A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
{"nessus": [{"lastseen": "2023-10-21T15:34:20", "description": "It was discovered that the cgroup v2 subsystem in the Linux kernel did not properly perform reference counting in some situations, leading to a NULL pointer dereference. A local attacker could use this to cause a denial of service or possibly gain administrative privileges.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-02T00:00:00", "type": "nessus", "title": "Ubuntu 18.04 LTS : Linux kernel vulnerability (USN-4484-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-14356"], "modified": "2023-10-21T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3.0-1032-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3.0-1034-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3.0-1034-gke", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3.0-66-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3.0-66-lowlatency", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts"], "id": "UBUNTU_USN-4484-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140182", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4484-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140182);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/21\");\n\n script_cve_id(\"CVE-2020-14356\");\n script_xref(name:\"USN\", value:\"4484-1\");\n\n script_name(english:\"Ubuntu 18.04 LTS : Linux kernel vulnerability (USN-4484-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"It was discovered that the cgroup v2 subsystem in the Linux kernel did\nnot properly perform reference counting in some situations, leading to\na NULL pointer dereference. A local attacker could use this to cause a\ndenial of service or possibly gain administrative privileges.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-4484-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14356\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3.0-1032-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3.0-1034-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3.0-1034-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3.0-66-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3.0-66-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2020-2023 Canonical, Inc. / NASL script (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\ninclude('ksplice.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('18.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 18.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar kernel_mappings = {\n '18.04': {\n '5.3.0': {\n 'generic': '5.3.0-66',\n 'lowlatency': '5.3.0-66',\n 'raspi2': '5.3.0-1032',\n 'aws': '5.3.0-1034',\n 'gke': '5.3.0-1034'\n }\n }\n};\n\nvar host_kernel_release = get_kb_item_or_exit('Host/uname-r');\nvar host_kernel_version = get_kb_item_or_exit('Host/Debian/kernel-version');\nvar host_kernel_base_version = get_kb_item_or_exit('Host/Debian/kernel-base-version');\nvar host_kernel_type = get_kb_item_or_exit('Host/Debian/kernel-type');\nif(empty_or_null(kernel_mappings[os_release][host_kernel_base_version][host_kernel_type])) audit(AUDIT_INST_VER_NOT_VULN, 'kernel ' + host_kernel_release);\n\nvar extra = '';\nvar kernel_fixed_version = kernel_mappings[os_release][host_kernel_base_version][host_kernel_type];\nif (deb_ver_cmp(ver1:host_kernel_version, ver2:kernel_fixed_version) < 0)\n{\n extra = extra + 'Running Kernel level of ' + host_kernel_version + ' does not meet the minimum fixed level of ' + kernel_fixed_version + ' for this advisory.\\n\\n';\n}\n else\n{\n audit(AUDIT_PATCH_INSTALLED, 'Kernel package for USN-4484-1');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n var cve_list = make_list('CVE-2020-14356');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for USN-4484-1');\n }\n else\n {\n extra = extra + ksplice_reporting_text();\n }\n}\nif (extra) {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:22:56", "description": "An update of the linux package has been released.", "cvss3": {}, "published": "2020-09-21T00:00:00", "type": "nessus", "title": "Photon OS 2.0: Linux PHSA-2020-2.0-0283", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-14356"], "modified": "2020-09-22T00:00:00", "cpe": ["p-cpe:/a:vmware:photonos:linux", "cpe:/o:vmware:photonos:2.0"], "id": "PHOTONOS_PHSA-2020-2_0-0283_LINUX.NASL", "href": "https://www.tenable.com/plugins/nessus/140709", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from VMware Security Advisory PHSA-2020-2.0-0283. The text\n# itself is copyright (C) VMware, Inc.\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140709);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/22\");\n\n script_cve_id(\"CVE-2020-14356\");\n\n script_name(english:\"Photon OS 2.0: Linux PHSA-2020-2.0-0283\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote PhotonOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update of the linux package has been released.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/vmware/photon/wiki/Security-Updates-2-283.md\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected Linux packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14356\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:vmware:photonos:linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:photonos:2.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"PhotonOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/PhotonOS/release\", \"Host/PhotonOS/rpm-list\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item('Host/PhotonOS/release');\nif (isnull(release) || release !~ \"^VMware Photon\") audit(AUDIT_OS_NOT, 'PhotonOS');\nif (release !~ \"^VMware Photon (?:Linux|OS) 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, 'PhotonOS 2.0');\n\nif (!get_kb_item('Host/PhotonOS/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'PhotonOS', cpu);\n\nflag = 0;\n\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-aws-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-aws-devel-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-aws-docs-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-aws-drivers-gpu-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-aws-oprofile-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-aws-sound-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-devel-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-docs-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-drivers-gpu-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-esx-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-esx-devel-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-esx-docs-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-oprofile-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-secure-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-secure-devel-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-secure-docs-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-secure-lkcm-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-sound-4.9.228-6.ph2')) flag++;\nif (rpm_check(release:'PhotonOS-2.0', cpu:'x86_64', reference:'linux-tools-4.9.228-6.ph2')) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'linux');\n}\n\n\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:09:20", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.(CVE-2020-14356)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.(CVE-2020-16166)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-28T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP8 : kernel (EulerOS-SA-2020-1859)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-14356", "CVE-2020-16166"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:bpftool", "p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-source", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "p-cpe:/a:huawei:euleros:python3-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2020-1859.NASL", "href": "https://www.tenable.com/plugins/nessus/139962", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(139962);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2020-14356\",\n \"CVE-2020-16166\"\n );\n\n script_name(english:\"EulerOS 2.0 SP8 : kernel (EulerOS-SA-2020-1859)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - A flaw null pointer dereference in the Linux kernel\n cgroupv2 subsystem in versions before 5.7.10 was found\n in the way when reboot the system. A local user could\n use this flaw to crash the system or escalate their\n privileges on the system.(CVE-2020-14356)\n\n - The Linux kernel through 5.7.11 allows remote attackers\n to make observations that help to obtain sensitive\n information about the internal state of the network\n RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and\n kernel/time/timer.c.(CVE-2020-16166)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1859\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?99aaf736\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/28\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python3-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(8)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"bpftool-4.19.36-vhulk1907.1.0.h821.eulerosv2r8\",\n \"kernel-4.19.36-vhulk1907.1.0.h821.eulerosv2r8\",\n \"kernel-devel-4.19.36-vhulk1907.1.0.h821.eulerosv2r8\",\n \"kernel-headers-4.19.36-vhulk1907.1.0.h821.eulerosv2r8\",\n \"kernel-source-4.19.36-vhulk1907.1.0.h821.eulerosv2r8\",\n \"kernel-tools-4.19.36-vhulk1907.1.0.h821.eulerosv2r8\",\n \"kernel-tools-libs-4.19.36-vhulk1907.1.0.h821.eulerosv2r8\",\n \"perf-4.19.36-vhulk1907.1.0.h821.eulerosv2r8\",\n \"python-perf-4.19.36-vhulk1907.1.0.h821.eulerosv2r8\",\n \"python3-perf-4.19.36-vhulk1907.1.0.h821.eulerosv2r8\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"8\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:07:42", "description": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14314: Fixed a potential negative array index in ext4 (bsc#1173798).\n\nCVE-2020-14331: Fixed a missing check in scrollback handling (bsc#1174205 bsc#1174247).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in the cgroupv2 subsystem (bsc#1175213).\n\nCVE-2020-16166: Fixed an information leak in the network RNG (bsc#1174757).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-04T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2486-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-16166"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-preempt", "p-cpe:/a:novell:suse_linux:kernel-preempt-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-preempt-debugsource", "p-cpe:/a:novell:suse_linux:kernel-preempt-devel", "p-cpe:/a:novell:suse_linux:kernel-preempt-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2486-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140264", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2486-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(140264);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-16166\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2486-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14314: Fixed a potential negative array index in ext4\n(bsc#1173798).\n\nCVE-2020-14331: Fixed a missing check in scrollback handling\n(bsc#1174205 bsc#1174247).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in the cgroupv2\nsubsystem (bsc#1175213).\n\nCVE-2020-16166: Fixed an information leak in the network RNG\n(bsc#1174757).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1149032\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152472\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152489\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1153274\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154353\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154488\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154492\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1156395\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160634\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167773\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171634\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171688\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172108\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172197\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173468\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173485\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173813\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174003\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174026\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174362\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174387\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174689\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174699\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174737\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174777\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174824\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174865\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174880\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174897\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174969\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175009\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175010\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175012\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175013\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175014\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175015\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175017\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175019\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175052\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175116\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175175\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175176\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175180\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175181\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175182\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175183\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175184\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175186\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175187\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175188\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175190\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175191\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175192\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175195\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175232\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175345\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175346\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175347\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175367\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175377\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175440\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175493\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175546\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175691\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175768\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175769\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175774\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175834\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14314/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14356/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-16166/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202486-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?67bd8b21\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Product-WE-15-SP2-2020-2486=1\n\nSUSE Linux Enterprise Module for Live Patching 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2020-2486=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2020-2486=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP2 :\n\nzypper in -t patch\nSUSE-SLE-Module-Development-Tools-15-SP2-2020-2486=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-2486=1\n\nSUSE Linux Enterprise High Availability 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Product-HA-15-SP2-2020-2486=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/07/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP2\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debuginfo-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debugsource-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-base-5.3.18-24.12.1.9.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-debuginfo-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-debugsource-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-devel-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-devel-debuginfo-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-obs-build-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-obs-build-debugsource-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-syms-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"reiserfs-kmp-default-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"reiserfs-kmp-default-debuginfo-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debuginfo-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debugsource-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-base-5.3.18-24.12.1.9.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-debuginfo-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-debugsource-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-devel-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-devel-debuginfo-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-obs-build-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-obs-build-debugsource-5.3.18-24.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-syms-5.3.18-24.12.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:51", "description": "The SUSE Linux Enterprise 15 SP1 realtime kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-12-09T00:00:00", "type": "nessus", "title": "SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2631-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-16166", "CVE-2020-24394"], "modified": "2020-12-11T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt", "p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt-debuginfo", "p-cpe:/a:novell:suse_linux:dlm-kmp-rt", "p-cpe:/a:novell:suse_linux:dlm-kmp-rt-debuginfo", "p-cpe:/a:novell:suse_linux:gfs2-kmp-rt", "p-cpe:/a:novell:suse_linux:gfs2-kmp-rt-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt", "p-cpe:/a:novell:suse_linux:kernel-rt-base", "p-cpe:/a:novell:suse_linux:kernel-rt-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt-debugsource", "p-cpe:/a:novell:suse_linux:kernel-rt-devel", "p-cpe:/a:novell:suse_linux:kernel-rt-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-debugsource", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-syms-rt", "p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt", "p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2631-1.NASL", "href": "https://www.tenable.com/plugins/nessus/143833", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2631-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(143833);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/11\");\n\n script_cve_id(\"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-16166\", \"CVE-2020-24394\");\n\n script_name(english:\"SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2631-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 15 SP1 realtime kernel was updated to\nreceive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14314: Fixed a potential negative array index in do_split()\n(bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem\nwhich could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling\n(bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed\nremote attackers to make observations that help to obtain sensitive\ninformation about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions\non new filesystem objects when the filesystem lacks ACL support\n(bsc#1175518).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1074701\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085235\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1087078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1100394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102640\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171688\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172108\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173485\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174003\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174026\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174070\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174161\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174298\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174387\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174547\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174685\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174689\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174699\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174734\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174844\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174926\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174968\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175064\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175065\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175067\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175228\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175232\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175396\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175397\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175398\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175399\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175400\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175402\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175403\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175404\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175405\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175406\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175410\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175414\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175415\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175416\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175419\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175420\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175421\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175422\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175423\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175440\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175493\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175515\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175526\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175668\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175669\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175767\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175768\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175769\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175992\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14314/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14356/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-16166/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-24394/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202631-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?15652cc4\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Realtime 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-RT-15-SP1-2020-2631=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:dlm-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:dlm-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gfs2-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gfs2-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/07/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cluster-md-kmp-rt-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cluster-md-kmp-rt-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"dlm-kmp-rt-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"dlm-kmp-rt-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"gfs2-kmp-rt-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"gfs2-kmp-rt-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-base-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-base-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-debugsource-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-devel-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-devel-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt_debug-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt_debug-debugsource-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt_debug-devel-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt_debug-devel-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-syms-rt-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"ocfs2-kmp-rt-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"ocfs2-kmp-rt-debuginfo-4.12.14-14.31.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:07:40", "description": "The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2018-3639: Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may have allowed unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bnc#1085308 bnc#1087082 bnc#1172782 bnc#1172783). Mitigations for Arm had not been included yet.\n\n - CVE-2020-14314: Fixed potential negative array index in do_split() (bsc#1173798).\n\n - CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).\n\n - CVE-2020-14356: A flaw NULL pointer dereference in the Linux kernel cgroupv2 subsystem in versions was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system (bnc#1175213).\n\n - CVE-2020-1749: Some ipv6 protocols were not encrypted over ipsec tunnels (bsc#1165629).\n\n - CVE-2020-24394: fs/nfsd/vfs.c (in the NFS server) could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131.\n This occurs because the current umask is not considered (bnc#1175518).\n\nThe following non-security bugs were fixed :\n\n - ACPI: kABI fixes for subsys exports (bsc#1174968).\n\n - ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).\n\n - ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).\n\n - ACPI: PM: Introduce 'poweroff' callbacks for ACPI PM domain and LPSS (bsc#1174968).\n\n - ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).\n\n - af_key: pfkey_dump needs parameter validation (git-fixes).\n\n - agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n\n - ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).\n\n - ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).\n\n - ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).\n\n - ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).\n\n - ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).\n\n - ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).\n\n - ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).\n\n - ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).\n\n - ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).\n\n - ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).\n\n - ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).\n\n - ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).\n\n - ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).\n\n - ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).\n\n - ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).\n\n - ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).\n\n - ALSA: pci: delete repeated words in comments (bsc#1111666).\n\n - ALSA: seq: oss: Serialize ioctls (bsc#1111666).\n\n - ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).\n\n - ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).\n\n - ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).\n\n - ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).\n\n - ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).\n\n - ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).\n\n - ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).\n\n - ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n\n - ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (bsc#1111666).\n\n - ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).\n\n - ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).\n\n - ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).\n\n - ALSA: usb/line6: remove 'defined but not used' warning (bsc#1111666).\n\n - arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).\n\n - arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).\n\n - arm64: add sysfs vulnerability show for meltdown (bsc#1174547).\n\n - arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).\n\n - arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).\n\n - arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).\n\n - arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547)\n\n - arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).\n\n - arm64: Always enable ssb vulnerability detection (bsc#1174547).\n\n - arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).\n\n - arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).\n\n - arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).\n\n - arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).\n\n - arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).\n\n - arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).\n\n - arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default\n\n - arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).\n\n - arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).\n\n - arm64: errata: Update stale comment (bsc#1174547).\n\n - arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).\n\n - arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).\n\n - arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).\n\n - arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).\n\n - arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).\n\n - arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).\n\n - arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).\n\n - arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).\n\n - arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).\n\n - arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).\n\n - arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).\n\n - arm64/speculation: Support 'mitigations=' cmdline option (bsc#1174547).\n\n - arm64: ssbd: explicitly depend on <linux/prctl.h> (bsc#1175399).\n\n - arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).\n\n - arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).\n\n - arm64/sve: <uapi/asm/ptrace.h> should not depend on <uapi/linux/prctl.h> (bsc#1175401).\n\n - arm64/sve: Fix wrong free for task->thread.sve_state (bsc#1175400).\n\n - arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).\n\n - arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).\n\n - ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).\n\n - ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).\n\n - ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).\n\n - ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).\n\n - ASoC: intel: Fix memleak in sst_media_open (git-fixes).\n\n - ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n\n - AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n\n - AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n\n - AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n\n - ax88172a: fix ax88172a_unbind() failures (git-fixes).\n\n - b43: Remove uninitialized_var() usage (git-fixes).\n\n - bcache: allocate meta data pages as compound pages (bsc#1172873).\n\n - block: check queue's limits.discard_granularity in\n __blkdev_issue_discard() (bsc#1152148).\n\n - block: improve discard bio alignment in\n __blkdev_issue_discard() (bsc#1152148).\n\n - Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).\n\n - Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).\n\n - Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).\n\n - bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n\n - bonding: fix a potential double-unregister (git-fixes).\n\n - bonding: show saner speed for broadcast mode (git-fixes).\n\n - bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).\n\n - brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).\n\n - brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).\n\n - brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).\n\n - btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n\n - btrfs: fix block group leak when removing fails (bsc#1175149).\n\n - btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n\n - btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n\n - btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n\n - btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n\n - btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n\n - btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).\n\n - btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n\n - btrfs: fix race between block group removal and block group creation (bsc#1175149).\n\n - btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n\n - btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n\n - btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n\n - btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n\n - btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).\n\n - btrfs: Rename and export clear_btree_io_tree (bsc#1175149).\n\n - btrfs: treat RWF_(,D)SYNC writes as sync for CRCs (bsc#1175493).\n\n - cfg80211: check vendor command doit pointer before use (git-fixes).\n\n - char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).\n\n - cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).\n\n - cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).\n\n - cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).\n\n - cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).\n\n - cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).\n\n - cifs: merge __(cifs,smb2)_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).\n\n - cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).\n\n - cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).\n\n - cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).\n\n - clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).\n\n - clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).\n\n - clk: iproc: round clock rate to the closest (bsc#1111666).\n\n - clk: spear: Remove uninitialized_var() usage (git-fixes).\n\n - clk: st: Remove uninitialized_var() usage (git-fixes).\n\n - console: newport_con: fix an issue about leak related system resources (git-fixes).\n\n - crypto: ccp - Fix use of merged scatterlists (git-fixes).\n\n - crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n\n - crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n\n - dev: Defer free of skbs in flush_backlog (git-fixes).\n\n - device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).\n\n - devres: keep both device name and resource name in pretty name (git-fixes).\n\n - dlm: Fix kobject memleak (bsc#1175768).\n\n - dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n\n - Documentation/networking: Add net DIM documentation (bsc#1174852).\n\n - dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (bsc#1175403).\n\n - dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).\n\n - dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).\n\n - dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).\n\n - dpaa_eth: add newline in dev_err() msg (bsc#1174550).\n\n - dpaa_eth: avoid timestamp read on error paths (bsc#1175406).\n\n - dpaa_eth: change DMA device (bsc#1174550).\n\n - dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).\n\n - dpaa_eth: defer probing after qbman (bsc#1174550).\n\n - dpaa_eth: extend delays in ndo_stop (bsc#1174550).\n\n - dpaa_eth: fix DMA mapping leak (bsc#1174550).\n\n - dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).\n\n - dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).\n\n - dpaa_eth: perform DMA unmapping before read (bsc#1175407).\n\n - dpaa_eth: register a device link for the qman portal used (bsc#1174550).\n\n - dpaa_eth: remove netdev_err() for user errors (bsc#1174550).\n\n - dpaa_eth: remove redundant code (bsc#1174550).\n\n - dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).\n\n - dpaa_eth: use a page to store the SGT (bsc#1174550).\n\n - dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).\n\n - dpaa_eth: use only one buffer pool per interface (bsc#1174550).\n\n - dpaa_eth: use page backed rx buffers (bsc#1174550).\n\n - driver core: Avoid binding drivers to dead devices (git-fixes).\n\n - Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).\n\n - Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).\n\n - Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).\n\n - Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).\n\n - drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).\n\n - drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).\n\n - drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).\n\n - drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).\n\n - drm/amd/display: fix pow() crashing when given base 0 (git-fixes).\n\n - drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).\n\n - drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).\n\n - drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956)\n\n - drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n\n - drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)\n\n - drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n\n - drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956)\n\n - drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n\n - drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956)\n\n - drm/debugfs: fix plain echo to connector 'force' attribute (bsc#1111666).\n\n - drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n\n - drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).\n\n - drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178)\n\n - drm: hold gem reference until object is no longer accessed (bsc#1113956)\n\n - drm/imx: fix use after free (git-fixes).\n\n - drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).\n\n - drm/imx: tve: fix regulator_disable error path (git-fixes).\n\n - drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n\n - drm/msm/adreno: fix updating ring fence (git-fixes).\n\n - drm/msm: ratelimit crtc event overflow error (bsc#1111666).\n\n - drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n\n - drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n\n - drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).\n\n - drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n\n - drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n\n - drm/radeon: disable AGP by default (bsc#1111666).\n\n - drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n\n - drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).\n\n - drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).\n\n - drm/tilcdc: fix leak & null ref in panel_connector_get_modes (bsc#1111666).\n\n - drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).\n\n - drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).\n\n - drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).\n\n - drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).\n\n - ext4: check journal inode extents more carefully (bsc#1173485).\n\n - ext4: do not allow overlapping system zones (bsc#1173485).\n\n - ext4: fix checking of directory entry validity for inline directories (bsc#1175771).\n\n - ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n\n - fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins. (bsc#1112178) \n\n - firmware: google: check if size is valid when decoding VPD data (git-fixes).\n\n - firmware: google: increment VPD key_len properly (git-fixes).\n\n - fsl/fman: add API to get the device behind a fman port (bsc#1174550).\n\n - fsl/fman: check dereferencing NULL pointer (git-fixes).\n\n - fsl/fman: detect FMan erratum A050385 (bsc#1174550).\n\n - fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).\n\n - fsl/fman: fix dereference null return value (git-fixes).\n\n - fsl/fman: fix eth hash table allocation (git-fixes).\n\n - fsl/fman: fix unreachable code (git-fixes).\n\n - fsl/fman: remove unused struct member (bsc#1174550).\n\n - fsl/fman: use 32-bit unsigned integer (git-fixes).\n\n - fuse: fix memleak in cuse_channel_open (bsc#1174926).\n\n - fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).\n\n - fuse: Fix parameter for FS_IOC_(GET,SET)FLAGS (bsc#1175062).\n\n - fuse: fix weird page warning (bsc#1175063).\n\n - fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).\n\n - fuse: truncate pending writes on O_TRUNC (bsc#1175065).\n\n - fuse: verify attributes (bsc#1175066).\n\n - fuse: verify nlink (bsc#1175067).\n\n - genetlink: remove genl_bind (networking-stable-20_07_17).\n\n - go7007: add sanity checking for endpoints (git-fixes).\n\n - gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).\n\n - hv_balloon: Balloon up according to request page number (git-fixes).\n\n - hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).\n\n - hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).\n\n - hv_netvsc: do not use VF device if link is down (git-fixes).\n\n - hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).\n\n - hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).\n\n - hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).\n\n - hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).\n\n - hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).\n\n - hv_netvsc: flag software created hash value (git-fixes).\n\n - hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).\n\n - i2c: rcar: in slave mode, clear NACK earlier (git-fixes).\n\n - i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).\n\n - i40e: Fix crash during removing i40e driver (git-fixes).\n\n - i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).\n\n - ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).\n\n - ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n\n - ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).\n\n - include/linux/poison.h: remove obsolete comment (git fixes (poison)).\n\n - Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).\n\n - Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).\n\n - integrity: remove redundant initialization of variable ret (git-fixes).\n\n - ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).\n\n - ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).\n\n - ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).\n\n - ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515).\n\n - ip_tunnel: Emit events for post-register MTU changes (git-fixes).\n\n - ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).\n\n - ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).\n\n - ipv4: fill fl4_icmp_(type,code) in ping_v4_sendmsg (networking-stable-20_07_17).\n\n - ipv4: Silence suspicious RCU usage warning (git-fixes).\n\n - ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).\n\n - ipvlan: fix device features (git-fixes).\n\n - ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).\n\n - ipvs: fix refcount usage for conns in ops mode (git-fixes).\n\n - ipvs: fix the connection sync failed in some cases (bsc#1174699).\n\n - irqchip/gic: Atomically update affinity (bsc#1111666).\n\n - iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).\n\n - jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).\n\n - kABI: genetlink: remove genl_bind (kabi).\n\n - kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).\n\n - kabi: mask changes to struct ipv6_stub (bsc#1165629).\n\n - kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).\n\n - kernel/relay.c: fix memleak on destroy relay channel (git-fixes).