user could use this\n flaw to starve the resources causing denial of\n service.(CVE-2020-25704)\n\n - A flaw in ICMP packets in the Linux kernel may allow an\n attacker to quickly scan open UDP ports. This flaw\n allows an off-path remote attacker to effectively\n bypass source port UDP randomization. Software that\n relies on UDP source port randomization are indirectly\n affected as well on the Linux Based Products (RUGGEDCOM\n RM1224: All versions between v5.0 and v6.4, SCALANCE\n M-800: All versions between v5.0 and v6.4, SCALANCE\n S615: All versions between v5.0 and v6.4, SCALANCE\n SC-600: All versions prior to v2.1.3, SCALANCE W1750D:\n v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7:\n All versions, SIMATIC MV500 Family: All versions,\n SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions\n 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU:\n Version(CVE-2020-25705)\n\n - A slab-out-of-bounds read in fbcon in the Linux kernel\n before 5.9.7 could be used by local attackers to read\n privileged information or potentially crash the kernel,\n aka CID-3c4e0dff2095. This occurs because\n KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for\n manipulations such as font height.(CVE-2020-28974)\n\n - An issue was discovered in kmem_cache_alloc_bulk in\n mm/slub.c in the Linux kernel before 5.5.11. The\n slowpath lacks the required TID increment, aka\n CID-fd4d9c7d0c71.(CVE-2020-29370)\n\n - A locking issue was discovered in the tty subsystem of\n the Linux kernel through 5.9.13.\n drivers/tty/tty_jobctrl.c allows a use-after-free\n attack against TIOCSPGRP, aka\n CID-54ffccbf053b.(CVE-2020-29661)\n\n - A flaw was found in the USB monitor driver of the Linux\n kernel. This flaw allows an attacker with physical\n access to the system to crash the system or potentially\n escalate their privileges(CVE-2019-9456)\n\n - A flaw out of bounds write in the Linux kernel human\n interface devices subsystem was found in the way user\n calls find key code by index. A local user could use\n this flaw to crash the system or escalate privileges on\n the system.(CVE-2020-0431)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-2140\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b3064040\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-29661\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/06\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.2.2\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.2.2\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.2.2\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-862.14.1.6_77\",\n \"kernel-devel-3.10.0-862.14.1.6_77\",\n \"kernel-headers-3.10.0-862.14.1.6_77\",\n \"kernel-tools-3.10.0-862.14.1.6_77\",\n \"kernel-tools-libs-3.10.0-862.14.1.6_77\",\n \"perf-3.10.0-862.14.1.6_77\",\n \"python-perf-3.10.0-862.14.1.6_77\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:28", "description": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n\nCVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).\n\nCVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth® BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine.\nThis flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n\nCVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-10781: A zram sysfs resource consumption was fixed (bnc#1173074).\n\nCVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).\n\nCVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n\nCVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-04T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2105-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19462", "CVE-2019-20810", "CVE-2019-20812", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12656", "CVE-2020-12769", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2022-05-12T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-preempt", "p-cpe:/a:novell:suse_linux:kernel-preempt-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-preempt-debugsource", "p-cpe:/a:novell:suse_linux:kernel-preempt-devel", "p-cpe:/a:novell:suse_linux:kernel-preempt-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2105-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139308", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2105-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(139308);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/12\");\n\n script_cve_id(\n \"CVE-2019-19462\",\n \"CVE-2019-20810\",\n \"CVE-2019-20812\",\n \"CVE-2020-0305\",\n \"CVE-2020-10135\",\n \"CVE-2020-10711\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-10773\",\n \"CVE-2020-10781\",\n \"CVE-2020-12656\",\n \"CVE-2020-12769\",\n \"CVE-2020-12771\",\n \"CVE-2020-12888\",\n \"CVE-2020-13143\",\n \"CVE-2020-13974\",\n \"CVE-2020-14416\",\n \"CVE-2020-15393\",\n \"CVE-2020-15780\"\n );\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2105-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel\nallowed local users to cause a denial of service (such as relay\nblockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n\nCVE-2019-20810: Fixed a memory leak in go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c because it did not call\nsnd_card_free for a failure path (bnc#1172458).\n\nCVE-2019-20812: An issue was discovered in the\nprb_calc_retire_blk_tmo() function in net/packet/af_packet.c could\nresult in a denial of service (CPU consumption and soft lockup) in a\ncertain failure case involving TPACKET_V3 (bnc#1172453).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth® BR/EDR Core Specification v5.2\nand earlier may have allowed an unauthenticated user to complete\nauthentication without pairing credentials via adjacent access. An\nunauthenticated, adjacent attacker could impersonate a Bluetooth\nBR/EDR master or slave to pair with a previously paired remote device\nto successfully complete the authentication procedure without knowing\nthe link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the\nSELinux subsystem in versions This flaw occurs while importing the\nCommercial IP Security Option (CIPSO) protocol's category bitmap into\nthe SELinux extensible bitmap via the' ebitmap_netlbl_import' routine.\nThis flaw allowed a remote network user to crash the system kernel,\nresulting in a denial of service (bnc#1171191).\n\nCVE-2020-10732: A flaw was found in the implementation of Userspace\ncore dumps. This flaw allowed an attacker with a local account to\ncrash a trivial program and exfiltrate private kernel data\n(bnc#1171220).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook\nimplementation, where it incorrectly assumed that an skb would only\ncontain a single netlink message. The hook would incorrectly only\nvalidate the first netlink message in the skb and allow or deny the\nrest of the messages within the skb with the granted permission\nwithout further processing (bnc#1171189).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local\naccount to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction\nBarrier was disabled in certain circumstances, leaving the system open\nto a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where\nindirect branch speculation could be enabled even though it was\ndiabled before (bnc#1172783).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the\ncmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-10781: A zram sysfs resource consumption was fixed\n(bnc#1173074).\n\nCVE-2020-12656: Fixed a memory leak in gss_mech_free in the\nrpcsec_gss_krb5 implementation, caused by a lack of certain\ndomain_release calls (bnc#1171219).\n\nCVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c\nallowed attackers to cause a panic via concurrent calls to dw_spi_irq\nand dw_spi_transfer_one (bnc#1171983).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in\ndrivers/md/bcache/btree.c has a deadlock if a coalescing operation\nfails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-13143: gadget_dev_desc_UDC_store in\ndrivers/usb/gadget/configfs.c relies on kstrdup without considering\nthe possibility of an internal '\\0' value, which allowed attackers to\ntrigger an out-of-bounds read (bnc#1171982).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c,\nif k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in\nthe slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c\n(bnc#1162002).\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect\n(bnc#1173514).\n\nCVE-2020-15780: An issue was discovered in\ndrivers/acpi/acpi_configfs.c where injection of malicious ACPI tables\nvia configfs could be used by attackers to bypass lockdown and secure\nboot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152472\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152489\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1153274\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154353\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154492\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155518\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155798\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1156395\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1157169\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158050\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158242\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158265\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158748\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158765\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159781\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159867\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160947\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1161495\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162063\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162400\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162702\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164648\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164777\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165211\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165933\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165975\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166985\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167104\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167651\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167773\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168230\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168779\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168838\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168959\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169094\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169194\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169681\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169771\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170442\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170774\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170879\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170891\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170895\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171150\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171246\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171417\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171513\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171529\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171530\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171662\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171688\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171699\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171743\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171759\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171828\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171857\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171904\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171915\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171982\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172046\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172061\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172062\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172063\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172064\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172065\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172066\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172067\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172068\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172069\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172073\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172086\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172095\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172169\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172170\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172201\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172208\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172223\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172342\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172365\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172366\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172391\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172393\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172394\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172453\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172467\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172537\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172543\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172687\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172719\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172759\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172814\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172823\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172841\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172938\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172939\