\n\n - kernfs: do not call fsnotify() with name without a parent (bsc#1175770).\n\n - KVM: arm64: Ensure 'params' is initialised when looking up sys register (bsc#1133021).\n\n - KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).\n\n - KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).\n\n - KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).\n\n - KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).\n\n - KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).\n\n - KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).\n\n - kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).\n\n - KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).\n\n - KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).\n\n - l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).\n\n - leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n\n - leds: core: Flush scheduled work for system suspend (git-fixes).\n\n - leds: da903x: fix use-after-free on unbind (git-fixes).\n\n - leds: lm3533: fix use-after-free on unbind (git-fixes).\n\n - leds: lm355x: avoid enum conversion warning (git-fixes).\n\n - leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n\n - lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).\n\n - lib: dimlib: fix help text typos (bsc#1174852).\n\n - linux/dim: Add completions count to dim_sample (bsc#1174852).\n\n - linux/dim: Fix overflow in dim calculation (bsc#1174852).\n\n - linux/dim: Move implementation to .c files (bsc#1174852).\n\n - linux/dim: Move logic to dim.h (bsc#1174852).\n\n - linux/dim: Remove 'net' prefix from internal DIM members (bsc#1174852).\n\n - linux/dim: Rename externally exposed macros (bsc#1174852).\n\n - linux/dim: Rename externally used net_dim members (bsc#1174852).\n\n - linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).\n\n - liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n\n - llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).\n\n - mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n\n - mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n\n - MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).\n\n - md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).\n\n - md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).\n\n - media: budget-core: Improve exception handling in budget_register() (git-fixes).\n\n - media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n\n - media: firewire: Using uninitialized values in node_probe() (git-fixes).\n\n - media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n\n - media: vpss: clean up resources in init (git-fixes).\n\n - mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n\n - mfd: dln2: Run event handler loop under spinlock (git-fixes).\n\n - mfd: rk808: Fix RK818 ID template (bsc#1175412).\n\n - mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).\n\n - mm: filemap: clear idle flag for writes (bsc#1175769).\n\n - mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).\n\n - mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).\n\n - mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).\n\n - mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).\n\n - mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).\n\n - mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).\n\n - mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).\n\n - mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).\n\n - mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).\n\n - mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).\n\n - mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).\n\n - mwifiex: Prevent memory corruption handling keys (git-fixes).\n\n - net: Added pointer check for dst->ops->neigh_lookup in dst_neigh_lookup_skb (git-fixes).\n\n - net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).\n\n - net: core: reduce recursion limit value (networking-stable-20_06_28).\n\n - net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).\n\n - net: dsa: b53: check for timeout (git-fixes).\n\n - net: ena: Add first_interrupt field to napi struct (bsc#1174852).\n\n - net: ena: add reserved PCI device ID (bsc#1174852).\n\n - net: ena: add support for reporting of packet drops (bsc#1174852).\n\n - net: ena: add support for the rx offset feature (bsc#1174852).\n\n - net: ena: add support for traffic mirroring (bsc#1174852).\n\n - net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n\n - net: ena: allow setting the hash function without changing the key (bsc#1174852).\n\n - net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n\n - net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n\n - net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n\n - net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).\n\n - net: ena: changes to RSS hash key allocation (bsc#1174852).\n\n - net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).\n\n - net: ena: clean up indentation issue (bsc#1174852).\n\n - net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n\n - net: ena: cosmetic: code reorderings (bsc#1174852).\n\n - net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n\n - net: ena: cosmetic: fix line break issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spacing issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n\n - net: ena: cosmetic: minor code changes (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n\n - net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n\n - net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n\n - net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n\n - net: ena: drop superfluous prototype (bsc#1174852).\n\n - net: ena: enable support of rss hash key and function changes (bsc#1174852).\n\n - net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).\n\n - net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n\n - net: ena: ethtool: get_channels: use combined only (bsc#1174852).\n\n - net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n\n - net: ena: ethtool: support set_channels callback (bsc#1174852).\n\n - net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n\n - net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n\n - net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n\n - net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).\n\n - net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).\n\n - net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n\n - net: ena: fix update of interrupt moderation register (bsc#1174852).\n\n - net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n\n - net: ena: implement XDP drop support (bsc#1174852).\n\n - net: ena: Implement XDP_TX action (bsc#1174852).\n\n - net: ena: make ethtool -l show correct max number of queues (bsc#1174852).\n\n - net: ena: Make missed_tx stat incremental (bsc#1083548).\n\n - net: ena: Make some functions static (bsc#1174852).\n\n - net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n\n - net: ena: multiple queue creation related cleanups (bsc#1174852).\n\n - net: ena: Prevent reset after device destruction (bsc#1083548).\n\n - net: ena: reduce driver load time (bsc#1174852).\n\n - net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).\n\n - net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).\n\n - net: ena: remove code that does nothing (bsc#1174852).\n\n - net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).\n\n - net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).\n\n - net: ena: remove redundant print of number of queues (bsc#1174852).\n\n - net: ena: remove set but not used variable 'hash_key' (bsc#1174852).\n\n - net: ena: remove set but not used variable 'rx_ring' (bsc#1174852).\n\n - net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n\n - net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).\n\n - net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n\n - net: ena: support new LLQ acceleration mode (bsc#1174852).\n\n - net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).\n\n - net: ena: use explicit variable size for clarity (bsc#1174852).\n\n - net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n\n - net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).\n\n - net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).\n\n - net: ethernet: aquantia: Fix wrong return value (git-fixes).\n\n - net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).\n\n - net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n\n - net: fec: correct the error path for regulator disable in probe (git-fixes).\n\n - netfilter: x_tables: add counters allocation wrapper (git-fixes).\n\n - netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).\n\n - netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).\n\n - net: Fix a documentation bug wrt.\n ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n\n - net: fix memleak in register_netdevice() (networking-stable-20_06_28).\n\n - net: Fix the arp error in some cases (networking-stable-20_06_28).\n\n - net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).\n\n - net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).\n\n - net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).\n\n - net: lan78xx: add missing endpoint sanity check (git-fixes).\n\n - net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n\n - net: make symbol 'flush_works' static (git-fixes).\n\n - net/mlx5: Delete extra dump stack that gives nothing (git-fixes).\n\n - net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n\n - net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n\n - net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).\n\n - net: netsec: initialize tx ring on ndo_open (bsc#1175418).\n\n - net: phy: Check harder for errors in get_phy_id() (bsc#1111666).\n\n - net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n\n - net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).\n\n - net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).\n\n - net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).\n\n - net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).\n\n - net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).\n\n - net: stmmac: Fix RX packet size > 8191 (git-fixes).\n\n - net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).\n\n - net: update net_dim documentation after rename (bsc#1174852).\n\n - net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).\n\n - net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).\n\n - netvsc: unshare skb in VF rx handler (git-fixes).\n\n - nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n\n - NTB: Fix an error in get link status (git-fixes).\n\n - ntb_netdev: fix sleep time mismatch (git-fixes).\n\n - NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n\n - nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n\n - nvme: fix possible deadlock when I/O is blocked (git-fixes).\n\n - nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).\n\n - nvme-multipath: fix logic for non-optimized paths (bsc#1172108).\n\n - nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).\n\n - nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).\n\n - obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).\n\n - ocfs2: add trimfs dlm lock resource (bsc#1175228).\n\n - ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n\n - ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n\n - ocfs2: change slot number type s16 to u16 (bsc#1175786).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n\n - ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n\n - ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)\n\n - openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).\n\n - PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).\n\n - PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).\n\n - PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n\n - PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n\n - PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).\n\n - PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n\n - PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n\n - PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n\n - phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n\n - pinctrl: single: fix function name in documentation (git-fixes).\n\n - pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n\n - platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n\n - platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n\n - PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).\n\n - PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).\n\n - PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.\n\n - PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).\n\n - PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).\n\n - powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).\n\n - powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n\n - powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n\n - powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n\n - powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n\n - powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n\n - powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n\n - powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).\n\n - powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).\n\n - powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n\n - powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).\n\n - powerpc/pseries: PCIE PHB reset (bsc#1174689).\n\n - powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n\n - powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n\n - powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n\n - power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n\n - pseries: Fix 64 bit logical memory block panic (bsc#1065729).\n\n - pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n\n - rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).\n\n - regulator: gpio: Honor regulator-boot-on property (git-fixes).\n\n - Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (bsc#1111666).\n\n - Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (bsc#1113956) 	* refresh for context changes\n\n - Revert 'ocfs2: avoid inode removal while nfsd is accessing it' This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.\n\n - Revert 'ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).' This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.\n\n - Revert 'ocfs2: load global_inode_alloc (bsc#1172963).' This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.\n\n - Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).\n\n - Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).\n\n - Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).\n\n - rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).\n\n - rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT\n\n - rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION\n\n - rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n\n - rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n\n - s390, dcssblk: kaddr and pfn can be NULL to\n ->direct_access() (bsc#1174873).\n\n - sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).\n\n - scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).\n\n - scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Change (RD,WRT)_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix NULL pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Use true, false for ha->fw_dumped (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).\n\n - scsi: smartpqi: add bay identifier (bsc#1172418).\n\n - scsi: smartpqi: add gigabyte controller (bsc#1172418).\n\n - scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).\n\n - scsi: smartpqi: add inquiry timeouts (bsc#1172418).\n\n - scsi: smartpqi: add module param for exposure order (bsc#1172418).\n\n - scsi: smartpqi: add module param to hide vsep (bsc#1172418).\n\n - scsi: smartpqi: add new pci ids (bsc#1172418).\n\n - scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).\n\n - scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n\n - scsi: smartpqi: add sysfs entries (bsc#1172418).\n\n - scsi: smartpqi: Align driver syntax with oob (bsc#1172418).\n\n - scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).\n\n - scsi: smartpqi: bump version (bsc#1172418).\n\n - scsi: smartpqi: bump version (bsc#1172418).\n\n - scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).\n\n - scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).\n\n - scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).\n\n - scsi: smartpqi: correct REGNEWD return status (bsc#1172418).\n\n - scsi: smartpqi: correct syntax issue (bsc#1172418).\n\n - scsi: smartpqi: fix call trace in device discovery (bsc#1172418).\n\n - scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).\n\n - scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).\n\n - scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).\n\n - scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).\n\n - scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).\n\n - scsi: smartpqi: remove unused manifest constants (bsc#1172418).\n\n - scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).\n\n - scsi: smartpqi: support device deletion via sysfs (bsc#1172418).\n\n - scsi: smartpqi: update copyright (bsc#1172418).\n\n - scsi: smartpqi: update logical volume size after expansion (bsc#1172418).\n\n - scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).\n\n - scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).\n\n - scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).\n\n - sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).\n\n - selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n\n - selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n\n - selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n\n - selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n\n - serial: 8250: change lock order in serial8250_do_startup() (git-fixes).\n\n - serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).\n\n - serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).\n\n - Set VIRTIO_CONSOLE=y (bsc#1175667).\n\n - sign also s390x kernel images (bsc#1163524)\n\n - soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).\n\n - soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).\n\n - spi: davinci: Remove uninitialized_var() usage (git-fixes).\n\n - spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n\n - spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).\n\n - spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).\n\n - spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).\n\n - spi: sun4i: update max transfer size reported (git-fixes).\n\n - staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n\n - staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).\n\n - staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n\n - Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).\n\n - staging/speakup: fix get_word non-space look-ahead (git-fixes).\n\n - tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).\n\n - tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).\n\n - tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).\n\n - tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).\n\n - tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).\n\n - tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).\n\n - tracepoint: Mark __tracepoint_string's __used (git-fixes).\n\n - tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).\n\n - tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).\n\n - tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).\n\n - Update patch reference for a tipc fix patch (bsc#1175515)\n\n - USB: cdc-acm: rework notification_buffer resizing (git-fixes).\n\n - usb: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).\n\n - usb: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).\n\n - USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).\n\n - USB: iowarrior: fix up report size handling for some devices (git-fixes).\n\n - usbip: tools: fix module name in man page (git-fixes).\n\n - USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).\n\n - USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n\n - USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n\n - USB: serial: ftdi_sio: clean up receive processing (git-fixes).\n\n - USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).\n\n - USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).\n\n - USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n\n - USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n\n - usb: xhci: define IDs for various ASMedia host controllers (git-fixes).\n\n - usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n\n - usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n\n - usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n\n - VFS: Check rename_lock in lookup_fast() (bsc#1174734).\n\n - video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n\n - video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).\n\n - vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).\n\n - vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).\n\n - watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).\n\n - watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).\n\n - watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).\n\n - wl1251: fix always return 0 error (git-fixes).\n\n - x86/hyperv: Create and use Hyper-V page definitions (git-fixes).\n\n - x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).\n\n - x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).\n\n - xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).\n\n - xen/balloon: make the balloon wait interruptible (bsc#1065600).\n\n - xfrm: check id proto in validate_tmpl() (git-fixes).\n\n - xfrm: clean up xfrm protocol checks (git-fixes).\n\n - xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).\n\n - xfs: fix inode allocation block res calculation precedence (git-fixes).\n\n - xfs: fix reflink quota reservation accounting error (git-fixes).", "cvss3": {}, "published": "2020-09-08T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2020-1325) (Spectre)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3639", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-1749", "CVE-2020-24394"], "modified": "2020-09-10T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "cpe:/o:novell:opensuse:15.1"], "id": "OPENSUSE-2020-1325.NASL", "href": "https://www.tenable.com/plugins/nessus/140365", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2020-1325.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(140365);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/10\");\n\n script_cve_id(\"CVE-2018-3639\", \"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-1749\", \"CVE-2020-24394\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2020-1325) (Spectre)\");\n script_summary(english:\"Check for the openSUSE-2020-1325 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The openSUSE Leap 15.1 kernel was updated to receive various security\nand bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2018-3639: Systems with microprocessors utilizing\n speculative execution and speculative execution of\n memory reads before the addresses of all prior memory\n writes are known may have allowed unauthorized\n disclosure of information to an attacker with local user\n access via a side-channel analysis, aka Speculative\n Store Bypass (SSB), Variant 4 (bnc#1085308 bnc#1087082\n bnc#1172782 bnc#1172783). Mitigations for Arm had not\n been included yet.\n\n - CVE-2020-14314: Fixed potential negative array index in\n do_split() (bsc#1173798).\n\n - CVE-2020-14331: Fixed a buffer over write in\n vgacon_scroll (bnc#1174205).\n\n - CVE-2020-14356: A flaw NULL pointer dereference in the\n Linux kernel cgroupv2 subsystem in versions was found in\n the way when reboot the system. A local user could use\n this flaw to crash the system or escalate their\n privileges on the system (bnc#1175213).\n\n - CVE-2020-1749: Some ipv6 protocols were not encrypted\n over ipsec tunnels (bsc#1165629).\n\n - CVE-2020-24394: fs/nfsd/vfs.c (in the NFS server) could\n set incorrect permissions on new filesystem objects when\n the filesystem lacks ACL support, aka CID-22cf8419f131.\n This occurs because the current umask is not considered\n (bnc#1175518).\n\nThe following non-security bugs were fixed :\n\n - ACPI: kABI fixes for subsys exports (bsc#1174968).\n\n - ACPI / LPSS: Resume BYT/CHT I2C controllers from\n resume_noirq (bsc#1174968).\n\n - ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_*\n functions for hibernate (bsc#1174968).\n\n - ACPI: PM: Introduce 'poweroff' callbacks for ACPI PM\n domain and LPSS (bsc#1174968).\n\n - ACPI: PM: Simplify and fix PM domain hibernation\n callbacks (bsc#1174968).\n\n - af_key: pfkey_dump needs parameter validation\n (git-fixes).\n\n - agp/intel: Fix a memory leak on module initialisation\n failure (git-fixes).\n\n - ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).\n\n - ALSA: echoaduio: Drop superfluous volatile modifier\n (bsc#1111666).\n\n - ALSA: echoaudio: Fix potential Oops in snd_echo_resume()\n (bsc#1111666).\n\n - ALSA: hda: Add support for Loongson 7A1000 controller\n (bsc#1111666).\n\n - ALSA: hda/ca0132 - Add new quirk ID for Recon3D\n (bsc#1111666).\n\n - ALSA: hda/ca0132 - Fix AE-5 microphone selection\n commands (bsc#1111666).\n\n - ALSA: hda/ca0132 - Fix ZxR Headphone gain control get\n value (bsc#1111666).\n\n - ALSA: hda: fix snd_hda_codec_cleanup() documentation\n (bsc#1111666).\n\n - ALSA: hda - fix the micmute led status for Lenovo\n ThinkCentre AIO (bsc#1111666).\n\n - ALSA: hda/realtek: Add alc269/alc662 pin-tables for\n Loongson-3 laptops (bsc#1111666).\n\n - ALSA: hda/realtek: Add model alc298-samsung-headphone\n (git-fixes).\n\n - ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion\n (git-fixes).\n\n - ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex\n Book (git-fixes).\n\n - ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged\n (bsc#1111666).\n\n - ALSA: hda/realtek - Fix unused variable warning\n (bsc#1111666).\n\n - ALSA: hda - reverse the setting value in the\n micmute_led_set (bsc#1111666).\n\n - ALSA: pci: delete repeated words in comments\n (bsc#1111666).\n\n - ALSA: seq: oss: Serialize ioctls (bsc#1111666).\n\n - ALSA: usb-audio: Add capture support for Saffire 6 (USB\n 1.1) (git-fixes).\n\n - ALSA: usb-audio: add quirk for Pioneer DDJ-RB\n (bsc#1111666).\n\n - ALSA: usb-audio: add startech usb audio dock name\n (bsc#1111666).\n\n - ALSA: usb-audio: Add support for Lenovo ThinkStation\n P620 (bsc#1111666).\n\n - ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume\n knob support (bsc#1111666).\n\n - ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume\n control (bsc#1111666).\n\n - ALSA: usb-audio: endpoint : remove needless check before\n usb_free_coherent() (bsc#1111666).\n\n - ALSA: usb-audio: fix overeager device match for\n MacroSilicon MS2109 (bsc#1174625).\n\n - ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus'\n (bsc#1111666).\n\n - ALSA: usb-audio: ignore broken processing/extension unit\n (git-fixes).\n\n - ALSA: usb-audio: Update documentation comment for MS2109\n quirk (git-fixes).\n\n - ALSA: usb-audio: work around streaming quirk for\n MacroSilicon MS2109 (bsc#1111666).\n\n - ALSA: usb/line6: remove 'defined but not used' warning\n (bsc#1111666).\n\n - arm64: Add MIDR encoding for HiSilicon Taishan CPUs\n (bsc#1174547).\n\n - arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).\n\n - arm64: add sysfs vulnerability show for meltdown\n (bsc#1174547).\n\n - arm64: Add sysfs vulnerability show for spectre-v1\n (bsc#1174547).\n\n - arm64: add sysfs vulnerability show for spectre-v2\n (bsc#1174547).\n\n - arm64: add sysfs vulnerability show for speculative\n store bypass (bsc#1174547).\n\n - arm64: Advertise mitigation of Spectre-v2, or lack\n thereof (bsc#1174547)\n\n - arm64: Always enable spectre-v2 vulnerability detection\n (bsc#1174547).\n\n - arm64: Always enable ssb vulnerability detection\n (bsc#1174547).\n\n - arm64: backtrace: Do not bother trying to unwind the\n userspace stack (bsc#1175397).\n\n - arm64: capabilities: Add NVIDIA Denver CPU to bp_harden\n list (bsc#1174547).\n\n - arm64: capabilities: Merge duplicate Cavium erratum\n entries (bsc#1174547).\n\n - arm64: capabilities: Merge entries for\n ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).\n\n - arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata\n 1003 (bsc#1175398).\n\n - arm64: Do not mask out PTE_RDONLY in pte_same()\n (bsc#1175393).\n\n - arm64: enable generic CPU vulnerabilites support\n (bsc#1174547). Update config/arm64/default\n\n - arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by\n default (bsc#1175394).\n\n - arm64: errata: Do not define type field twice for\n arm64_errata entries (bsc#1174547).\n\n - arm64: errata: Update stale comment (bsc#1174547).\n\n - arm64: Get rid of __smccc_workaround_1_hvc_*\n (bsc#1174547).\n\n - arm64: kpti: Avoid rewriting early page tables when\n KASLR is enabled (bsc#1174547).\n\n - arm64: kpti: Update arm64_kernel_use_ng_mappings() when\n forced on (bsc#1174547).\n\n - arm64: kpti: Whitelist Cortex-A CPUs that do not\n implement the CSV3 field (bsc#1174547).\n\n - arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs\n (bsc#1174547).\n\n - arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2\n to 1 (bsc#1133021).\n\n - arm64: KVM: Guests can skip __install_bp_hardening_cb()s\n HYP work (bsc#1174547).\n\n - arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP\n hardening (bsc#1174547).\n\n - arm64: mm: Fix pte_mkclean, pte_mkdirty semantics\n (bsc#1175526).\n\n - arm64: Provide a command line to disable spectre_v2\n mitigation (bsc#1174547).\n\n - arm64: Silence clang warning on mismatched\n value/register sizes (bsc#1175396).\n\n - arm64/speculation: Support 'mitigations=' cmdline option\n (bsc#1174547).\n\n - arm64: ssbd: explicitly depend on <linux/prctl.h>\n (bsc#1175399).\n\n - arm64: ssbs: Do not treat CPUs with SSBS as unaffected\n by SSB (bsc#1174547).\n\n - arm64: ssbs: Fix context-switch when SSBS is present on\n all CPUs (bsc#1175669).\n\n - arm64/sve: <uapi/asm/ptrace.h> should not depend on\n <uapi/linux/prctl.h> (bsc#1175401).\n\n - arm64/sve: Fix wrong free for task->thread.sve_state\n (bsc#1175400).\n\n - arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).\n\n - arm64: Use firmware to detect CPUs that are not affected\n by Spectre-v2 (bsc#1174547).\n\n - ARM: KVM: invalidate BTB on guest exit for\n Cortex-A12/A17 (bsc#1133021).\n\n - ARM: KVM: invalidate icache on guest exit for Cortex-A15\n (bsc#1133021).\n\n - ARM: spectre-v2: KVM: invalidate icache on guest exit\n for Brahma B15 (bsc#1133021).\n\n - ASoC: hda/tegra: Set buffer alignment to 128 bytes\n (bsc#1111666).\n\n - ASoC: intel: Fix memleak in sst_media_open (git-fixes).\n\n - ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n\n - AX.25: Fix out-of-bounds read in ax25_connect()\n (git-fixes).\n\n - AX.25: Prevent integer overflows in connect and sendmsg\n (git-fixes).\n\n - AX.25: Prevent out-of-bounds read in ax25_sendmsg()\n (git-fixes).\n\n - ax88172a: fix ax88172a_unbind() failures (git-fixes).\n\n - b43: Remove uninitialized_var() usage (git-fixes).\n\n - bcache: allocate meta data pages as compound pages\n (bsc#1172873).\n\n - block: check queue's limits.discard_granularity in\n __blkdev_issue_discard() (bsc#1152148).\n\n - block: improve discard bio alignment in\n __blkdev_issue_discard() (bsc#1152148).\n\n - Bluetooth: Fix slab-out-of-bounds read in\n hci_extended_inquiry_result_evt() (bsc#1111666).\n\n - Bluetooth: Fix update of connection state in\n `hci_encrypt_cfm` (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in\n hci_inquiry_result_evt() (bsc#1111666).\n\n - Bluetooth: Prevent out-of-bounds read in\n hci_inquiry_result_with_rssi_evt() (bsc#1111666).\n\n - bonding: fix active-backup failover for current ARP\n slave (bsc#1174771).\n\n - bonding: fix a potential double-unregister (git-fixes).\n\n - bonding: show saner speed for broadcast mode\n (git-fixes).\n\n - bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).\n\n - brcmfmac: keep SDIO watchdog running when\n console_interval is non-zero (bsc#1111666).\n\n - brcmfmac: set state of hanger slot to FREE when flushing\n PSQ (bsc#1111666).\n\n - brcmfmac: To fix Bss Info flag definition Bug\n (bsc#1111666).\n\n - btrfs: fix a block group ref counter leak after failure\n to remove block group (bsc#1175149).\n\n - btrfs: fix block group leak when removing fails\n (bsc#1175149).\n\n - btrfs: fix bytes_may_use underflow when running balance\n and scrub in parallel (bsc#1175149).\n\n - btrfs: fix corrupt log due to concurrent fsync of inodes\n with shared extents (bsc#1175149).\n\n - btrfs: fix data block group relocation failure due to\n concurrent scrub (bsc#1175149).\n\n - btrfs: fix double free on ulist after backref resolution\n failure (bsc#1175149).\n\n - btrfs: fix fatal extent_buffer readahead vs releasepage\n race (bsc#1175149).\n\n - btrfs: fix memory leaks after failure to lookup\n checksums during inode logging (bsc#1175550).\n\n - btrfs: fix page leaks after failure to lock page for\n delalloc (bsc#1175149).\n\n - btrfs: fix race between block group removal and block\n group creation (bsc#1175149).\n\n - btrfs: fix space_info bytes_may_use underflow after\n nocow buffered write (bsc#1175149).\n\n - btrfs: fix space_info bytes_may_use underflow during\n space cache writeout (bsc#1175149).\n\n - btrfs: fix wrong file range cleanup after an error\n filling dealloc range (bsc#1175149).\n\n - btrfs: inode: fix NULL pointer dereference if inode does\n not need compression (bsc#1174484).\n\n - btrfs: Open code btrfs_write_and_wait_marked_extents\n (bsc#1175149).\n\n - btrfs: Rename and export clear_btree_io_tree\n (bsc#1175149).\n\n - btrfs: treat RWF_(,D)SYNC writes as sync for CRCs\n (bsc#1175493).\n\n - cfg80211: check vendor command doit pointer before use\n (git-fixes).\n\n - char: virtio: Select VIRTIO from VIRTIO_CONSOLE\n (bsc#1175667).\n\n - cifs: document and cleanup dfs mount (bsc#1144333\n bsc#1172428).\n\n - cifs: Fix an error pointer dereference in cifs_mount()\n (bsc#1144333 bsc#1172428).\n\n - cifs: fix double free error on share and prefix\n (bsc#1144333 bsc#1172428).\n\n - cifs: handle empty list of targets in cifs_reconnect()\n (bsc#1144333 bsc#1172428).\n\n - cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in\n reconnect (bsc#1144333 bsc#1172428).\n\n - cifs: merge __(cifs,smb2)_reconnect[_tcon]() into\n cifs_tree_connect() (bsc#1144333 bsc#1172428).\n\n - cifs: only update prefix path of DFS links in\n cifs_tree_connect() (bsc#1144333 bsc#1172428).\n\n - cifs: reduce number of referral requests in DFS link\n lookups (bsc#1144333 bsc#1172428).\n\n - cifs: rename reconn_inval_dfs_target() (bsc#1144333\n bsc#1172428).\n\n - clk: at91: clk-generated: check best_rate against ranges\n (bsc#1111666).\n\n - clk: clk-atlas6: fix return value check in\n atlas6_clk_init() (bsc#1111666).\n\n - clk: iproc: round clock rate to the closest\n (bsc#1111666).\n\n - clk: spear: Remove uninitialized_var() usage\n (git-fixes).\n\n - clk: st: Remove uninitialized_var() usage (git-fixes).\n\n - console: newport_con: fix an issue about leak related\n system resources (git-fixes).\n\n - crypto: ccp - Fix use of merged scatterlists\n (git-fixes).\n\n - crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP\n was not specified (git-fixes).\n\n - crypto: qat - fix double free in\n qat_uclo_create_batch_init_list (git-fixes).\n\n - dev: Defer free of skbs in flush_backlog (git-fixes).\n\n - device property: Fix the secondary firmware node\n handling in set_primary_fwnode() (git-fixes).\n\n - devres: keep both device name and resource name in\n pretty name (git-fixes).\n\n - dlm: Fix kobject memleak (bsc#1175768).\n\n - dmaengine: fsl-edma: Fix NULL pointer exception in\n fsl_edma_tx_handler (git-fixes).\n\n - Documentation/networking: Add net DIM documentation\n (bsc#1174852).\n\n - dpaa2-eth: Fix passing zero to 'PTR_ERR' warning\n (bsc#1175403).\n\n - dpaa2-eth: free already allocated channels on probe\n defer (bsc#1175404).\n\n - dpaa2-eth: prevent array underflow in update_cls_rule()\n (bsc#1175405).\n\n - dpaa_eth: add dropped frames to percpu ethtool stats\n (bsc#1174550).\n\n - dpaa_eth: add newline in dev_err() msg (bsc#1174550).\n\n - dpaa_eth: avoid timestamp read on error paths\n (bsc#1175406).\n\n - dpaa_eth: change DMA device (bsc#1174550).\n\n - dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).\n\n - dpaa_eth: defer probing after qbman (bsc#1174550).\n\n - dpaa_eth: extend delays in ndo_stop (bsc#1174550).\n\n - dpaa_eth: fix DMA mapping leak (bsc#1174550).\n\n - dpaa_eth: Fix one possible memleak in dpaa_eth_probe\n (bsc#1174550).\n\n - dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).\n\n - dpaa_eth: perform DMA unmapping before read\n (bsc#1175407).\n\n - dpaa_eth: register a device link for the qman portal\n used (bsc#1174550).\n\n - dpaa_eth: remove netdev_err() for user errors\n (bsc#1174550).\n\n - dpaa_eth: remove redundant code (bsc#1174550).\n\n - dpaa_eth: simplify variables used in\n dpaa_cleanup_tx_fd() (bsc#1174550).\n\n - dpaa_eth: use a page to store the SGT (bsc#1174550).\n\n - dpaa_eth: use fd information in dpaa_cleanup_tx_fd()\n (bsc#1174550).\n\n - dpaa_eth: use only one buffer pool per interface\n (bsc#1174550).\n\n - dpaa_eth: use page backed rx buffers (bsc#1174550).\n\n - driver core: Avoid binding drivers to dead devices\n (git-fixes).\n\n - Drivers: hv: balloon: Remove dependencies on guest page\n size (git-fixes).\n\n - Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE\n (git-fixes).\n\n - Drivers: hv: vmbus: Only notify Hyper-V for die events\n that are oops (bsc#1175127, bsc#1175128).\n\n - Drivers: hv: vmbus: Remove the undesired put_cpu_ptr()\n in hv_synic_cleanup() (git-fixes).\n\n - drivers/perf: hisi: Fix typo in events attribute array\n (bsc#1175408).\n\n - drivers/perf: hisi: Fixup one DDRC PMU register offset\n (bsc#1175410).\n\n - drivers/perf: hisi: Fix wrong value for all counters\n enable (bsc#1175409).\n\n - drm: Added orientation quirk for ASUS tablet model\n T103HAF (bsc#1111666).\n\n - drm/amd/display: fix pow() crashing when given base 0\n (git-fixes).\n\n - drm/amdgpu: avoid dereferencing a NULL pointer\n (bsc#1111666).\n\n - drm/amdgpu: Fix bug where DPM is not enabled after\n hibernate and resume (bsc#1111666).\n\n - drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\n (bsc#1113956)\n\n - drm/amdgpu: Prevent kernel-infoleak in\n amdgpu_info_ioctl() (git-fixes).\n\n - drm/amdgpu: Replace invalid device ID with a valid\n device ID (bsc#1113956)\n\n - drm/arm: fix unintentional integer overflow on left\n shift (git-fixes).\n\n - drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc\n ptr in (bsc#1113956)\n\n - drm/bridge: sil_sii8620: initialize return of\n sii8620_readb (git-fixes).\n\n - drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956)\n\n - drm/debugfs: fix plain echo to connector 'force'\n attribute (bsc#1111666).\n\n - drm/etnaviv: Fix error path on failure to enable bus clk\n (git-fixes).\n\n - drm/etnaviv: fix ref count leak via pm_runtime_get_sync\n (bsc#1111666).\n\n - drm: fix drm_dp_mst_port refcount leaks in\n drm_dp_mst_allocate_vcpi (bsc#1112178)\n\n - drm: hold gem reference until object is no longer\n accessed (bsc#1113956)\n\n - drm/imx: fix use after free (git-fixes).\n\n - drm/imx: imx-ldb: Disable both channels for split mode\n in enc->disable() (git-fixes).\n\n - drm/imx: tve: fix regulator_disable error path\n (git-fixes).\n\n - drm/mipi: use dcs write for\n mipi_dsi_dcs_set_tear_scanline (git-fixes).\n\n - drm/msm/adreno: fix updating ring fence (git-fixes).\n\n - drm/msm: ratelimit crtc event overflow error\n (bsc#1111666).\n\n - drm/nouveau/fbcon: fix module unload when fbcon init has\n failed for some reason (git-fixes).\n\n - drm/nouveau/fbcon: zero-initialise the mode_cmd2\n structure (git-fixes).\n\n - drm/nouveau: fix multiple instances of reference count\n leaks (bsc#1111666).\n\n - drm/panel: otm8009a: Drop unnessary\n backlight_device_unregister() (git-fixes).\n\n - drm: panel: simple: Fix bpc for LG LB070WV8 panel\n (git-fixes).\n\n - drm/radeon: disable AGP by default (bsc#1111666).\n\n - drm/radeon: fix array out-of-bounds read and write\n issues (git-fixes).\n\n - drm/radeon: Fix reference count leaks caused by\n pm_runtime_get_sync (bsc#1111666).\n\n - drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).\n\n - drm/tilcdc: fix leak & null ref in\n panel_connector_get_modes (bsc#1111666).\n\n - drm/ttm/nouveau: do not call tt destroy callback on\n alloc failure (bsc#1175232).\n\n - drm/vmwgfx: Fix two list_for_each loop exit tests\n (bsc#1111666).\n\n - drm/vmwgfx: Use correct vmw_legacy_display_unit pointer\n (bsc#1111666).\n\n - drm/xen-front: Fix misused IS_ERR_OR_NULL checks\n (bsc#1065600).\n\n - ext4: check journal inode extents more carefully\n (bsc#1173485).\n\n - ext4: do not allow overlapping system zones\n (bsc#1173485).\n\n - ext4: fix checking of directory entry validity for\n inline directories (bsc#1175771).\n\n - ext4: handle error of ext4_setup_system_zone() on\n remount (bsc#1173485).\n\n - fbdev: Detect integer underflow at 'struct\n fbcon_ops'->clear_margins. (bsc#1112178) \n\n - firmware: google: check if size is valid when decoding\n VPD data (git-fixes).\n\n - firmware: google: increment VPD key_len properly\n (git-fixes).\n\n - fsl/fman: add API to get the device behind a fman port\n (bsc#1174550).\n\n - fsl/fman: check dereferencing NULL pointer (git-fixes).\n\n - fsl/fman: detect FMan erratum A050385 (bsc#1174550).\n\n - fsl/fman: do not touch liodn base regs reserved on\n non-PAMU SoCs (bsc#1174550).\n\n - fsl/fman: fix dereference null return value (git-fixes).\n\n - fsl/fman: fix eth hash table allocation (git-fixes).\n\n - fsl/fman: fix unreachable code (git-fixes).\n\n - fsl/fman: remove unused struct member (bsc#1174550).\n\n - fsl/fman: use 32-bit unsigned integer (git-fixes).\n\n - fuse: fix memleak in cuse_channel_open (bsc#1174926).\n\n - fuse: fix missing unlock_page in fuse_writepage()\n (bsc#1174904).\n\n - fuse: Fix parameter for FS_IOC_(GET,SET)FLAGS\n (bsc#1175062).\n\n - fuse: fix weird page warning (bsc#1175063).\n\n - fuse: flush dirty data/metadata before non-truncate\n setattr (bsc#1175064).\n\n - fuse: truncate pending writes on O_TRUNC (bsc#1175065).\n\n - fuse: verify attributes (bsc#1175066).\n\n - fuse: verify nlink (bsc#1175067).\n\n - genetlink: remove genl_bind\n (networking-stable-20_07_17).\n\n - go7007: add sanity checking for endpoints (git-fixes).\n\n - gpu: host1x: debug: Fix multiple channels emitting\n messages simultaneously (bsc#1111666).\n\n - hv_balloon: Balloon up according to request page number\n (git-fixes).\n\n - hv_balloon: Use a static page for the balloon_up send\n buffer (git-fixes).\n\n - hv_netvsc: Allow scatter-gather feature to be tunable\n (git-fixes).\n\n - hv_netvsc: do not use VF device if link is down\n (git-fixes).\n\n - hv_netvsc: Fix a warning of suspicious RCU usage\n (git-fixes).\n\n - hv_netvsc: Fix error handling in netvsc_attach()\n (git-fixes).\n\n - hv_netvsc: Fix extra rcu_read_unlock in\n netvsc_recv_callback() (git-fixes).\n\n - hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit()\n (git-fixes).\n\n - hv_netvsc: Fix unwanted wakeup in netvsc_attach()\n (git-fixes).\n\n - hv_netvsc: flag software created hash value (git-fixes).\n\n - hv_netvsc: Remove 'unlikely' from netvsc_select_queue\n (git-fixes).\n\n - i2c: rcar: in slave mode, clear NACK earlier\n (git-fixes).\n\n - i2c: rcar: slave: only send STOP event when we have been\n addressed (bsc#1111666).\n\n - i40e: Fix crash during removing i40e driver (git-fixes).\n\n - i40e: Set RX_ONLY mode for unicast promiscuous on VLAN\n (git-fixes).\n\n - ibmveth: Fix use of ibmveth in a bridge (bsc#1174387\n ltc#187506).\n\n - ibmvnic: Fix IRQ mapping disposal in error path\n (bsc#1175112 ltc#187459).\n\n - ibmvnic fix NULL tx_pools and rx_tools issue at do_reset\n (bsc#1175873 ltc#187922).\n\n - include/linux/poison.h: remove obsolete comment (git\n fixes (poison)).\n\n - Input: psmouse - add a newline when printing 'proto' by\n sysfs (git-fixes).\n\n - Input: sentelic - fix error return when fsp_reg_write\n fails (bsc#1111666).\n\n - integrity: remove redundant initialization of variable\n ret (git-fixes).\n\n - ip6_gre: fix null-ptr-deref in ip6gre_init_net()\n (git-fixes).\n\n - ip6_gre: fix use-after-free in ip6gre_tunnel_lookup()\n (networking-stable-20_06_28).\n\n - ip6_tunnel: allow not to count pkts on tstats by passing\n dev as NULL (bsc#1175515).\n\n - ip_tunnel: allow not to count pkts on tstats by setting\n skb's dev to NULL (bsc#1175515).\n\n - ip_tunnel: Emit events for post-register MTU changes\n (git-fixes).\n\n - ip_tunnel: fix use-after-free in ip_tunnel_lookup()\n (networking-stable-20_06_28).\n\n - ip_tunnel: restore binding to ifaces with a large mtu\n (git-fixes).\n\n - ipv4: fill fl4_icmp_(type,code) in ping_v4_sendmsg\n (networking-stable-20_07_17).\n\n - ipv4: Silence suspicious RCU usage warning (git-fixes).\n\n - ipv6: fix memory leaks on IPV6_ADDRFORM path\n (git-fixes).\n\n - ipvlan: fix device features (git-fixes).\n\n - ipvs: allow connection reuse for unconfirmed conntrack\n (git-fixes).\n\n - ipvs: fix refcount usage for conns in ops mode\n (git-fixes).\n\n - ipvs: fix the connection sync failed in some cases\n (bsc#1174699).\n\n - irqchip/gic: Atomically update affinity (bsc#1111666).\n\n - iwlegacy: Check the return value of\n pcie_capability_read_*() (bsc#1111666).\n\n - jbd2: add the missing unlock_buffer() in the error path\n of jbd2_write_superblock() (bsc#1175772).\n\n - kABI: genetlink: remove genl_bind (kabi).\n\n - kabi: hide new parameter of ip6_dst_lookup_flow()\n (bsc#1165629).\n\n - kabi: mask changes to struct ipv6_stub (bsc#1165629).\n\n - kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes\n (kernel/pm)).\n\n - kernel/relay.c: fix memleak on destroy relay channel\n (git-fixes).\n\n - kernfs: do not call fsnotify() with name without a\n parent (bsc#1175770).\n\n - KVM: arm64: Ensure 'params' is initialised when looking\n up sys register (bsc#1133021).\n\n - KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART\n (bsc#1133021).\n\n - KVM: arm/arm64: Fix young bit from mmu notifier\n (bsc#1133021).\n\n - KVM: arm/arm64: vgic: Do not rely on the wrong pending\n table (bsc#1133021).\n\n - KVM: arm/arm64: vgic-its: Fix restoration of unmapped\n collections (bsc#1133021).\n\n - KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests\n (bsc#1133021).\n\n - KVM: arm: Make inject_abt32() inject an external abort\n instead (bsc#1133021).\n\n - kvm: Change offset in kvm_write_guest_offset_cached to\n unsigned (bsc#1133021).\n\n - KVM: Check for a bad hva before dropping into the ghc\n slow path (bsc#1133021).\n\n - KVM: PPC: Book3S PR: Remove uninitialized_var() usage\n (bsc#1065729).\n\n - l2tp: remove skb_dst_set() from l2tp_xmit_skb()\n (networking-stable-20_07_17).\n\n - leds: 88pm860x: fix use-after-free on unbind\n (git-fixes).\n\n - leds: core: Flush scheduled work for system suspend\n (git-fixes).\n\n - leds: da903x: fix use-after-free on unbind (git-fixes).\n\n - leds: lm3533: fix use-after-free on unbind (git-fixes).\n\n - leds: lm355x: avoid enum conversion warning (git-fixes).\n\n - leds: wm831x-status: fix use-after-free on unbind\n (git-fixes).\n\n - lib/dim: Fix -Wunused-const-variable warnings\n (bsc#1174852).\n\n - lib: dimlib: fix help text typos (bsc#1174852).\n\n - linux/dim: Add completions count to dim_sample\n (bsc#1174852).\n\n - linux/dim: Fix overflow in dim calculation\n (bsc#1174852).\n\n - linux/dim: Move implementation to .c files\n (bsc#1174852).\n\n - linux/dim: Move logic to dim.h (bsc#1174852).\n\n - linux/dim: Remove 'net' prefix from internal DIM members\n (bsc#1174852).\n\n - linux/dim: Rename externally exposed macros\n (bsc#1174852).\n\n - linux/dim: Rename externally used net_dim members\n (bsc#1174852).\n\n - linux/dim: Rename net_dim_sample() to\n net_dim_update_sample() (bsc#1174852).\n\n - liquidio: Fix wrong return value in cn23xx_get_pf_num()\n (git-fixes).\n\n - llc: make sure applications use ARPHRD_ETHER\n (networking-stable-20_07_17).\n\n - mac80211: mesh: Free ie data when leaving mesh\n (git-fixes).\n\n - mac80211: mesh: Free pending skb when destroying a mpath\n (git-fixes).\n\n - MAINTAINERS: add entry for Dynamic Interrupt Moderation\n (bsc#1174852).\n\n - md-cluster: Fix potential error pointer dereference in\n resize_bitmaps() (git-fixes).\n\n - md/raid5: Fix Force reconstruct-write io stuck in\n degraded raid5 (git-fixes).\n\n - media: budget-core: Improve exception handling in\n budget_register() (git-fixes).\n\n - media: exynos4-is: Add missed check for\n pinctrl_lookup_state() (git-fixes).\n\n - media: firewire: Using uninitialized values in\n node_probe() (git-fixes).\n\n - media: omap3isp: Add missed v4l2_ctrl_handler_free() for\n preview_init_entities() (git-fixes).\n\n - media: vpss: clean up resources in init (git-fixes).\n\n - mfd: arizona: Ensure 32k clock is put on driver unbind\n and error (git-fixes).\n\n - mfd: dln2: Run event handler loop under spinlock\n (git-fixes).\n\n - mfd: rk808: Fix RK818 ID template (bsc#1175412).\n\n - mld: fix memory leak in ipv6_mc_destroy_dev()\n (networking-stable-20_06_28).\n\n - mm: filemap: clear idle flag for writes (bsc#1175769).\n\n - mm/migrate.c: add missing flush_dcache_page for\n non-mapped page migrate (git fixes (mm/migrate)).\n\n - mm/mmu_notifier: use hlist_add_head_rcu() (git fixes\n (mm/mmu_notifiers)).\n\n - mm: remove VM_BUG_ON(PageSlab()) from page_mapcount()\n (git fixes (mm/compaction)).\n\n - mm/rmap.c: do not reuse anon_vma if we just want a copy\n (git fixes (mm/rmap)).\n\n - mm/shmem.c: cast the type of unmap_start to u64 (git\n fixes (mm/shmem)).\n\n - mm, thp: fix defrag setting if newline is not used (git\n fixes (mm/thp)).\n\n - mm/vunmap: add cond_resched() in vunmap_pmd_range\n (bsc#1175654 ltc#184617).\n\n - mtd: spi-nor: Fix an error code in spi_nor_read_raw()\n (bsc#1175413).\n\n - mtd: spi-nor: fix kernel-doc for spi_nor::info\n (bsc#1175414).\n\n - mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto\n (bsc#1175415).\n\n - mtd: spi-nor: fix silent truncation in\n spi_nor_read_raw() (bsc#1175416).\n\n - mwifiex: Prevent memory corruption handling keys\n (git-fixes).\n\n - net: Added pointer check for dst->ops->neigh_lookup in\n dst_neigh_lookup_skb (git-fixes).\n\n - net: bridge: enfore alignment for ethernet address\n (networking-stable-20_06_28).\n\n - net: core: reduce recursion limit value\n (networking-stable-20_06_28).\n\n - net: Do not clear the sock TX queue in sk_set_socket()\n (networking-stable-20_06_28).\n\n - net: dsa: b53: check for timeout (git-fixes).\n\n - net: ena: Add first_interrupt field to napi struct\n (bsc#1174852).\n\n - net: ena: add reserved PCI device ID (bsc#1174852).\n\n - net: ena: add support for reporting of packet drops\n (bsc#1174852).\n\n - net: ena: add support for the rx offset feature\n (bsc#1174852).\n\n - net: ena: add support for traffic mirroring\n (bsc#1174852).\n\n - net: ena: add unmask interrupts statistics to ethtool\n (bsc#1174852).\n\n - net: ena: allow setting the hash function without\n changing the key (bsc#1174852).\n\n - net: ena: avoid unnecessary admin command when RSS\n function set fails (bsc#1174852).\n\n - net: ena: avoid unnecessary rearming of interrupt vector\n when busy-polling (bsc#1174852).\n\n - net: ena: change default RSS hash function to Toeplitz\n (bsc#1174852).\n\n - net: ena: change num_queues to num_io_queues for clarity\n and consistency (bsc#1174852).\n\n - net: ena: changes to RSS hash key allocation\n (bsc#1174852).\n\n - net: ena: Change WARN_ON expression in\n ena_del_napi_in_range() (bsc#1174852).\n\n - net: ena: clean up indentation issue (bsc#1174852).\n\n - net: ena: cosmetic: change ena_com_stats_admin stats to\n u64 (bsc#1174852).\n\n - net: ena: cosmetic: code reorderings (bsc#1174852).\n\n - net: ena: cosmetic: extract code to\n ena_indirection_table_set() (bsc#1174852).\n\n - net: ena: cosmetic: fix line break issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spacing issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spelling and grammar mistakes in\n comments (bsc#1174852).\n\n - net: ena: cosmetic: minor code changes (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary code\n (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary spaces and tabs\n in ena_com.h macros (bsc#1174852).\n\n - net: ena: cosmetic: rename\n ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n\n - net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n\n - net: ena: cosmetic: set queue sizes to u32 for\n consistency (bsc#1174852).\n\n - net: ena: drop superfluous prototype (bsc#1174852).\n\n - net: ena: enable support of rss hash key and function\n changes (bsc#1174852).\n\n - net: ena: enable the interrupt_moderation in\n driver_supported_features (bsc#1174852).\n\n - net: ena: ethtool: clean up minor indentation issue\n (bsc#1174852).\n\n - net: ena: ethtool: get_channels: use combined only\n (bsc#1174852).\n\n - net: ena: ethtool: remove redundant non-zero check on rc\n (bsc#1174852).\n\n - net: ena: ethtool: support set_channels callback\n (bsc#1174852).\n\n - net/ena: Fix build warning in ena_xdp_set()\n (bsc#1174852).\n\n - net: ena: fix ena_com_comp_status_to_errno() return\n value (bsc#1174852).\n\n - net: ena: fix error returning in\n ena_com_get_hash_function() (bsc#1174852).\n\n - net: ena: fix incorrect setting of the number of msix\n vectors (bsc#1174852).\n\n - net: ena: fix incorrect update of intr_delay_resolution\n (bsc#1174852).\n\n - net: ena: fix request of incorrect number of IRQ vectors\n (bsc#1174852).\n\n - net: ena: fix update of interrupt moderation register\n (bsc#1174852).\n\n - net: ena: Fix using plain integer as NULL pointer in\n ena_init_napi_in_range (bsc#1174852).\n\n - net: ena: implement XDP drop support (bsc#1174852).\n\n - net: ena: Implement XDP_TX action (bsc#1174852).\n\n - net: ena: make ethtool -l show correct max number of\n queues (bsc#1174852).\n\n - net: ena: Make missed_tx stat incremental (bsc#1083548).\n\n - net: ena: Make some functions static (bsc#1174852).\n\n - net: ena: move llq configuration from ena_probe to\n ena_device_init() (bsc#1174852).\n\n - net: ena: multiple queue creation related cleanups\n (bsc#1174852).\n\n - net: ena: Prevent reset after device destruction\n (bsc#1083548).\n\n - net: ena: reduce driver load time (bsc#1174852).\n\n - net: ena: remove all old adaptive rx interrupt\n moderation code from ena_com (bsc#1174852).\n\n - net: ena: remove code duplication in\n ena_com_update_nonadaptive_moderation_interval _*()\n (bsc#1174852).\n\n - net: ena: remove code that does nothing (bsc#1174852).\n\n - net: ena: remove ena_restore_ethtool_params() and\n relevant fields (bsc#1174852).\n\n - net: ena: remove old adaptive interrupt moderation code\n from ena_netdev (bsc#1174852).\n\n - net: ena: remove redundant print of number of queues\n (bsc#1174852).\n\n - net: ena: remove set but not used variable 'hash_key'\n (bsc#1174852).\n\n - net: ena: remove set but not used variable 'rx_ring'\n (bsc#1174852).\n\n - net: ena: rename ena_com_free_desc to make API more\n uniform (bsc#1174852).\n\n - net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).\n\n - net: ena: simplify\n ena_com_update_intr_delay_resolution() (bsc#1174852).\n\n - net: ena: support new LLQ acceleration mode\n (bsc#1174852).\n\n - net: ena: switch to dim algorithm for rx adaptive\n interrupt moderation (bsc#1174852).\n\n - net: ena: use explicit variable size for clarity\n (bsc#1174852).\n\n - net: ena: use SHUTDOWN as reset reason when closing\n interface (bsc#1174852).\n\n - net: ena: xdp: update napi budget for DROP and ABORTED\n (bsc#1174852).\n\n - net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).\n\n - net: ethernet: aquantia: Fix wrong return value\n (git-fixes).\n\n - net: ethernet: broadcom: have drivers select DIMLIB as\n needed (bsc#1174852).\n\n - net: ethernet: stmmac: Disable hardware multicast filter\n (git-fixes).\n\n - net: fec: correct the error path for regulator disable\n in probe (git-fixes).\n\n - netfilter: x_tables: add counters allocation wrapper\n (git-fixes).\n\n - netfilter: x_tables: cap allocations at 512 mbyte\n (git-fixes).\n\n - netfilter: x_tables: limit allocation requests for blob\n rule heads (git-fixes).\n\n - net: Fix a documentation bug wrt.\n ip_unprivileged_port_start (git-fixes). (SLES tuning\n guide refers to ip-sysctl.txt.)\n\n - net: fix memleak in register_netdevice()\n (networking-stable-20_06_28).\n\n - net: Fix the arp error in some cases\n (networking-stable-20_06_28).\n\n - net: gre: recompute gre csum for sctp over gre tunnels\n (git-fixes).\n\n - net: increment xmit_recursion level in dev_direct_xmit()\n (networking-stable-20_06_28).\n\n - net: ip6_gre: Request headroom in __gre6_xmit()\n (git-fixes).\n\n - net: lan78xx: add missing endpoint sanity check\n (git-fixes).\n\n - net: lan78xx: fix transfer-buffer memory leak\n (git-fixes).\n\n - net: make symbol 'flush_works' static (git-fixes).\n\n - net/mlx5: Delete extra dump stack that gives nothing\n (git-fixes).\n\n - net/mlx5e: vxlan: Use RCU for vxlan table lookup\n (git-fixes).\n\n - net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n\n - net: netsec: Fix signedness bug in netsec_probe()\n (bsc#1175417).\n\n - net: netsec: initialize tx ring on ndo_open\n (bsc#1175418).\n\n - net: phy: Check harder for errors in get_phy_id()\n (bsc#1111666).\n\n - net: qcom/emac: add missed clk_disable_unprepare in\n error path of emac_clks_phase1_init (git-fixes).\n\n - net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).\n\n - net: socionext: Fix a signedness bug in ave_probe()\n (bsc#1175419).\n\n - net: socionext: replace napi_alloc_frag with the netdev\n variant on init (bsc#1175420).\n\n - net: spider_net: Fix the size used in a\n 'dma_free_coherent()' call (git-fixes).\n\n - net: stmmac: dwmac1000: provide multicast filter\n fallback (git-fixes).\n\n - net: stmmac: Fix RX packet size > 8191 (git-fixes).\n\n - net: udp: Fix wrong clean up for IS_UDPLITE macro\n (git-fixes).\n\n - net: update net_dim documentation after rename\n (bsc#1174852).\n\n - net: usb: ax88179_178a: fix packet alignment padding\n (networking-stable-20_06_28).\n\n - net: usb: qmi_wwan: add support for Quectel EG95 LTE\n modem (networking-stable-20_07_17).\n\n - netvsc: unshare skb in VF rx handler (git-fixes).\n\n - nfc: nci: add missed destroy_workqueue in\n nci_register_device (git-fixes).\n\n - NTB: Fix an error in get link status (git-fixes).\n\n - ntb_netdev: fix sleep time mismatch (git-fixes).\n\n - NTB: ntb_transport: Use scnprintf() for avoiding\n potential buffer overflow (git-fixes).\n\n - nvme: explicitly update mpath disk capacity on\n revalidation (git-fixes).\n\n - nvme: fix possible deadlock when I/O is blocked\n (git-fixes).\n\n - nvme-multipath: do not fall back to __nvme_find_path()\n for non-optimized paths (bsc#1172108).\n\n - nvme-multipath: fix logic for non-optimized paths\n (bsc#1172108).\n\n - nvme-multipath: round-robin: eliminate 'fallback'\n variable (bsc#1172108).\n\n - nvme: multipath: round-robin: fix single non-optimized\n path case (bsc#1172108).\n\n - obsolete_kmp: provide newer version than the obsoleted\n one (boo#1170232).\n\n - ocfs2: add trimfs dlm lock resource (bsc#1175228).\n\n - ocfs2: add trimfs lock to avoid duplicated trims in\n cluster (bsc#1175228).\n\n - ocfs2: avoid inode removal while nfsd is accessing it\n (bsc#1172963).\n\n - ocfs2: change slot number type s16 to u16 (bsc#1175786).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: fix remounting needed after setfacl command\n (bsc#1173954).\n\n - ocfs2: fix the application IO timeout when fstrim is\n running (bsc#1175228).\n\n - ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - omapfb: dss: Fix max fclk divider for omap36xx\n (bsc#1113956)\n\n - openvswitch: Prevent kernel-infoleak in ovs_ct_put_key()\n (git-fixes).\n\n - PCI/ASPM: Add missing newline in sysfs 'policy'\n (git-fixes).\n\n - PCI: dwc: Move interrupt acking into the proper callback\n (bsc#1175666).\n\n - PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n\n - PCI: hotplug: ACPI: Fix context refcounting in\n acpiphp_grab_context() (git-fixes).\n\n - PCI: hv: Fix a timing issue which causes kdump to fail\n occasionally (bsc#1172871, bsc#1172872, git-fixes).\n\n - PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n\n - PCI: switchtec: Add missing __iomem and __user tags to\n fix sparse warnings (git-fixes).\n\n - PCI: switchtec: Add missing __iomem tag to fix sparse\n warnings (git-fixes).\n\n - phy: sun4i-usb: fix dereference of pointer phy0 before\n it is null checked (git-fixes).\n\n - pinctrl: single: fix function name in documentation\n (git-fixes).\n\n - pinctrl-single: fix pcs_parse_pinconf() return value\n (git-fixes).\n\n - platform/x86: intel-hid: Fix return value check in\n check_acpi_dev() (git-fixes).\n\n - platform/x86: intel-vbtn: Fix return value check in\n check_acpi_dev() (git-fixes).\n\n - PM / CPU: replace raw_notifier with atomic_notifier (git\n fixes (kernel/pm)).\n\n - PM / devfreq: rk3399_dmc: Add missing of_node_put()\n (bsc#1175668).\n\n - PM / devfreq: rk3399_dmc: Disable devfreq-event device\n when fails.\n\n - PM / devfreq: rk3399_dmc: Fix kernel oops when\n rockchip,pmu is absent (bsc#1175668).\n\n - PM: sleep: core: Fix the handling of pending runtime\n resume requests (git-fixes).\n\n - powerpc/64s: Do not init FSCR_DSCR in __init_FSCR()\n (bsc#1065729).\n\n - powerpc/64s: Fix early_init_mmu section mismatch\n (bsc#1065729).\n\n - powerpc: Allow 4224 bytes of stack expansion for the\n signal frame (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Use PVR check instead of cpu\n feature (bsc#1065729).\n\n - powerpc/boot: Fix CONFIG_PPC_MPC52XX references\n (bsc#1065729).\n\n - powerpc/eeh: Fix pseries_eeh_configure_bridge()\n (bsc#1174689).\n\n - powerpc/nvdimm: Use HCALL error as the return value\n (bsc#1175284).\n\n - powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error\n (bsc#1175284).\n\n - powerpc/perf: Fix missing is_sier_aviable() during build\n (bsc#1065729).\n\n - powerpc/pseries: Do not initiate shutdown when system is\n running on UPS (bsc#1175440 ltc#187574).\n\n - powerpc/pseries/hotplug-cpu: Remove double free in error\n path (bsc#1065729).\n\n - powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU\n death (bsc#1085030 ltC#165630).\n\n - powerpc/pseries: PCIE PHB reset (bsc#1174689).\n\n - powerpc/pseries: remove cede offline state for CPUs\n (bsc#1065729).\n\n - powerpc/rtas: do not online CPUs for partition suspend\n (bsc#1065729).\n\n - powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n\n - power: supply: check if calc_soc succeeded in\n pm860x_init_battery (git-fixes).\n\n - pseries: Fix 64 bit logical memory block panic\n (bsc#1065729).\n\n - pwm: bcm-iproc: handle clk_get_rate() return\n (git-fixes).\n\n - rds: Prevent kernel-infoleak in rds_notify_queue_get()\n (git-fixes).\n\n - regulator: gpio: Honor regulator-boot-on property\n (git-fixes).\n\n - Revert 'ALSA: hda: call runtime_allow() for all hda\n controllers' (bsc#1111666).\n\n - Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs\n handlers' (bsc#1113956) 	* refresh for context\n changes\n\n - Revert 'ocfs2: avoid inode removal while nfsd is\n accessing it' This reverts commit\n 9e096c72476eda333a9998ff464580c00ff59c83.\n\n - Revert 'ocfs2: fix panic on nfs server over ocfs2\n (bsc#1172963).' This reverts commit\n 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.\n\n - Revert 'ocfs2: load global_inode_alloc (bsc#1172963).'\n This reverts commit\n fc476497b53f967dc615b9cbad9427ba3107b5c4.\n\n - Revert 'scsi: qla2xxx: Disable T10-DIF feature with\n FC-NVMe during probe' (bsc#1171688 bsc#1174003).\n\n - Revert 'scsi: qla2xxx: Fix crash on\n qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).\n\n - Revert 'xen/balloon: Fix crash when ballooning on x86 32\n bit PAE' (bsc#1065600).\n\n - rocker: fix incorrect error handling in dma_rings_init\n (networking-stable-20_06_28).\n\n - rpm/check-for-config-changes: Ignore\n CONFIG_CC_VERSION_TEXT\n\n - rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION\n\n - rpm/kernel-source.spec.in: Add obsolete_rebuilds\n (boo#1172073).\n\n - rtlwifi: rtl8192cu: Remove uninitialized_var() usage\n (git-fixes).\n\n - s390, dcssblk: kaddr and pfn can be NULL to\n ->direct_access() (bsc#1174873).\n\n - sched: consistently handle layer3 header accesses in the\n presence of VLANs (networking-stable-20_07_17).\n\n - scsi: dh: Add Fujitsu device to devinfo and dh lists\n (bsc#1174026).\n\n - scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Add more BUILD_BUG_ON() statements\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Address a set of sparse warnings\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Allow ql2xextended_error_logging special\n value 1 to be set anytime (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Change in PUREX to handle FPIN ELS\n requests (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Change (RD,WRT)_REG_*() function names\n from upper case into lower case (bsc#1171688\n bsc#1174003).\n\n - scsi: qla2xxx: Change two hardcoded constants into\n offsetof() / sizeof() expressions (bsc#1171688\n bsc#1174003).\n\n - scsi: qla2xxx: Check if FW supports MQ before enabling\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Check the size of struct fcp_hdr at\n compile time (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix a Coverity complaint in\n qla2100_fw_dump() (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix endianness annotations in header\n files (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix endianness annotations in source\n files (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix failure message in qlt_disable_vha()\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix issue with adapter's stopping state\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix login timeout (bsc#1171688\n bsc#1174003).\n\n - scsi: qla2xxx: Fix MPI failure AEN (8200) handling\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix NULL pointer access during disconnect\n from subsystem (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix spelling of a variable name\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix the code that reads from mailbox\n registers (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix warning after FC target reset\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Flush all sessions on zone disable\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688\n bsc#1174003).\n\n - scsi: qla2xxx: Increase the size of struct\n qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688\n bsc#1174003).\n\n - scsi: qla2xxx: Indicate correct supported speeds for\n Mezz card (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Initialize 'n' before using it\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Introduce a function for computing the\n debug message prefix (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Keep initiator ports after RSCN\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: make 1-bit bit-fields unsigned int\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain\n explicit (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize\n 32 bits of request_t.handle (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Make qla2x00_restart_isp() easier to read\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Make qla82xx_flash_wait_write_finish()\n easier to read (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Make qlafx00_process_aen() return void\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Make qla_set_ini_mode() return void\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Reduce noisy debug message (bsc#1171688\n bsc#1174003).\n\n - scsi: qla2xxx: Remove an unused function (bsc#1171688\n bsc#1174003).\n\n - scsi: qla2xxx: Remove a superfluous cast (bsc#1171688\n bsc#1174003).\n\n - scsi: qla2xxx: Remove return value from qla_nvme_ls()\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Remove the __packed annotation from\n struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: SAN congestion management implementation\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Simplify the functions for dumping\n firmware (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Sort BUILD_BUG_ON() statements\n alphabetically (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Split qla2x00_configure_local_loop()\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding\n it (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Use make_handle() instead of open-coding\n it (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command\n timeout values (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Use register names instead of register\n offsets (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Use true, false for ha->fw_dumped\n (bsc#1171688 bsc#1174003).\n\n - scsi: qla2xxx: Use true, false for need_mpi_reset\n (bsc#1171688 bsc#1174003).\n\n - scsi: smartpqi: add bay identifier (bsc#1172418).\n\n - scsi: smartpqi: add gigabyte controller (bsc#1172418).\n\n - scsi: smartpqi: add id support for SmartRAID 3152-8i\n (bsc#1172418).\n\n - scsi: smartpqi: add inquiry timeouts (bsc#1172418).\n\n - scsi: smartpqi: add module param for exposure order\n (bsc#1172418).\n\n - scsi: smartpqi: add module param to hide vsep\n (bsc#1172418).\n\n - scsi: smartpqi: add new pci ids (bsc#1172418).\n\n - scsi: smartpqi: add pci ids for fiberhome controller\n (bsc#1172418).\n\n - scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n\n - scsi: smartpqi: add sysfs entries (bsc#1172418).\n\n - scsi: smartpqi: Align driver syntax with oob\n (bsc#1172418).\n\n - scsi: smartpqi: avoid crashing kernel for controller\n issues (bsc#1172418).\n\n - scsi: smartpqi: bump version (bsc#1172418).\n\n - scsi: smartpqi: bump version (bsc#1172418).\n\n - scsi: smartpqi: bump version to 1.2.16-010\n (bsc#1172418).\n\n - scsi: smartpqi: change TMF timeout from 60 to 30 seconds\n (bsc#1172418).\n\n - scsi: smartpqi: correct hang when deleting 32 lds\n (bsc#1172418).\n\n - scsi: smartpqi: correct REGNEWD return status\n (bsc#1172418).\n\n - scsi: smartpqi: correct syntax issue (bsc#1172418).\n\n - scsi: smartpqi: fix call trace in device discovery\n (bsc#1172418).\n\n - scsi: smartpqi: fix controller lockup observed during\n force reboot (bsc#1172418).\n\n - scsi: smartpqi: fix LUN reset when fw bkgnd thread is\n hung (bsc#1172418).\n\n - scsi: smartpqi: fix problem with unique ID for physical\n device (bsc#1172418).\n\n - scsi: smartpqi: identify physical devices without\n issuing INQUIRY (bsc#1172418).\n\n - scsi: smartpqi: properly set both the DMA mask and the\n coherent DMA mask (bsc#1172418).\n\n - scsi: smartpqi: remove unused manifest constants\n (bsc#1172418).\n\n - scsi: smartpqi: Reporting unhandled SCSI errors\n (bsc#1172418).\n\n - scsi: smartpqi: support device deletion via sysfs\n (bsc#1172418).\n\n - scsi: smartpqi: update copyright (bsc#1172418).\n\n - scsi: smartpqi: update logical volume size after\n expansion (bsc#1172418).\n\n - scsi: smartpqi: Use scnprintf() for avoiding potential\n buffer overflow (bsc#1172418).\n\n - scsi: storvsc: Correctly set number of hardware queues\n for IDE disk (git-fixes).\n\n - scsi: target/iblock: fix WRITE SAME zeroing\n (bsc#1169790).\n\n - sctp: Do not advertise IPv4 addresses if ipv6only is set\n on the socket (networking-stable-20_06_28).\n\n - selftests/livepatch: fix mem leaks in\n test-klp-shadow-vars (bsc#1071995).\n\n - selftests/livepatch: more verification in\n test-klp-shadow-vars (bsc#1071995).\n\n - selftests/livepatch: rework test-klp-shadow-vars\n (bsc#1071995).\n\n - selftests/livepatch: simplify test-klp-callbacks busy\n target tests (bsc#1071995).\n\n - serial: 8250: change lock order in\n serial8250_do_startup() (git-fixes).\n\n - serial: pl011: Do not leak amba_ports entry on driver\n register error (git-fixes).\n\n - serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).\n\n - Set VIRTIO_CONSOLE=y (bsc#1175667).\n\n - sign also s390x kernel images (bsc#1163524)\n\n - soc: fsl: qbman: allow registering a device link for the\n portal user (bsc#1174550).\n\n - soc: fsl: qbman_portals: add APIs to retrieve the\n probing status (bsc#1174550).\n\n - spi: davinci: Remove uninitialized_var() usage\n (git-fixes).\n\n - spi: lantiq: fix: Rx overflow error in full duplex mode\n (git-fixes).\n\n - spi: nxp-fspi: Ensure width is respected in spi-mem\n operations (bsc#1175421).\n\n - spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI\n mode (bsc#1175422).\n\n - spi: spi-mem: export spi_mem_default_supports_op()\n (bsc#1175421).\n\n - spi: sun4i: update max transfer size reported\n (git-fixes).\n\n - staging: comedi: addi_apci_1032: check\n INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1500: check\n INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1564: check\n INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG\n support (git-fixes).\n\n - staging: fsl-dpaa2: ethsw: Add missing netdevice check\n (bsc#1175423).\n\n - staging: rtl8192u: fix a dubious looking mask before a\n shift (git-fixes).\n\n - Staging: rtl8723bs: prevent buffer overflow in\n update_sta_support_rate() (git-fixes).\n\n - staging/speakup: fix get_word non-space look-ahead\n (git-fixes).\n\n - tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in\n min RTT (networking-stable-20_06_28).\n\n - tcp: grow window for OOO packets only for SACK flows\n (networking-stable-20_06_28).\n\n - tcp: make sure listeners do not initialize\n congestion-control state (networking-stable-20_07_17).\n\n - tcp: md5: add missing memory barriers in\n tcp_md5_do_add()/tcp_md5_hash_key()\n (networking-stable-20_07_17).\n\n - tcp: md5: do not send silly options in SYNCOOKIES\n (networking-stable-20_07_17).\n\n - tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key()\n barriers (networking-stable-20_07_17).\n\n - tracepoint: Mark __tracepoint_string's __used\n (git-fixes).\n\n - tracing: Use trace_sched_process_free() instead of\n exit() for pid tracing (git-fixes).\n\n - tty: serial: fsl_lpuart: add imx8qxp support\n (bsc#1175670).\n\n - tty: serial: fsl_lpuart: free IDs allocated by IDA\n (bsc#1175670).\n\n - Update patch reference for a tipc fix patch\n (bsc#1175515)\n\n - USB: cdc-acm: rework notification_buffer resizing\n (git-fixes).\n\n - usb: gadget: f_tcm: Fix some resource leaks in some\n error paths (git-fixes).\n\n - usb: host: ohci-exynos: Fix error handling in\n exynos_ohci_probe() (git-fixes).\n\n - USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge\n (git-fixes).\n\n - USB: iowarrior: fix up report size handling for some\n devices (git-fixes).\n\n - usbip: tools: fix module name in man page (git-fixes).\n\n - USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE\n (git-fixes).\n\n - USB: serial: cp210x: enable usb generic\n throttle/unthrottle (git-fixes).\n\n - USB: serial: cp210x: re-enable auto-RTS on open\n (git-fixes).\n\n - USB: serial: ftdi_sio: clean up receive processing\n (git-fixes).\n\n - USB: serial: ftdi_sio: fix break and sysrq handling\n (git-fixes).\n\n - USB: serial: ftdi_sio: make process-packet buffer\n unsigned (git-fixes).\n\n - USB: serial: iuu_phoenix: fix led-activity helpers\n (git-fixes).\n\n - USB: serial: qcserial: add EM7305 QDL product ID\n (git-fixes).\n\n - usb: xhci: define IDs for various ASMedia host\n controllers (git-fixes).\n\n - usb: xhci: Fix ASM2142/ASM3142 DMA addressing\n (git-fixes).\n\n - usb: xhci: Fix ASMedia ASM1142 DMA addressing\n (git-fixes).\n\n - usb: xhci-mtk: fix the failure of bandwidth allocation\n (git-fixes).\n\n - VFS: Check rename_lock in lookup_fast() (bsc#1174734).\n\n - video: fbdev: sm712fb: fix an issue about iounmap for a\n wrong address (git-fixes).\n\n - video: pxafb: Fix the function used to balance a\n 'dma_alloc_coherent()' call (git-fixes).\n\n - vlan: consolidate VLAN parsing code and limit max\n parsing depth (networking-stable-20_07_17).\n\n - vmxnet3: use correct tcp hdr length when packet is\n encapsulated (bsc#1175199).\n\n - watchdog: f71808e_wdt: clear watchdog timeout occurred\n flag (bsc#1111666).\n\n - watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support\n in watchdog_info.options (bsc#1111666).\n\n - watchdog: f71808e_wdt: remove use of wrong watchdog_info\n option (bsc#1111666).\n\n - wl1251: fix always return 0 error (git-fixes).\n\n - x86/hyperv: Create and use Hyper-V page definitions\n (git-fixes).\n\n - x86/hyper-v: Fix overflow bug in fill_gva_list()\n (git-fixes).\n\n - x86/hyperv: Make hv_vcpu_is_preempted() visible\n (git-fixes).\n\n - xen/balloon: fix accounting in alloc_xenballooned_pages\n error path (bsc#1065600).\n\n - xen/balloon: make the balloon wait interruptible\n (bsc#1065600).\n\n - xfrm: check id proto in validate_tmpl() (git-fixes).\n\n - xfrm: clean up xfrm protocol checks (git-fixes).\n\n - xfrm_user: uncoditionally validate esn replay attribute\n struct (git-fixes).\n\n - xfs: fix inode allocation block res calculation\n precedence (git-fixes).\n\n - xfs: fix reflink quota reservation accounting error\n (git-fixes).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1085308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1087082\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152148\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1163524\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1165629\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1166965\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170232\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171688\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172073\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172108\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173485\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174003\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174026\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174387\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174547\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174689\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174699\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174734\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174926\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174968\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175064\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175065\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175067\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175228\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175232\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175396\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175397\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175398\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175399\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175400\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175402\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175403\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175404\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175405\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175406\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175410\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175414\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175415\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175416\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175419\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175420\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175421\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175422\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175423\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175440\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175493\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175515\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175526\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175668\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175669\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175767\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175768\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175769\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175873\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/08\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-debuginfo-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debuginfo-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debugsource-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-debuginfo-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-debuginfo-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debuginfo-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debugsource-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-debuginfo-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-devel-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-docs-html-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debugsource-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-macros-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-debugsource-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-qa-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-vanilla-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-syms-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debuginfo-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debugsource-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-4.12.14-lp151.28.63.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-lp151.28.63.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-28T14:15:12", "description": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n\nCVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-09T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2574-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-14386", "CVE-2020-16166", "CVE-2020-1749", "CVE-2020-24394"], "modified": "2020-09-29T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2574-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140449", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2574-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(140449);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/29\");\n\n script_cve_id(\"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-14386\", \"CVE-2020-16166\", \"CVE-2020-1749\", \"CVE-2020-24394\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2574-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup\n(bsc#1165629).\n\nCVE-2020-14314: Fixed a potential negative array index in do_split()\n(bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem\nwhich could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling\n(bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed\nremote attackers to make observations that help to obtain sensitive\ninformation about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions\non new filesystem objects when the filesystem lacks ACL support\n(bsc#1175518).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via\nmemory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1074701\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085235\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1087078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1087082\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094912\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1100394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102640\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152148\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163524\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165629\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166965\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170232\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171688\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172073\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172108\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173485\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174003\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174026\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174070\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174161\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174387\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174547\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174685\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174689\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174699\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174734\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174844\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174926\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174968\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175064\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175065\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175067\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175228\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175232\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175396\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175397\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175398\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175399\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175400\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175402\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175403\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175404\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175405\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175406\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175410\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175414\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175415\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175416\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175419\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175420\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175421\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175422\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175423\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175440\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175493\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175515\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175526\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175668\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175669\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175691\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175767\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175768\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175769\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1176069\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14314/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14356/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14386/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-16166/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-1749/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-24394/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202574-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a6d3c27b\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 12-SP5 :\n\nzypper in -t patch SUSE-SLE-WE-12-SP5-2020-2574=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SDK-12-SP5-2020-2574=1\n\nSUSE Linux Enterprise Server 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-2574=1\n\nSUSE Linux Enterprise Live Patching 12-SP5 :\n\nzypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2020-2574=1\n\nSUSE Linux Enterprise High Availability 12-SP5 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP5-2020-2574=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14386\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/07/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-default-devel-debuginfo-4.12.14-122.37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-122.37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-4.12.14-122.37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-base-4.12.14-122.37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-base-debuginfo-4.12.14-122.37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-debuginfo-4.12.14-122.37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-debugsource-4.12.14-122.37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-devel-4.12.14-122.37.