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172940\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172956\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172984\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172985\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172986\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172987\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172988\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172989\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172990\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173068\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173074\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173085\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173139\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173206\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173271\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173438\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173461\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173552\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173746\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173776\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173817\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173818\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173820\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173822\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173823\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173824\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173825\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173826\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173827\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173828\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173830\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173831\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173832\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173833\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173834\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173836\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173837\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173838\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173839\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173841\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173843\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173844\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173845\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173847\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173849\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173860\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173894\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173941\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174018\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174072\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174116\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174126\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174127\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174128\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174129\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174185\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174244\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174263\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174264\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174331\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174332\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174333\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174345\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174356\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174396\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174398\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174407\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174409\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174411\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174438\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174513\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174527\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174627\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=962849\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19462/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20810/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20812/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-0305/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10135/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10711/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10732/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10751/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10766/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10767/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10768/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10773/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10781/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12656/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12769/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12771/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12888/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13143/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13974/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-14416/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-15393/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-15780/\");\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202105-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?965229cb\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Product-WE-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Live Patching 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP2 :\n\nzypper in -t patch\nSUSE-SLE-Module-Development-Tools-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise High Availability 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Product-HA-15-SP2-2020-2105=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-13974\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP2\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-base-5.3.18-24.9.1.9.2.6\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-devel-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-devel-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-obs-build-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-obs-build-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-syms-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"reiserfs-kmp-default-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"reiserfs-kmp-default-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-base-5.3.18-24.9.1.9.2.6\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-devel-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-devel-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-obs-build-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-obs-build-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-syms-5.3.18-24.9.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-28T14:09:55", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - A stack information leak flaw was found in s390/s390x in the Linux kernel's memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.(CVE-2020-10773)\n\n - In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.(CVE-2019-9458)\n\n - An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.(CVE-2019-20934)\n\n - A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13.\n drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.(CVE-2020-29660)\n\n - An out-of-bounds memory write flaw was found in how the Linux kernel's Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720.\n This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2020-14305)\n\n - A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13.\n drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.(CVE-2020-29661)\n\n - An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4.\n Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.(CVE-2020-29371)\n\n - Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.(CVE-2020-15436)\n\n - The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init\n _ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.(CVE-2020-15437)\n\n - An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.(CVE-2020-29370)\n\n - A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-14351)\n\n - A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.(CVE-2020-28915)\n\n - A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.(CVE-2020-28974)\n\n - Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.(CVE-2020-12352)\n\n - In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions:\n Android-10Android ID: A-153467744(CVE-2020-0305)\n\n - A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service.\n The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-25643)\n\n - An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user 'root' with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g.\n cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.(CVE-2019-3701)\n\n - In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.(CVE-2019-9456)\n\n - A pivot_root race condition in fs/ namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.(CVE-2020-12114)\n\n - A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.(CVE-2020-25645)\n\n - In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product:\n AndroidVersions: Android kernelAndroid ID:\n A-144161459(CVE-2020-0431)\n\n - In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product:\n AndroidVersions: Android kernelAndroid ID:\n A-151939299(CVE-2020-0433)\n\n - In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/ netfilter/ nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.(CVE-2020-25211)\n\n - A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.(CVE-2020-14314)\n\n - A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/ nfs/ nfs4proc.c instead of fs/ nfs/ nfs4xdr.c, aka CID-b4487b935452.(CVE-2020-25212)\n\n - The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.(CVE-2020-25284)\n\n - A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.(CVE-2020-25285)\n\n - A flaw was found in the Linux kernel before 5.9-rc4.\n Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.(CVE-2020-14386)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-01-20T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP3 : kernel (EulerOS-SA-2021-1079)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20934", "CVE-2019-3701", "CVE-2019-9456", "CVE-2019-9458", "CVE-2020-0305", "CVE-2020-0431", "CVE-2020-0433", "CVE-2020-10773", "CVE-2020-12114", "CVE-2020-12352", "CVE-2020-14305", "CVE-2020-14314", "CVE-2020-14351", "CVE-2020-14386", "CVE-2020-15436", "CVE-2020-15437", "CVE-2020-25211", "CVE-2020-25212", "CVE-2020-25284", "CVE-2020-25285", "CVE-2020-25643", "CVE-2020-25645", "CVE-2020-28915", "CVE-2020-28974", "CVE-2020-29370", "CVE-2020-29371", "CVE-2020-29660", "CVE-2020-29661"], "modified": "2021-01-22T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-debuginfo", "p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-1079.NASL", "href": "https://www.tenable.com/plugins/nessus/145201", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(145201);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/22\");\n\n script_cve_id(\n \"CVE-2019-20934\",\n \"CVE-2019-3701\",\n \"CVE-2019-9456\",\n \"CVE-2019-9458\",\n \"CVE-2020-0305\",\n \"CVE-2020-0431\",\n \"CVE-2020-0433\",\n \"CVE-2020-10773\",\n \"CVE-2020-12114\",\n \"CVE-2020-12352\",\n \"CVE-2020-14305\",\n \"CVE-2020-14314\",\n \"CVE-2020-14351\",\n \"CVE-2020-14386\",\n \"CVE-2020-15436\",\n \"CVE-2020-15437\",\n \"CVE-2020-25211\",\n \"CVE-2020-25212\",\n \"CVE-2020-25284\",\n \"CVE-2020-25285\",\n \"CVE-2020-25643\",\n \"CVE-2020-25645\",\n \"CVE-2020-28915\",\n \"CVE-2020-28974\",\n \"CVE-2020-29370\",\n \"CVE-2020-29371\",\n \"CVE-2020-29660\",\n \"CVE-2020-29661\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : kernel (EulerOS-SA-2021-1079)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - A stack information leak flaw was found in s390/s390x\n in the Linux kernel's memory manager functionality,\n where it incorrectly writes to the\n /proc/sys/vm/cmm_timeout file. This flaw allows a local\n user to see the kernel data.(CVE-2020-10773)\n\n - In the Android kernel in the video driver there is a\n use after free due to a race condition. This could lead\n to local escalation of privilege with no additional\n execution privileges needed. User interaction is not\n needed for exploitation.(CVE-2019-9458)\n\n - An issue was discovered in the Linux kernel before\n 5.2.6. On NUMA systems, the Linux fair scheduler has a\n use-after-free in show_numa_stats() because NUMA fault\n statistics are inappropriately freed, aka\n CID-16d51a590a8c.(CVE-2019-20934)\n\n - A locking inconsistency issue was discovered in the tty\n subsystem of the Linux kernel through 5.9.13.\n drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may\n allow a read-after-free attack against TIOCGSID, aka\n CID-c8bcd9c5be24.(CVE-2020-29660)\n\n - An out-of-bounds memory write flaw was found in how the\n Linux kernel's Voice Over IP H.323 connection tracking\n functionality handled connections on ipv6 port 1720.\n This flaw allows an unauthenticated remote user to\n crash the system, causing a denial of service. The\n highest threat from this vulnerability is to\n confidentiality, integrity, as well as system\n availability.(CVE-2020-14305)\n\n - A locking issue was discovered in the tty subsystem of\n the Linux kernel through 5.9.13.\n drivers/tty/tty_jobctrl.c allows a use-after-free\n attack against TIOCSPGRP, aka\n CID-54ffccbf053b.(CVE-2020-29661)\n\n - An issue was discovered in romfs_dev_read in\n fs/romfs/storage.c in the Linux kernel before 5.8.4.\n Uninitialized memory leaks to userspace, aka\n CID-bcf85fcedfdd.