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-syms-4.12.14-122.37.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-29T14:25:13", "description": "The remote Oracle Linux 7 / 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2020-5884 advisory.\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system. (CVE-2020-14356)\n\n - A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.\n (CVE-2020-14385)\n\n - A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity. (CVE-2020-14386)\n\n - A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.\n (CVE-2020-14314)\n\n - A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452. (CVE-2020-25212)\n\n - The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe. (CVE-2020-25284)\n\n - A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812. (CVE-2020-25285)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-10-12T00:00:00", "type": "nessus", "title": "Oracle Linux 7 / 8 : Unbreakable Enterprise kernel (ELSA-2020-5884)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-14314", "CVE-2020-14356", "CVE-2020-14385", "CVE-2020-14386", "CVE-2020-25212", "CVE-2020-25284", "CVE-2020-25285"], "modified": "2021-09-08T00:00:00", "cpe": ["cpe:/o:oracle:linux:7", "cpe:/o:oracle:linux:8", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-tools", "p-cpe:/a:oracle:linux:kernel-uek-tools-libs", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:python-perf"], "id": "ORACLELINUX_ELSA-2020-5884.NASL", "href": "https://www.tenable.com/plugins/nessus/141395", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2020-5884.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(141395);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/09/08\");\n\n script_cve_id(\n \"CVE-2020-14314\",\n \"CVE-2020-14356\",\n \"CVE-2020-14385\",\n \"CVE-2020-14386\",\n \"CVE-2020-25212\",\n \"CVE-2020-25284\",\n \"CVE-2020-25285\"\n );\n\n script_name(english:\"Oracle Linux 7 / 8 : Unbreakable Enterprise kernel (ELSA-2020-5884)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 7 / 8 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe ELSA-2020-5884 advisory.\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found\n in the way when reboot the system. A local user could use this flaw to crash the system or escalate their\n privileges on the system. (CVE-2020-14356)\n\n - A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in\n XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can\n lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading\n to a denial of service. The highest threat from this vulnerability is to system availability.\n (CVE-2020-14385)\n\n - A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root\n privileges from unprivileged processes. The highest threat from this vulnerability is to data\n confidentiality and integrity. (CVE-2020-14386)\n\n - A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file\n system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash\n the system if the directory exists. The highest threat from this vulnerability is to system availability.\n (CVE-2020-14314)\n\n - A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers\n to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c\n instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452. (CVE-2020-25212)\n\n - The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete\n permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap\n rbd block devices, aka CID-f44d04e696fe. (CVE-2020-25284)\n\n - A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be\n used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified\n other impact, aka CID-17743798d812. (CVE-2020-25285)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2020-5884.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14386\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/10/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^(7|8)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 7 / 8', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['5.4.17-2011.7.4.el7uek', '5.4.17-2011.7.4.el8uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2020-5884');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '5.4';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-5.4.17-2011.7.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-5.4.17'},\n {'reference':'kernel-uek-5.4.17-2011.7.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-5.4.17'},\n {'reference':'kernel-uek-debug-5.4.17-2011.7.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-5.4.17'},\n {'reference':'kernel-uek-debug-5.4.17-2011.7.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-5.4.17'},\n {'reference':'kernel-uek-debug-devel-5.4.17-2011.7.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-5.4.17'},\n {'reference':'kernel-uek-debug-devel-5.4.17-2011.7.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-5.4.17'},\n {'reference':'kernel-uek-devel-5.4.17-2011.7.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-5.4.17'},\n {'reference':'kernel-uek-devel-5.4.17-2011.7.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-5.4.17'},\n {'reference':'kernel-uek-doc-5.4.17-2011.7.4.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-5.4.17'},\n {'reference':'kernel-uek-tools-5.4.17-2011.7.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-5.4.17'},\n {'reference':'kernel-uek-tools-5.4.17-2011.7.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-5.4.17'},\n {'reference':'kernel-uek-tools-libs-5.4.17-2011.7.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-libs-5.4.17'},\n {'reference':'perf-5.4.17-2011.7.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python-perf-5.4.17-2011.7.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-uek-5.4.17-2011.7.4.el8uek', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-5.4.17'},\n {'reference':'kernel-uek-5.4.17-2011.7.4.el8uek', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-5.4.17'},\n {'reference':'kernel-uek-debug-5.4.17-2011.7.4.el8uek', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-5.4.17'},\n {'reference':'kernel-uek-debug-5.4.17-2011.7.4.el8uek', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-5.4.17'},\n {'reference':'kernel-uek-debug-devel-5.4.17-2011.7.4.el8uek', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-5.4.17'},\n {'reference':'kernel-uek-debug-devel-5.4.17-2011.7.4.el8uek', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-5.4.17'},\n {'reference':'kernel-uek-devel-5.4.17-2011.7.4.el8uek', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-5.4.17'},\n {'reference':'kernel-uek-devel-5.4.17-2011.7.4.el8uek', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-5.4.17'},\n {'reference':'kernel-uek-doc-5.4.17-2011.7.4.el8uek', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-5.4.17'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-debug / kernel-uek-debug-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:58", "description": "The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\nThis update is signed with the new UEFI signing key for openSUSE. It contains rebuilds of all available KMP packages also rebuilt with the new UEFi signing key. (boo#1174543)\n\nThe following security bugs were fixed :\n\n - CVE-2020-14356: A use after free vulnerability in cgroup BPF component was fixed (bsc#1175213).\n\n - CVE-2020-14331: A buffer over write in vgacon_scroll was fixed (bnc#1174205).\n\n - CVE-2020-16166: The Linux kernel allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n\n - CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth® BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\n - CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\n - CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n\nThe following non-security bugs were fixed :\n\n - 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).\n\n - ACPICA: Dispatcher: add status checks (git-fixes).\n\n - ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).\n\n - ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).\n\n - ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).\n\n - af_key: pfkey_dump needs parameter validation (git-fixes).\n\n - agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n\n - ALSA: asihpi: delete duplicated word (git-fixes).\n\n - ALSA: atmel: Remove invalid 'fall through' comments (git-fixes).\n\n - ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).\n\n - ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).\n\n - ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).\n\n - ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).\n\n - ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).\n\n - ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).\n\n - ALSA: echoaudio: Race conditions around 'opencount' (git-fixes).\n\n - ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).\n\n - ALSA: echoaudio: Remove redundant check (git-fixes).\n\n - ALSA: firewire: fix kernel-doc (git-fixes).\n\n - ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).\n\n - ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).\n\n - ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).\n\n - ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).\n\n - ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).\n\n - ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n\n - ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).\n\n - ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).\n\n - ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).\n\n - ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).\n\n - ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).\n\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).\n\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).\n\n - ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).\n\n - ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).\n\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).\n\n - ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (git-fixes).\n\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).\n\n - ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).\n\n - ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).\n\n - ALSA: hda/realtek - Fix unused variable warning (git-fixes).\n\n - ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).\n\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).\n\n - ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).\n\n - ALSA: hda/tegra: Disable sync-write operation (git-fixes).\n\n - ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n\n - ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n\n - ALSA: isa: delete repeated words in comments (git-fixes).\n\n - ALSA: isa/gus: remove 'set but not used' warning (git-fixes).\n\n - ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).\n\n - ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).\n\n - ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n\n - ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).\n\n - ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).\n\n - ALSA: pci/asihpi: fix kernel-doc (git-fixes).\n\n - ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).\n\n - ALSA: pci/au88x0: remove 'defined but not used' warnings (git-fixes).\n\n - ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).\n\n - ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).\n\n - ALSA: pci: delete repeated words in comments (git-fixes).\n\n - ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/fm801: fix kernel-doc (git-fixes).\n\n - ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).\n\n - ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).\n\n - ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).\n\n - ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).\n\n - ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).\n\n - ALSA: seq: oss: Serialize ioctls (git-fixes).\n\n - ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).\n\n - ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).\n\n - ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n\n - ALSA: usb-audio: add startech usb audio dock name (git-fixes).\n\n - ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).\n\n - ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).\n\n - ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).\n\n - ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).\n\n - ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n\n - ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n\n - ALSA: usb-audio: Fix some typos (git-fixes).\n\n - ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (git-fixes).\n\n - ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).\n\n - ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).\n\n - ALSA: vx_core: remove warning for empty loop body (git-fixes).\n\n - ALSA: xen: remove 'set but not used' warning (git-fixes).\n\n - ALSA: xen: Remove superfluous fall through comments (git-fixes).\n\n - apparmor: ensure that dfa state tables have entries (git-fixes).\n\n - apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).\n\n - apparmor: Fix memory leak of profile proxy (git-fixes).\n\n - apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).\n\n - apparmor: remove useless aafs_create_symlink (git-fixes).\n\n - appletalk: Fix atalk_proc_init() return path (git-fixes).\n\n - arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).\n\n - arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).\n\n - arm64: csum: Fix handling of bad packets (bsc#1175192).\n\n - arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).\n\n - arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).\n\n - arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).\n\n - arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).\n\n - arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).\n\n - arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).\n\n - arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).\n\n - arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).\n\n - arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).\n\n - arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).\n\n - arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).\n\n - arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).\n\n - arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).\n\n - arm64: dts: rockchip: Replace RK805 PMIC node name with 'pmic' on rk3328 boards (none bsc#1175014).\n\n - arm64: dts: uDPU: fix broken ethernet (bsc#1175344).\n\n - arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).\n\n - arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n\n - arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).\n\n - arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).\n\n - arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).\n\n - arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).\n\n - arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).\n\n - arm64: kexec_file: print appropriate variable (bsc#1175187).\n\n - arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).\n\n - arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).\n\n - arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).\n\n - arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).\n\n - arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).\n\n - arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none bsc#1175018).\n\n - arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).\n\n - arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).\n\n - arm64: vdso: do not free unallocated pages (bsc#1175181).\n\n - arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).\n\n - arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).\n\n - arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).\n\n - ARM: percpu.h: fix build error (git-fixes).\n\n - arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n\n - ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).\n\n - ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).\n\n - ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).\n\n - ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).\n\n - ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).\n\n - ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).\n\n - ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).\n\n - ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).\n\n - ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).\n\n - ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).\n\n - ASoC: rt286: fix unexpected interrupt happens (git-fixes).\n\n - ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).\n\n - ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n\n - ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n\n - ASoC: rt5682: Report the button event in the headset type only (git-fixes).\n\n - ASoC: SOF: nocodec: add missing .owner field (git-fixes).\n\n - ASoC: topology: fix kernel oops on route addition error (git-fixes).\n\n - ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).\n\n - ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).\n\n - ASoC: wm8974: remove unsupported clock mode (git-fixes).\n\n - ath10k: Acquire tx_lock in tx error paths (git-fixes).\n\n - ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).\n\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n\n - ath9k: Fix regression with Atheros 9271 (git-fixes).\n\n - atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).\n\n - AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n\n - AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n\n - AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n\n - ax88172a: fix ax88172a_unbind() failures (git-fixes).\n\n - b43: Remove uninitialized_var() usage (git-fixes).\n\n - blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).\n\n - Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).\n\n - Bluetooth: btusb: fix up firmware download sequence (git-fixes).\n\n - Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).\n\n - Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).\n\n - Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).\n\n - Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).\n\n - Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).\n\n - bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n\n - bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n\n - bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).\n\n - bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).\n\n - bpfilter: fix up a sparse annotation (bsc#1155518).\n\n - bpfilter: Initialize pos variable (bsc#1155518).\n\n - bpfilter: reject kernel addresses (bsc#1155518).\n\n - bpfilter: switch to kernel_write (bsc#1155518).\n\n - bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).\n\n - bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).\n\n - brcmfmac: Set timeout value when configuring power save (bsc#1173468).\n\n - brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n\n - bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).\n\n - bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).\n\n - btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).\n\n - btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).\n\n - btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).\n\n - btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).\n\n - btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n\n - btrfs: delete the ordered isize update code (bsc#1175377).\n\n - btrfs: do not set path->leave_spinning for truncate (bsc#1175377).\n\n - btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n\n - btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n\n - btrfs: fix block group leak when removing fails (bsc#1175149).\n\n - btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n\n - btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n\n - btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n\n - btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).\n\n - btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n\n - btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n\n - btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n\n - btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).\n\n - btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n\n - btrfs: fix race between block group removal and block group creation (bsc#1175149).\n\n - btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).\n\n - btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n\n - btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n\n - btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n\n - btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n\n - btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n\n - btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: introduce per-inode file extent tree (bsc#1175377).\n\n - btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n\n - btrfs: move extent_io_tree defs to their own header (bsc#1175377).\n\n - btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).\n\n - btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n\n - btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n\n - btrfs: qgroup: try to flush qgroup space when we get\n -EDQUOT (bsc#1120163).\n\n - btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).\n\n - btrfs: Remove leftover of in-band dedupe (bsc#1175149).\n\n - btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).\n\n - btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).\n\n - btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).\n\n - btrfs: separate out the extent io init function (bsc#1175377).\n\n - btrfs: separate out the extent leak code (bsc#1175377).\n\n - btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).\n\n - btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).\n\n - btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n\n - btrfs: use the file extent tree infrastructure (bsc#1175377).\n\n - bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).\n\n - cfg80211: check vendor command doit pointer before use (git-fixes).\n\n - clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).\n\n - clk: at91: clk-generated: check best_rate against ranges (git-fixes).\n\n - clk: at91: clk-generated: continue if\n __clk_determine_rate() returns error (git-fixes).\n\n - clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).\n\n - clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).\n\n - clk: at91: sam9x60-pll: use logical or for range check (git-fixes).\n\n - clk: at91: sckc: register slow_rc with accuracy option (git-fixes).\n\n - clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).\n\n - clk: bcm63xx-gate: fix last clock availability (git-fixes).\n\n - clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).\n\n - clk: iproc: round clock rate to the closest (git-fixes).\n\n - clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).\n\n - clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).\n\n - clk: rockchip: Revert 'fix wrong mmc sample phase shift for rk3328' (git-fixes).\n\n - clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).\n\n - clk: spear: Remove uninitialized_var() usage (git-fixes).\n\n - clk: st: Remove uninitialized_var() usage (git-fixes).\n\n - console: newport_con: fix an issue about leak related system resources (git-fixes).\n\n - crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).\n\n - crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).\n\n - crypto: ccp - Fix use of merged scatterlists (git-fixes).\n\n - crypto: ccree - fix resource leak on error path (git-fixes).\n\n - crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n\n - crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n\n - crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n\n - dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).\n\n - Delete patches.suse/apparmor-Fix-memory-leak-of-profile-proxy.p atch (bsc#1174627)\n\n - devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n\n - devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).\n\n - /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n\n - /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n\n - devres: keep both device name and resource name in pretty name (git-fixes).\n\n - dlm: remove BUG() before panic() (git-fixes).\n\n - dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).\n\n - dmaengine: dw: Initialize channel before each transfer (git-fixes).\n\n - dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).\n\n - dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n\n - dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).\n\n - dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).\n\n - dmaengine: ioat setting ioat timeout as module parameter (git-fixes).\n\n - dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).\n\n - dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).\n\n - dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).\n\n - dm: do not use waitqueue for request-based DM (bsc#1165933).\n\n - docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)\n\n - dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).\n\n - dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).\n\n - drbd: Remove uninitialized_var() usage (git-fixes).\n\n - driver core: Avoid binding drivers to dead devices (git-fixes).\n\n - drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).\n\n - drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).\n\n - drm/amd/display: Clear dm_state for fast updates (git-fixes).\n\n - drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).\n\n - drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).\n\n - drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) 	* refreshed for context changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0\n\n - drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).\n\n - drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).\n\n - drm/amdgpu: fix preemption unit test (git-fixes).\n\n - drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).\n\n - drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n\n - drm/amdgpu/sdma5: fix wptr overwritten in ->get_wptr() (git-fixes).\n\n - drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).\n\n - drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)\n\n - drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).\n\n - drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n\n - drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) 	* refreshed for context changes\n\n - drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) 	* refreshed for context changes\n\n - drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) 	* move drm_mipi_dbi.c -> tinydrm/mipi-dbi.c\n\n - drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n\n - drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).\n\n - drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).\n\n - drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).\n\n - drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).\n\n - drm: hold gem reference until object is no longer accessed (git-fixes).\n\n - drm/i915: Actually emit the await_start (bsc#1174737).\n\n - drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).\n\n - drm/i915: Do not poison i915_request.link on removal (bsc#1174737).\n\n - drm/i915: Drop no-semaphore boosting (bsc#1174737).\n\n - drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).\n\n - drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) 	* context changes\n\n - drm/i915: Flush execution tasklets before checking request status (bsc#1174737).\n\n - drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).\n\n - drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).\n\n - drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).\n\n - drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).\n\n - drm/i915/gt: Move new timelines to the end of active_list (git-fixes).\n\n - drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) 	* context changes\n\n - drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).\n\n - drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).\n\n - drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).\n\n - drm/i915: Keep track of request among the scheduling lists (bsc#1174737).\n\n - drm/i915: Lock signaler timeline while navigating (bsc#1174737).\n\n - drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).\n\n - drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).\n\n - drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).\n\n - drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) 	* context changes\n\n - drm/i915: Peel dma-fence-chains for await (bsc#1174737).\n\n - drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).\n\n - drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).\n\n - drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).\n\n - drm/i915: Rely on direct submission to the queue (bsc#1174737).\n\n - drm/i915: Remove wait priority boosting (bsc#1174737).\n\n - drm/i915: Reorder await_execution before await_request (bsc#1174737).\n\n - drm/i915: Return early for await_start on same timeline (bsc#1174737).\n\n - drm/i915: Use EAGAIN for trylock failures (bsc#1174737).\n\n - drm/imx: fix use after free (git-fixes).\n\n - drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).\n\n - drm/imx: tve: fix regulator_disable error path (git-fixes).\n\n - drm/ingenic: Fix incorrect assumption about plane->index (bsc#1152489) 	* refreshed for context changes\n\n - drm: mcde: Fix display initialization problem (git-fixes).\n\n - drm/mediatek: Check plane visibility in atomic_update (git-fixes).\n\n - drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n\n - drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).\n\n - drm/msm: fix potential memleak in error branch (git-fixes).\n\n - drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n\n - drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n\n - drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).\n\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).\n\n - drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).\n\n - drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n\n - drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n\n - drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n\n - drm/radeon: fix double free (git-fixes).\n\n - drm/stm: repair runtime power management (git-fixes).\n\n - drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).\n\n - drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).\n\n - drm/tegra: hub: Do not enable orphaned window group (git-fixes).\n\n - drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed for context changes\n\n - drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).\n\n - drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).\n\n - exfat: add missing brelse() calls on error paths (git-fixes).\n\n - exfat: fix incorrect update of stream entry in\n __exfat_truncate() (git-fixes).\n\n - exfat: fix memory leak in exfat_parse_param() (git-fixes).\n\n - exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).\n\n - fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins (git-fixes).\n\n - firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).\n\n - firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).\n\n - firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).\n\n - firmware: Fix a reference count leak (git-fixes).\n\n - firmware_loader: fix memory leak for paged buffer (bsc#1175367).\n\n - firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).\n\n - firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).\n\n - firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).\n\n - firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).\n\n - firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).\n\n - firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).\n\n - firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).\n\n - firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).\n\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n\n - fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file\n\n - fuse: copy_file_range should truncate cache (git-fixes).\n\n - fuse: fix copy_file_range cache issues (git-fixes).\n\n - fuse: Fix parameter for FS_IOC_(GET,SET)FLAGS (bsc#1175176).\n\n - fuse: fix weird page warning (bsc#1175175).\n\n - geneve: fix an uninitialized value in geneve_changelink() (git-fixes).\n\n - genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).\n\n - genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).\n\n - genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).\n\n - gfs2: Another gfs2_find_jhead fix (bsc#1174824).\n\n - gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).\n\n - go7007: add sanity checking for endpoints (git-fixes).\n\n - gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n\n - gpio: arizona: put pm_runtime in case of failure (git-fixes).\n\n - gpio: max77620: Fix missing release of interrupt (git-fixes).\n\n - gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).\n\n - gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).\n\n - gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).\n\n - gpu: host1x: Detach driver on unregister (git-fixes).\n\n - habanalabs: increase timeout during reset (git-fixes).\n\n - HID: alps: support devices with report id 2 (git-fixes).\n\n - HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n\n - HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).\n\n - HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).\n\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n\n - HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).\n\n - HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).\n\n - HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).\n\n - HID: steam: fixes race in handling device list (git-fixes).\n\n - hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).\n\n - hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).\n\n - hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n\n - hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).\n\n - hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).\n\n - hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).\n\n - hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).\n\n - i2c: also convert placeholder function to return errno (git-fixes).\n\n - i2c: eg20t: Load module automatically if ID matches (git-fixes).\n\n - i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).\n\n - i2c: iproc: fix race between client unreg and isr (git-fixes).\n\n - i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).\n\n - i2c: rcar: avoid race when unregistering slave (git-fixes).\n\n - i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).\n\n - i2c: slave: add sanity check when unregistering (git-fixes).\n\n - i2c: slave: improve sanity check when registering (git-fixes).\n\n - i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).\n\n - i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).\n\n - i40iw: fix NULL pointer dereference on a null wqe pointer (git-fixes).\n\n - i40iw: Report correct firmware version (git-fixes).\n\n - IB/cma: Fix ports memory leak in cma_configfs (git-fixes).\n\n - IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).\n\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n\n - IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n\n - IB/hfi1: Ensure pq is not left on waitlist (git-fixes).\n\n - IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).\n\n - IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).\n\n - IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).\n\n - IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).\n\n - IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).\n\n - IB/mad: Fix use after free when destroying MAD agent (git-fixes).\n\n - IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).\n\n - IB/mlx5: Fix 50G per lane indication (git-fixes).\n\n - IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).\n\n - IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).\n\n - IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).\n\n - ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n\n - IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).\n\n - IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).\n\n - IB/rdmavt: Delete unused routine (git-fixes).\n\n - IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).\n\n - IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).\n\n - ide: Remove uninitialized_var() usage (git-fixes).\n\n - ieee802154: fix one possible memleak in adf7242_probe (git-fixes).\n\n - iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).\n\n - iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).\n\n - iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).\n\n - iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).\n\n - iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).\n\n - iio: improve IIO_CONCENTRATION channel type description (git-fixes).\n\n - iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).\n\n - iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).\n\n - iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).\n\n - iio:pressure:ms5611 Fix buffer element alignment (git-fixes).\n\n - iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).\n\n - Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).\n\n - Input: elan_i2c - only increment wakeup count on touch (git-fixes).\n\n - Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).\n\n - Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).\n\n - Input: mms114 - add extra compatible for mms345l (git-fixes).\n\n - Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).\n\n - Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).\n\n - integrity: remove redundant initialization of variable ret (git-fixes).\n\n - intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).\n\n - intel_th: pci: Add Emmitsburg PCH support (git-fixes).\n\n - intel_th: pci: Add Jasper Lake CPU support (git-fixes).\n\n - intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).\n\n - io-mapping: indicate mapping failure (git-fixes).\n\n - iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).\n\n - iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).\n\n - iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).\n\n - ionic: centralize queue reset code (bsc#1167773).\n\n - ionic: fix up filter locks and debug msgs (bsc#1167773).\n\n - ionic: keep rss hash after fw update (bsc#1167773).\n\n - ionic: unlock queue mutex in error path (bsc#1167773).\n\n - ionic: update filter id after replay (bsc#1167773).\n\n - ionic: update the queue count on open (bsc#1167773).\n\n - ionic: use mutex to protect queue operations (bsc#1167773).\n\n - ionic: use offset for ethtool regs data (bsc#1167773).\n\n - irqchip/gic: Atomically update affinity (bsc#1175195).\n\n - kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.pat ch (bsc1174263).\n\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n\n - kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).\n\n - kABI workaround for enum cpuhp_state (git-fixes).\n\n - kABI workaround for struct kvm_device (git-fixes). Just change an variable to 'const' type in kvm_device.\n\n - kABI workaround for struct kvm_vcpu_arch (git-fixes).\n\n - kernel.h: remove duplicate include of asm/div64.h (git-fixes).\n\n - keys: asymmetric: fix error return code in software_key_query() (git-fixes).\n\n - kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).\n\n - KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n\n - KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Annotate hyp NMI-related functions as\n __always_inline (bsc#1175190).\n\n - KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).\n\n - KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).\n\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).\n\n - KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).\n\n - KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).\n\n - KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).\n\n - KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).\n\n - KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).\n\n - KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).\n\n - KVM: nVMX: always update CR3 in VMCS (git-fixes).\n\n - KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).\n\n - KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).\n\n - l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n\n - l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n\n - leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n\n - leds: core: Flush scheduled work for system suspend (git-fixes).\n\n - leds: da903x: fix use-after-free on unbind (git-fixes).\n\n - leds: gpio: Fix semantic error (git-fixes).\n\n - leds: lm3533: fix use-after-free on unbind (git-fixes).\n\n - leds: lm355x: avoid enum conversion warning (git-fixes).\n\n - leds: lm36274: fix use-after-free on unbind (git-fixes).\n\n - leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n\n - libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).\n\n - lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).\n\n - liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n\n - locktorture: Print ratio of acquisitions, not failures (bsc#1149032).\n\n - mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n\n - mac80211: fix misplaced while instead of if (git-fixes).\n\n - mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n\n - mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n\n - media: cec: silence shift wrapping warning in\n __cec_s_log_addrs() (git-fixes).\n\n - media: cxusb-analog: fix V4L2 dependency (git-fixes).\n\n - media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n\n - media: firewire: Using uninitialized values in node_probe() (git-fixes).\n\n - media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).\n\n - media: media-request: Fix crash if memory allocation fails (git-fixes).\n\n - media: nuvoton-cir: remove setting tx carrier functions (git-fixes).\n\n - media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n\n - media: sur40: Remove uninitialized_var() usage (git-fixes).\n\n - media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).\n\n - mei: bus: do not clean driver pointer (git-fixes).\n\n - mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n\n - mfd: dln2: Run event handler loop under spinlock (git-fixes).\n\n - mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).\n\n - mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).\n\n - mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).\n\n - mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).\n\n - mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).\n\n - mm: Fix protection usage propagation (bsc#1174002).\n\n - mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).\n\n - mtd: properly check all write ioctls for permissions (git-fixes).\n\n - mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).\n\n - mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).\n\n - mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).\n\n - mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).\n\n - mwifiex: Prevent memory corruption handling keys (git-fixes).\n\n - nbd: Fix memory leak in nbd_add_socket (git-fixes).\n\n - ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n\n - net/bpfilter: Initialize pos in\n __bpfilter_process_sockopt (bsc#1155518).\n\n - net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).\n\n - net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n\n - netdevsim: fix unbalaced locking in nsim_create() (git-fixes).\n\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n\n - net: ena: add reserved PCI device ID (bsc#1174852).\n\n - net: ena: add support for reporting of packet drops (bsc#1174852).\n\n - net: ena: add support for the rx offset feature (bsc#1174852).