(CVE-2020-29371)\n\n - Use-after-free vulnerability in fs/block_dev.c in the\n Linux kernel before 5.8 allows local users to gain\n privileges or cause a denial of service by leveraging\n improper access to a certain error\n field.(CVE-2020-15436)\n\n - The Linux kernel before version 5.8 is vulnerable to a\n NULL pointer dereference in\n drivers/tty/serial/8250/8250_core.c:serial8250_isa_init\n _ports() that allows local users to cause a denial of\n service by using the p->serial_in pointer which\n uninitialized.(CVE-2020-15437)\n\n - An issue was discovered in kmem_cache_alloc_bulk in\n mm/slub.c in the Linux kernel before 5.5.11. The\n slowpath lacks the required TID increment, aka\n CID-fd4d9c7d0c71.(CVE-2020-29370)\n\n - A flaw was found in the Linux kernel. A use-after-free\n memory flaw was found in the perf subsystem allowing a\n local attacker with permission to monitor perf events\n to corrupt memory and possibly escalate privileges. The\n highest threat from this vulnerability is to data\n confidentiality and integrity as well as system\n availability.(CVE-2020-14351)\n\n - A buffer over-read (at the framebuffer layer) in the\n fbcon code in the Linux kernel before 5.8.15 could be\n used by local attackers to read kernel memory, aka\n CID-6735b4632def.(CVE-2020-28915)\n\n - A slab-out-of-bounds read in fbcon in the Linux kernel\n before 5.9.7 could be used by local attackers to read\n privileged information or potentially crash the kernel,\n aka CID-3c4e0dff2095. This occurs because\n KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for\n manipulations such as font height.(CVE-2020-28974)\n\n - Improper access control in BlueZ may allow an\n unauthenticated user to potentially enable information\n disclosure via adjacent access.(CVE-2020-12352)\n\n - In cdev_get of char_dev.c, there is a possible\n use-after-free due to a race condition. This could lead\n to local escalation of privilege with System execution\n privileges needed. User interaction is not needed for\n exploitation.Product: AndroidVersions:\n Android-10Android ID: A-153467744(CVE-2020-0305)\n\n - A flaw was found in the HDLC_PPP module of the Linux\n kernel in versions before 5.9-rc7. Memory corruption\n and a read overflow is caused by improper input\n validation in the ppp_cp_parse_cr function which can\n cause the system to crash or cause a denial of service.\n The highest threat from this vulnerability is to data\n confidentiality and integrity as well as system\n availability.(CVE-2020-25643)\n\n - An issue was discovered in can_can_gw_rcv in\n net/can/gw.c in the Linux kernel through 4.19.13. The\n CAN frame modification rules allow bitwise logical\n operations that can be also applied to the can_dlc\n field. The privileged user 'root' with CAP_NET_ADMIN\n can create a CAN frame modification rule that makes the\n data length code a higher value than the available CAN\n frame data size. In combination with a configured\n checksum calculation where the result is stored\n relatively to the end of the data (e.g.\n cgw_csum_xor_rel) the tail of the skb (e.g. frag_list\n pointer in skb_shared_info) can be rewritten which\n finally can cause a system crash. Because of a missing\n check, the CAN drivers may write arbitrary content\n beyond the data registers in the CAN controller's I/O\n memory when processing can-gw manipulated outgoing\n frames.(CVE-2019-3701)\n\n - In the Android kernel in Pixel C USB monitor driver\n there is a possible OOB write due to a missing bounds\n check. This could lead to local escalation of privilege\n with System execution privileges needed. User\n interaction is not needed for\n exploitation.(CVE-2019-9456)\n\n - A pivot_root race condition in fs/ namespace.c in the\n Linux kernel 4.4.x before 4.4.221, 4.9.x before\n 4.9.221, 4.14.x before 4.14.178, 4.19.x before\n 4.19.119, and 5.x before 5.3 allows local users to\n cause a denial of service (panic) by corrupting a\n mountpoint reference counter.(CVE-2020-12114)\n\n - A flaw was found in the Linux kernel in versions before\n 5.9-rc7. Traffic between two Geneve endpoints may be\n unencrypted when IPsec is configured to encrypt traffic\n for the specific UDP port used by the GENEVE tunnel\n allowing anyone between the two endpoints to read the\n traffic unencrypted. The main threat from this\n vulnerability is to data\n confidentiality.(CVE-2020-25645)\n\n - In kbd_keycode of keyboard.c, there is a possible out\n of bounds write due to a missing bounds check. This\n could lead to local escalation of privilege with no\n additional execution privileges needed. User\n interaction is not needed for exploitation.Product:\n AndroidVersions: Android kernelAndroid ID:\n A-144161459(CVE-2020-0431)\n\n - In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is\n a possible use after free due to improper locking. This\n could lead to local escalation of privilege with no\n additional execution privileges needed. User\n interaction is not needed for exploitation.Product:\n AndroidVersions: Android kernelAndroid ID:\n A-151939299(CVE-2020-0433)\n\n - In the Linux kernel through 5.8.7, local attackers able\n to inject conntrack netlink configuration could\n overflow a local buffer, causing crashes or triggering\n use of incorrect protocol numbers in\n ctnetlink_parse_tuple_filter in net/ netfilter/\n nf_conntrack_netlink.c, aka\n CID-1cc5ef91d2ff.(CVE-2020-25211)\n\n - A memory out-of-bounds read flaw was found in the Linux\n kernel before 5.9-rc2 with the ext3/ext4 file system,\n in the way it accesses a directory with broken\n indexing. This flaw allows a local user to crash the\n system if the directory exists. The highest threat from\n this vulnerability is to system\n availability.(CVE-2020-14314)\n\n - A TOCTOU mismatch in the NFS client code in the Linux\n kernel before 5.8.3 could be used by local attackers to\n corrupt memory or possibly have unspecified other\n impact because a size check is in fs/ nfs/ nfs4proc.c\n instead of fs/ nfs/ nfs4xdr.c, aka\n CID-b4487b935452.(CVE-2020-25212)\n\n - The rbd block device driver in drivers/block/rbd.c in\n the Linux kernel through 5.8.9 used incomplete\n permission checking for access to rbd devices, which\n could be leveraged by local attackers to map or unmap\n rbd block devices, aka\n CID-f44d04e696fe.(CVE-2020-25284)\n\n - A race condition between hugetlb sysctl handlers in\n mm/hugetlb.c in the Linux kernel before 5.8.8 could be\n used by local attackers to corrupt memory, cause a NULL\n pointer dereference, or possibly have unspecified other\n impact, aka CID-17743798d812.(CVE-2020-25285)\n\n - A flaw was found in the Linux kernel before 5.9-rc4.\n Memory corruption can be exploited to gain root\n privileges from unprivileged processes. The highest\n threat from this vulnerability is to data\n confidentiality and integrity.(CVE-2020-14386)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-1079\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?83f9eb52\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/20\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-514.44.5.10.h296\",\n \"kernel-debuginfo-3.10.0-514.44.5.10.h296\",\n \"kernel-debuginfo-common-x86_64-3.10.0-514.44.5.10.h296\",\n \"kernel-devel-3.10.0-514.44.5.10.h296\",\n \"kernel-headers-3.10.0-514.44.5.10.h296\",\n \"kernel-tools-3.10.0-514.44.5.10.h296\",\n \"kernel-tools-libs-3.10.0-514.44.5.10.h296\",\n \"perf-3.10.0-514.44.5.10.h296\",\n \"python-perf-3.10.0-514.44.5.10.h296\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:24:59", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:4609 advisory.\n\n - kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)\n\n - kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)\n\n - kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)\n\n - kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)\n\n - kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c (CVE-2019-18808)\n\n - kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c (CVE-2019-18809)\n\n - kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c (CVE-2019-19046)\n\n - kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS (CVE-2019-19056)\n\n - kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS (CVE-2019-19062)\n\n - kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS (CVE-2019-19063)\n\n - kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS (CVE-2019-19068)\n\n - kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS (CVE-2019-19072)\n\n - kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c (CVE-2019-19319)\n\n - Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)\n\n - kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c (CVE-2019-19447)\n\n - kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)\n\n - kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb- dec/ttusb_dec.c (CVE-2019-19533)\n\n - kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)\n\n - kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (CVE-2019-19543)\n\n - kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c (CVE-2019-19767)\n\n - kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c (CVE-2019-19770)\n\n - kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c (CVE-2019-20054)\n\n - kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)\n\n - kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)\n\n - kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)\n\n - kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c (CVE-2020-0305)\n\n - kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)\n\n - kernel: SELinux netlink permission check bypass (CVE-2020-10751)\n\n - kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)\n\n - kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)\n\n - kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c (CVE-2020-11565)\n\n - kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n - kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)\n\n - kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption (CVE-2020-12659)\n\n - kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)\n\n - kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)\n\n - kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)\n\n - kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\n - kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c (CVE-2020-8647)\n\n - kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\n - kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c (CVE-2020-8649)\n\n - kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-11-04T00:00:00", "type": "nessus", "title": "RHEL 8 : kernel-rt (RHSA-2020:4609)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-15917", "CVE-2019-15925", "CVE-2019-16231", "CVE-2019-16233", "CVE-2019-18808", "CVE-2019-18809", "CVE-2019-19046", "CVE-2019-19056", "CVE-2019-19062", "CVE-2019-19063", "CVE-2019-19068", "CVE-2019-19072", "CVE-2019-19319", "CVE-2019-19332", "CVE-2019-19447", "CVE-2019-19524", "CVE-2019-19533", "CVE-2019-19537", "CVE-2019-19543", "CVE-2019-19767", "CVE-2019-19770", "CVE-2019-20054", "CVE-2019-20636", "CVE-2019-9455", "CVE-2019-9458", "CVE-2020-0305", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10774", "CVE-2020-10942", "CVE-2020-11565", "CVE-2020-11668", "CVE-2020-12655", "CVE-2020-12659", "CVE-2020-12770", "CVE-2020-12826", "CVE-2020-14381", "CVE-2020-25641", "CVE-2020-8647", "CVE-2020-8648", "CVE-2020-8649", "CVE-2021-3715"], "modified": "2023-01-23T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:rhel_aus:8.4", "cpe:/o:redhat:rhel_aus:8.6", "cpe:/o:redhat:rhel_e4s:8.4", "cpe:/o:redhat:rhel_e4s:8.6", "cpe:/o:redhat:rhel_eus:8.4", "cpe:/o:redhat:rhel_eus:8.6", "cpe:/o:redhat:rhel_tus:8.4", "cpe:/o:redhat:rhel_tus:8.6", "p-cpe:/a:redhat:enterprise_linux:kernel-rt", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-core", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra"], "id": "REDHAT-RHSA-2020-4609.NASL", "href": "https://www.tenable.com/plugins/nessus/142382", "sourceData": "##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:4609. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142382);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/23\");\n\n script_cve_id(\n \"CVE-2019-9455\",\n \"CVE-2019-9458\",\n \"CVE-2019-15917\",\n \"CVE-2019-15925\",\n \"CVE-2019-16231\",\n \"CVE-2019-16233\",\n \"CVE-2019-18808\",\n \"CVE-2019-18809\",\n \"CVE-2019-19046\",\n \"CVE-2019-19056\",\n \"CVE-2019-19062\",\n \"CVE-2019-19063\",\n \"CVE-2019-19068\",\n \"CVE-2019-19072\",\n \"CVE-2019-19319\",\n \"CVE-2019-19332\",\n \"CVE-2019-19447\",\n \"CVE-2019-19524\",\n \"CVE-2019-19533\",\n \"CVE-2019-19537\",\n \"CVE-2019-19543\",\n \"CVE-2019-19767\",\n \"CVE-2019-19770\",\n \"CVE-2019-20054\",\n \"CVE-2019-20636\",\n \"CVE-2020-0305\",\n \"CVE-2020-8647\",\n \"CVE-2020-8648\",\n \"CVE-2020-8649\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-10774\",\n \"CVE-2020-10942\",\n \"CVE-2020-11565\",\n \"CVE-2020-11668\",\n \"CVE-2020-12655\",\n \"CVE-2020-12659\",\n \"CVE-2020-12770\",\n \"CVE-2020-12826\",\n \"CVE-2020-14381\",\n \"CVE-2020-25641\"\n );\n script_xref(name:\"RHSA\", value:\"2020:4609\");\n\n script_name(english:\"RHEL 8 : kernel-rt (RHSA-2020:4609)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the RHSA-2020:4609 advisory.\n\n - kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)\n\n - kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)\n\n - kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)\n\n - kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)\n\n - kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c (CVE-2019-18808)\n\n - kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c\n (CVE-2019-18809)\n\n - kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c\n (CVE-2019-19046)\n\n - kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in\n drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS (CVE-2019-19056)\n\n - kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS\n (CVE-2019-19062)\n\n - kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c\n allow for a DoS (CVE-2019-19063)\n\n - kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in\n drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS (CVE-2019-19068)\n\n - kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a\n DoS (CVE-2019-19072)\n\n - kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c (CVE-2019-19319)\n\n - Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)\n\n - kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a\n use-after-free in ext4_put_super in fs/ext4/super.c (CVE-2019-19447)\n\n - kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)\n\n - kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-\n dec/ttusb_dec.c (CVE-2019-19533)\n\n - kernel: race condition caused by a malicious USB device in the USB character device driver layer\n (CVE-2019-19537)\n\n - kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (CVE-2019-19543)\n\n - kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c\n and fs/ext4/super.c (CVE-2019-19767)\n\n - kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c (CVE-2019-19770)\n\n - kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c (CVE-2019-20054)\n\n - kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)\n\n - kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure\n (CVE-2019-9455)\n\n - kernel: use after free due to race condition in the video driver leads to local privilege escalation\n (CVE-2019-9458)\n\n - kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c (CVE-2020-0305)\n\n - kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)\n\n - kernel: SELinux netlink permission check bypass (CVE-2020-10751)\n\n - kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features\n (CVE-2020-10774)\n\n - kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)\n\n - kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c (CVE-2020-11565)\n\n - kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n - kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)\n\n - kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data\n coruption (CVE-2020-12659)\n\n - kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)\n\n - kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)\n\n - kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)\n\n - kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\n - kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c (CVE-2020-8647)\n\n - kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\n - kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c\n (CVE-2020-8649)\n\n - kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-9455\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-9458\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-15917\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-15925\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-16231\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-16233\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-18808\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-18809\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19046\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19056\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19062\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19063\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19068\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19072\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19319\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19332\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19447\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19524\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19533\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19537\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19543\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19767\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19770\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-20054\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-20636\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-0305\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-8647\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-8648\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-8649\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10732\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10774\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10942\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-11565\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-11668\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12655\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12659\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12770\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12826\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-14381\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-25641\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-3715\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:4609\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1759052\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1760100\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1760310\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1760420\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1774946\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1774963\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1774988\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1775015\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1775021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1775097\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1777418\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1777449\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1779594\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1781679\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1781810\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1783459\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1783534\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1783561\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1784130\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1786160\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1786179\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1790063\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1802555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1802559\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1802563\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1817718\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1819377\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1819399\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1822077\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1824059\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1824792\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1824918\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1831399\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1832543\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1832876\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1834845\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1839634\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1846964\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1860065\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1874311\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1881424\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1993988\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-12659\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2019-19770\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 94, 119, 200, 349, 362, 400, 401, 416, 476, 772, 787, 805, 835, 908, 909);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/05/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '8')) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n rm_kb_item(name:'Host/uptrack-uname-r');\n var cve_list = make_list('CVE-2019-9455', 'CVE-2019-9458', 'CVE-2019-15917', 'CVE-2019-15925', 'CVE-2019-16231', 'CVE-2019-16233', 'CVE-2019-18808', 'CVE-2019-18809', 'CVE-2019-19046', 'CVE-2019-19056', 'CVE-2019-19062', 'CVE-2019-19063', 'CVE-2019-19068', 'CVE-2019-19072', 'CVE-2019-19319', 'CVE-2019-19332', 'CVE-2019-19447', 'CVE-2019-19524', 'CVE-2019-19533', 'CVE-2019-19537', 'CVE-2019-19543', 'CVE-2019-19767', 'CVE-2019-19770', 'CVE-2019-20054', 'CVE-2019-20636', 'CVE-2020-0305', 'CVE-2020-8647', 'CVE-2020-8648', 'CVE-2020-8649', 'CVE-2020-10732', 'CVE-2020-10751', 'CVE-2020-10774', 'CVE-2020-10942', 'CVE-2020-11565', 'CVE-2020-11668', 'CVE-2020-12655', 'CVE-2020-12659', 'CVE-2020-12770', 'CVE-2020-12826', 'CVE-2020-14381', 'CVE-2020-25641', 'CVE-2021-3715');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2020:4609');\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nvar constraints = [\n {\n 'repo_relative_urls': [\n 'content/aus/rhel8/8.4/x86_64/appstream/debug',\n 'content/aus/rhel8/8.4/x86_64/appstream/os',\n 'content/aus/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/aus/rhel8/8.4/x86_64/baseos/debug',\n 'content/aus/rhel8/8.4/x86_64/baseos/os',\n 'content/aus/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/appstream/debug',\n 'content/e4s/rhel8/8.4/x86_64/appstream/os',\n 'content/e4s/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/baseos/debug',\n 'content/e4s/rhel8/8.4/x86_64/baseos/os',\n 'content/e4s/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/highavailability/debug',\n 'content/e4s/rhel8/8.4/x86_64/highavailability/os',\n 'content/e4s/rhel8/8.4/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/sap-solutions/debug',\n 'content/e4s/rhel8/8.4/x86_64/sap-solutions/os',\n 'content/e4s/rhel8/8.4/x86_64/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/sap/debug',\n 'content/e4s/rhel8/8.4/x86_64/sap/os',\n 'content/e4s/rhel8/8.4/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/appstream/debug',\n 'content/eus/rhel8/8.4/x86_64/appstream/os',\n 'content/eus/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/baseos/debug',\n 'content/eus/rhel8/8.4/x86_64/baseos/os',\n 'content/eus/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/codeready-builder/debug',\n 'content/eus/rhel8/8.4/x86_64/codeready-builder/os',\n 'content/eus/rhel8/8.4/x86_64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/highavailability/debug',\n 'content/eus/rhel8/8.4/x86_64/highavailability/os',\n 'content/eus/rhel8/8.4/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/resilientstorage/debug',\n 'content/eus/rhel8/8.4/x86_64/resilientstorage/os',\n 'content/eus/rhel8/8.4/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/sap-solutions/debug',\n 'content/eus/rhel8/8.4/x86_64/sap-solutions/os',\n 'content/eus/rhel8/8.4/x86_64/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/sap/debug',\n 'content/eus/rhel8/8.4/x86_64/sap/os',\n 'content/eus/rhel8/8.4/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/supplementary/debug',\n 'content/eus/rhel8/8.4/x86_64/supplementary/os',\n 'content/eus/rhel8/8.4/x86_64/supplementary/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/appstream/debug',\n 'content/tus/rhel8/8.4/x86_64/appstream/os',\n 'content/tus/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/baseos/debug',\n 'content/tus/rhel8/8.4/x86_64/baseos/os',\n 'content/tus/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/highavailability/debug',\n 'content/tus/rhel8/8.4/x86_64/highavailability/os',\n 'content/tus/rhel8/8.4/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/nfv/debug',\n 'content/tus/rhel8/8.4/x86_64/nfv/os',\n 'content/tus/rhel8/8.4/x86_64/nfv/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/rt/debug',\n 'content/tus/rhel8/8.4/x86_64/rt/os',\n 'content/tus/rhel8/8.4/x86_64/rt/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'kernel-rt-4.18.0-240.rt7.54.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-core-4.18.0-240.rt7.54.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-4.18.0-240.rt7.54.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-core-4.18.0-240.rt7.54.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-devel-4.18.0-240.rt7.54.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-kvm-4.18.0-240.rt7.54.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-modules-4.18.0-240.rt7.54.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-devel-4.18.0-240.rt7.54.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-kvm-4.18.0-240.rt7.54.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-modules-4.18.0-240.rt7.54.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-modules-extra-4.18.0-240.rt7.54.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n },\n {\n 'repo_relative_urls': [\n 'content/aus/rhel8/8.6/x86_64/appstream/debug',\n 'content/aus/rhel8/8.6/x86_64/appstream/os',\n 'content/aus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/aus/rhel8/8.6/x86_64/baseos/debug',\n 'content/aus/rhel8/8.6/x86_64/baseos/os',\n 'content/aus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/appstream/debug',\n 'content/e4s/rhel8/8.6/x86_64/appstream/os',\n 'content/e4s/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/baseos/debug',\n 'content/e4s/rhel8/8.6/x86_64/baseos/os',\n 'content/e4s/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/debug',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/os',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/debug',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/os',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/sap/debug',\n 'content/e4s/rhel8/8.6/x86_64/sap/os',\n 'content/e4s/rhel8/8.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/appstream/debug',\n 'content/eus/rhel8/8.6/x86_64/appstream/os',\n 'content/eus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/baseos/debug',\n 'content/eus/rhel8/8.6/x86_64/baseos/os',\n 'content/eus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/debug',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/os',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/highavailability/debug',\n 'content/eus/rhel8/8.6/x86_64/highavailability/os',\n 'content/eus/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/debug',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/os',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/debug',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/os',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/sap/debug',\n 'content/eus/rhel8/8.6/x86_64/sap/os',\n 'content/eus/rhel8/8.