\n\n - net: ena: add support for traffic mirroring (bsc#1174852).\n\n - net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n\n - net: ena: allow setting the hash function without changing the key (bsc#1174852).\n\n - net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).\n\n - net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n\n - net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n\n - net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n\n - net: ena: changes to RSS hash key allocation (bsc#1174852).\n\n - net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n\n - net: ena: cosmetic: code reorderings (bsc#1174852).\n\n - net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n\n - net: ena: cosmetic: fix line break issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spacing issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n\n - net: ena: cosmetic: minor code changes (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n\n - net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n\n - net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n\n - net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n\n - net: ena: drop superfluous prototype (bsc#1174852).\n\n - net: ena: enable support of rss hash key and function changes (bsc#1174852).\n\n - net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n\n - net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n\n - net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n\n - net: ena: fix continuous keep-alive resets (bsc#1174852).\n\n - net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n\n - net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n\n - net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n\n - net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n\n - net: ena: Make some functions static (bsc#1174852).\n\n - net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n\n - net: ena: reduce driver load time (bsc#1174852).\n\n - net: ena: remove code that does nothing (bsc#1174852).\n\n - net: ena: remove set but not used variable 'hash_key' (bsc#1174852).\n\n - net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n\n - net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n\n - net: ena: support new LLQ acceleration mode (bsc#1174852).\n\n - net: ena: use explicit variable size for clarity (bsc#1174852).\n\n - net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n\n - net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).\n\n - netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).\n\n - netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).\n\n - netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).\n\n - netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).\n\n - net: Fix a documentation bug wrt.\n ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n\n - net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).\n\n - net: hns3: check reset pending after FLR prepare (bsc#1154353).\n\n - net: hns3: fix error handling for desc filling (git-fixes).\n\n - net: hns3: fix for not calculating TX BD send size correctly (git-fixes).\n\n - net: hns3: fix return value error when query MAC link status fail (git-fixes).\n\n - net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).\n\n - net: lan78xx: add missing endpoint sanity check (git-fixes).\n\n - net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n\n - net: lan78xx: replace bogus endpoint lookup (git-fixes).\n\n - net: macb: call pm_runtime_put_sync on failure path (git-fixes).\n\n - net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).\n\n - net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).\n\n - net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).\n\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).\n\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).\n\n - net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).\n\n - net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).\n\n - net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).\n\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).\n\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).\n\n - net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).\n\n - net: phy: Check harder for errors in get_phy_id() (git-fixes).\n\n - net: phy: fix memory leak in device-create error path (git-fixes).\n\n - net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).\n\n - net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).\n\n - net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).\n\n - net/smc: fix restoring of fallback changes (git-fixes).\n\n - net: stmmac: do not attach interface until resume finishes (bsc#1174072).\n\n - net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).\n\n - net: stmmac: dwc-qos: use generic device api (bsc#1174072).\n\n - net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).\n\n - net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).\n\n - net/tls: fix encryption error checking (git-fixes).\n\n - net/tls: free record only on encryption error (git-fixes).\n\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n\n - nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n\n - nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).\n\n - nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).\n\n - NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).\n\n - NTB: Fix static check warning in perf_clear_test (git-fixes).\n\n - NTB: Fix the default port and peer numbers for legacy drivers (git-fixes).\n\n - ntb: hw: remove the code that sets the DMA mask (git-fixes).\n\n - NTB: ntb_pingpong: Choose doorbells based on port number (git-fixes).\n\n - NTB: ntb_test: Fix bug when counting remote files (git-fixes).\n\n - NTB: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).\n\n - NTB: perf: Do not require one more memory window than number of peers (git-fixes).\n\n - NTB: perf: Fix race condition when run with ntb_test (git-fixes).\n\n - NTB: perf: Fix support for hardware that does not have port numbers (git-fixes).\n\n - ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).\n\n - NTB: Revert the change to use the NTB device dev for DMA allocations (git-fixes).\n\n - ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).\n\n - ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).\n\n - ovl: inode reference leak in ovl_is_inuse true case (git-fixes).\n\n - padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).\n\n - padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).\n\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n\n - PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n\n - PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).\n\n - PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).\n\n - PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).\n\n - PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).\n\n - PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n\n - PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n\n - PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).\n\n - PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n\n - PCI: qcom: Add missing reset for ipq806x (git-fixes).\n\n - PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n\n - PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n\n - PCI: rcar: Fix runtime PM imbalance on error (git-fixes).\n\n - PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n\n - pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n\n - PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n\n - PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n\n - PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).\n\n - percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).\n\n - phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).\n\n - phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).\n\n - phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).\n\n - phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n\n - pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n\n - pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n\n - pinctrl: single: fix function name in documentation (git-fixes).\n\n - pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n\n - platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).\n\n - platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n\n - platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n\n - platform/x86: ISST: Increase timeout (bsc#1174185).\n\n - PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).\n\n - powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n\n - powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n\n - powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n\n - powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n\n - powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n\n - powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).\n\n - powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n\n - powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n\n - powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n\n - powerpc/pseries: PCIE PHB reset (bsc#1174689).\n\n - powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n\n - powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n\n - powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n\n - powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n\n - power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n\n - pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n\n - qed: suppress 'do not support RoCE & iWARP' flooding on HW init (git-fixes).\n\n - qed: suppress false-positives interrupt error messages on HW init (git-fixes).\n\n - r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).\n\n - r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).\n\n - r8169: fix resume on cable plug-in (bsc#1175296).\n\n - r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).\n\n - r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).\n\n - r8169: read common register for PCI commit (bsc#1175296).\n\n - random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).\n\n - random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).\n\n - random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).\n\n - RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).\n\n - RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).\n\n - RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).\n\n - RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).\n\n - RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).\n\n - RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).\n\n - RDMA/cm: Remove a race freeing timewait_info (git-fixes).\n\n - RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).\n\n - RDMA/core: Fix double destruction of uobject (git-fixes).\n\n - RDMA/core: Fix double put of resource (git-fixes).\n\n - RDMA/core: Fix missing error check on dev_set_name() (git-fixes).\n\n - RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).\n\n - RDMA/core: Fix race between destroy and release FD object (git-fixes).\n\n - RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).\n\n - RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).\n\n - RDMA/counter: Query a counter before release (git-fixes).\n\n - RDMA/efa: Set maximum pkeys device attribute (git-fixes).\n\n - RDMA/hns: Bugfix for querying qkey (git-fixes).\n\n - RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).\n\n - RDMA/iwcm: Fix iwcm work deallocation (git-fixes).\n\n - RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).\n\n - RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).\n\n - RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).\n\n - RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).\n\n - RDMA/mlx5: Add init2init as a modify command (git-fixes).\n\n - RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).\n\n - RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).\n\n - RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).\n\n - RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).\n\n - RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).\n\n - RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).\n\n - RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).\n\n - RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).\n\n - RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).\n\n - RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).\n\n - RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).\n\n - RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).\n\n - RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).\n\n - RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).\n\n - RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).\n\n - RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).\n\n - RDMA/rxe: Set default vendor ID (git-fixes).\n\n - RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).\n\n - RDMA/siw: Fix failure handling during device creation (git-fixes).\n\n - RDMA/siw: Fix passive connection establishment (git-fixes).\n\n - RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).\n\n - RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).\n\n - RDMA/siw: Fix reporting vendor_part_id (git-fixes).\n\n - RDMA/siw: Fix setting active_mtu attribute (git-fixes).\n\n - RDMA/siw: Fix setting active_(speed, width) attributes (git-fixes).\n\n - RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).\n\n - RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).\n\n - regmap: debugfs: check count when read regmap file (git-fixes).\n\n - regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).\n\n - regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n\n - regmap: fix alignment issue (git-fixes).\n\n - regmap: Fix memory leak from regmap_register_patch (git-fixes).\n\n - regulator: gpio: Honor regulator-boot-on property (git-fixes).\n\n - remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).\n\n - remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).\n\n - remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).\n\n - Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (git-fixes).\n\n - Revert 'drm/amd/display: Expose connector VRR range via debugfs' (bsc#1152489) 	* refreshed for context changes\n\n - Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (git-fixes).\n\n - Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).\n\n - Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).\n\n - Revert 'thermal: mediatek: fix register index error' (git-fixes).\n\n - rhashtable: Document the right function parameters (bsc#1174880).\n\n - rhashtable: drop duplicated word in <linux/rhashtable.h> (bsc#1174880).\n\n - rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).\n\n - rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).\n\n - rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).\n\n - RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).\n\n - rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.\n\n - rpm/modules.fips: add ecdh_generic (boo#1173813)\n\n - rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (bsc#1154353).\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).\n\n - rtw88: fix LDPC field for RA info (git-fixes).\n\n - rtw88: fix short GI capability based on current bandwidth (git-fixes).\n\n - s390: fix syscall_get_error for compat processes (git-fixes).\n\n - s390/ism: fix error return code in ism_probe() (git-fixes).\n\n - s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).\n\n - s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).\n\n - s390/qdio: consistently restore the IRQ handler (git-fixes).\n\n - s390/qdio: put thinint indicator after early error (git-fixes).\n\n - s390/qdio: tear down thinint indicator after early error (git-fixes).\n\n - s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n\n - sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).\n\n - scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).\n\n - scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).\n\n - scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).\n\n - scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).\n\n - scsi: libfc: free response frame from GPN_ID (bsc#1173849).\n\n - scsi: libfc: Handling of extra kref (bsc#1173849).\n\n - scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).\n\n - scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).\n\n - scsi: libfc: Skip additional kref updating work event (bsc#1173849).\n\n - scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).\n\n - scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).\n\n - selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).\n\n - selinux: fall back to ref-walk if audit is required (bsc#1174333).\n\n - selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).\n\n - seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).\n\n - serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).\n\n - serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).\n\n - serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).\n\n - serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).\n\n - serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).\n\n - serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).\n\n - serial: tegra: fix CREAD handling for PIO (git-fixes).\n\n - SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n\n - soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).\n\n - soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).\n\n - spi: davinci: Remove uninitialized_var() usage (git-fixes).\n\n - spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n\n - spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).\n\n - spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).\n\n - spi: rockchip: Fix error in SPI slave pio read (git-fixes).\n\n - spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n\n - spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).\n\n - spi: spi-geni-qcom: Actually use our FIFO (git-fixes).\n\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).\n\n - spi: sun4i: update max transfer size reported (git-fixes).\n\n - staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n\n - staging: comedi: verify array index is correct before using it (git-fixes).\n\n - Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).\n\n - staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n\n - staging: rtl8712: handle firmware load failure (git-fixes).\n\n - staging: vchiq_arm: Add a matching unregister call (git-fixes).\n\n - staging: wlan-ng: properly check endpoint types (git-fixes).\n\n - SUNRPC dont update timeout value on connection reset (bsc#1174263).\n\n - sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).\n\n - tcp: md5: allow changing MD5 keys in all socket states (git-fixes).\n\n - thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).\n\n - thermal: int3403_thermal: Downgrade error message (git-fixes).\n\n - thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).\n\n - tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).\n\n - tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).\n\n - tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (git-fixes).\n\n - tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n\n - ubsan: check panic_on_warn (bsc#1174805).\n\n - udp: Copy has_conns in reuseport_grow() (git-fixes).\n\n - udp: Improve load balancing for SO_REUSEPORT (git-fixes).\n\n - uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).\n\n - USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).\n\n - usb: chipidea: core: add wakeup support for extcon (git-fixes).\n\n - usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).\n\n - usb: dwc2: Fix shutdown callback in platform (git-fixes).\n\n - usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).\n\n - usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).\n\n - usb: dwc3: pci: add support for the Intel Tiger Lake PCH\n -H variant (git-fixes).\n\n - usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).\n\n - usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).\n\n - usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).\n\n - usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).\n\n - usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).\n\n - usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).\n\n - usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).\n\n - usb: hso: check for return value in hso_serial_common_create() (git-fixes).\n\n - usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n\n - USB: iowarrior: fix up report size handling for some devices (git-fixes).\n\n - usbip: tools: fix module name in man page (git-fixes).\n\n - usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).\n\n - USB: serial: ch341: add new Product ID for CH340 (git-fixes).\n\n - USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n\n - USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n\n - USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).\n\n - USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n\n - USB: serial: iuu_phoenix: fix memory corruption (git-fixes).\n\n - USB: serial: option: add GosunCn GM500 series (git-fixes).\n\n - USB: serial: option: add Quectel EG95 LTE modem (git-fixes).\n\n - USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n\n - usb: tegra: Fix allocation for the FPCI context (git-fixes).\n\n - usb: xhci: define IDs for various ASMedia host controllers (git-fixes).\n\n - usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n\n - usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n\n - usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).\n\n - video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n\n - video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).\n\n - virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n\n - virt: vbox: Fix guest capabilities mask check (git-fixes).\n\n - virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).\n\n - vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n\n - vt: Reject zero-sized screen buffer size (git-fixes).\n\n - vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).\n\n - watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).\n\n - watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).\n\n - watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).\n\n - watchdog: initialize device before misc_register (git-fixes).\n\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n\n - wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n\n - wireless: Use offsetof instead of custom macro (git-fixes).\n\n - wl1251: fix always return 0 error (git-fixes).\n\n - workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).\n\n - xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).\n\n - xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).\n\n - xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).\n\n - xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).\n\n - xfs: fix inode allocation block res calculation precedence (git-fixes).\n\n - xfs: fix reflink quota reservation accounting error (git-fixes).\n\n - xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).", "cvss3": {}, "published": "2020-08-24T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2020-1236)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10781", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-15780", "CVE-2020-16166"], "modified": "2022-05-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:bbswitch", "p-cpe:/a:novell:opensuse:bbswitch-debugsource", "p-cpe:/a:novell:opensuse:drbd-debugsource", "p-cpe:/a:novell:opensuse:bbswitch-kmp-default", "p-cpe:/a:novell:opensuse:drbd-kmp-default", "p-cpe:/a:novell:opensuse:bbswitch-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:drbd-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:bbswitch-kmp-preempt", "p-cpe:/a:novell:opensuse:drbd-kmp-preempt", "p-cpe:/a:novell:opensuse:bbswitch-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:drbd-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-debugsource", "p-cpe:/a:novell:opensuse:hdjmod-kmp-default", "p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:crash", "p-cpe:/a:novell:opensuse:hdjmod-kmp-preempt", "p-cpe:/a:novell:opensuse:crash-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:crash-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:crash-devel", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:crash-eppic", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:crash-eppic-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:crash-gcore", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:crash-gcore-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-default", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-preempt", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:crash-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:dpdk", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:dpdk-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:dpdk-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:dpdk-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:dpdk-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:dpdk-examples", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:dpdk-examples-debuginfo", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:dpdk-kmp-default", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-preempt", "p-cpe:/a:novell:opensuse:dpdk-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-preempt-debuginfo", "p-cpe:/a:novell:opensuse:dpdk-kmp-preempt", "p-cpe:/a:novell:opensuse:kernel-preempt-debugsource", "p-cpe:/a:novell:opensuse:kernel-preempt-devel", "p-cpe:/a:novell:opensuse:dpdk-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:kernel-preempt-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:dpdk-tools", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:libdpdk-20_0", "p-cpe:/a:novell:opensuse:dpdk-tools-debuginfo", "p-cpe:/a:novell:opensuse:drbd", "p-cpe:/a:novell:opensuse:libdpdk-20_0-debuginfo", "p-cpe:/a:novell:opensuse:openafs-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:mhvtl", "p-cpe:/a:novell:opensuse:mhvtl-debuginfo", "p-cpe:/a:novell:opensuse:mhvtl-debugsource", "p-cpe:/a:novell:opensuse:openafs-kmp-preempt", "p-cpe:/a:novell:opensuse:mhvtl-kmp-default", "p-cpe:/a:novell:opensuse:openafs-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:mhvtl-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:mhvtl-kmp-preempt", "p-cpe:/a:novell:opensuse:openafs-server", "p-cpe:/a:novell:opensuse:mhvtl-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:openafs-server-debuginfo", "p-cpe:/a:novell:opensuse:openafs", "p-cpe:/a:novell:opensuse:openafs-authlibs", "p-cpe:/a:novell:opensuse:pcfclock", "p-cpe:/a:novell:opensuse:openafs-authlibs-debuginfo", "p-cpe:/a:novell:opensuse:openafs-authlibs-devel", "p-cpe:/a:novell:opensuse:pcfclock-debuginfo", "p-cpe:/a:novell:opensuse:openafs-client", "p-cpe:/a:novell:opensuse:pcfclock-debugsource", "p-cpe:/a:novell:opensuse:openafs-client-debuginfo", "p-cpe:/a:novell:opensuse:openafs-debuginfo", "p-cpe:/a:novell:opensuse:openafs-debugsource", "p-cpe:/a:novell:opensuse:openafs-devel", "p-cpe:/a:novell:opensuse:pcfclock-kmp-default", "p-cpe:/a:novell:opensuse:openafs-devel-debuginfo", "p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:openafs-fuse_client", "p-cpe:/a:novell:opensuse:pcfclock-kmp-preempt", "p-cpe:/a:novell:opensuse:openafs-fuse_client-debuginfo", "p-cpe:/a:novell:opensuse:pcfclock-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:openafs-kernel-source", "p-cpe:/a:novell:opensuse:openafs-kmp-default", "p-cpe:/a:novell:opensuse:python3-virtualbox", "p-cpe:/a:novell:opensuse:python3-virtualbox-debuginfo", "p-cpe:/a:novell:opensuse:rtl8812au", "p-cpe:/a:novell:opensuse:rtl8812au-debugsource", "p-cpe:/a:novell:opensuse:rtl8812au-kmp-default", "p-cpe:/a:novell:opensuse:rtl8812au-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-websrv", "p-cpe:/a:novell:opensuse:rtl8812au-kmp-preempt", "p-cpe:/a:novell:opensuse:rtl8812au-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons", "p-cpe:/a:novell:opensuse:xtables-addons-debuginfo", "p-cpe:/a:novell:opensuse:sysdig", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-default", "p-cpe:/a:novell:opensuse:sysdig-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:sysdig-debugsource", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-preempt", "p-cpe:/a:novell:opensuse:sysdig-kmp-default", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:sysdig-kmp-default-debuginfo", "cpe:/o:novell:opensuse:15.2", "p-cpe:/a:novell:opensuse:sysdig-kmp-preempt", "p-cpe:/a:novell:opensuse:sysdig-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:v4l2loopback-debugsource", "p-cpe:/a:novell:opensuse:v4l2loopback-kmp-default", "p-cpe:/a:novell:opensuse:v4l2loopback-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:v4l2loopback-kmp-preempt", "p-cpe:/a:novell:opensuse:v4l2loopback-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:v4l2loopback-utils", "p-cpe:/a:novell:opensuse:vhba-kmp-default", "p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:vhba-kmp-preempt", "p-cpe:/a:novell:opensuse:vhba-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox", "p-cpe:/a:novell:opensuse:virtualbox-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-debugsource", "p-cpe:/a:novell:opensuse:virtualbox-devel", "p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons", "p-cpe:/a:novell:opensuse:virtualbox-guest-source", "p-cpe:/a:novell:opensuse:virtualbox-guest-tools", "p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-guest-x11", "p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-host-source", "p-cpe:/a:novell:opensuse:virtualbox-kmp-default", "p-cpe:/a:novell:opensuse:virtualbox-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt", "p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-qt", "p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-vnc"], "id": "OPENSUSE-2020-1236.NASL", "href": "https://www.tenable.com/plugins/nessus/139766", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2020-1236.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139766);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/13\");\n\n script_cve_id(\"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10781\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-15780\", \"CVE-2020-16166\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2020-1236)\");\n script_summary(english:\"Check for the openSUSE-2020-1236 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The openSUSE Leap 15.2 kernel was updated to receive various security\nand bugfixes.\n\nThis update is signed with the new UEFI signing key for openSUSE. It\ncontains rebuilds of all available KMP packages also rebuilt with the\nnew UEFi signing key. (boo#1174543)\n\nThe following security bugs were fixed :\n\n - CVE-2020-14356: A use after free vulnerability in cgroup\n BPF component was fixed (bsc#1175213).\n\n - CVE-2020-14331: A buffer over write in vgacon_scroll was\n fixed (bnc#1174205).\n\n - CVE-2020-16166: The Linux kernel allowed remote\n attackers to make observations that help to obtain\n sensitive information about the internal state of the\n network RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and kernel/time/timer.c\n (bnc#1174757).\n\n - CVE-2020-10135: Legacy pairing and secure-connections\n pairing authentication in Bluetooth® BR/EDR Core\n Specification v5.2 and earlier may have allowed an\n unauthenticated user to complete authentication without\n pairing credentials via adjacent access. An\n unauthenticated, adjacent attacker could impersonate a\n Bluetooth BR/EDR master or slave to pair with a\n previously paired remote device to successfully complete\n the authentication procedure without knowing the link\n key (bnc#1171988).\n\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a\n possible use-after-free due to a race condition. This\n could lead to local escalation of privilege with System\n execution privileges needed. User interaction is not\n needed for exploitation (bnc#1174462).\n\n - CVE-2020-15780: An issue was discovered in\n drivers/acpi/acpi_configfs.c in the Linux kernel\n Injection of malicious ACPI tables via configfs could be\n used by attackers to bypass lockdown and secure boot\n restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\n - CVE-2020-10781: zram sysfs resource consumption was\n fixed (bnc#1173074).\n\nThe following non-security bugs were fixed :\n\n - 9p/trans_fd: Fix concurrency del of req_list in\n p9_fd_cancelled/p9_read_work (git-fixes).\n\n - ACPICA: Dispatcher: add status checks (git-fixes).\n\n - ACPI/IORT: Fix PMCG node single ID mapping handling\n (git-fixes).\n\n - ACPI: video: Use native backlight on Acer Aspire 5783z\n (git-fixes).\n\n - ACPI: video: Use native backlight on Acer TravelMate\n 5735Z (git-fixes).\n\n - af_key: pfkey_dump needs parameter validation\n (git-fixes).\n\n - agp/intel: Fix a memory leak on module initialisation\n failure (git-fixes).\n\n - ALSA: asihpi: delete duplicated word (git-fixes).\n\n - ALSA: atmel: Remove invalid 'fall through' comments\n (git-fixes).\n\n - ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).\n\n - ALSA: echoaduio: Drop superfluous volatile modifier\n (git-fixes).\n\n - ALSA: echoaudio: Address bugs in the interrupt handling\n (git-fixes).\n\n - ALSA: echoaudio: Fix potential Oops in snd_echo_resume()\n (git-fixes).\n\n - ALSA: echoaudio: Prevent races in calls to\n set_audio_format() (git-fixes).\n\n - ALSA: echoaudio: Prevent some noise on unloading the\n module (git-fixes).\n\n - ALSA: echoaudio: Race conditions around 'opencount'\n (git-fixes).\n\n - ALSA: echoaudio: re-enable IRQs on failure path\n (git-fixes).\n\n - ALSA: echoaudio: Remove redundant check (git-fixes).\n\n - ALSA: firewire: fix kernel-doc (git-fixes).\n\n - ALSA: hda: Add support for Loongson 7A1000 controller\n (git-fixes).\n\n - ALSA: hda/ca0132 - Add new quirk ID for Recon3D\n (git-fixes).\n\n - ALSA: hda/ca0132 - Fix AE-5 microphone selection\n commands (git-fixes).\n\n - ALSA: hda/ca0132 - Fix ZxR Headphone gain control get\n value (git-fixes).\n\n - ALSA: hda: Enable sync-write operation as default for\n all controllers (git-fixes).\n\n - ALSA: hda: fix NULL pointer dereference during suspend\n (git-fixes).\n\n - ALSA: hda: fix snd_hda_codec_cleanup() documentation\n (git-fixes).\n\n - ALSA: hda - fix the micmute led status for Lenovo\n ThinkCentre AIO (git-fixes).\n\n - ALSA: hda/hdmi: Add quirk to force connectivity\n (git-fixes).\n\n - ALSA: hda/hdmi: Fix keep_power assignment for\n non-component devices (git-fixes).\n\n - ALSA: hda/hdmi: Use force connectivity quirk on another\n HP desktop (git-fixes).\n\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H\n and EKL (jsc#SLE-13261).\n\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H\n and EKL (jsc#SLE-13261).\n\n - ALSA: hda/realtek: Add alc269/alc662 pin-tables for\n Loongson-3 laptops (git-fixes).\n\n - ALSA: hda/realtek - change to suitable link model for\n ASUS platform (git-fixes).\n\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate\n B311R-31 with ALC256 (git-fixes).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG\n Zephyrus G14(G401) series with ALC289 (git-fixes).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG\n Zephyrus G15(GA502) series with ALC289 (git-fixes).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and\n UX534 (git-fixes).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563\n (git-fixes).\n\n - ALSA: hda/realtek: Fix add a 'ultra_low_power' function\n for intel reference board (alc256) (git-fixes).\n\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding\n quirk for Samsung Notebook Pen S (git-fixes).\n\n - ALSA: hda/realtek - Fixed HP right speaker no sound\n (git-fixes).\n\n - ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged\n (git-fixes).\n\n - ALSA: hda/realtek - Fix unused variable warning\n (git-fixes).\n\n - ALSA: hda/realtek - fixup for yet another Intel\n reference board (git-fixes).\n\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS\n ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).\n\n - ALSA: hda - reverse the setting value in the\n micmute_led_set (git-fixes).\n\n - ALSA: hda/tegra: Disable sync-write operation\n (git-fixes).\n\n - ALSA: hda: Workaround for spurious wakeups on some Intel\n platforms (git-fixes).\n\n - ALSA: info: Drop WARN_ON() from buffer NULL sanity check\n (git-fixes).\n\n - ALSA: isa: delete repeated words in comments\n (git-fixes).\n\n - ALSA: isa/gus: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: isa/gus: remove -Wmissing-prototypes warnings\n (git-fixes).\n\n - ALSA: line6: add hw monitor volume control for POD HD500\n (git-fixes).\n\n - ALSA: line6: Perform sanity check for each URB creation\n (git-fixes).\n\n - ALSA: line6: Sync the pending work cancel at\n disconnection (git-fixes).\n\n - ALSA: line6: Use kmemdup in podhd_set_monitor_level()\n (git-fixes).\n\n - ALSA: pci/asihpi: fix kernel-doc (git-fixes).\n\n - ALSA: pci/asihpi: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/asihpi: remove 'set but not used' warnings\n (git-fixes).\n\n - ALSA: pci/au88x0: remove 'defined but not used' warnings\n (git-fixes).\n\n - ALSA: pci/aw2-saa7146: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).\n\n - ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).\n\n - ALSA: pci: delete repeated words in comments\n (git-fixes).\n\n - ALSA: pci/echoaudio: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/emu10k1: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/es1938: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/fm801: fix kernel-doc (git-fixes).\n\n - ALSA: pci/korg1212: remove 'set but not used' warnings\n (git-fixes).\n\n - ALSA: pci/oxygen/xonar_wm87x6: remove always true\n condition (git-fixes).\n\n - ALSA: pci/rme9652/hdspm: remove always true condition\n (git-fixes).\n\n - ALSA: pci/via82xx: remove 'set but not used' warnings\n (git-fixes).\n\n - ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).\n\n - ALSA: seq: oss: Serialize ioctls (git-fixes).\n\n - ALSA: usb-audio: Add implicit feedback quirk for SSL2\n (git-fixes).\n\n - ALSA: usb-audio: add quirk for Pioneer DDJ-RB\n (git-fixes).\n\n - ALSA: usb-audio: Add registration quirk for Kingston\n HyperX Cloud Flight S (git-fixes).\n\n - ALSA: usb-audio: add startech usb audio dock name\n (git-fixes).\n\n - ALSA: usb-audio: Add support for Lenovo ThinkStation\n P620 (git-fixes).\n\n - ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume\n knob support (git-fixes).\n\n - ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume\n control (git-fixes).\n\n - ALSA: usb-audio: endpoint : remove needless check before\n usb_free_coherent() (git-fixes).\n\n - ALSA: usb-audio: fix overeager device match for\n MacroSilicon MS2109 (bsc#1174625).\n\n - ALSA: usb-audio: Fix race against the error recovery URB\n submission (git-fixes).\n\n - ALSA: usb-audio: Fix some typos (git-fixes).\n\n - ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus'\n (git-fixes).\n\n - ALSA: usb-audio: work around streaming quirk for\n MacroSilicon MS2109 (git-fixes).\n\n - ALSA: usb/line6: remove 'defined but not used' warning\n (git-fixes).\n\n - ALSA: vx_core: remove warning for empty loop body\n (git-fixes).\n\n - ALSA: xen: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: xen: Remove superfluous fall through comments\n (git-fixes).\n\n - apparmor: ensure that dfa state tables have entries\n (git-fixes).\n\n - apparmor: fix introspection of of task mode for\n unconfined tasks (git-fixes).\n\n - apparmor: Fix memory leak of profile proxy (git-fixes).\n\n - apparmor: Fix use-after-free in aa_audit_rule_init\n (git-fixes).\n\n - apparmor: remove useless aafs_create_symlink\n (git-fixes).\n\n - appletalk: Fix atalk_proc_init() return path\n (git-fixes).\n\n - arm64: armv8_deprecated: Fix undef_hook mask for thumb\n setend (bsc#1175180).\n\n - arm64: cacheflush: Fix KGDB trap detection\n (bsc#1175188).\n\n - arm64: csum: Fix handling of bad packets (bsc#1175192).\n\n - arm64: dts: allwinner: a64: Remove unused SPDIF sound\n card (none bsc#1175016).\n\n - arm64: dts: clearfog-gt-8k: set gigabit PHY reset\n deassert delay (bsc#1175347).\n\n - arm64: dts: exynos: Fix silent hang after boot on\n Espresso (bsc#1175346).\n\n - arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range\n (none bsc#1175019).\n\n - arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY\n (bsc#1175345).\n\n - arm64: dts: librem5-devkit: add a vbus supply to usb0\n (none bsc#1175013).\n\n - arm64: dts: ls1028a: delete extraneous #interrupt-cells\n for ENETC RCIE (none bsc#1175012).\n\n - arm64: dts: ls1043a-rdb: correct RGMII delay mode to\n rgmii-id (bsc#1174398).\n\n - arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID\n mode (bsc#1174398).\n\n - arm64: dts: qcom: msm8998-clamshell: Fix label on l15\n regulator (git-fixes).\n\n - arm64: dts: rockchip: fix rk3399-puma gmac reset gpio\n (none bsc#1175021).\n\n - arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio\n (none bsc#1175020).\n\n - arm64: dts: rockchip: Rename dwc3 device nodes on rk3399\n to make dtc happy (none bsc#1175015).\n\n - arm64: dts: rockchip: Replace RK805 PMIC node name with\n 'pmic' on rk3328 boards (none bsc#1175014).\n\n - arm64: dts: uDPU: fix broken ethernet (bsc#1175344).\n\n - arm64: dts: uniphier: Set SCSSI clock and reset IDs for\n each channel (none bsc#1175011).\n\n - arm64: errata: use arm_smccc_1_1_get_conduit()\n (bsc#1174906).\n\n - arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).\n\n - arm64: fix the flush_icache_range arguments in\n machine_kexec (bsc#1175184).\n\n - arm64: hugetlb: avoid potential NULL dereference\n (bsc#1175183).\n\n - arm64: hw_breakpoint: Do not invoke overflow handler on\n uaccess watchpoints (bsc#1175189).\n\n - arm64: insn: Fix two bugs in encoding 32-bit logical\n immediates (bsc#1175186).\n\n - arm64: kexec_file: print appropriate variable\n (bsc#1175187).\n\n - arm64: kgdb: Fix single-step exception handling oops\n (bsc#1175191).\n\n - arm64: Retrieve stolen time as paravirtualized guest\n (bsc#1172197 jsc#SLE-13593).\n\n - arm64: Retrieve stolen time as paravirtualized guest\n (bsc#1172197 jsc#SLE-13593).\n\n - arm64: tegra: Enable I2C controller for EEPROM (none\n bsc#1175010).\n\n - arm64: tegra: Fix ethernet phy-mode for Jetson Xavier\n (none bsc#1175017).\n\n - arm64: tegra: Fix flag for 64-bit resources in 'ranges'\n property (none bsc#1175018).\n\n - arm64: tegra: Fix Tegra194 PCIe compatible string (none\n bsc#1175009).\n\n - arm64: vdso: Add -fasynchronous-unwind-tables to cflags\n (bsc#1175182).\n\n - arm64: vdso: do not free unallocated pages\n (bsc#1175181).\n\n - arm/arm64: Make use of the SMCCC 1.1 wrapper\n (bsc#1174906).\n\n - arm/arm64: Provide a wrapper for SMCCC 1.1 calls\n (bsc#1174906).\n\n - arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()\n (bsc#1174906).\n\n - ARM: percpu.h: fix build error (git-fixes).\n\n - arm: spectre-v2: use arm_smccc_1_1_get_conduit()\n (bsc#1174906).\n\n - ASoC: codecs: max98373: Removed superfluous volume\n control from chip default (git-fixes).\n\n - ASoc: codecs: max98373: remove Idle_bias_on to let codec\n suspend (git-fixes).\n\n - ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK\n (git-fixes).\n\n - ASoC: hdac_hda: fix deadlock after PCM open error\n (git-fixes).\n\n - ASoC: Intel: bxt_rt298: add missing .owner field\n (git-fixes).\n\n - ASoC: Intel: bytcht_es8316: Add missed put_device()\n (git-fixes).\n\n - ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).\n\n - ASoC: meson: axg-tdm-interface: fix link fmt setup\n (git-fixes).\n\n - ASoC: meson: fixes the missed kfree() for\n axg_card_add_tdm_loopback (git-fixes).\n\n - ASoC: rockchip: add format and rate constraints on\n rk3399 (git-fixes).\n\n - ASoC: rt286: fix unexpected interrupt happens\n (git-fixes).\n\n - ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and\n enable it on the Lenovo Miix 2 10 (git-fixes).\n\n - ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n\n - ASoC: rt5670: Fix dac- and adc- vol-tlv values being off\n by a factor of 10 (git-fixes).\n\n - ASoC: rt5682: Report the button event in the headset\n type only (git-fixes).\n\n - ASoC: SOF: nocodec: add missing .owner field\n (git-fixes).