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/supplementary/debug',\n 'content/eus/rhel8/8.6/x86_64/supplementary/os',\n 'content/eus/rhel8/8.6/x86_64/supplementary/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/appstream/debug',\n 'content/tus/rhel8/8.6/x86_64/appstream/os',\n 'content/tus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/baseos/debug',\n 'content/tus/rhel8/8.6/x86_64/baseos/os',\n 'content/tus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/highavailability/debug',\n 'content/tus/rhel8/8.6/x86_64/highavailability/os',\n 'content/tus/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/rt/os',\n 'content/tus/rhel8/8.6/x86_64/rt/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'kernel-rt-4.18.0-240.rt7.54.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-core-4.18.0-240.rt7.54.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-4.18.0-240.rt7.54.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-core-4.18.0-240.rt7.54.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-devel-4.18.0-240.rt7.54.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-kvm-4.18.0-240.rt7.54.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-modules-4.18.0-240.rt7.54.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-devel-4.18.0-240.rt7.54.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-kvm-4.18.0-240.rt7.54.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-modules-4.18.0-240.rt7.54.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-modules-extra-4.18.0-240.rt7.54.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n },\n {\n 'repo_relative_urls': [\n 'content/dist/rhel8/8/x86_64/appstream/debug',\n 'content/dist/rhel8/8/x86_64/appstream/os',\n 'content/dist/rhel8/8/x86_64/appstream/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/baseos/debug',\n 'content/dist/rhel8/8/x86_64/baseos/os',\n 'content/dist/rhel8/8/x86_64/baseos/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/codeready-builder/debug',\n 'content/dist/rhel8/8/x86_64/codeready-builder/os',\n 'content/dist/rhel8/8/x86_64/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/highavailability/debug',\n 'content/dist/rhel8/8/x86_64/highavailability/os',\n 'content/dist/rhel8/8/x86_64/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/nfv/debug',\n 'content/dist/rhel8/8/x86_64/nfv/os',\n 'content/dist/rhel8/8/x86_64/nfv/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/resilientstorage/debug',\n 'content/dist/rhel8/8/x86_64/resilientstorage/os',\n 'content/dist/rhel8/8/x86_64/resilientstorage/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/rt/debug',\n 'content/dist/rhel8/8/x86_64/rt/os',\n 'content/dist/rhel8/8/x86_64/rt/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/sap-solutions/debug',\n 'content/dist/rhel8/8/x86_64/sap-solutions/os',\n 'content/dist/rhel8/8/x86_64/sap-solutions/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/sap/debug',\n 'content/dist/rhel8/8/x86_64/sap/os',\n 'content/dist/rhel8/8/x86_64/sap/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/supplementary/debug',\n 'content/dist/rhel8/8/x86_64/supplementary/os',\n 'content/dist/rhel8/8/x86_64/supplementary/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'kernel-rt-4.18.0-240.rt7.54.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-core-4.18.0-240.rt7.54.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-4.18.0-240.rt7.54.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-core-4.18.0-240.rt7.54.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-devel-4.18.0-240.rt7.54.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-kvm-4.18.0-240.rt7.54.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-modules-4.18.0-240.rt7.54.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-devel-4.18.0-240.rt7.54.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-kvm-4.18.0-240.rt7.54.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-modules-4.18.0-240.rt7.54.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-modules-extra-4.18.0-240.rt7.54.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nforeach var constraint_array ( constraints ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];\n var enterprise_linux_flag = rhel_repo_urls_has_content_dist_rhel(repo_urls:repo_relative_urls);\n foreach var pkg ( constraint_array['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp']) && !enterprise_linux_flag) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-rt / kernel-rt-core / kernel-rt-debug / kernel-rt-debug-core / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:22:33", "description": "According to the versions of the kernel packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities :\n\n - The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system:\n memory allocation, process allocation, device input and output, etc. Security Fix(es):In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.(CVE-2019-9445)In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932(CVE-2020-0009)A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found.\n This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.(CVE-2020-0543)A flaw was found in the Linux kernel's implementation of the BTRFS file system.\n A local attacker, with the ability to mount a file system, can create a use-after-free memory fault after the file system has been unmounted. This may lead to memory corruption or privilege escalation.(CVE-2019-19377)A NULL pointer dereference flaw may occur in the Linux kernel's relay_open in kernel/relay.c. if the alloc_percpu() function is not validated in time of failure and used as a valid address for access. An attacker could use this flaw to cause a denial of service.(CVE-2019-19462)A NULL pointer dereference flaw was found in tw5864_handle_frame function in drivers/media/pci/tw5864/tw5864-video.c in the TW5864 Series Video media driver. The pointer 'vb' is assigned, but not validated before its use, and can lead to a denial of service. This flaw allows a local attacker with special user or root privileges to crash the system or leak internal kernel information.(CVE-2019-20806)go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.(CVE-2019-20810)An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/coreet-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.(CVE-2019-20811)A flaw was found in the way the af_packet functionality in the Linux kernel handled the retirement timer setting for TPACKET_v3 when getting settings from the underlying network device errors out. This flaw allows a local user who can open the af_packet domain socket and who can hit the error path, to use this vulnerability to starve the system.(CVE-2019-20812)A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.(CVE-2020-10711)A flaw was found in the Linux kernel's SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.(CVE-2020-10751)A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.(CVE-2020-10757)A logic bug flaw was found in the Linux kernel's implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10766)A flaw was found in the Linux kernel's implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10767)A flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled.\n This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10768)A flaw was found in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.(CVE-2020-10781)A stack buffer overflow issue was found in the get_raw_socket() routine of the Host kernel accelerator for virtio net (vhost-net) driver. It could occur while doing an ictol(VHOST_NET_SET_BACKEND) call, and retrieving socket name in a kernel stack variable via get_raw_socket(). A user able to perform ioctl(2) calls on the '/dev/vhost-net' device may use this flaw to crash the kernel resulting in DoS issue.(CVE-2020-10942)A flaw was found in the Linux kernel's implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.(CVE-2020-12114)A use-after-free flaw was found in usb_sg_cancel in drivers/usb/core/message.c in the USB core subsystem.\n This flaw allows a local attacker with a special user or root privileges to crash the system due to a race problem in the scatter-gather cancellation and transfer completion in usb_sg_wait. This vulnerability can also lead to a leak of internal kernel information.(CVE-2020-12464)A memory overflow and data corruption flaw were found in the Mediatek MT76 driver module for WiFi in mt76_add_fragment in driverset/wireless/mediatek/mt76/dma.c. An oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with a special user or root privileges can cause a denial of service or a leak of internal kernel information.(CVE-2020-12465)A vulnerability was found in __mptctl_ioctl in drivers/message/fusion/mptctl.c in Fusion MPT base driver 'mptctl' in the SCSI device module, where an incorrect lock leads to a race problem. This flaw allows an attacker with local access and special user (or root) privileges to cause a denial of service.(CVE-2020-12652)A flaw was found in the way the mwifiex_cmd_append_vsie_tlv() in Linux kernel's Marvell WiFi-Ex driver handled vendor specific information elements. A local user could use this flaw to escalate their privileges on the system.(CVE-2020-12653)A flaw was found in the Linux kernel. The Marvell mwifiex driver allows a remote WiFi access point to trigger a heap-based memory buffer overflow due to an incorrect memcpy operation. The highest threat from this vulnerability is to data integrity and system availability.(CVE-2020-12654)A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.(CVE-2020-12655)An out-of-bounds (OOB) memory access flaw was found in the Network XDP (the eXpress Data Path) module in the Linux kernel's xdp_umem_reg function in net/xdp/xdp_umem.c.\n When a user with special user privilege of CAP_NET_ADMIN (or root) calls setsockopt to register umem ring on XDP socket, passing the headroom value larger than the available space in the chunk, it leads to an out-of-bounds write, causing panic or possible memory corruption. This flaw may lead to privilege escalation if a local end-user is granted permission to influence the execution of code in this manner.(CVE-2020-12659)A vulnerability was found in sg_write in drivers/scsi/sg.c in the SCSI generic (sg) driver subsystem. This flaw allows an attacker with local access and special user or root privileges to cause a denial of service if the allocated list is not cleaned with an invalid (Sg_fd * sfp) pointer at the time of failure, also possibly causing a kernel internal information leak problem.(CVE-2020-12770)An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.(CVE-2020-12771)A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.(CVE-2020-12826)A flaw was found in the Linux kernel, where it allows userspace processes, for example, a guest VM, to directly access h/w devices via its VFIO driver modules. The VFIO modules allow users to enable or disable access to the devices' MMIO memory address spaces. If a user attempts to access the read/write devices' MMIO address space when it is disabled, some h/w devices issue an interrupt to the CPU to indicate a fatal error condition, crashing the system. This flaw allows a guest user or process to crash the host system resulting in a denial of service.(CVE-2020-12888)gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel through 5.6.13 relies on kstrdup without considering the possibility of an internal '\\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.(CVE-2020-13143)** DISPUTED ** An issue was discovered in the Linux kernel through 5.7.1.\n drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.(CVE-2020-13974)A use-after-free flaw was found in slcan_write_wakeup in driverset/can/slcan.c in the serial CAN module slcan. A race condition occurs when communicating with can using slcan between the write (scheduling the transmit) and closing (flushing out any pending queues) the SLCAN channel. This flaw allows a local attacker with special user or root privileges to cause a denial of service or a kernel information leak. The highest threat from this vulnerability is to system availability.(CVE-2020-14416)In the Linux kernel through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.(CVE-2020-15393)The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.(CVE-2020-16166)A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.(CVE-2020-10732)A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.(CVE-2020-14356)The Linux kernel 4.9.x before 4.9.233, 4.14.x before 4.14.194, and 4.19.x before 4.19.140 has a use-after-free because skcd->no_refcnt was not considered during a backport of a CVE-2020-14356 patch. This is related to the cgroups feature.(CVE-2020-25220)get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount underflow. This can be triggered by any 64-bit process that can use ptrace() or process_vm_readv(), aka CID-9fa2dd946743.(CVE-2020-25221)In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.(CVE-2020-25211)A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash.\n This flaw allows a local attacker with user privileges to cause a denial of service.(CVE-2020-10769)A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-14331)In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product:\n AndroidVersions: Android-10Android ID:\n A-153467744(CVE-2020-0305)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-08T00:00:00", "type": "nessus", "title": "EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2020-1958)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19377", "CVE-2019-19462", "CVE-2019-20806", "CVE-2019-20810", "CVE-2019-20811", "CVE-2019-20812", "CVE-2019-9445", "CVE-2020-0009", "CVE-2020-0305", "CVE-2020-0543", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10781", "CVE-2020-10942", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12465", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12659", "CVE-2020-12770", "CVE-2020-12771", "CVE-2020-12826", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-16166", "CVE-2020-25211", "CVE-2020-25220", "CVE-2020-25221"], "modified": "2021-07-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:kernel-tools-libs-devel", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:uvp:3.0.2.0"], "id": "EULEROS_SA-2020-1958.NASL", "href": "https://www.tenable.com/plugins/nessus/140328", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140328);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/07/06\");\n\n script_cve_id(\n \"CVE-2019-19377\",\n \"CVE-2019-19462\",\n \"CVE-2019-20806\",\n \"CVE-2019-20810\",\n \"CVE-2019-20811\",\n \"CVE-2019-20812\",\n \"CVE-2019-9445\",\n \"CVE-2020-0009\",\n \"CVE-2020-0305\",\n \"CVE-2020-0543\",\n \"CVE-2020-10711\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-10757\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-10769\",\n \"CVE-2020-10781\",\n \"CVE-2020-10942\",\n \"CVE-2020-12114\",\n \"CVE-2020-12464\",\n \"CVE-2020-12465\",\n \"CVE-2020-12652\",\n \"CVE-2020-12653\",\n \"CVE-2020-12654\",\n \"CVE-2020-12655\",\n \"CVE-2020-12659\",\n \"CVE-2020-12770\",\n \"CVE-2020-12771\",\n \"CVE-2020-12826\",\n \"CVE-2020-12888\",\n \"CVE-2020-13143\",\n \"CVE-2020-13974\",\n \"CVE-2020-14331\",\n \"CVE-2020-14356\",\n \"CVE-2020-14416\",\n \"CVE-2020-15393\",\n \"CVE-2020-16166\",\n \"CVE-2020-25211\",\n \"CVE-2020-25220\",\n \"CVE-2020-25221\"\n );\n\n script_name(english:\"EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2020-1958)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization for ARM 64 host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS Virtualization for ARM 64 installation on the remote host is\naffected by the following vulnerabilities :\n\n - The kernel package contains the Linux kernel (vmlinuz),\n the core of any Linux operating system. The kernel\n handles the basic functions of the operating system:\n memory allocation, process allocation, device input and\n output, etc. Security Fix(es):In the Android kernel in\n F2FS driver there is a possible out of bounds read due\n to a missing bounds check. This could lead to local\n information disclosure with system execution privileges\n needed. User interaction is not needed for\n exploitation.(CVE-2019-9445)In calc_vm_may_flags of\n ashmem.c, there is a possible arbitrary write to shared\n memory due to a permissions bypass. This could lead to\n local escalation of privilege by corrupting memory\n shared between processes, with no additional execution\n privileges needed. User interaction is not needed for\n exploitation. Product: Android Versions: Android kernel\n Android ID: A-142938932(CVE-2020-0009)A new domain\n bypass transient execution attack known as Special\n Register Buffer Data Sampling (SRBDS) has been found.\n This flaw allows data values from special internal\n registers to be leaked by an attacker able to execute\n code on any core of the CPU. An unprivileged, local\n attacker can use this flaw to infer values returned by\n affected instructions known to be commonly used during\n cryptographic operations that rely on uniqueness,\n secrecy, or both.(CVE-2020-0543)A flaw was found in the\n Linux kernel's implementation of the BTRFS file system.\n A local attacker, with the ability to mount a file\n system, can create a use-after-free memory fault after\n the file system has been unmounted. This may lead to\n memory corruption or privilege\n escalation.(CVE-2019-19377)A NULL pointer dereference\n flaw may occur in the Linux kernel's relay_open in\n kernel/relay.c. if the alloc_percpu() function is not\n validated in time of failure and used as a valid\n address for access. An attacker could use this flaw to\n cause a denial of service.(CVE-2019-19462)A NULL\n pointer dereference flaw was found in\n tw5864_handle_frame function in\n drivers/media/pci/tw5864/tw5864-video.c in the TW5864\n Series Video media driver. The pointer 'vb' is\n assigned, but not validated before its use, and can\n lead to a denial of service. This flaw allows a local\n attacker with special user or root privileges to crash\n the system or leak internal kernel\n information.(CVE-2019-20806)go7007_snd_init in\n drivers/media/usb/go7007/snd-go7007.c in the Linux\n kernel before 5.6 does not call snd_card_free for a\n failure path, which causes a memory leak, aka\n CID-9453264ef586.(CVE-2019-20810)An issue was\n discovered in the Linux kernel before 5.0.6. In\n rx_queue_add_kobject() and netdev_queue_add_kobject()\n in net/coreet-sysfs.c, a reference count is mishandled,\n aka CID-a3e23f719f5c.(CVE-2019-20811)A flaw was found\n in the way the af_packet functionality in the Linux\n kernel handled the retirement timer setting for\n TPACKET_v3 when getting settings from the underlying\n network device errors out. This flaw allows a local\n user who can open the af_packet domain socket and who\n can hit the error path, to use this vulnerability to\n starve the system.(CVE-2019-20812)A NULL pointer\n dereference flaw was found in the Linux kernel's\n SELinux subsystem. This flaw occurs while importing the\n Commercial IP Security Option (CIPSO) protocol's\n category bitmap into the SELinux extensible bitmap via\n the' ebitmap_netlbl_import' routine. While processing\n the CIPSO restricted bitmap tag in the\n 'cipso_v4_parsetag_rbm' routine, it sets the security\n attribute to indicate that the category bitmap is\n present, even if it has not been allocated. This issue\n leads to a NULL pointer dereference issue while\n importing the same category bitmap into SELinux. This\n flaw allows a remote network user to crash the system\n kernel, resulting in a denial of\n service.(CVE-2020-10711)A flaw was found in the Linux\n kernel's SELinux LSM hook implementation, where it\n anticipated the skb would only contain a single Netlink\n message. The hook incorrectly validated the first\n Netlink message in the skb only, to allow or deny the\n rest of the messages within the skb with the granted\n permissions and without further processing. At this\n time, there is no known ability for an attacker to\n abuse this flaw.(CVE-2020-10751)A flaw was found in the\n Linux Kernel in versions after 4.5-rc1 in the way\n mremap handled DAX Huge Pages. This flaw allows a local\n attacker with access to a DAX enabled storage to\n escalate their privileges on the\n system.(CVE-2020-10757)A logic bug flaw was found in\n the Linux kernel's implementation of SSBD. A bug in the\n logic handling allows an attacker with a local account\n to disable SSBD protection during a context switch when\n additional speculative execution mitigations are in\n place. This issue was introduced when the per\n task/process conditional STIPB switching was added on\n top of the existing SSBD switching. The highest threat\n from this vulnerability is to\n confidentiality.(CVE-2020-10766)A flaw was found in the\n Linux kernel's implementation of the Enhanced IBPB\n (Indirect Branch Prediction Barrier). The IBPB\n mitigation will be disabled when STIBP is not available\n or when the Enhanced Indirect Branch Restricted\n Speculation (IBRS) is available. This flaw allows a\n local attacker to perform a Spectre V2 style attack\n when this configuration is active. The highest threat\n from this vulnerability is to\n confidentiality.(CVE-2020-10767)A flaw was found in the\n prctl() function, where it can be used to enable\n indirect branch speculation after it has been disabled.\n This call incorrectly reports it as being 'force\n disabled' when it is not and opens the system to\n Spectre v2 attacks. The highest threat from this\n vulnerability is to confidentiality.(CVE-2020-10768)A\n flaw was found in the ZRAM kernel module, where a user\n with a local account and the ability to read the\n /sys/class/zram-control/hot_add file can create ZRAM\n device nodes in the /dev/ directory. This read\n allocates kernel memory and is not accounted for a user\n that triggers the creation of that ZRAM device. With\n this vulnerability, continually reading the device may\n consume a large amount of system memory and cause the\n Out-of-Memory (OOM) killer to activate and terminate\n random userspace processes, possibly making the system\n inoperable.(CVE-2020-10781)A stack buffer overflow\n issue was found in the get_raw_socket() routine of the\n Host kernel accelerator for virtio net (vhost-net)\n driver. It could occur while doing an\n ictol(VHOST_NET_SET_BACKEND) call, and retrieving\n socket name in a kernel stack variable via\n get_raw_socket(). A user able to perform ioctl(2) calls\n on the '/dev/vhost-net' device may use this flaw to\n crash the kernel resulting in DoS\n issue.(CVE-2020-10942)A flaw was found in the Linux\n kernel's implementation of the pivot_root syscall. This\n flaw allows a local privileged user (root outside or\n root inside a privileged container) to exploit a race\n condition to manipulate the reference count of the root\n filesystem. To be able to abuse this flaw, the process\n or user calling pivot_root must have advanced\n permissions. The highest threat from this vulnerability\n is to system availability.(CVE-2020-12114)A\n use-after-free flaw was found in usb_sg_cancel in\n drivers/usb/core/message.c in the USB core subsystem.\n This flaw allows a local attacker with a special user\n or root privileges to crash the system due to a race\n problem in the scatter-gather cancellation and transfer\n completion in usb_sg_wait. This vulnerability can also\n lead to a leak of internal kernel\n information.(CVE-2020-12464)A memory overflow and data\n corruption flaw were found in the Mediatek MT76 driver\n module for WiFi in mt76_add_fragment in\n driverset/wireless/mediatek/mt76/dma.c. An oversized\n packet with too many rx fragments causes an overflow\n and corruption in memory of adjacent pages. A local\n attacker with a special user or root privileges can\n cause a denial of service or a leak of internal kernel\n information.(CVE-2020-12465)A vulnerability was found\n in __mptctl_ioctl in drivers/message/fusion/mptctl.c in\n Fusion MPT base driver 'mptctl' in the SCSI device\n module, where an incorrect lock leads to a race\n problem. This flaw allows an attacker with local access\n and special user (or root) privileges to cause a denial\n of service.(CVE-2020-12652)A flaw was found in the way\n the mwifiex_cmd_append_vsie_tlv() in Linux kernel's\n Marvell WiFi-Ex driver handled vendor specific\n information elements. A local user could use this flaw\n to escalate their privileges on the\n system.(CVE-2020-12653)A flaw was found in the Linux\n kernel. The Marvell mwifiex driver allows a remote WiFi\n access point to trigger a heap-based memory buffer\n overflow due to an incorrect memcpy operation. The\n highest threat from this vulnerability is to data\n integrity and system availability.(CVE-2020-12654)A\n flaw was discovered in the XFS source in the Linux\n kernel. This flaw allows an attacker with the ability\n to mount an XFS filesystem, to trigger a denial of\n service while attempting to sync a file located on an\n XFS v5 image with crafted metadata.(CVE-2020-12655)An\n out-of-bounds (OOB) memory access flaw was found in the\n Network XDP (the eXpress Data Path) module in the Linux\n kernel's xdp_umem_reg function in net/xdp/xdp_umem.c.\n When a user with special user privilege of\n CAP_NET_ADMIN (or root) calls setsockopt to register\n umem ring on XDP socket, passing the headroom value\n larger than the available space in the chunk, it leads\n to an out-of-bounds write, causing panic or possible\n memory corruption. This flaw may lead to privilege\n escalation if a local end-user is granted permission to\n influence the execution of code in this\n manner.(CVE-2020-12659)A vulnerability was found in\n sg_write in drivers/scsi/sg.c in the SCSI generic (sg)\n driver subsystem. This flaw allows an attacker with\n local access and special user or root privileges to\n cause a denial of service if the allocated list is not\n cleaned with an invalid (Sg_fd * sfp) pointer at the\n time of failure, also possibly causing a kernel\n internal information leak problem.(CVE-2020-12770)An\n issue was discovered in the Linux kernel through\n 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c\n has a deadlock if a coalescing operation\n fails.(CVE-2020-12771)A flaw was found in the Linux\n kernel loose validation of child/parent process\n identification handling while filtering signal\n handlers. A local attacker is able to abuse this flaw\n to bypass checks to send any signal to a privileged\n process.(CVE-2020-12826)A flaw was found in the Linux\n kernel, where it allows userspace processes, for\n example, a guest VM, to directly access h/w devices via\n its VFIO driver modules. The VFIO modules allow users\n to enable or disable access to the devices' MMIO memory\n address spaces. If a user attempts to access the\n read/write devices' MMIO address space when it is\n disabled, some h/w devices issue an interrupt to the\n CPU to indicate a fatal error condition, crashing the\n system. This flaw allows a guest user or process to\n crash the host system resulting in a denial of\n service.(CVE-2020-12888)gadget_dev_desc_UDC_store in\n drivers/usb/gadget/configfs.c in the Linux kernel\n through 5.6.13 relies on kstrdup without considering\n the possibility of an internal '\\0' value, which allows\n attackers to trigger an out-of-bounds read, aka\n CID-15753588bcd4.(CVE-2020-13143)** DISPUTED ** An\n issue was discovered in the Linux kernel through 5.7.1.\n drivers/tty/vt/keyboard.c has an integer overflow if\n k_ascii is called several times in a row, aka\n CID-b86dab054059. NOTE: Members in the community argue\n that the integer overflow does not lead to a security\n issue in this case.(CVE-2020-13974)A use-after-free\n flaw was found in slcan_write_wakeup in\n driverset/can/slcan.c in the serial CAN module slcan. A\n race condition occurs when communicating with can using\n slcan between the write (scheduling the transmit) and\n closing (flushing out any pending queues) the SLCAN\n channel. This flaw allows a local attacker with special\n user or root privileges to cause a denial of service or\n a kernel information leak. The highest threat from this\n vulnerability is to system\n availability.(CVE-2020-14416)In the Linux kernel\n through 5.7.6, usbtest_disconnect in\n drivers/usb/misc/usbtest.c has a memory leak, aka\n CID-28ebeb8db770.(CVE-2020-15393)The Linux kernel\n through 5.7.11 allows remote attackers to make\n observations that help to obtain sensitive information\n about the internal state of the network RNG, aka\n CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and\n kernel/time/timer.c.