\n\n - ASoC: topology: fix kernel oops on route addition error\n (git-fixes).\n\n - ASoC: topology: fix tlvs in error handling for\n widget_dmixer (git-fixes).\n\n - ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).\n\n - ASoC: wm8974: remove unsupported clock mode (git-fixes).\n\n - ath10k: Acquire tx_lock in tx error paths (git-fixes).\n\n - ath10k: enable transmit data ack RSSI for QCA9884\n (git-fixes).\n\n - ath9k: Fix general protection fault in\n ath9k_hif_usb_rx_cb (git-fixes).\n\n - ath9k: Fix regression with Atheros 9271 (git-fixes).\n\n - atm: fix atm_dev refcnt leaks in\n atmtcp_remove_persistent (git-fixes).\n\n - AX.25: Fix out-of-bounds read in ax25_connect()\n (git-fixes).\n\n - AX.25: Prevent integer overflows in connect and sendmsg\n (git-fixes).\n\n - AX.25: Prevent out-of-bounds read in ax25_sendmsg()\n (git-fixes).\n\n - ax88172a: fix ax88172a_unbind() failures (git-fixes).\n\n - b43: Remove uninitialized_var() usage (git-fixes).\n\n - blk-mq: consider non-idle request as 'inflight' in\n blk_mq_rq_inflight() (bsc#1165933).\n\n - Bluetooth: btmtksdio: fix up firmware download sequence\n (git-fixes).\n\n - Bluetooth: btusb: fix up firmware download sequence\n (git-fixes).\n\n - Bluetooth: fix kernel oops in store_pending_adv_report\n (git-fixes).\n\n - Bluetooth: Fix slab-out-of-bounds read in\n hci_extended_inquiry_result_evt() (git-fixes).\n\n - Bluetooth: Fix update of connection state in\n `hci_encrypt_cfm` (git-fixes).\n\n - Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct\n flags (git-fixes).\n\n - Bluetooth: hci_serdev: Only unregister device if it was\n registered (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in\n hci_inquiry_result_evt() (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in\n hci_inquiry_result_with_rssi_evt() (git-fixes).\n\n - bnxt_en: Init ethtool link settings after reading\n updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n\n - bnxt_en: Init ethtool link settings after reading\n updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n\n - bpf: Do not allow btf_ctx_access with __int128 types\n (bsc#1155518).\n\n - bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).\n\n - bpfilter: fix up a sparse annotation (bsc#1155518).\n\n - bpfilter: Initialize pos variable (bsc#1155518).\n\n - bpfilter: reject kernel addresses (bsc#1155518).\n\n - bpfilter: switch to kernel_write (bsc#1155518).\n\n - bpf: net: Avoid copying sk_user_data of reuseport_array\n during sk_clone (bsc#1155518).\n\n - bpf: net: Avoid incorrect bpf_sk_reuseport_detach call\n (bsc#1155518).\n\n - brcmfmac: Set timeout value when configuring power save\n (bsc#1173468).\n\n - brcmfmac: Transform compatible string for FW loading\n (bsc#1169771).\n\n - bridge: Avoid infinite loop when suppressing NS messages\n with invalid options (networking-stable-20_06_10).\n\n - bridge: mcast: Fix MLD2 Report IPv6 payload length check\n (git-fixes).\n\n - btmrvl: Fix firmware filename for sd8977 chipset\n (git-fixes).\n\n - btmrvl: Fix firmware filename for sd8997 chipset\n (git-fixes).\n\n - btrfs: add assertions for tree == inode->io_tree to\n extent IO helpers (bsc#1174438).\n\n - btrfs: avoid unnecessary splits when setting bits on an\n extent io tree (bsc#1175377).\n\n - btrfs: change timing for qgroup reserved space for\n ordered extents to fix reserved space leak\n (bsc#1172247).\n\n - btrfs: delete the ordered isize update code\n (bsc#1175377).\n\n - btrfs: do not set path->leave_spinning for truncate\n (bsc#1175377).\n\n - btrfs: drop argument tree from\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: file: reserve qgroup space after the hole punch\n range is locked (bsc#1172247).\n\n - btrfs: fix a block group ref counter leak after failure\n to remove block group (bsc#1175149).\n\n - btrfs: fix block group leak when removing fails\n (bsc#1175149).\n\n - btrfs: fix bytes_may_use underflow when running balance\n and scrub in parallel (bsc#1175149).\n\n - btrfs: fix corrupt log due to concurrent fsync of inodes\n with shared extents (bsc#1175149).\n\n - btrfs: fix data block group relocation failure due to\n concurrent scrub (bsc#1175149).\n\n - btrfs: fix deadlock during fast fsync when logging\n prealloc extents beyond eof (bsc#1175377).\n\n - btrfs: fix double free on ulist after backref resolution\n failure (bsc#1175149).\n\n - btrfs: fix failure of RWF_NOWAIT write into prealloc\n extent beyond eof (bsc#1174438).\n\n - btrfs: fix fatal extent_buffer readahead vs releasepage\n race (bsc#1175149).\n\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT\n write (bsc#1174438).\n\n - btrfs: fix lost i_size update after cloning inline\n extent (bsc#1175377).\n\n - btrfs: fix page leaks after failure to lock page for\n delalloc (bsc#1175149).\n\n - btrfs: fix race between block group removal and block\n group creation (bsc#1175149).\n\n - btrfs: fix race between shrinking truncate and fiemap\n (bsc#1175377).\n\n - btrfs: fix RWF_NOWAIT write not failling when we need to\n cow (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks\n and waiting for IO (bsc#1174438).\n\n - btrfs: fix space_info bytes_may_use underflow after\n nocow buffered write (bsc#1175149).\n\n - btrfs: fix space_info bytes_may_use underflow during\n space cache writeout (bsc#1175149).\n\n - btrfs: fix wrong file range cleanup after an error\n filling dealloc range (bsc#1175149).\n\n - btrfs: inode: fix NULL pointer dereference if inode does\n not need compression (bsc#1174484).\n\n - btrfs: inode: move qgroup reserved space release to the\n callers of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: inode: refactor the parameters of\n insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: introduce per-inode file extent tree\n (bsc#1175377).\n\n - btrfs: make btrfs_ordered_extent naming consistent with\n btrfs_file_extent_item (bsc#1172247).\n\n - btrfs: move extent_io_tree defs to their own header\n (bsc#1175377).\n\n - btrfs: Move free_pages_out label in inline extent\n handling branch in compress_file_range (bsc#1175263).\n\n - btrfs: qgroup: allow to unreserve range without\n releasing other ranges (bsc#1120163).\n\n - btrfs: qgroup: fix data leak caused by race between\n writeback and truncate (bsc#1172247).\n\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of\n reserve retry-after-EDQUOT (bsc#1120163).\n\n - btrfs: qgroup: try to flush qgroup space when we get\n -EDQUOT (bsc#1120163).\n\n - btrfs: Remove delalloc_end argument from\n extent_clear_unlock_delalloc (bsc#1175149).\n\n - btrfs: Remove leftover of in-band dedupe (bsc#1175149).\n\n - btrfs: remove unnecessary delalloc mutex for inodes\n (bsc#1175377).\n\n - btrfs: Rename btrfs_join_transaction_nolock\n (bsc#1175377).\n\n - btrfs: replace all uses of btrfs_ordered_update_i_size\n (bsc#1175377).\n\n - btrfs: separate out the extent io init function\n (bsc#1175377).\n\n - btrfs: separate out the extent leak code (bsc#1175377).\n\n - btrfs: trim: fix underflow in trim length to prevent\n access beyond device boundary (bsc#1175263).\n\n - btrfs: use btrfs_ordered_update_i_size in\n clone_finish_inode_update (bsc#1175377).\n\n - btrfs: use correct count in btrfs_file_write_iter()\n (bsc#1174438).\n\n - btrfs: use the file extent tree infrastructure\n (bsc#1175377).\n\n - bus: ti-sysc: Do not disable on suspend for no-idle\n (git-fixes).\n\n - cfg80211: check vendor command doit pointer before use\n (git-fixes).\n\n - clk: actions: Fix h_clk for Actions S500 SoC\n (git-fixes).\n\n - clk: at91: clk-generated: check best_rate against ranges\n (git-fixes).\n\n - clk: at91: clk-generated: continue if\n __clk_determine_rate() returns error (git-fixes).\n\n - clk: at91: sam9x60: fix main rc oscillator frequency\n (git-fixes).\n\n - clk: at91: sam9x60-pll: check fcore against ranges\n (git-fixes).\n\n - clk: at91: sam9x60-pll: use logical or for range check\n (git-fixes).\n\n - clk: at91: sckc: register slow_rc with accuracy option\n (git-fixes).\n\n - clk: bcm2835: Do not use prediv with bcm2711's PLLs\n (bsc#1174865).\n\n - clk: bcm63xx-gate: fix last clock availability\n (git-fixes).\n\n - clk: clk-atlas6: fix return value check in\n atlas6_clk_init() (git-fixes).\n\n - clk: iproc: round clock rate to the closest (git-fixes).\n\n - clk: qcom: gcc-sdm660: Add missing modem reset\n (git-fixes).\n\n - clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk\n (git-fixes).\n\n - clk: rockchip: Revert 'fix wrong mmc sample phase shift\n for rk3328' (git-fixes).\n\n - clk: scmi: Fix min and max rate when registering clocks\n with discrete rates (git-fixes).\n\n - clk: spear: Remove uninitialized_var() usage\n (git-fixes).\n\n - clk: st: Remove uninitialized_var() usage (git-fixes).\n\n - console: newport_con: fix an issue about leak related\n system resources (git-fixes).\n\n - crc-t10dif: Fix potential crypto notify dead-lock\n (git-fixes).\n\n - crypto: caam - Fix argument type in\n handle_imx6_err005766 (git-fixes).\n\n - crypto: ccp - Fix use of merged scatterlists\n (git-fixes).\n\n - crypto: ccree - fix resource leak on error path\n (git-fixes).\n\n - crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP\n was not specified (git-fixes).\n\n - crypto: hisilicon - do not sleep of\n CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n\n - crypto: qat - fix double free in\n qat_uclo_create_batch_init_list (git-fixes).\n\n - dccp: Fix possible memleak in dccp_init and dccp_fini\n (networking-stable-20_06_16).\n\n - Delete\n patches.suse/apparmor-Fix-memory-leak-of-profile-proxy.p\n atch (bsc#1174627)\n\n - devinet: fix memleak in inetdev_init()\n (networking-stable-20_06_07).\n\n - devlink: ignore -EOPNOTSUPP errors on dumpit\n (bsc#1154353).\n\n - /dev/mem: Add missing memory barriers for devmem_inode\n (git-fixes).\n\n - /dev/mem: Revoke mappings when a driver claims the\n region (git-fixes).\n\n - devres: keep both device name and resource name in\n pretty name (git-fixes).\n\n - dlm: remove BUG() before panic() (git-fixes).\n\n - dmaengine: dmatest: stop completed threads when running\n without set channel (git-fixes).\n\n - dmaengine: dw: Initialize channel before each transfer\n (git-fixes).\n\n - dmaengine: fsl-edma-common: correct DSIZE_32BYTE\n (git-fixes).\n\n - dmaengine: fsl-edma: Fix NULL pointer exception in\n fsl_edma_tx_handler (git-fixes).\n\n - dmaengine: fsl-edma: fix wrong tcd endianness for\n big-endian cpu (git-fixes).\n\n - dmaengine: imx-sdma: Fix: Remove 'always true'\n comparison (git-fixes).\n\n - dmaengine: ioat setting ioat timeout as module parameter\n (git-fixes).\n\n - dmaengine: mcf-edma: Fix NULL pointer exception in\n mcf_edma_tx_handler (git-fixes).\n\n - dmaengine: sh: usb-dmac: set tx_result parameters\n (git-fixes).\n\n - dmaengine: tegra210-adma: Fix runtime PM imbalance on\n error (git-fixes).\n\n - dm: do not use waitqueue for request-based DM\n (bsc#1165933).\n\n - docs: fix memory.low description in cgroup-v2.rst\n (git-fixes). (SLE documentation might refer to\n cgroup-v2.rst.)\n\n - dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).\n\n - dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).\n\n - drbd: Remove uninitialized_var() usage (git-fixes).\n\n - driver core: Avoid binding drivers to dead devices\n (git-fixes).\n\n - drivers/firmware/psci: Fix memory leakage in\n alloc_init_cpu_groups() (git-fixes).\n\n - drivers/net/wan: lapb: Corrected the usage of skb_cow\n (git-fixes).\n\n - drm/amd/display: Clear dm_state for fast updates\n (git-fixes).\n\n - drm/amd/display: Use kfree() to free rgb_user in\n calculate_user_regamma_ramp() (git-fixes).\n\n - drm/amdgpu/atomfirmware: fix vram_info fetching for\n renoir (git-fixes).\n\n - drm/amdgpu/display: use blanked rather than plane state\n for sync (bsc#1152489) 	* refreshed for context\n changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0\n\n - drm/amdgpu: do not do soft recovery if gpu_recovery=0\n (git-fixes).\n\n - drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\n (git-fixes).\n\n - drm/amdgpu: fix preemption unit test (git-fixes).\n\n - drm/amdgpu/gfx10: fix race condition for kiq\n (git-fixes).\n\n - drm/amdgpu: Prevent kernel-infoleak in\n amdgpu_info_ioctl() (git-fixes).\n\n - drm/amdgpu/sdma5: fix wptr overwritten in ->get_wptr()\n (git-fixes).\n\n - drm/amdgpu: use %u rather than %d for sclk/mclk\n (git-fixes).\n\n - drm/amd/powerplay: fix a crash when overclocking Vega M\n (bsc#1152472)\n\n - drm/amd/powerplay: fix a crash when overclocking Vega M\n (git-fixes).\n\n - drm/arm: fix unintentional integer overflow on left\n shift (git-fixes).\n\n - drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc\n ptr in (bsc#1152472) 	* refreshed for context changes\n\n - drm/bridge: sil_sii8620: initialize return of\n sii8620_readb (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Clear old error bits before\n AUX transfers (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment\n for local array (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock\n choice (bsc#1152489) 	* refreshed for context changes\n\n - drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472)\n 	* move drm_mipi_dbi.c -> tinydrm/mipi-dbi.c\n\n - drm/etnaviv: Fix error path on failure to enable bus clk\n (git-fixes).\n\n - drm/exynos: fix ref count leak in mic_pre_enable\n (git-fixes).\n\n - drm/exynos: Properly propagate return value in\n drm_iommu_attach_device() (git-fixes).\n\n - drm: fix drm_dp_mst_port refcount leaks in\n drm_dp_mst_allocate_vcpi (git-fixes).\n\n - drm/gem: Fix a leak in drm_gem_objects_lookup()\n (git-fixes).\n\n - drm: hold gem reference until object is no longer\n accessed (git-fixes).\n\n - drm/i915: Actually emit the await_start (bsc#1174737).\n\n - drm/i915: Copy across scheduler behaviour flags across\n submit fences (bsc#1174737).\n\n - drm/i915: Do not poison i915_request.link on removal\n (bsc#1174737).\n\n - drm/i915: Drop no-semaphore boosting (bsc#1174737).\n\n - drm/i915: Eliminate the trylock for awaiting an earlier\n request (bsc#1174737).\n\n - drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489)\n 	* context changes\n\n - drm/i915: Flush execution tasklets before checking\n request status (bsc#1174737).\n\n - drm/i915: Flush tasklet submission before sleeping on\n i915_request_wait (bsc#1174737).\n\n - drm/i915/gt: Close race between engine_park and\n intel_gt_retire_requests (git-fixes).\n\n - drm/i915/gt: Flush submission tasklet before\n waiting/retiring (bsc#1174737).\n\n - drm/i915/gt: Ignore irq enabling on the virtual engines\n (git-fixes).\n\n - drm/i915/gt: Move new timelines to the end of\n active_list (git-fixes).\n\n - drm/i915/gt: Only swap to a random sibling once upon\n creation (bsc#1152489) 	* context changes\n\n - drm/i915/gt: Unlock engine-pm after queuing the kernel\n context switch (git-fixes).\n\n - drm/i915: Ignore submit-fences on the same timeline\n (bsc#1174737).\n\n - drm/i915: Improve the start alignment of bonded pairs\n (bsc#1174737).\n\n - drm/i915: Keep track of request among the scheduling\n lists (bsc#1174737).\n\n - drm/i915: Lock signaler timeline while navigating\n (bsc#1174737).\n\n - drm/i915: Mark i915_request.timeline as a volatile, rcu\n pointer (bsc#1174737).\n\n - drm/i915: Mark racy read of intel_engine_cs.saturated\n (bsc#1174737).\n\n - drm/i915: Mark up unlocked update of\n i915_request.hwsp_seqno (bsc#1174737).\n\n - drm/i915: Move cec_notifier to\n intel_hdmi_connector_unregister, v2. (bsc#1152489) 	*\n context changes\n\n - drm/i915: Peel dma-fence-chains for await (bsc#1174737).\n\n - drm/i915: Prevent using semaphores to chain up to\n external fences (bsc#1174737).\n\n - drm/i915: Protect i915_request_await_start from early\n waits (bsc#1174737).\n\n - drm/i915: Pull waiting on an external dma-fence into its\n routine (bsc#1174737).\n\n - drm/i915: Rely on direct submission to the queue\n (bsc#1174737).\n\n - drm/i915: Remove wait priority boosting (bsc#1174737).\n\n - drm/i915: Reorder await_execution before await_request\n (bsc#1174737).\n\n - drm/i915: Return early for await_start on same timeline\n (bsc#1174737).\n\n - drm/i915: Use EAGAIN for trylock failures (bsc#1174737).\n\n - drm/imx: fix use after free (git-fixes).\n\n - drm/imx: imx-ldb: Disable both channels for split mode\n in enc->disable() (git-fixes).\n\n - drm/imx: tve: fix regulator_disable error path\n (git-fixes).\n\n - drm/ingenic: Fix incorrect assumption about plane->index\n (bsc#1152489) 	* refreshed for context changes\n\n - drm: mcde: Fix display initialization problem\n (git-fixes).\n\n - drm/mediatek: Check plane visibility in atomic_update\n (git-fixes).\n\n - drm/mipi: use dcs write for\n mipi_dsi_dcs_set_tear_scanline (git-fixes).\n\n - drm/msm/dpu: allow initialization of encoder locks\n during encoder init (git-fixes).\n\n - drm/msm: fix potential memleak in error branch\n (git-fixes).\n\n - drm/nouveau/fbcon: fix module unload when fbcon init has\n failed for some reason (git-fixes).\n\n - drm/nouveau/fbcon: zero-initialise the mode_cmd2\n structure (git-fixes).\n\n - drm/nouveau/i2c/g94-: increase\n NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).\n\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA\n panel (git-fixes).\n\n - drm: panel-orientation-quirks: Use generic\n orientation-data for Acer S1003 (git-fixes).\n\n - drm/panel: otm8009a: Drop unnessary\n backlight_device_unregister() (git-fixes).\n\n - drm: panel: simple: Fix bpc for LG LB070WV8 panel\n (git-fixes).\n\n - drm/radeon: fix array out-of-bounds read and write\n issues (git-fixes).\n\n - drm/radeon: fix double free (git-fixes).\n\n - drm/stm: repair runtime power management (git-fixes).\n\n - drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).\n\n - drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on\n A20 (git-fixes).\n\n - drm/tegra: hub: Do not enable orphaned window group\n (git-fixes).\n\n - drm/vgem: Replace opencoded version of\n drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed\n for context changes\n\n - drm/vmwgfx: Fix two list_for_each loop exit tests\n (git-fixes).\n\n - drm/vmwgfx: Use correct vmw_legacy_display_unit pointer\n (git-fixes).\n\n - exfat: add missing brelse() calls on error paths\n (git-fixes).\n\n - exfat: fix incorrect update of stream entry in\n __exfat_truncate() (git-fixes).\n\n - exfat: fix memory leak in exfat_parse_param()\n (git-fixes).\n\n - exfat: move setting VOL_DIRTY over\n exfat_remove_entries() (git-fixes).\n\n - fbdev: Detect integer underflow at 'struct\n fbcon_ops'->clear_margins (git-fixes).\n\n - firmware: arm_scmi: Fix SCMI genpd domain probing\n (git-fixes).\n\n - firmware: arm_scmi: Keep the discrete clock rates sorted\n (git-fixes).\n\n - firmware: arm_sdei: use common SMCCC_CONDUIT_*\n (bsc#1174906).\n\n - firmware: Fix a reference count leak (git-fixes).\n\n - firmware_loader: fix memory leak for paged buffer\n (bsc#1175367).\n\n - firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).\n\n - firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).\n\n - firmware: smccc: Add function to fetch SMCCC version\n (bsc#1174906).\n\n - firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to\n identify SMCCC v1.1 and above (bsc#1174906).\n\n - firmware: smccc: Add the definition for SMCCCv1.2\n version/error codes (bsc#1174906).\n\n - firmware: smccc: Drop smccc_version enum and use\n ARM_SMCCC_VERSION_1_x instead (bsc#1174906).\n\n - firmware: smccc: Refactor SMCCC specific bits into\n separate file (bsc#1174906).\n\n - firmware: smccc: Update link to latest SMCCC\n specification (bsc#1174906).\n\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n\n - fsl/fman: detect FMan erratum A050385 (bsc#1174396)\n Update arm64 config file\n\n - fuse: copy_file_range should truncate cache (git-fixes).\n\n - fuse: fix copy_file_range cache issues (git-fixes).\n\n - fuse: Fix parameter for FS_IOC_(GET,SET)FLAGS\n (bsc#1175176).\n\n - fuse: fix weird page warning (bsc#1175175).\n\n - geneve: fix an uninitialized value in\n geneve_changelink() (git-fixes).\n\n - genirq/affinity: Improve __irq_build_affinity_masks()\n (bsc#1174897 ltc#187090).\n\n - genirq/affinity: Remove const qualifier from\n node_to_cpumask argument (bsc#1174897 ltc#187090).\n\n - genirq/affinity: Spread vectors on node according to\n nr_cpu ratio (bsc#1174897 ltc#187090).\n\n - gfs2: Another gfs2_find_jhead fix (bsc#1174824).\n\n - gfs2: fix gfs2_find_jhead that returns uninitialized\n jhead with seq 0 (bsc#1174825).\n\n - go7007: add sanity checking for endpoints (git-fixes).\n\n - gpio: arizona: handle pm_runtime_get_sync failure case\n (git-fixes).\n\n - gpio: arizona: put pm_runtime in case of failure\n (git-fixes).\n\n - gpio: max77620: Fix missing release of interrupt\n (git-fixes).\n\n - gpio: pca953x: disable regmap locking for automatic\n address incrementing (git-fixes).\n\n - gpio: pca953x: Fix GPIO resource leak on Intel Galileo\n Gen 2 (git-fixes).\n\n - gpio: pca953x: Override IRQ for one of the expanders on\n Galileo Gen 2 (git-fixes).\n\n - gpu: host1x: Detach driver on unregister (git-fixes).\n\n - habanalabs: increase timeout during reset (git-fixes).\n\n - HID: alps: support devices with report id 2 (git-fixes).\n\n - HID: apple: Disable Fn-key key-re-mapping on clone\n keyboards (git-fixes).\n\n - HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor\n override (git-fixes).\n\n - HID: logitech-hidpp: avoid repeated 'multiplier = ' log\n messages (git-fixes).\n\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n\n - HID: quirks: Always poll Obins Anne Pro 2 keyboard\n (git-fixes).\n\n - HID: quirks: Ignore Simply Automated UPB PIM\n (git-fixes).\n\n - HID: quirks: Remove ITE 8595 entry from\n hid_have_special_driver (git-fixes).\n\n - HID: steam: fixes race in handling device list\n (git-fixes).\n\n - hippi: Fix a size used in a 'pci_free_consistent()' in\n an error handling path (git-fixes).\n\n - hwmon: (adm1275) Make sure we are reading enough data\n for different chips (git-fixes).\n\n - hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow\n (git-fixes).\n\n - hwmon: (emc2103) fix unable to change fan pwm1_enable\n attribute (git-fixes).\n\n - hwmon: (nct6775) Accept PECI Calibration as temperature\n source for NCT6798D (git-fixes).\n\n - hwmon: (scmi) Fix potential buffer overflow in\n scmi_hwmon_probe() (git-fixes).\n\n - hwrng: ks-sa - Fix runtime PM imbalance on error\n (git-fixes).\n\n - i2c: also convert placeholder function to return errno\n (git-fixes).\n\n - i2c: eg20t: Load module automatically if ID matches\n (git-fixes).\n\n - i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).\n\n - i2c: iproc: fix race between client unreg and isr\n (git-fixes).\n\n - i2c: rcar: always clear ICSAR to avoid side effects\n (git-fixes).\n\n - i2c: rcar: avoid race when unregistering slave\n (git-fixes).\n\n - i2c: rcar: slave: only send STOP event when we have been\n addressed (git-fixes).\n\n - i2c: slave: add sanity check when unregistering\n (git-fixes).\n\n - i2c: slave: improve sanity check when registering\n (git-fixes).\n\n - i40iw: Do an RCU lookup in i40iw_add_ipv4_addr\n (git-fixes).\n\n - i40iw: Fix error handling in i40iw_manage_arp_cache()\n (git-fixes).\n\n - i40iw: fix NULL pointer dereference on a null wqe\n pointer (git-fixes).\n\n - i40iw: Report correct firmware version (git-fixes).\n\n - IB/cma: Fix ports memory leak in cma_configfs\n (git-fixes).\n\n - IB/core: Fix potential NULL pointer dereference in pkey\n cache (git-fixes).\n\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut\n down (bsc#1174409).\n\n - IB/hfi1: Do not destroy link_wq when the device is shut\n down (bsc#1174409).\n\n - IB/hfi1: Ensure pq is not left on waitlist (git-fixes).\n\n - IB/hfi1: Fix another case where pq is left on waitlist\n (bsc#1174411).\n\n - IB/hfi1: Fix memory leaks in sysfs registration and\n unregistration (git-fixes).\n\n - IB/hfi1: Fix module use count flaw due to leftover\n module put calls (bsc#1174407).\n\n - IB/hfi1, qib: Ensure RCU is locked when accessing list\n (git-fixes).\n\n - IB/ipoib: Fix double free of skb in case of multicast\n traffic in CM mode (git-fixes).\n\n - IB/mad: Fix use after free when destroying MAD agent\n (git-fixes).\n\n - IB/mlx4: Test return value of calls to\n ib_get_cached_pkey (git-fixes).\n\n - IB/mlx5: Fix 50G per lane indication (git-fixes).\n\n - IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP\n command (git-fixes).\n\n - IB/mlx5: Fix missing congestion control debugfs on rep\n rdma device (git-fixes).\n\n - IB/mlx5: Replace tunnel mpls capability bits for\n tunnel_offloads (git-fixes).\n\n - ibmvnic: Fix IRQ mapping disposal in error path\n (bsc#1175112 ltc#187459).\n\n - IB/qib: Call kobject_put() when kobject_init_and_add()\n fails (git-fixes).\n\n - IB/rdmavt: Always return ERR_PTR from\n rvt_create_mmap_info() (git-fixes).\n\n - IB/rdmavt: Delete unused routine (git-fixes).\n\n - IB/rdmavt: Fix RQ counting issues causing use of an\n invalid RWQE (bsc#1174770).\n\n - IB/sa: Resolv use-after-free in ib_nl_make_request()\n (git-fixes).\n\n - ide: Remove uninitialized_var() usage (git-fixes).\n\n - ieee802154: fix one possible memleak in adf7242_probe\n (git-fixes).\n\n - iio: adc: ad7780: Fix a resource handling path in\n 'ad7780_probe()' (git-fixes).\n\n - iio: core: add missing IIO_MOD_H2/ETHANOL string\n identifiers (git-fixes).\n\n - iio:health:afe4404 Fix timestamp alignment and prevent\n data leak (git-fixes).\n\n - iio:humidity:hdc100x Fix alignment and data leak issues\n (git-fixes).\n\n - iio:humidity:hts221 Fix alignment and data leak issues\n (git-fixes).\n\n - iio: improve IIO_CONCENTRATION channel type description\n (git-fixes).\n\n - iio:magnetometer:ak8974: Fix alignment and data leak\n issues (git-fixes).\n\n - iio: magnetometer: ak8974: Fix runtime PM imbalance on\n error (git-fixes).\n\n - iio: mma8452: Add missed iio_device_unregister() call in\n mma8452_probe() (git-fixes).\n\n - iio:pressure:ms5611 Fix buffer element alignment\n (git-fixes).\n\n - iio: pressure: zpa2326: handle pm_runtime_get_sync\n failure (git-fixes).\n\n - Input: elan_i2c - add more hardware ID for Lenovo\n laptops (git-fixes).\n\n - Input: elan_i2c - only increment wakeup count on touch\n (git-fixes).\n\n - Input: goodix - fix touch coordinates on Cube I15-TC\n (git-fixes).\n\n - Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux\n list (git-fixes).\n\n - Input: mms114 - add extra compatible for mms345l\n (git-fixes).\n\n - Input: sentelic - fix error return when fsp_reg_write\n fails (git-fixes).\n\n - Input: synaptics - enable InterTouch for ThinkPad X1E\n 1st gen (git-fixes).\n\n - integrity: remove redundant initialization of variable\n ret (git-fixes).\n\n - intel_th: Fix a NULL dereference when hub driver is not\n loaded (git-fixes).\n\n - intel_th: pci: Add Emmitsburg PCH support (git-fixes).\n\n - intel_th: pci: Add Jasper Lake CPU support (git-fixes).\n\n - intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).\n\n - io-mapping: indicate mapping failure (git-fixes).\n\n - iommu/arm-smmu-v3: Do not reserve implementation defined\n register space (bsc#1174126).\n\n - iommu/vt-d: Enable PCI ACS for platform opt in hint\n (bsc#1174127).\n\n - iommu/vt-d: Update scalable mode paging structure\n coherency (bsc#1174128).\n\n - ionic: centralize queue reset code (bsc#1167773).\n\n - ionic: fix up filter locks and debug msgs (bsc#1167773).\n\n - ionic: keep rss hash after fw update (bsc#1167773).\n\n - ionic: unlock queue mutex in error path (bsc#1167773).\n\n - ionic: update filter id after replay (bsc#1167773).\n\n - ionic: update the queue count on open (bsc#1167773).\n\n - ionic: use mutex to protect queue operations\n (bsc#1167773).\n\n - ionic: use offset for ethtool regs data (bsc#1167773).\n\n - irqchip/gic: Atomically update affinity (bsc#1175195).\n\n - kabi fix for\n SUNRPC-dont-update-timeout-value-on-connection-reset.pat\n ch (bsc1174263).\n\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip\n (kabi).\n\n - kABI: restore signature of xfrm_policy_bysel_ctx() and\n xfrm_policy_byid() (bsc#1174645).\n\n - kABI workaround for enum cpuhp_state (git-fixes).\n\n - kABI workaround for struct kvm_device (git-fixes). Just\n change an variable to 'const' type in kvm_device.\n\n - kABI workaround for struct kvm_vcpu_arch (git-fixes).\n\n - kernel.h: remove duplicate include of asm/div64.h\n (git-fixes).\n\n - keys: asymmetric: fix error return code in\n software_key_query() (git-fixes).\n\n - kobject: Avoid premature parent object freeing in\n kobject_cleanup() (git-fixes).\n\n - KVM: Allow kvm_device_ops to be const (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: Allow kvm_device_ops to be const (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Annotate hyp NMI-related functions as\n __always_inline (bsc#1175190).\n\n - KVM: arm64: Correct PSTATE on exception entry\n (bsc#1133021).\n\n - KVM: arm64: Document PV-time interface (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Document PV-time interface (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).\n\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts\n (bsc#1133021).\n\n - KVM: arm64: Provide VCPU attributes for stolen time\n (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Provide VCPU attributes for stolen time\n (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than\n SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than\n SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Stop writing aarch32's CSSELR into ACTLR\n (bsc#1133021).\n\n - KVM: arm64: Support stolen time reporting via shared\n structure (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Support stolen time reporting via shared\n structure (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Use the correct timer structure to access\n the physical counter (bsc#1133021).\n\n - KVM: arm/arm64: Correct AArch32 SPSR on exception entry\n (bsc#1133021).\n\n - KVM: arm/arm64: Correct CPSR on exception entry\n (bsc#1133021).\n\n - KVM: arm/arm64: Factor out hypercall handling from PSCI\n code (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm/arm64: Factor out hypercall handling from PSCI\n code (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm: vgic: Fix limit condition when writing to\n GICD_IACTIVER (bsc#1133021).\n\n - KVM: Implement kvm_put_guest() (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: nVMX: always update CR3 in VMCS (git-fixes).\n\n - KVM: Play nice with read-only memslots when querying\n host page size (bsc#1133021).\n\n - KVM: s390: Remove false WARN_ON_ONCE for the PQAP\n instruction (bsc#1133021).\n\n - l2tp: add sk_family checks to l2tp_validate_socket\n (networking-stable-20_06_07).\n\n - l2tp: do not use inet_hash()/inet_unhash()\n (networking-stable-20_06_07).\n\n - leds: 88pm860x: fix use-after-free on unbind\n (git-fixes).\n\n - leds: core: Flush scheduled work for system suspend\n (git-fixes).\n\n - leds: da903x: fix use-after-free on unbind (git-fixes).\n\n - leds: gpio: Fix semantic error (git-fixes).\n\n - leds: lm3533: fix use-after-free on unbind (git-fixes).\n\n - leds: lm355x: avoid enum conversion warning (git-fixes).\n\n - leds: lm36274: fix use-after-free on unbind (git-fixes).\n\n - leds: wm831x-status: fix use-after-free on unbind\n (git-fixes).\n\n - libbpf: Wrap source argument of BPF_CORE_READ macro in\n parentheses (bsc#1155518).\n\n - lib: Reduce user_access_begin() boundaries in\n strncpy_from_user() and strnlen_user() (bsc#1174331).\n\n - liquidio: Fix wrong return value in cn23xx_get_pf_num()\n (git-fixes).\n\n - locktorture: Print ratio of acquisitions, not failures\n (bsc#1149032).\n\n - mac80211: allow rx of mesh eapol frames with default rx\n key (git-fixes).\n\n - mac80211: fix misplaced while instead of if (git-fixes).\n\n - mac80211: mesh: Free ie data when leaving mesh\n (git-fixes).\n\n - mac80211: mesh: Free pending skb when destroying a mpath\n (git-fixes).\n\n - media: cec: silence shift wrapping warning in\n __cec_s_log_addrs() (git-fixes).\n\n - media: cxusb-analog: fix V4L2 dependency (git-fixes).\n\n - media: exynos4-is: Add missed check for\n pinctrl_lookup_state() (git-fixes).\n\n - media: firewire: Using uninitialized values in\n node_probe() (git-fixes).\n\n - media: marvell-ccic: Add missed\n v4l2_async_notifier_cleanup() (git-fixes).\n\n - media: media-request: Fix crash if memory allocation\n fails (git-fixes).\n\n - media: nuvoton-cir: remove setting tx carrier functions\n (git-fixes).\n\n - media: omap3isp: Add missed v4l2_ctrl_handler_free() for\n preview_init_entities() (git-fixes).\n\n - media: sur40: Remove uninitialized_var() usage\n (git-fixes).\n\n - media: vsp1: dl: Fix NULL pointer dereference on unbind\n (git-fixes).\n\n - mei: bus: do not clean driver pointer (git-fixes).\n\n - mfd: arizona: Ensure 32k clock is put on driver unbind\n and error (git-fixes).\n\n - mfd: dln2: Run event handler loop under spinlock\n (git-fixes).\n\n - mfd: intel-lpss: Add Intel Jasper Lake PCI IDs\n (jsc#SLE-12602).\n\n - mlxsw: core: Fix wrong SFP EEPROM reading for upper\n pages 1-3 (bsc#1154488).\n\n - mlxsw: core: Use different get_trend() callbacks for\n different thermal zones (networking-stable-20_06_10).\n\n - mmc: meson-gx: limit segments to 1 when\n dram-access-quirk is needed (git-fixes).\n\n - mmc: sdhci: do not enable card detect interrupt for gpio\n cd type (git-fixes).\n\n - mm: Fix protection usage propagation (bsc#1174002).\n\n - mm/mmap.c: close race between munmap() and\n expand_upwards()/downwards() (bsc#1174527).\n\n - mtd: properly check all write ioctls for permissions\n (git-fixes).\n\n - mtd: rawnand: fsl_upm: Remove unused mtd var\n (git-fixes).\n\n - mtd: rawnand: qcom: avoid write to unavailable register\n (git-fixes).\n\n - mwifiex: Fix firmware filename for sd8977 chipset\n (git-fixes).\n\n - mwifiex: Fix firmware filename for sd8997 chipset\n (git-fixes).\n\n - mwifiex: Prevent memory corruption handling keys\n (git-fixes).\n\n - nbd: Fix memory leak in nbd_add_socket (git-fixes).\n\n - ndctl/papr_scm,uapi: Add support for PAPR nvdimm\n specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n\n - net: be more gentle about silly gso requests coming from\n user (networking-stable-20_06_07).\n\n - net/bpfilter: Initialize pos in\n __bpfilter_process_sockopt (bsc#1155518).\n\n - net/bpfilter: split __bpfilter_process_sockopt\n (bsc#1155518).\n\n - net: check untrusted gso_size at kernel entry\n (networking-stable-20_06_07).\n\n - netdevsim: fix unbalaced locking in nsim_create()\n (git-fixes).\n\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n\n - net: ena: add reserved PCI device ID (bsc#1174852).\n\n - net: ena: add support for reporting of packet drops\n (bsc#1174852).\n\n - net: ena: add support for the rx offset feature\n (bsc#1174852).\n\n - net: ena: add support for traffic mirroring\n (bsc#1174852).\n\n - net: ena: add unmask interrupts statistics to ethtool\n (bsc#1174852).\n\n - net: ena: allow setting the hash function without\n changing the key (bsc#1174852).\n\n - net: ena: avoid memory access violation by validating\n req_id properly (bsc#1174852).\n\n - net: ena: avoid unnecessary admin command when RSS\n function set fails (bsc#1174852).\n\n - net: ena: avoid unnecessary rearming of interrupt vector\n when busy-polling (bsc#1174852).\n\n - net: ena: change default RSS hash function to Toeplitz\n (bsc#1174852).\n\n - net: ena: changes to RSS hash key allocation\n (bsc#1174852).\n\n - net: ena: cosmetic: change ena_com_stats_admin stats to\n u64 (bsc#1174852).\n\n - net: ena: cosmetic: code reorderings (bsc#1174852).\n\n - net: ena: cosmetic: extract code to\n ena_indirection_table_set() (bsc#1174852).\n\n - net: ena: cosmetic: fix line break issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spacing issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spelling and grammar mistakes in\n comments (bsc#1174852).\n\n - net: ena: cosmetic: minor code changes (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary code\n (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary spaces and tabs\n in ena_com.h macros (bsc#1174852).\n\n - net: ena: cosmetic: rename\n ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n\n - net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n\n - net: ena: cosmetic: set queue sizes to u32 for\n consistency (bsc#1174852).\n\n - net: ena: drop superfluous prototype (bsc#1174852).\n\n - net: ena: enable support of rss hash key and function\n changes (bsc#1174852).\n\n - net: ena: ethtool: clean up minor indentation issue\n (bsc#1174852).\n\n - net: ena: ethtool: remove redundant non-zero check on rc\n (bsc#1174852).\n\n - net/ena: Fix build warning in ena_xdp_set()\n (bsc#1174852).\n\n - net: ena: fix continuous keep-alive resets\n (bsc#1174852).\n\n - net: ena: fix ena_com_comp_status_to_errno() return\n value (bsc#1174852).\n\n - net: ena: fix error returning in\n ena_com_get_hash_function() (bsc#1174852).\n\n - net: ena: fix request of incorrect number of IRQ vectors\n (bsc#1174852).\n\n - net: ena: Fix using plain integer as NULL pointer in\n ena_init_napi_in_range (bsc#1174852).\n\n - net: ena: Make some functions static (bsc#1174852).\n\n - net: ena: move llq configuration from ena_probe to\n ena_device_init() (bsc#1174852).\n\n - net: ena: reduce driver load time (bsc#1174852).\n\n - net: ena: remove code that does nothing (bsc#1174852).\n\n - net: ena: remove set but not used variable 'hash_key'\n (bsc#1174852).\n\n - net: ena: rename ena_com_free_desc to make API more\n uniform (bsc#1174852).\n\n - net: ena: simplify\n ena_com_update_intr_delay_resolution() (bsc#1174852).\n\n - net: ena: support new LLQ acceleration mode\n (bsc#1174852).\n\n - net: ena: use explicit variable size for clarity\n (bsc#1174852).\n\n - net: ena: use SHUTDOWN as reset reason when closing\n interface (bsc#1174852).\n\n - net_failover: fixed rollback in net_failover_open()\n (networking-stable-20_06_10).\n\n - netfilter: ip6tables: Add a .pre_exit hook in all\n ip6table_foo.c (bsc#1171857).\n\n - netfilter: ip6tables: Split ip6t_unregister_table() into\n pre_exit and exit helpers (bsc#1171857).\n\n - netfilter: iptables: Add a .pre_exit hook in all\n iptable_foo.c (bsc#1171857).\n\n - netfilter: iptables: Split ipt_unregister_table() into\n pre_exit and exit helpers (bsc#1171857).\n\n - net: Fix a documentation bug wrt.\n ip_unprivileged_port_start (git-fixes). (SLES tuning\n guide refers to ip-sysctl.txt.)\n\n - net: fsl/fman: treat all RGMII modes in\n memac_adjust_link() (bsc#1174398).\n\n - net: hns3: check reset pending after FLR prepare\n (bsc#1154353).\n\n - net: hns3: fix error handling for desc filling\n (git-fixes).\n\n - net: hns3: fix for not calculating TX BD send size\n correctly (git-fixes).\n\n - net: hns3: fix return value error when query MAC link\n status fail (git-fixes).\n\n - net: ipv4: Fix wrong type conversion from hint to rt in\n ip_route_use_hint() (bsc#1154353).\n\n - net: lan78xx: add missing endpoint sanity check\n (git-fixes).\n\n - net: lan78xx: fix transfer-buffer memory leak\n (git-fixes).\n\n - net: lan78xx: replace bogus endpoint lookup (git-fixes).\n\n - net: macb: call pm_runtime_put_sync on failure path\n (git-fixes).\n\n - net/mlx5: drain health workqueue in case of driver load\n error (networking-stable-20_06_16).\n\n - net/mlx5e: Fix CPU mapping after function reload to\n avoid aRFS RX crash (jsc#SLE-8464).\n\n - net/mlx5e: Fix CPU mapping after function reload to\n avoid aRFS RX crash (jsc#SLE-8464).\n\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a\n VF dev (jsc#SLE-8464).\n\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a\n VF dev (jsc#SLE-8464).\n\n - net/mlx5e: Fix repeated XSK usage on one channel\n (networking-stable-20_06_16).\n\n - net/mlx5e: Fix VXLAN configuration restore after\n function reload (jsc#SLE-8464).\n\n - net/mlx5e: Fix VXLAN configuration restore after\n function reload (jsc#SLE-8464).\n\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the\n mode (jsc#SLE-8464).\n\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the\n mode (jsc#SLE-8464).\n\n - net/mlx5: Fix fatal error handling during device load\n (networking-stable-20_06_16).\n\n - net: phy: Check harder for errors in get_phy_id()\n (git-fixes).\n\n - net: phy: fix memory leak in device-create error path\n (git-fixes).\n\n - net: phy: realtek: add support for configuring the RX\n delay on RTL8211F (bsc#1174398).\n\n - net, sk_msg: Clear sk_user_data pointer on clone if\n tagged (bsc#1155518).\n\n - net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data\n (bsc#1155518).\n\n - net/smc: fix restoring of fallback changes (git-fixes).\n\n - net: stmmac: do not attach interface until resume\n finishes (bsc#1174072).\n\n - net: stmmac: dwc-qos: avoid clk and reset for acpi\n device (bsc#1174072).\n\n - net: stmmac: dwc-qos: use generic device api\n (bsc#1174072).\n\n - net: stmmac: enable timestamp snapshot for required PTP\n packets in dwmac v5.10a (networking-stable-20_06_07).\n\n - net: stmmac: platform: fix probe for ACPI devices\n (bsc#1174072).\n\n - net/tls: fix encryption error checking (git-fixes).\n\n - net/tls: free record only on encryption error\n (git-fixes).\n\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition\n (networking-stable-20_06_07).\n\n - nfc: nci: add missed destroy_workqueue in\n nci_register_device (git-fixes).\n\n - nfc: s3fwrn5: add missing release on skb in\n s3fwrn5_recv_frame (git-fixes).\n\n - nfp: flower: fix used time of merge flow statistics\n (networking-stable-20_06_07).\n\n - NFS: Fix interrupted slots by sending a solo SEQUENCE\n operation (bsc#1174264).\n\n - NTB: Fix static check warning in perf_clear_test\n (git-fixes).\n\n - NTB: Fix the default port and peer numbers for legacy\n drivers (git-fixes).\n\n - ntb: hw: remove the code that sets the DMA mask\n (git-fixes).\n\n - NTB: ntb_pingpong: Choose doorbells based on port number\n (git-fixes).\n\n - NTB: ntb_test: Fix bug when counting remote files\n (git-fixes).\n\n - NTB: ntb_tool: reading the link file should not end in a\n NULL byte (git-fixes).\n\n - NTB: perf: Do not require one more memory window than\n number of peers (git-fixes).\n\n - NTB: perf: Fix race condition when run with ntb_test\n (git-fixes).\n\n - NTB: perf: Fix support for hardware that does not have\n port numbers (git-fixes).\n\n - ntb_perf: pass correct struct device to\n dma_alloc_coherent (git-fixes).\n\n - NTB: Revert the change to use the NTB device dev for DMA\n allocations (git-fixes).\n\n - ntb_tool: pass correct struct device to\n dma_alloc_coherent (git-fixes).\n\n - ocfs2: avoid inode removal while nfsd is accessing it\n (bsc#1172963).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: fix remounting needed after setfacl command\n (bsc#1173954).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - omapfb: dss: Fix max fclk divider for omap36xx\n (git-fixes).\n\n - ovl: inode reference leak in ovl_is_inuse true case\n (git-fixes).\n\n - padata: add separate cpuhp node for CPUHP_PADATA_DEAD\n (git-fixes).\n\n - padata: kABI fixup for struct padata_instance splitting\n nodes (git-fixes).\n\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER\n ownership (bsc#1174356).\n\n - PCI/AER: Use only _OSC to determine AER ownership\n (bsc#1174356).\n\n - PCI/ASPM: Add missing newline in sysfs 'policy'\n (git-fixes).\n\n - PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085\n PCIe-to-PCI bridge (git-fixes).\n\n - PCI: cadence: Fix updating Vendor ID and Subsystem\n Vendor ID register (git-fixes).\n\n - PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events\n (bsc#1174513).\n\n - PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n\n - PCI: hotplug: ACPI: Fix context refcounting in\n acpiphp_grab_context() (git-fixes).\n\n - PCI: hv: Add support for protocol 1.3 and support\n PCI_BUS_RELATIONS2 (bsc#1172201).\n\n - PCI: qcom: Add missing ipq806x clocks in PCIe driver\n (git-fixes).\n\n - PCI: qcom: Add missing reset for ipq806x (git-fixes).\n\n - PCI: qcom: Add support for tx term offset for rev 2.1.0\n (git-fixes).\n\n - PCI: qcom: Define some PARF params needed for ipq8064\n SoC (git-fixes).\n\n - PCI: rcar: Fix runtime PM imbalance on error\n (git-fixes).\n\n - PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n\n - pci: Revive pci_dev __aer_firmware_first* fields for\n kABI (bsc#1174356).\n\n - PCI: switchtec: Add missing __iomem and __user tags to\n fix sparse warnings (git-fixes).\n\n - PCI: switchtec: Add missing __iomem tag to fix sparse\n warnings (git-fixes).