(CVE-2020-16166)A flaw was found in\n the Linux kernel's implementation of Userspace core\n dumps. This flaw allows an attacker with a local\n account to crash a trivial program and exfiltrate\n private kernel data.(CVE-2020-10732)A flaw null pointer\n dereference in the Linux kernel cgroupv2 subsystem in\n versions before 5.7.10 was found in the way when reboot\n the system. A local user could use this flaw to crash\n the system or escalate their privileges on the\n system.(CVE-2020-14356)The Linux kernel 4.9.x before\n 4.9.233, 4.14.x before 4.14.194, and 4.19.x before\n 4.19.140 has a use-after-free because skcd->no_refcnt\n was not considered during a backport of a\n CVE-2020-14356 patch. This is related to the cgroups\n feature.(CVE-2020-25220)get_gate_page in mm/gup.c in\n the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows\n privilege escalation because of incorrect reference\n counting (caused by gate page mishandling) of the\n struct page that backs the vsyscall page. The result is\n a refcount underflow. This can be triggered by any\n 64-bit process that can use ptrace() or\n process_vm_readv(), aka\n CID-9fa2dd946743.(CVE-2020-25221)In the Linux kernel\n through 5.8.7, local attackers able to inject conntrack\n netlink configuration could overflow a local buffer,\n causing crashes or triggering use of incorrect protocol\n numbers in ctnetlink_parse_tuple_filter in\n net/netfilter/nf_conntrack_netlink.c, aka\n CID-1cc5ef91d2ff.(CVE-2020-25211)A buffer over-read\n flaw was found in RH kernel versions before 5.0 in\n crypto_authenc_extractkeys in crypto/authenc.c in the\n IPsec Cryptographic algorithm's module, authenc. When a\n payload longer than 4 bytes, and is not following\n 4-byte alignment boundary guidelines, it causes a\n buffer over-read threat, leading to a system crash.\n This flaw allows a local attacker with user privileges\n to cause a denial of service.(CVE-2020-10769)A flaw was\n found in the Linux kernel's implementation of the\n invert video code on VGA consoles when a local attacker\n attempts to resize the console, calling an ioctl\n VT_RESIZE, which causes an out-of-bounds write to\n occur. This flaw allows a local user with access to the\n VGA console to crash the system, potentially escalating\n their privileges on the system. The highest threat from\n this vulnerability is to data confidentiality and\n integrity as well as system\n availability.(CVE-2020-14331)In cdev_get of char_dev.c,\n there is a possible use-after-free due to a race\n condition. This could lead to local escalation of\n privilege with System execution privileges needed. User\n interaction is not needed for exploitation.Product:\n AndroidVersions: Android-10Android ID:\n A-153467744(CVE-2020-0305)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1958\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ea61decf\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-13974\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.2.0\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.2.0\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-4.19.36-vhulk1907.1.0.h820\",\n \"kernel-devel-4.19.36-vhulk1907.1.0.h820\",\n \"kernel-headers-4.19.36-vhulk1907.1.0.h820\",\n \"kernel-tools-4.19.36-vhulk1907.1.0.h820\",\n \"kernel-tools-libs-4.19.36-vhulk1907.1.0.h820\",\n \"kernel-tools-libs-devel-4.19.36-vhulk1907.1.0.h820\",\n \"perf-4.19.36-vhulk1907.1.0.h820\",\n \"python-perf-4.19.36-vhulk1907.1.0.h820\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:22:35", "description": "The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n\nCVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\nCVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n\nCVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n\nCVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n\nCVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n\nCVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n\nCVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n\nCVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n\nCVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n\nCVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n\nCVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n\nCVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n\nCVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).\n\nCVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n\nCVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n\nCVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n\nCVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n\nCVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n\nCVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n\nCVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n\nCVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n\nCVE-2019-20806: Fixed a NULL pointer dereference which may had lead to denial of service (bsc#1172199).\n\nCVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n\nCVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\nCVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-08T00:00:00", "type": "nessus", "title": "SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2487-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-1000199", "CVE-2019-19462", "CVE-2019-20806", "CVE-2019-20810", "CVE-2019-20812", "CVE-2019-20908", "CVE-2019-9455", "CVE-2020-0305", "CVE-2020-0543", "CVE-2020-10135", "CVE-2020-10690", "CVE-2020-10711", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-11669", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12656", "CVE-2020-12657", "CVE-2020-12659", "CVE-2020-12769", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2022-05-12T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt", "p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt-debuginfo", "p-cpe:/a:novell:suse_linux:dlm-kmp-rt", "p-cpe:/a:novell:suse_linux:dlm-kmp-rt-debuginfo", "p-cpe:/a:novell:suse_linux:gfs2-kmp-rt", "p-cpe:/a:novell:suse_linux:gfs2-kmp-rt-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt", "p-cpe:/a:novell:suse_linux:kernel-rt-base", "p-cpe:/a:novell:suse_linux:kernel-rt-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt-debugsource", "p-cpe:/a:novell:suse_linux:kernel-rt-devel", "p-cpe:/a:novell:suse_linux:kernel-rt-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-debugsource", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-syms-rt", "p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt", "p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2487-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140378", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2487-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140378);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/12\");\n\n script_cve_id(\n \"CVE-2018-1000199\",\n \"CVE-2019-9455\",\n \"CVE-2019-19462\",\n \"CVE-2019-20806\",\n \"CVE-2019-20810\",\n \"CVE-2019-20812\",\n \"CVE-2019-20908\",\n \"CVE-2020-0305\",\n \"CVE-2020-0543\",\n \"CVE-2020-10135\",\n \"CVE-2020-10690\",\n \"CVE-2020-10711\",\n \"CVE-2020-10720\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-10757\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-10769\",\n \"CVE-2020-10773\",\n \"CVE-2020-10781\",\n \"CVE-2020-11669\",\n \"CVE-2020-12114\",\n \"CVE-2020-12464\",\n \"CVE-2020-12652\",\n \"CVE-2020-12653\",\n \"CVE-2020-12654\",\n \"CVE-2020-12655\",\n \"CVE-2020-12656\",\n \"CVE-2020-12657\",\n \"CVE-2020-12659\",\n \"CVE-2020-12769\",\n \"CVE-2020-12771\",\n \"CVE-2020-12888\",\n \"CVE-2020-13143\",\n \"CVE-2020-13974\",\n \"CVE-2020-14416\",\n \"CVE-2020-15393\",\n \"CVE-2020-15780\"\n );\n\n script_name(english:\"SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2487-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth BR/EDR Core Specification v5.2 and earlier\nmay have allowed an unauthenticated user to complete authentication\nwithout pairing credentials via adjacent access. An unauthenticated,\nadjacent attacker could impersonate a Bluetooth BR/EDR master or slave\nto pair with a previously paired remote device to successfully\ncomplete the authentication procedure without knowing the link key\n(bnc#1171988).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c\nwhere incorrect access permissions for the efivar_ssdt ACPI variable\ncould be used by attackers to bypass lockdown or secure boot\nrestrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-10781: zram sysfs resource consumption was fixed\n(bnc#1173074).\n\nCVE-2020-15780: An issue was discovered in\ndrivers/acpi/acpi_configfs.c where injection of malicious ACPI tables\nvia configfs could be used by attackers to bypass lockdown and secure\nboot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a\nmemory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a\ndeadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in\ncrypto_authenc_extractkeys in crypto/authenc.c in the IPsec\nCryptographic algorithm's module, authenc. When a payload longer than\n4 bytes, and is not following 4-byte alignment boundary guidelines, it\ncauses a buffer over-read threat, leading to a system crash. This flaw\nallowed a local attacker with user privileges to cause a denial of\nservice (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was\nfixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the\nslip and slcan line discipline could lead to a use-after-free, aka\nCID-0ace17d56824. This affects drivers/net/slip/slip.c and\ndrivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local\naccount to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction\nBarrier was disabled in certain circumstances, leaving the system open\nto a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where\nindirect branch speculation could be enabled even though it was\ndiabled before (bnc#1172783).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c,\nif k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-0543: Fixed a side channel attack against special registers\nwhich could have resulted in leaking of read values to cores other\nthan the one which called it. This attack is known as Special Register\nBuffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\nCVE-2020-13143: Fixed an out-of-bounds read in\ngadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c\n(bsc#1171982).\n\nCVE-2020-12769: Fixed an issue which could have allowed attackers to\ncause a panic via concurrent calls to dw_spi_irq and\ndw_spi_transfer_one (bsc#1171983).\n\nCVE-2020-12659: Fixed an out-of-bounds write (by a user with the\nCAP_NET_ADMIN capability) due to improper headroom validation\n(bsc#1171214).\n\nCVE-2020-12657: An a use-after-free in block/bfq-iosched.c\n(bsc#1171205).\n\nCVE-2020-12656: Fixed an improper handling of certain domain_release\ncalls leadingch could have led to a memory leak (bsc#1171219).\n\nCVE-2020-12655: Fixed an issue which could have allowed attackers to\ntrigger a sync of excessive duration via an XFS v5 image with crafted\nmetadata (bsc#1171217).\n\nCVE-2020-12654: Fixed an issue in he wifi driver which could have\nallowed a remote AP to trigger a heap-based buffer overflow\n(bsc#1171202).\n\nCVE-2020-12653: Fixed an issue in the wifi driver which could have\nallowed local users to gain privileges or cause a denial of service\n(bsc#1171195).\n\nCVE-2020-12652: Fixed an issue which could have allowed local users to\nhold an incorrect lock during the ioctl operation and trigger a race\ncondition (bsc#1171218).\n\nCVE-2020-12464: Fixed a use-after-free due to a transfer without a\nreference (bsc#1170901).\n\nCVE-2020-12114: Fixed a pivot_root race condition which could have\nallowed local users to cause a denial of service (panic) by corrupting\na mountpoint reference counter (bsc#1171098).\n\nCVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S\ndid not have save/restore functionality for PNV_POWERSAVE_AMR,\nPNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).\n\nCVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon\nmmap could have caused user PTE access (bsc#1172317).\n\nCVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\nwhere it was assumed that an skb would only contain a single netlink\nmessage (bsc#1171189).\n\nCVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\nuninitialized data (bsc#1171220).\n\nCVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n(bsc#1170778).\n\nCVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem\nwhich could have allowed a remote network user to crash the kernel\nresulting in a denial of service (bsc#1171191).\n\nCVE-2020-10690: Fixed the race between the release of ptp_clock and\ncdev (bsc#1170056).\n\nCVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\nvideo driver. This could lead to local information disclosure with\nSystem execution privileges needed (bsc#1170345).\n\nCVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which\ncould have resulted in a denial of service (bsc#1172453).\n\nCVE-2019-20806: Fixed a NULL pointer dereference which may had lead to\ndenial of service (bsc#1172199).\n\nCVE-2019-19462: Fixed an issue which could have allowed local user to\ncause denial of service (bsc#1158265).\n\nCVE-2019-20810: go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a\nfailure path, which caused a memory leak, aka CID-9453264ef586\n(bnc#1172458).\n\nCVE-2018-1000199: Fixed a potential local code execution via ptrace\n(bsc#1089895).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1082555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083647\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1089895\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1090036\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103990\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103991\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103992\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104745\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109837\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124278\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127354\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127355\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127371\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137325\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1142685\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1145929\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1150660\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151794\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151927\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152489\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152624\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154824\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1157169\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158265\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159037\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159058\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159199\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160388\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160947\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1161016\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162063\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163309\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163403\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163897\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164871\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165183\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165478\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165741\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166860\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166861\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166862\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166864\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166866\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166867\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166870\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166940\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166969\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166978\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166985\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167104\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167288\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167574\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167851\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167867\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168081\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168202\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168332\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168486\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168670\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168760\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168762\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168763\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168764\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168765\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168789\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168881\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168884\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168952\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168959\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169020\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169057\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169194\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169390\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169525\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169762\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169771\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169795\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170056\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170125\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170145\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170345\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170442\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170457\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170522\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170592\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170620\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170621\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170770\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170778\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170791\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170901\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171078\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171098\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171118\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171124\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171195\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171202\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171205\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171214\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171217\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171218\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171244\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171417\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171424\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171527\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171529\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171530\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171599\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171601\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171602\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171604\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171605\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171606\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171607\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171608\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171609\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171610\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171611\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171612\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171613\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171614\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171615\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171618\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171619\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171620\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171621\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171622\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171623\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171624\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171626\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171662\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171679\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171691\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171692\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171694\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171695\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171736\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171743\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171753\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171759\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171817\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171835\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171841\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171904\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171948\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171949\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171951\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171952\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171979\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171982\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172096\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172097\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172098\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172099\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172101\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172102\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172103\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172104\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172127\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172130\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172185\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172188\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172199\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172201\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172202\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172221\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172249\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172251\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172257\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172317\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172342\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172366\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172378\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172391\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172397\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172453\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172537\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172538\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172687\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172719\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172759\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173074\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173146\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173265\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173567\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173746\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173818\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173820\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173825\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173826\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173833\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173838\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173839\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173845\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173857\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174113\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174122\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174123\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174186\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174187\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174296\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174356\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174409\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174438\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-1000199/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19462/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20806/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20810/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20812/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20908/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-9455/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-0305/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-0543/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10135/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10690/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10711/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10720/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10732/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10751/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10757/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10766/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10767/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10768/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10769/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10773/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10781/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-11669/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12114/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12464/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12652/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12653/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12654/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12655/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12656/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12657/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12659/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12769/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12771/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12888/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13143/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13974/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-14416/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-15393/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-15780/\");\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202487-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7934daea\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Realtime 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-RT-15-SP1-2020-2487=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-13974\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:dlm-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:dlm-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gfs2-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gfs2-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global