\n\n - PCI: tegra: Revert tegra124 raw_violation_fixup\n (git-fixes).\n\n - percpu: Separate decrypted varaibles anytime encryption\n can be enabled (bsc#1174332).\n\n - phy: armada-38x: fix NETA lockup when repeatedly\n switching speeds (git-fixes).\n\n - phy: exynos5-usbdrd: Calibrating makes sense only for\n USB2.0 PHY (git-fixes).\n\n - phy: renesas: rcar-gen3-usb2: move irq registration to\n init (git-fixes).\n\n - phy: sun4i-usb: fix dereference of pointer phy0 before\n it is null checked (git-fixes).\n\n - pinctrl: amd: fix npins for uart0 in kerncz_groups\n (git-fixes).\n\n - pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH\n (git-fixes).\n\n - pinctrl: single: fix function name in documentation\n (git-fixes).\n\n - pinctrl-single: fix pcs_parse_pinconf() return value\n (git-fixes).\n\n - platform/chrome: cros_ec_ishtp: Fix a double-unlock\n issue (git-fixes).\n\n - platform/x86: intel-hid: Fix return value check in\n check_acpi_dev() (git-fixes).\n\n - platform/x86: intel-vbtn: Fix return value check in\n check_acpi_dev() (git-fixes).\n\n - platform/x86: ISST: Increase timeout (bsc#1174185).\n\n - PM: wakeup: Show statistics for deleted wakeup sources\n again (git-fixes).\n\n - powerpc/64s: Fix early_init_mmu section mismatch\n (bsc#1065729).\n\n - powerpc: Allow 4224 bytes of stack expansion for the\n signal frame (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for\n execute disable pkey (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Use PVR check instead of cpu\n feature (bsc#1065729).\n\n - powerpc/boot: Fix CONFIG_PPC_MPC52XX references\n (bsc#1065729).\n\n - powerpc: Document details on H_SCM_HEALTH hcall\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/eeh: Fix pseries_eeh_configure_bridge()\n (bsc#1174689).\n\n - powerpc/fadump: fix race between pstore write and fadump\n crash trigger (bsc#1168959 ltc#185010).\n\n - powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END\n (git-fixes).\n\n - powerpc/nvdimm: Use HCALL error as the return value\n (bsc#1175284).\n\n - powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error\n (bsc#1175284).\n\n - powerpc/papr_scm: Add support for fetching nvdimm\n 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823\n bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Fetch nvdimm health information from\n PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n\n - powerpc/papr_scm: Fetch nvdimm performance stats from\n PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n\n - powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Improve error logging and handling\n papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n\n - powerpc/papr_scm: Mark papr_scm_ndctl() as static\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/pseries/hotplug-cpu: Remove double free in error\n path (bsc#1065729).\n\n - powerpc/pseries: PCIE PHB reset (bsc#1174689).\n\n - powerpc/pseries: remove cede offline state for CPUs\n (bsc#1065729).\n\n - powerpc/rtas: do not online CPUs for partition suspend\n (bsc#1065729).\n\n - powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n\n - powerpc/xmon: Reset RCU and soft lockup watchdogs\n (bsc#1065729).\n\n - power: supply: check if calc_soc succeeded in\n pm860x_init_battery (git-fixes).\n\n - pwm: bcm-iproc: handle clk_get_rate() return\n (git-fixes).\n\n - qed: suppress 'do not support RoCE & iWARP' flooding on\n HW init (git-fixes).\n\n - qed: suppress false-positives interrupt error messages\n on HW init (git-fixes).\n\n - r8169: fix jumbo configuration for RTL8168evl\n (bsc#1175296).\n\n - r8169: fix jumbo packet handling on resume from suspend\n (bsc#1175296).\n\n - r8169: fix resume on cable plug-in (bsc#1175296).\n\n - r8169: fix rtl_hw_jumbo_disable for RTL8168evl\n (bsc#1175296).\n\n - r8169: move disabling interrupt coalescing to\n RTL8169/RTL8168 init (bsc#1175296).\n\n - r8169: read common register for PCI commit\n (bsc#1175296).\n\n - random32: move the pseudo-random 32-bit definitions to\n prandom.h (git-fixes).\n\n - random32: remove net_rand_state from the latent entropy\n gcc plugin (git-fixes).\n\n - random: fix circular include dependency on arm64 after\n addition of percpu.h (git-fixes).\n\n - RDMA/cm: Add missing locking around id.state in\n cm_dup_req_handler (git-fixes).\n\n - RDMA/cma: Protect bind_list and listen_list while\n finding matching cm id (git-fixes).\n\n - RDMA/cm: Fix an error check in cm_alloc_id_priv()\n (git-fixes).\n\n - RDMA/cm: Fix checking for allowed duplicate listens\n (git-fixes).\n\n - RDMA/cm: Fix ordering of xa_alloc_cyclic() in\n ib_create_cm_id() (git-fixes).\n\n - RDMA/cm: Read id.state under lock when doing pr_debug()\n (git-fixes).\n\n - RDMA/cm: Remove a race freeing timewait_info\n (git-fixes).\n\n - RDMA/cm: Update num_paths in cma_resolve_iboe_route\n error flow (git-fixes).\n\n - RDMA/core: Fix double destruction of uobject\n (git-fixes).\n\n - RDMA/core: Fix double put of resource (git-fixes).\n\n - RDMA/core: Fix missing error check on dev_set_name()\n (git-fixes).\n\n - RDMA/core: Fix protection fault in ib_mr_pool_destroy\n (git-fixes).\n\n - RDMA/core: Fix race between destroy and release FD\n object (git-fixes).\n\n - RDMA/core: Fix race in rdma_alloc_commit_uobject()\n (git-fixes).\n\n - RDMA/core: Prevent mixed use of FDs between shared\n ufiles (git-fixes).\n\n - RDMA/counter: Query a counter before release\n (git-fixes).\n\n - RDMA/efa: Set maximum pkeys device attribute\n (git-fixes).\n\n - RDMA/hns: Bugfix for querying qkey (git-fixes).\n\n - RDMA/hns: Fix cmdq parameter of querying pf timer\n resource (git-fixes).\n\n - RDMA/iwcm: Fix iwcm work deallocation (git-fixes).\n\n - RDMA/iw_cxgb4: Fix incorrect function parameters\n (git-fixes).\n\n - RDMA/mad: Do not crash if the rdma device does not have\n a umad interface (git-fixes).\n\n - RDMA/mad: Fix possible memory leak in\n ib_mad_post_receive_mads() (git-fixes).\n\n - RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).\n\n - RDMA/mlx5: Add init2init as a modify command\n (git-fixes).\n\n - RDMA/mlx5: Fix access to wrong pointer while performing\n flush due to error (git-fixes).\n\n - RDMA/mlx5: Fix prefetch memory leak if\n get_prefetchable_mr fails (jsc#SLE-8446).\n\n - RDMA/mlx5: Fix prefetch memory leak if\n get_prefetchable_mr fails (jsc#SLE-8446).\n\n - RDMA/mlx5: Fix the number of hwcounters of a dynamic\n counter (git-fixes).\n\n - RDMA/mlx5: Fix udata response upon SRQ creation\n (git-fixes).\n\n - RDMA/mlx5: Prevent prefetch from racing with implicit\n destruction (jsc#SLE-8446).\n\n - RDMA/mlx5: Prevent prefetch from racing with implicit\n destruction (jsc#SLE-8446).\n\n - RDMA/mlx5: Set GRH fields in query QP on RoCE\n (git-fixes).\n\n - RDMA/mlx5: Use xa_lock_irq when access to SRQ table\n (git-fixes).\n\n - RDMA/mlx5: Verify that QP is created with RQ or SQ\n (git-fixes).\n\n - RDMA/nldev: Fix crash when set a QP to a new counter but\n QPN is missing (git-fixes).\n\n - RDMA/pvrdma: Fix missing pci disable in\n pvrdma_pci_probe() (git-fixes).\n\n - RDMA/qedr: Fix KASAN: use-after-free in\n ucma_event_handler+0x532 (git-fixes).\n\n - RDMA/rvt: Fix potential memory leak caused by\n rvt_alloc_rq (git-fixes).\n\n - RDMA/rxe: Always return ERR_PTR from\n rxe_create_mmap_info() (git-fixes).\n\n - RDMA/rxe: Fix configuration of atomic queue pair\n attributes (git-fixes).\n\n - RDMA/rxe: Set default vendor ID (git-fixes).\n\n - RDMA/rxe: Set sys_image_guid to be aligned with HW IB\n devices (git-fixes).\n\n - RDMA/siw: Fix failure handling during device creation\n (git-fixes).\n\n - RDMA/siw: Fix passive connection establishment\n (git-fixes).\n\n - RDMA/siw: Fix pointer-to-int-cast warning in\n siw_rx_pbl() (git-fixes).\n\n - RDMA/siw: Fix potential siw_mem refcnt leak in\n siw_fastreg_mr() (git-fixes).\n\n - RDMA/siw: Fix reporting vendor_part_id (git-fixes).\n\n - RDMA/siw: Fix setting active_mtu attribute (git-fixes).\n\n - RDMA/siw: Fix setting active_(speed, width) attributes\n (git-fixes).\n\n - RDMA/ucma: Put a lock around every call to the rdma_cm\n layer (git-fixes).\n\n - RDMA/uverbs: Fix create WQ to use the given user handle\n (git-fixes).\n\n - regmap: debugfs: check count when read regmap file\n (git-fixes).\n\n - regmap: debugfs: Do not sleep while atomic for fast_io\n regmaps (git-fixes).\n\n - regmap: dev_get_regmap_match(): fix string comparison\n (git-fixes).\n\n - regmap: fix alignment issue (git-fixes).\n\n - regmap: Fix memory leak from regmap_register_patch\n (git-fixes).\n\n - regulator: gpio: Honor regulator-boot-on property\n (git-fixes).\n\n - remoteproc: qcom_q6v5_mss: Validate MBA firmware size\n before load (git-fixes).\n\n - remoteproc: qcom_q6v5_mss: Validate modem blob firmware\n size before load (git-fixes).\n\n - remoteproc: qcom: q6v5: Update running state before\n requesting stop (git-fixes).\n\n - Revert 'ALSA: hda: call runtime_allow() for all hda\n controllers' (git-fixes).\n\n - Revert 'drm/amd/display: Expose connector VRR range via\n debugfs' (bsc#1152489) 	* refreshed for context\n changes\n\n - Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs\n handlers' (git-fixes).\n\n - Revert 'i2c: cadence: Fix the hold bit setting'\n (git-fixes).\n\n - Revert 'RDMA/cma: Simplify rdma_resolve_addr() error\n flow' (git-fixes).\n\n - Revert 'thermal: mediatek: fix register index error'\n (git-fixes).\n\n - rhashtable: Document the right function parameters\n (bsc#1174880).\n\n - rhashtable: drop duplicated word in <linux/rhashtable.h>\n (bsc#1174880).\n\n - rhashtable: Drop raw RCU deref in nested_table_free\n (bsc#1174880).\n\n - rhashtable: Fix unprotected RCU dereference in __rht_ptr\n (bsc#1174880).\n\n - rhashtable: Restore RCU marking on rhash_lock_head\n (bsc#1174880).\n\n - RMDA/cm: Fix missing ib_cm_destroy_id() in\n ib_cm_insert_listen() (git-fixes).\n\n - rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs\n is needed for podman or docker builds when no more\n specific driver can be used (like lvm or btrfs). As the\n default build fs is ext4 currently, we need overlayfs\n kernel modules to be available.\n\n - rpm/modules.fips: add ecdh_generic (boo#1173813)\n\n - rtlwifi: rtl8192cu: Remove uninitialized_var() usage\n (git-fixes).\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink\n fails (bsc#1154353).\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink\n fails (git-fixes).\n\n - rtw88: fix LDPC field for RA info (git-fixes).\n\n - rtw88: fix short GI capability based on current\n bandwidth (git-fixes).\n\n - s390: fix syscall_get_error for compat processes\n (git-fixes).\n\n - s390/ism: fix error return code in ism_probe()\n (git-fixes).\n\n - s390/kaslr: add support for R_390_JMP_SLOT relocation\n type (git-fixes).\n\n - s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).\n\n - s390/qdio: consistently restore the IRQ handler\n (git-fixes).\n\n - s390/qdio: put thinint indicator after early error\n (git-fixes).\n\n - s390/qdio: tear down thinint indicator after early error\n (git-fixes).\n\n - s390/qeth: fix error handling for isolation mode cmds\n (git-fixes).\n\n - sched/fair: handle case of task_h_load() returning 0\n (bnc#1155798 (CPU scheduler functional and performance\n backports)).\n\n - scsi: ipr: Fix softlockup when rescanning devices in\n petitboot (jsc#SLE-13654).\n\n - scsi: ipr: Fix softlockup when rescanning devices in\n petitboot (jsc#SLE-13654).\n\n - scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).\n\n - scsi: ipr: Use scnprintf() for avoiding potential buffer\n overflow (jsc#SLE-13654).\n\n - scsi: ipr: Use scnprintf() for avoiding potential buffer\n overflow (jsc#SLE-13654).\n\n - scsi: libfc: free response frame from GPN_ID\n (bsc#1173849).\n\n - scsi: libfc: Handling of extra kref (bsc#1173849).\n\n - scsi: libfc: If PRLI rejected, move rport to PLOGI state\n (bsc#1173849).\n\n - scsi: libfc: rport state move to PLOGI if all PRLI retry\n exhausted (bsc#1173849).\n\n - scsi: libfc: Skip additional kref updating work event\n (bsc#1173849).\n\n - scsi: ufs-bsg: Fix runtime PM imbalance on error\n (git-fixes).\n\n - scsi: zfcp: Fix panic on ERP timeout for previously\n dismissed ERP action (git-fixes).\n\n - selftests/net: in rxtimestamp getopt_long needs\n terminating null entry (networking-stable-20_06_16).\n\n - selinux: fall back to ref-walk if audit is required\n (bsc#1174333).\n\n - selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC\n upon follow_link' (bsc#1174333).\n\n - seq_buf: Export seq_buf_printf (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - seq_buf: Export seq_buf_printf (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - serial: 8250: fix null-ptr-deref in\n serial8250_start_tx() (git-fixes).\n\n - serial: 8250_mtk: Fix high-speed baud rates clamping\n (git-fixes).\n\n - serial: 8250_pci: Move Pericom IDs to pci_ids.h\n (git-fixes).\n\n - serial: 8250_tegra: Create Tegra specific 8250 driver\n (bsc#1173941).\n\n - serial: amba-pl011: Make sure we initialize the\n port.lock spinlock (git-fixes).\n\n - serial: exar: Fix GPIO configuration for Sealevel cards\n based on XR17V35X (git-fixes).\n\n - serial: mxs-auart: add missed iounmap() in probe failure\n and remove (git-fixes).\n\n - serial: tegra: fix CREAD handling for PIO (git-fixes).\n\n - SMB3: Honor lease disabling for multiuser mounts\n (git-fixes).\n\n - soc/tegra: pmc: Enable PMIC wake event on Tegra210\n (bsc#1175116).\n\n - soundwire: intel: fix memory leak with devm_kasprintf\n (git-fixes).\n\n - spi: davinci: Remove uninitialized_var() usage\n (git-fixes).\n\n - spi: lantiq: fix: Rx overflow error in full duplex mode\n (git-fixes).\n\n - spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM\n (git-fixes).\n\n - spi: mediatek: use correct SPI_CFG2_REG MACRO\n (git-fixes).\n\n - spi: rockchip: Fix error in SPI slave pio read\n (git-fixes).\n\n - spi: spidev: fix a potential use-after-free in\n spidev_release() (git-fixes).\n\n - spi: spidev: fix a race between spidev_release and\n spidev_remove (git-fixes).\n\n - spi: spi-geni-qcom: Actually use our FIFO (git-fixes).\n\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of\n clock rate (git-fixes).\n\n - spi: sun4i: update max transfer size reported\n (git-fixes).\n\n - staging: comedi: addi_apci_1032: check\n INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1500: check\n INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1564: check\n INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG\n support (git-fixes).\n\n - staging: comedi: verify array index is correct before\n using it (git-fixes).\n\n - Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable\n authmode (git-fixes).\n\n - staging: rtl8192u: fix a dubious looking mask before a\n shift (git-fixes).\n\n - staging: rtl8712: handle firmware load failure\n (git-fixes).\n\n - staging: vchiq_arm: Add a matching unregister call\n (git-fixes).\n\n - staging: wlan-ng: properly check endpoint types\n (git-fixes).\n\n - SUNRPC dont update timeout value on connection reset\n (bsc#1174263).\n\n - sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).\n\n - tcp: md5: allow changing MD5 keys in all socket states\n (git-fixes).\n\n - thermal/drivers: imx: Fix missing of_node_put() at probe\n time (git-fixes).\n\n - thermal: int3403_thermal: Downgrade error message\n (git-fixes).\n\n - thermal: ti-soc-thermal: Fix reversed condition in\n ti_thermal_expose_sensor() (git-fixes).\n\n - tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).\n\n - tpm: Require that all digests are present in\n TCG_PCR_EVENT2 structures (git-fixes).\n\n - tpm_tis: extra chip->ops check on error path in\n tpm_tis_core_init (git-fixes).\n\n - tty: hvc_console, fix crashes on parallel open/close\n (git-fixes).\n\n - ubsan: check panic_on_warn (bsc#1174805).\n\n - udp: Copy has_conns in reuseport_grow() (git-fixes).\n\n - udp: Improve load balancing for SO_REUSEPORT\n (git-fixes).\n\n - uio_pdrv_genirq: Remove warning when irq is not\n specified (bsc#1174762).\n\n - USB: c67x00: fix use after free in c67x00_giveback_urb\n (git-fixes).\n\n - usb: chipidea: core: add wakeup support for extcon\n (git-fixes).\n\n - usb: core: fix quirks_param_set() writing to a const\n pointer (git-fixes).\n\n - usb: dwc2: Fix shutdown callback in platform\n (git-fixes).\n\n - usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).\n\n - usb: dwc3: pci: add support for the Intel Jasper Lake\n (git-fixes).\n\n - usb: dwc3: pci: add support for the Intel Tiger Lake PCH\n -H variant (git-fixes).\n\n - usb: dwc3: pci: Fix reference count leak in\n dwc3_pci_resume_work (git-fixes).\n\n - usb: gadget: Fix issue with config_ep_by_speed function\n (git-fixes).\n\n - usb: gadget: f_uac2: fix AC Interface Header Descriptor\n wTotalLength (git-fixes).\n\n - usb: gadget: function: fix missing spinlock in\n f_uac1_legacy (git-fixes).\n\n - usb: gadget: udc: atmel: fix uninitialized read in debug\n printk (git-fixes).\n\n - usb: gadget: udc: atmel: remove outdated comment in\n usba_ep_disable() (git-fixes).\n\n - usb: gadget: udc: gr_udc: fix memleak on error handling\n path in gr_ep_init() (git-fixes).\n\n - usb: hso: check for return value in\n hso_serial_common_create() (git-fixes).\n\n - usb: hso: Fix debug compile warning on sparc32\n (git-fixes).\n\n - USB: iowarrior: fix up report size handling for some\n devices (git-fixes).\n\n - usbip: tools: fix module name in man page (git-fixes).\n\n - usbnet: smsc95xx: Fix use-after-free after removal\n (git-fixes).\n\n - USB: serial: ch341: add new Product ID for CH340\n (git-fixes).\n\n - USB: serial: cp210x: enable usb generic\n throttle/unthrottle (git-fixes).\n\n - USB: serial: cp210x: re-enable auto-RTS on open\n (git-fixes).\n\n - USB: serial: cypress_m8: enable Simply Automated UPB PIM\n (git-fixes).\n\n - USB: serial: iuu_phoenix: fix led-activity helpers\n (git-fixes).\n\n - USB: serial: iuu_phoenix: fix memory corruption\n (git-fixes).\n\n - USB: serial: option: add GosunCn GM500 series\n (git-fixes).\n\n - USB: serial: option: add Quectel EG95 LTE modem\n (git-fixes).\n\n - USB: serial: qcserial: add EM7305 QDL product ID\n (git-fixes).\n\n - usb: tegra: Fix allocation for the FPCI context\n (git-fixes).\n\n - usb: xhci: define IDs for various ASMedia host\n controllers (git-fixes).\n\n - usb: xhci: Fix ASM2142/ASM3142 DMA addressing\n (git-fixes).\n\n - usb: xhci: Fix ASMedia ASM1142 DMA addressing\n (git-fixes).\n\n - usb: xhci-mtk: fix the failure of bandwidth allocation\n (git-fixes).\n\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking\n (bsc#1174129).\n\n - video: fbdev: sm712fb: fix an issue about iounmap for a\n wrong address (git-fixes).\n\n - video: pxafb: Fix the function used to balance a\n 'dma_alloc_coherent()' call (git-fixes).\n\n - virtio: virtio_console: add missing\n MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n\n - virt: vbox: Fix guest capabilities mask check\n (git-fixes).\n\n - virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG\n req numbers to match upstream (git-fixes).\n\n - vsock: fix timeout in vsock_accept()\n (networking-stable-20_06_07).\n\n - vt: Reject zero-sized screen buffer size (git-fixes).\n\n - vxlan: Avoid infinite loop when suppressing NS messages\n with invalid options (networking-stable-20_06_10).\n\n - watchdog: f71808e_wdt: clear watchdog timeout occurred\n flag (git-fixes).\n\n - watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support\n in watchdog_info.options (git-fixes).\n\n - watchdog: f71808e_wdt: remove use of wrong watchdog_info\n option (git-fixes).\n\n - watchdog: initialize device before misc_register\n (git-fixes).\n\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO\n (jsc#SLE-13202).\n\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO\n (jsc#SLE-13202).\n\n - wireless: Use linux/stddef.h instead of stddef.h\n (git-fixes).\n\n - wireless: Use offsetof instead of custom macro\n (git-fixes).\n\n - wl1251: fix always return 0 error (git-fixes).\n\n - workqueue: Remove unnecessary kfree() call in\n rcu_free_wq() (git-fixes).\n\n - xen/pvcalls-back: test for errors when calling\n backend_connect() (bsc#1065600).\n\n - xfrm: fix a warning in xfrm_policy_insert_list\n (bsc#1174645).\n\n - xfrm: policy: match with both mark and mask on user\n interfaces (bsc#1174645).\n\n - xfs: do not eat an EIO/ENOSPC writeback error when\n scrubbing data fork (git-fixes).\n\n - xfs: fix inode allocation block res calculation\n precedence (git-fixes).\n\n - xfs: fix reflink quota reservation accounting error\n (git-fixes).\n\n - xfs: preserve rmapbt swapext block reservation from\n freed blocks (git-fixes).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1149032\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152472\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152489\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1153274\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1154353\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1154488\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1155518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1155798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1165933\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167773\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172197\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172201\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173468\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173813\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173849\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173941\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174072\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174116\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174126\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174129\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174264\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174331\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174332\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174362\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174396\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174398\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174513\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174527\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174627\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174689\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174737\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174824\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174865\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174880\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174897\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174969\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175009\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175010\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175012\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175013\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175014\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175015\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175017\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175019\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175052\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175116\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175175\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175176\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175180\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175181\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175182\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175183\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175184\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175186\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175187\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175188\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175190\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175191\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175192\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175195\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175345\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175346\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175347\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175367\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175377\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-eppic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-eppic-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-gcore\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-gcore-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libdpdk-20_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libdpdk-20_0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-authlibs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-authlibs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-authlibs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-client-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-fuse_client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-fuse_client-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-server-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python3-virtualbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python3-virtualbox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-x11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-vnc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-websrv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-0.8-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-debugsource-0.8-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-kmp-default-debuginfo-0.8_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-kmp-preempt-debuginfo-0.8_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-debuginfo-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-debugsource-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-devel-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-eppic-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-eppic-debuginfo-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-gcore-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-gcore-debuginfo-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-kmp-default-debuginfo-7.2.8_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-kmp-preempt-debuginfo-7.2.8_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-debugsource-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-devel-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-devel-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-examples-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-examples-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-kmp-default-debuginfo-19.11.1_k5.3.18_lp152.36-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-kmp-preempt-debuginfo-19.11.1_k5.3.18_lp152.36-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-tools-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-tools-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-debugsource-9.0.22~1+git.fe2b5983-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-kmp-default-debuginfo-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-kmp-preempt-debuginfo-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-debugsource-1.28-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-kmp-default-debuginfo-1.28_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-kmp-preempt-debuginfo-1.28_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-devel-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-devel-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-docs-html-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-devel-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-macros-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-build-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-build-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-qa-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-source-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-source-vanilla-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-syms-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libdpdk-20_0-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libdpdk-20_0-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-1.62-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-debuginfo-1.62-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-debugsource-1.62-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-kmp-default-debuginfo-1.62_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-kmp-preempt-debuginfo-1.62_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-authlibs-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-authlibs-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-authlibs-devel-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-client-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-client-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-debugsource-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-devel-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-devel-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-fuse_client-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-fuse_client-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kernel-source-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kmp-default-debuginfo-1.8.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kmp-preempt-debuginfo-1.8.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-server-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-server-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-0.44-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-debuginfo-0.44-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-debugsource-0.44-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-kmp-default-debuginfo-0.44_k5.3.18_lp152.36-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-kmp-preempt-debuginfo-0.44_k5.3.18_lp152.36-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"python3-virtualbox-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"python3-virtualbox-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-debugsource-5.6.4.2+git20200318.49e98ff-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-kmp-default-debuginfo-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-kmp-preempt-debuginfo-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-0.26.5-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-debuginfo-0.26.5-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-debugsource-0.26.5-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-kmp-default-debuginfo-0.26.5_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-kmp-preempt-debuginfo-0.26.5_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-debugsource-0.12.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-kmp-default-debuginfo-0.12.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-kmp-preempt-debuginfo-0.12.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-utils-0.12.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"vhba-kmp-default-debuginfo-20200106_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"vhba-kmp-preempt-debuginfo-20200106_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-debugsource-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-devel-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-source-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-tools-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-tools-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-x11-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-x11-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-host-source-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-kmp-default-debuginfo-6.1.10_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-kmp-preempt-debuginfo-6.1.10_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-qt-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-qt-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-vnc-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-websrv-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-websrv-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-3.9-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-debuginfo-3.9-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-kmp-default-debuginfo-3.9_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-kmp-preempt-debuginfo-3.9_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bbswitch / bbswitch-debugsource / bbswitch-kmp-default / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:22:49", "description": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n\nCVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-08T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2540-1) (Spectre)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3639", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-16166", "CVE-2020-1749", "CVE-2020-24394"], "modified": "2020-09-10T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-azure", "p-cpe:/a:novell:suse_linux:kernel-azure-base", "p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debugsource", "p-cpe:/a:novell:suse_linux:kernel-azure-devel", "p-cpe:/a:novell:suse_linux:kernel-syms-azure", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2540-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140385", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2540-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(140385);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/10\");\n\n script_cve_id(\"CVE-2018-3639\", \"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-16166\", \"CVE-2020-1749\", \"CVE-2020-24394\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2540-1) (Spectre)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup\n(bsc#1165629).\n\nCVE-2020-14314: Fixed a potential negative array index in do_split()\n(bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem\nwhich could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling\n(bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed\nremote attackers to make observations that help to obtain sensitive\ninformation about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions\non new filesystem objects when the filesystem lacks ACL support\n(bsc#1175518).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1074701\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085235\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1087078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1087082\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094912\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1100394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102640\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152148\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163524\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165629\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166965\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170232\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171688\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172073\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172108\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173485\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174003\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174026\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174070\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174161\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174387\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174547\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174685\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174689\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174699\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174734\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174844\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174926\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174968\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175064\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175065\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175067\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175228\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175232\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175396\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175397\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175398\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175399\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175400\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175402\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175403\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175404\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175405\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175406\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175410\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175414\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175415\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175416\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175419\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175420\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175421\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175422\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175423\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175440\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175493\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175515\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175526\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175668\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175669\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175767\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175768\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175769\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-3639/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14314/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14356/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-16166/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-1749/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-24394/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202540-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cd2a887b\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-2540=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/08\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-4.12.14-16.25.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-base-4.12.14-16.25.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-base-debuginfo-4.12.14-16.25.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-debuginfo-4.12.14-16.25.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-debugsource-4.12.14-16.25.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-devel-4.12.14-16.25.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-syms-azure-4.12.14-16.25.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-29T14:24:35", "description": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n\nCVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-10T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2575-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10135", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-14386", "CVE-2020-16166", "CVE-2020-1749", "CVE-2020-24394"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2575-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140475", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2575-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(140475);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2020-10135\", \"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-14386\", \"CVE-2020-16166\", \"CVE-2020-1749\", \"CVE-2020-24394\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2575-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup\n(bsc#1165629).\n\nCVE-2020-14314: Fixed a potential negative array index in do_split()\n(bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem\nwhich could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling\n(bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed\nremote attackers to make observations that help to obtain sensitive\ninformation about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions\non new filesystem objects when the filesystem lacks ACL support\n(bsc#1175518).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication Bluetooth might have allowed an unauthenticated user to\ncomplete authentication without pairing credentials via adjacent\naccess (bsc#1171988).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via\nmemory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152148\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163524\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165629\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166965\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170232\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171688\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172073\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172108\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173485\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174003\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174026\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174070\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174387\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174547\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174685\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174689\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174699\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174734\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174844\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174926\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174968\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175064\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175065\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175067\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175228\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175232\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175396\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175397\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175398\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175399\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175400\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175402\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175403\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175404\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175405\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175406\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175410\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175414\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175415\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175416\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175419\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175420\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175421\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175422\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175423\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175440\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175493\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175515\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175526\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175668\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175669\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175691\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175767\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175768\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175769\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1176069\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10135/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14314/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14356/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14386/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-16166/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-1749/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-24394/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202575-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?56c6884d\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Product-WE-15-SP1-2020-2575=1\n\nSUSE Linux Enterprise Module for Live Patching 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2020-2575=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP1-2020-2575=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP1 :\n\nzypper in -t patch\nSUSE-SLE-Module-Development-Tools-15-SP1-2020-2575=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-2575=1\n\nSUSE Linux Enterprise High Availability 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Product-HA-15-SP1-2020-2575=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14386\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-base-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-base-debuginfo-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-debuginfo-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-debugsource-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-devel-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-devel-debuginfo-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-obs-build-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-obs-build-debugsource-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-syms-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"reiserfs-kmp-default-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"reiserfs-kmp-default-debuginfo-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-base-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-base-debuginfo-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-debuginfo-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-debugsource-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-devel-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-devel-debuginfo-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-obs-build-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-obs-build-debugsource-4.12.14-197.56.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-syms-4.12.14-197.56.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-29T14:26:55", "description": "The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n\nCVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-12-09T00:00:00", "type": "nessus", "title": "SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2610-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10135", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-14386", "CVE-2020-16166", "CVE-2020-1749", "CVE-2020-24394"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-vanilla-base", "p-cpe:/a:novell:suse_linux:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-vanilla-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-vanilla-debugsource", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2610-1.NASL", "href": "https://www.tenable.com/plugins/nessus/143767", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2610-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(143767);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2020-10135\", \"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-14386\", \"CVE-2020-16166\", \"CVE-2020-1749\", \"CVE-2020-24394\");\n\n script_name(english:\"SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2610-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 15 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup\n(bsc#1165629).\n\nCVE-2020-14314: Fixed a potential negative array index in do_split()\n(bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem\nwhich could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling\n(bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed\nremote attackers to make observations that help to obtain sensitive\ninformation about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions\non new filesystem objects when the filesystem lacks ACL support\n(bsc#1175518).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication Bluetooth might have allowed an unauthenticated user to\ncomplete authentication without pairing credentials via adjacent\naccess (bsc#1171988).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via\nmemory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154366\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165629\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165631\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175204\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175515\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175691\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175992\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1176069\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10135/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14314/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14356/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14386/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-16166/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-1749/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-24394/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202610-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ca91339c\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server for SAP 15 :\n\nzypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-2610=1\n\nSUSE Linux Enterprise Server 15-LTSS :\n\nzypper in -t patch SUSE-SLE-Product-SLES-15-2020-2610=1\n\nSUSE Linux Enterprise Module for Live Patching 15 :\n\nzypper in -t patch SUSE-SLE-Module-Live-Patching-15-2020-2610=1\n\nSUSE Linux Enterprise High Performance Computing 15-LTSS :\n\nzypper in -t patch SUSE-SLE-Product-HPC-15-2020-2610=1\n\nSUSE Linux Enterprise High Performance Computing 15-ESPOS :\n\nzypper in -t patch SUSE-SLE-Product-HPC-15-2020-2610=1\n\nSUSE Linux Enterprise High Availability 15 :\n\nzypper in -t patch SUSE-SLE-Product-HA-15-2020-2610=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"s390x\") audit(AUDIT_ARCH_NOT, \"s390x\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-base-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-debuginfo-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-debugsource-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-devel-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-devel-debuginfo-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-obs-build-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-obs-build-debugsource-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-syms-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-vanilla-base-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-vanilla-debuginfo-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-vanilla-debugsource-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"reiserfs-kmp-default-4.12.14-150.58.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"reiserfs-kmp-default-debuginfo-4.12.14-150.58.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-06-02T15:38:42", "description": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n\nCVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-12-09T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2623-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10135", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-14386", "CVE-2020-16166", "CVE-2020-1749", "CVE-2020-24394"], "modified": "2020-12-11T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2623-1.NASL", "href": "https://www.tenable.com/plugins/nessus/143840", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2623-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(143840);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/11\");\n\n script_cve_id(\"CVE-2020-10135\", \"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-14386\", \"CVE-2020-16166\", \"CVE-2020-1749\", \"CVE-2020-24394\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2623-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup\n(bsc#1165629).\n\nCVE-2020-14314: Fixed a potential negative array index in do_split()\n(bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem\nwhich could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling\n(bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed\nremote attackers to make observations that help to obtain sensitive\ninformation about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions\non new filesystem objects when the filesystem lacks ACL support\n(bsc#1175518).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication Bluetooth might have allowed an unauthenticated user to\ncomplete authentication without pairing credentials via adjacent\naccess (bsc#1171988).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via\nmemory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154366\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165629\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174689\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174699\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174978\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175228\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175515\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175691\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175749\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1176069\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10135/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14314/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14356/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14386/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-16166/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-1749/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-24394/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202623-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?967fcc78\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud Crowbar 9 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2020-2623=1\n\nSUSE OpenStack Cloud 9 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-9-2020-2623=1\n\nSUSE Linux Enterprise Server for SAP 12-SP4 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP4-2020-2623=1\n\nSUSE Linux Enterprise Server 12-SP4-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2020-2623=1\n\nSUSE Linux Enterprise Live Patching 12-SP4 :\n\nzypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2020-2623=1\n\nSUSE Linux Enterprise High Availability 12-SP4 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP4-2020-2623=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-devel-debuginfo-4.12.14-95.60.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-95.60.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-4.12.14-95.60.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-base-4.12.14-95.60.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-base-debuginfo-4.12.14-95.60.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-debuginfo-4.12.14-95.60.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-debugsource-4.12.14-95.60.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-devel-4.12.14-95.60.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-syms-4.12.14-95.60.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-27T15:00:35", "description": "The remote Ubuntu 16.04 LTS / 18.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-4526-1 advisory.\n\n - In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check.\n This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation. (CVE-2019-9445)\n\n - A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.\n (CVE-2019-18808)\n\n - A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b. (CVE-2019-19054)\n\n - A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3. (CVE-2019-19061)\n\n - ** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading. (CVE-2019-19067)\n\n - Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10. (CVE-2019-19073)\n\n - A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.\n (CVE-2019-19074)\n\n - The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space. (CVE-2020-12888)\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system. (CVE-2020-14356)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c. (CVE-2020-16166)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-09-22T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-4526-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-18808", "CVE-2019-19054", "CVE-2019-19061", "CVE-2019-19067", "CVE-2019-19073", "CVE-2019-19074", "CVE-2019-9445", "CVE-2020-12888", "CVE-2020-14356", "CVE-2020-16166"], "modified": "2023-10-20T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04:-:lts", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1054-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1070-gke", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1071-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1075-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1083-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1084-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1087-snapdragon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1096-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1097-oem", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-118-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-118-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-118-lowlatency"], "id": "UBUNTU_USN-4526-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140722", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4526-1. The text\n# itself is copyright (C) Canonical, Inc. See\n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140722);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/20\");\n\n script_cve_id(\n \"CVE-2019-9445\",\n \"CVE-2019-18808\",\n \"CVE-2019-19054\",\n \"CVE-2019-19061\",\n \"CVE-2019-19067\",\n \"CVE-2019-19073\",\n \"CVE-2019-19074\",\n \"CVE-2020-12888\",\n \"CVE-2020-14356\",\n \"CVE-2020-16166\"\n );\n script_xref(name:\"USN\", value:\"4526-1\");\n\n script_name(english:\"Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-4526-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 16.04 LTS / 18.04 LTS host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the USN-4526-1 advisory.\n\n - In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check.\n This could lead to local information disclosure with system execution privileges needed. User interaction\n is not needed for exploitation. (CVE-2019-9445)\n\n - A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel\n through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.\n (CVE-2019-18808)\n\n - A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux\n kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering\n kfifo_alloc() failures, aka CID-a7b2df76b42b. (CVE-2019-19054)\n\n - A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux\n kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka\n CID-9c0530e898f3. (CVE-2019-19061)\n\n - ** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c\n in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by\n triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third\n parties dispute the relevance of this because the attacker must already have privileges for module\n loading. (CVE-2019-19067)\n\n - Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow\n attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout()\n failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the\n htc_connect_service() function, aka CID-853acf7caf10. (CVE-2019-19073)\n\n - A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel\n through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.\n (CVE-2019-19074)\n\n - The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory\n space. (CVE-2020-12888)\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found\n in the way when reboot the system. A local user could use this flaw to crash the system or escalate their\n privileges on the system. (CVE-2020-14356)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive\n information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and kernel/time/timer.c. (CVE-2020-16166)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-4526-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14356\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1054-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1070-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1071-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1075-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1083-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1084-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1087-snapdragon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1096-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1097-oem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-118-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-118-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-118-lowlatency\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2020-2023 Canonical, Inc. / NASL script (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\ninclude('ksplice.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('16.04' >< os_release || '18.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 16.04 / 18.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar kernel_mappings = {\n '16.04': {\n '4.15.0': {\n 'generic': '4.15.0-118',\n 'generic-lpae': '4.15.0-118',\n 'lowlatency': '4.15.0-118',\n 'oracle': '4.15.0-1054',\n 'aws': '4.15.0-1083',\n 'gcp': '4.15.0-1084',\n 'azure': '4.15.0-1096'\n }\n },\n '18.04': {\n '4.15.0': {\n 'generic': '4.15.0-118',\n 'generic-lpae': '4.15.0-118',\n 'lowlatency': '4.15.0-118',\n 'oracle': '4.15.0-1054',\n 'gke': '4.15.0-1070',\n 'raspi2': '4.15.0-1071',\n 'kvm': '4.15.0-1075',\n 'aws': '4.15.0-1083',\n 'gcp': '4.15.0-1084',\n 'snapdragon': '4.15.0-1087',\n 'azure': '4.15.0-1096',\n 'oem': '4.15.0-1097'\n }\n }\n};\n\nvar host_kernel_release = get_kb_item_or_exit('Host/uname-r');\nvar host_kernel_version = get_kb_item_or_exit('Host/Debian/kernel-version');\nvar host_kernel_base_version = get_kb_item_or_exit('Host/Debian/kernel-base-version');\nvar host_kernel_type = get_kb_item_or_exit('Host/Debian/kernel-type');\nif(empty_or_null(kernel_mappings[os_release][host_kernel_base_version][host_kernel_type])) audit(AUDIT_INST_VER_NOT_VULN, 'kernel ' + host_kernel_release);\n\nvar extra = '';\nvar kernel_fixed_version = kernel_mappings[os_release][host_kernel_base_version][host_kernel_type];\nif (deb_ver_cmp(ver1:host_kernel_version, ver2:kernel_fixed_version) < 0)\n{\n extra = extra + 'Running Kernel level of ' + host_kernel_version + ' does not meet the minimum fixed level of ' + kernel_fixed_version + ' for this advisory.\\n\\n';\n}\n else\n{\n audit(AUDIT_PATCH_INSTALLED, 'Kernel package for USN-4526-1');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n var cve_list = make_list('CVE-2019-9445', 'CVE-2019-18808', 'CVE-2019-19054', 'CVE-2019-19061', 'CVE-2019-19067', 'CVE-2019-19073', 'CVE-2019-19074', 'CVE-2020-12888', 'CVE-2020-14356', 'CVE-2020-16166');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for USN-4526-1');\n }\n else\n {\n extra = extra + ksplice_reporting_text();\n }\n}\nif (extra) {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:45:07", "description": "The remote NewStart CGSL host, running version MAIN 6.02, has kernel packages installed that are affected by multiple vulnerabilities:\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system. (CVE-2020-14356)\n\n - A flaw was found in the Linux kernel's futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2020-14381)\n\n - In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.\n (CVE-2020-25211)\n\n - A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13.\n drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.\n (CVE-2020-29661)\n\n - A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c.\n This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space (CVE-2021-22555)\n\n - A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. (CVE-2021-23133)\n\n - The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value. (CVE-2021-33033)\n\n - nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after- free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71. (CVE-2021-3348)\n\n - An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2021-3612)\n\n - arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e. (CVE-2021-37576)\n\n - net/sunrpc/xdr.c in the Linux kernel before 5.13.4 allows remote attackers to cause a denial of service (xdr_set_page_base slab-out-of-bounds access) by performing many NFS 4.2 READ_PLUS operations.\n (CVE-2021-38201)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-05-09T00:00:00", "type": "nessus", "title": "NewStart CGSL MAIN 6.02 : kernel Multiple Vulnerabilities (NS-SA-2022-0073)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-14356", "CVE-2020-14381", "CVE-2020-25211", "CVE-2020-29661", "CVE-2021-22555", "CVE-2021-23133", "CVE-2021-33033", "CVE-2021-3348", "CVE-2021-3612", "CVE-2021-37576", "CVE-2021-38201"], "modified": "2023-01-13T00:00:00", "cpe": ["p-cpe:/a:zte:cgsl_main:bpftool", "p-cpe:/a:zte:cgsl_main:bpftool-debuginfo", "p-cpe:/a:zte:cgsl_main:kernel", "p-cpe:/a:zte:cgsl_main:kernel-abi-whitelists", "p-cpe:/a:zte:cgsl_main:kernel-core", "p-cpe:/a:zte:cgsl_main:kernel-cross-headers", "p-cpe:/a:zte:cgsl_main:kernel-debug", "p-cpe:/a:zte:cgsl_main:kernel-debug-core", "p-cpe:/a:zte:cgsl_main:kernel-debug-debuginfo", "p-cpe:/a:zte:cgsl_main:kernel-debug-devel", "p-cpe:/a:zte:cgsl_main:kernel-debug-modules", "p-cpe:/a:zte:cgsl_main:kernel-debug-modules-extra", "p-cpe:/a:zte:cgsl_main:kernel-debug-modules-internal", "p-cpe:/a:zte:cgsl_main:kernel-debuginfo", "p-cpe:/a:zte:cgsl_main:kernel-debuginfo-common-x86_64", "p-cpe:/a:zte:cgsl_main:kernel-devel", "p-cpe:/a:zte:cgsl_main:kernel-headers", "p-cpe:/a:zte:cgsl_main:kernel-ipaclones-internal", "p-cpe:/a:zte:cgsl_main:kernel-modules", "p-cpe:/a:zte:cgsl_main:kernel-modules-extra", "p-cpe:/a:zte:cgsl_main:kernel-modules-internal", "p-cpe:/a:zte:cgsl_main:kernel-selftests-internal", "p-cpe:/a:zte:cgsl_main:kernel-sign-keys", "p-cpe:/a:zte:cgsl_main:kernel-tools", "p-cpe:/a:zte:cgsl_main:kernel-tools-debuginfo", "p-cpe:/a:zte:cgsl_main:kernel-tools-libs", "p-cpe:/a:zte:cgsl_main:kernel-tools-libs-devel", "p-cpe:/a:zte:cgsl_main:perf", "p-cpe:/a:zte:cgsl_main:perf-debuginfo", "p-cpe:/a:zte:cgsl_main:python3-perf", "p-cpe:/a:zte:cgsl_main:python3-perf-debuginfo", "cpe:/o:zte:cgsl_main:6"], "id": "NEWSTART_CGSL_NS-SA-2022-0073_KERNEL.NASL", "href": "https://www.tenable.com/plugins/nessus/160769", "sourceData": "##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from ZTE advisory NS-SA-2022-0073. The text\n# itself is copyright (C) ZTE, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(160769);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/13\");\n\n script_cve_id(\n \"CVE-2020-14356\",\n \"CVE-2020-14381\",\n \"CVE-2020-25211\",\n \"CVE-2020-29661\",\n \"CVE-2021-3348\",\n \"CVE-2021-3612\",\n \"CVE-2021-22555\",\n \"CVE-2021-23133\",\n \"CVE-2021-33033\",\n \"CVE-2021-37576\",\n \"CVE-2021-38201\"\n );\n\n script_name(english:\"NewStart CGSL MAIN 6.02 : kernel Multiple Vulnerabilities (NS-SA-2022-0073)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote NewStart CGSL host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote NewStart CGSL host, running version MAIN 6.02, has kernel packages installed that are affected by multiple\nvulnerabilities:\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found\n in the way when reboot the system. A local user could use this flaw to crash the system or escalate their\n privileges on the system. (CVE-2020-14356)\n\n - A flaw was found in the Linux kernel's futex implementation. This flaw allows a local attacker to corrupt\n system memory or escalate their privileges when creating a futex on a filesystem that is about to be\n unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system\n availability. (CVE-2020-14381)\n\n - In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could\n overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in\n ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.\n (CVE-2020-25211)\n\n - A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13.\n drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.\n (CVE-2020-29661)\n\n - A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c.\n This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name\n space (CVE-2021-22555)\n\n - A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel\n privilege escalation from the context of a network service or an unprivileged process. If\n sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the\n auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network\n service privileges to escalate to root or from the context of an unprivileged user directly if a\n BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. (CVE-2021-23133)\n\n - The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because\n the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads\n to writing an arbitrary value. (CVE-2021-33033)\n\n - nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-\n free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a\n certain point during device setup, aka CID-b98e762e3d71. (CVE-2021-3348)\n\n - An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions\n before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the\n system or possibly escalate their privileges on the system. The highest threat from this vulnerability is\n to confidentiality, integrity, as well as system availability. (CVE-2021-3612)\n\n - arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest\n OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e. (CVE-2021-37576)\n\n - net/sunrpc/xdr.c in the Linux kernel before 5.13.4 allows remote attackers to cause a denial of service\n (xdr_set_page_base slab-out-of-bounds access) by performing many NFS 4.2 READ_PLUS operations.\n (CVE-2021-38201)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/notice/NS-SA-2022-0073\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2020-14356\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2020-14381\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2020-25211\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2020-29661\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-22555\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-23133\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-33033\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-3348\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-3612\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-37576\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-38201\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the vulnerable CGSL kernel packages. Note that updated packages may not be available yet. Please contact ZTE for\nmore information.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-37576\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Netfilter x_tables Heap OOB Write Privilege Escalation');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:\"CANVAS\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/05/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:bpftool-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-cross-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-debug-modules-internal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-ipaclones-internal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-modules-internal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-selftests-internal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-sign-keys\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:python3-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:python3-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:zte:cgsl_main:6\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"NewStart CGSL Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/ZTE-CGSL/release\", \"Host/ZTE-CGSL/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nvar release = get_kb_item('Host/ZTE-CGSL/release');\nif (isnull(release) || release !~ \"^CGSL (MAIN|CORE)\") audit(AUDIT_OS_NOT, 'NewStart Carrier Grade Server Linux');\n\nif (release !~ \"CGSL MAIN 6.02\")\n audit(AUDIT_OS_NOT, 'NewStart CGSL MAIN 6.02');\n\nif (!get_kb_item('Host/ZTE-CGSL/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'NewStart Carrier Grade Server Linux', cpu);\n\nvar flag = 0;\n\nvar pkgs = {\n 'CGSL MAIN 6.02': [\n 'bpftool-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'bpftool-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-abi-whitelists-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-core-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-cross-headers-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-debug-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-debug-core-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-debug-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-debug-devel-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-debug-modules-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-debug-modules-extra-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-debug-modules-internal-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-debuginfo-common-x86_64-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-devel-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-headers-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-ipaclones-internal-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-modules-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-modules-extra-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-modules-internal-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-selftests-internal-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-sign-keys-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-tools-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-tools-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-tools-libs-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'kernel-tools-libs-devel-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'perf-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'perf-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'python3-perf-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54',\n 'python3-perf-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.27.g8dd645d54'\n ]\n};\nvar pkg_list = pkgs[release];\n\nforeach (pkg in pkg_list)\n if (rpm_check(release:'ZTE ' + release, reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-27T15:00:36", "description": "Chuhong Yuan discovered that go7007 USB audio device driver in the Linux kernel did not properly deallocate memory in some failure conditions. A physically proximate attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-20810) Fan Yang discovered that the mremap implementation in the Linux kernel did not properly handle DAX Huge Pages. A local attacker with access to DAX storage could use this to gain administrative privileges.\n(CVE-2020-10757) It was discovered that the Linux kernel did not correctly apply Speculative Store Bypass Disable (SSBD) mitigations in certain situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-10766) It was discovered that the Linux kernel did not correctly apply Indirect Branch Predictor Barrier (IBPB) mitigations in certain situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-10767) It was discovered that the Linux kernel could incorrectly enable Indirect Branch Speculation after it has been disabled for a process via a prctl() call. A local attacker could possibly use this to expose sensitive information. (CVE-2020-10768) Luca Bruno discovered that the zram module in the Linux kernel did not properly restrict unprivileged users from accessing the hot_add sysfs file. A local attacker could use this to cause a denial of service (memory exhaustion).\n(CVE-2020-10781) It was discovered that the XFS file system implementation in the Linux kernel did not properly validate meta data in some circumstances. An attacker could use this to construct a malicious XFS image that, when mounted, could cause a denial of service. (CVE-2020-12655) It was discovered that the bcache subsystem in the Linux kernel did not properly release a lock in some error conditions. A local attacker could possibly use this to cause a denial of service. (CVE-2020-12771) It was discovered that the Virtual Terminal keyboard driver in the Linux kernel contained an integer overflow. A local attacker could possibly use this to have an unspecified impact. (CVE-2020-13974) It was discovered that the cgroup v2 subsystem in the Linux kernel did not properly perform reference counting in some situations, leading to a NULL pointer dereference. A local attacker could use this to cause a denial of service or possibly gain administrative privileges. (CVE-2020-14356) Kyungtae Kim discovered that the USB testing driver in the Linux kernel did not properly deallocate memory on disconnect events. A physically proximate attacker could use this to cause a denial of service (memory exhaustion). (CVE-2020-15393) It was discovered that the NFS server implementation in the Linux kernel did not properly honor umask settings when setting permissions while creating file system objects if the underlying file system did not support ACLs. An attacker could possibly use this to expose sensitive information or violate system integrity. (CVE-2020-24394) It was discovered that the Kerberos SUNRPC GSS implementation in the Linux kernel did not properly deallocate memory on module unload. A local privileged attacker could possibly use this to cause a denial of service (memory exhaustion).\n(CVE-2020-12656).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-02T00:00:00", "type": "nessus", "title": "Ubuntu 18.04 LTS / 20.04 LTS : Linux kernel vulnerabilities (USN-4483-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20810", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10781", "CVE-2020-12655", "CVE-2020-12656", "CVE-2020-12771", "CVE-2020-13974", "CVE-2020-14356", "CVE-2020-15393", "CVE-2020-24394"], "modified": "2023-10-20T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1016-raspi", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1022-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1022-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1022-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1023-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-45-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-45-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-45-lowlatency", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "cpe:/o:canonical:ubuntu_linux:20.04:-:lts"], "id": "UBUNTU_USN-4483-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140181", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4483-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140181);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/20\");\n\n script_cve_id(\n \"CVE-2019-20810\",\n \"CVE-2020-10757\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-10781\",\n \"CVE-2020-12655\",\n \"CVE-2020-12656\",\n \"CVE-2020-12771\",\n \"CVE-2020-13974\",\n \"CVE-2020-14356\",\n \"CVE-2020-15393\",\n \"CVE-2020-24394\"\n );\n script_xref(name:\"USN\", value:\"4483-1\");\n\n script_name(english:\"Ubuntu 18.04 LTS / 20.04 LTS : Linux kernel vulnerabilities (USN-4483-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"Chuhong Yuan discovered that go7007 USB audio device driver in the\nLinux kernel did not properly deallocate memory in some failure\nconditions. A physically proximate attacker could use this to cause a\ndenial of service (memory exhaustion). (CVE-2019-20810) Fan Yang\ndiscovered that the mremap implementation in the Linux kernel did not\nproperly handle DAX Huge Pages. A local attacker with access to DAX\nstorage could use this to gain administrative privileges.\n(CVE-2020-10757) It was discovered that the Linux kernel did not\ncorrectly apply Speculative Store Bypass Disable (SSBD) mitigations in\ncertain situations. A local attacker could possibly use this to expose\nsensitive information. (CVE-2020-10766) It was discovered that the\nLinux kernel did not correctly apply Indirect Branch Predictor Barrier\n(IBPB) mitigations in certain situations. A local attacker could\npossibly use this to expose sensitive information. (CVE-2020-10767) It\nwas discovered that the Linux kernel could incorrectly enable Indirect\nBranch Speculation after it has been disabled for a process via a\nprctl() call. A local attacker could possibly use this to expose\nsensitive information. (CVE-2020-10768) Luca Bruno discovered that the\nzram module in the Linux kernel did not properly restrict unprivileged\nusers from accessing the hot_add sysfs file. A local attacker could\nuse this to cause a denial of service (memory exhaustion).\n(CVE-2020-10781) It was discovered that the XFS file system\nimplementation in the Linux kernel did not properly validate meta data\nin some circumstances. An attacker could use this to construct a\nmalicious XFS image that, when mounted, could cause a denial of\nservice. (CVE-2020-12655) It was discovered that the bcache subsystem\nin the Linux kernel did not properly release a lock in some error\nconditions. A local attacker could possibly use this to cause a denial\nof service. (CVE-2020-12771) It was discovered that the Virtual\nTerminal keyboard driver in the Linux kernel contained an integer\noverflow. A local attacker could possibly use this to have an\nunspecified impact. (CVE-2020-13974) It was discovered that the cgroup\nv2 subsystem in the Linux kernel did not properly perform reference\ncounting in some situations, leading to a NULL pointer dereference. A\nlocal attacker could use this to cause a denial of service or possibly\ngain administrative privileges. (CVE-2020-14356) Kyungtae Kim\ndiscovered that the USB testing driver in the Linux kernel did not\nproperly deallocate memory on disconnect events. A physically\nproximate attacker could use this to cause a denial of service (memory\nexhaustion). (CVE-2020-15393) It was discovered that the NFS server\nimplementation in the Linux kernel did not properly honor umask\nsettings when setting permissions while creating file system objects\nif the underlying file system did not support ACLs. An attacker could\npossibly use this to expose sensitive information or violate system\nintegrity. (CVE-2020-24394) It was discovered that the Kerberos SUNRPC\nGSS implementation in the Linux kernel did not properly deallocate\nmemory on module unload. A local privileged attacker could possibly\nuse this to cause a denial of service (memory exhaustion).\n(CVE-2020-12656).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-4483-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14356\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1016-raspi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1022-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1022-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1022-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1023-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-45-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-45-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-45-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04:-:lts\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2020-2023 Canonical, Inc. / NASL script (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\ninclude('ksplice.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('18.04' >< os_release || '20.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 18.04 / 20.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar kernel_mappings = {\n '18.04': {\n '5.4.0': {\n 'generic': '5.4.0-45',\n 'generic-lpae': '5.4.0-45',\n 'lowlatency': '5.4.0-45',\n 'raspi': '5.4.0-1016',\n 'aws': '5.4.0-1022',\n 'gcp': '5.4.0-1022',\n 'oracle': '5.4.0-1022',\n 'azure': '5.4.0-1023'\n }\n },\n '20.04': {\n '5.4.0': {\n 'generic': '5.4.0-45',\n 'generic-lpae': '5.4.0-45',\n 'lowlatency': '5.4.0-45',\n 'raspi': '5.4.0-1016',\n 'aws': '5.4.0-1022',\n 'gcp': '5.4.0-1022',\n 'oracle': '5.4.0-1022',\n 'azure': '5.4.0-1023'\n }\n }\n};\n\nvar host_kernel_release = get_kb_item_or_exit('Host/uname-r');\nvar host_kernel_version = get_kb_item_or_exit('Host/Debian/kernel-version');\nvar host_kernel_base_version = get_kb_item_or_exit('Host/Debian/kernel-base-version');\nvar host_kernel_type = get_kb_item_or_exit('Host/Debian/kernel-type');\nif(empty_or_null(kernel_mappings[os_release][host_kernel_base_version][host_kernel_type])) audit(AUDIT_INST_VER_NOT_VULN, 'kernel ' + host_kernel_release);\n\nvar extra = '';\nvar kernel_fixed_version = kernel_mappings[os_release][host_kernel_base_version][host_kernel_type];\nif (deb_ver_cmp(ver1:host_kernel_version, ver2:kernel_fixed_version) < 0)\n{\n extra = extra + 'Running Kernel level of ' + host_kernel_version + ' does not meet the minimum fixed level of ' + kernel_fixed_version + ' for this advisory.\\n\\n';\n}\n else\n{\n audit(AUDIT_PATCH_INSTALLED, 'Kernel package for USN-4483-1');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n var cve_list = make_list('CVE-2019-20810', 'CVE-2020-10757', 'CVE-2020-10766', 'CVE-2020-10767', 'CVE-2020-10768', 'CVE-2020-10781', 'CVE-2020-12655', 'CVE-2020-12656', 'CVE-2020-12771', 'CVE-2020-13974', 'CVE-2020-14356', 'CVE-2020-15393', 'CVE-2020-24394');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for USN-4483-1');\n }\n else\n {\n extra = extra + ksplice_reporting_text();\n }\n}\nif (extra) {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-09-10T16:46:38", "description": "The remote Oracle Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2020-5913 advisory.\n\n - In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c. (CVE-2019-19377)\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system. (CVE-2020-14356)\n\n - A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.\n (CVE-2020-14385)\n\n - In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.\n (CVE-2020-25211)\n\n - A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-25643)\n\n - The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.\n (CVE-2020-26541)\n\n - Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. (CVE-2020-8694)\n\n - Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access. (CVE-2020-8695)\n\n - An issue was discovered in the Linux kernel through 5.2.13. nbd_genl_status in drivers/block/nbd.c does not check the nla_nest_start_noflag return value. (CVE-2019-16089)\n\n - A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of- bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (CVE-2020-14390)\n\n - A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality. (CVE-2020-25645)\n\n - **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5.\n phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it..\n (CVE-2019-12380)\n\n - In the Linux kernel 5.0.21 and 5.3.11, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in try_merge_free_space in fs/btrfs/free-space-cache.c because the pointer to a left data structure can be the same as the pointer to a right data structure. (CVE-2019-19448)\n\n - A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability. (CVE-2020-25641)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-09-07T00:00:00", "type": "nessus", "title": "Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2020-5913)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12380", "CVE-2019-16089", "CVE-2019-19377", "CVE-2019-19448", "CVE-2020-14356", "CVE-2020-14385", "CVE-2020-14390", "CVE-2020-25211", "CVE-2020-25641", "CVE-2020-25643", "CVE-2020-25645", "CVE-2020-26541", "CVE-2020-8694", "CVE-2020-8695"], "modified": "2023-09-07T00:00:00", "cpe": ["cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-headers", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:python-perf", "p-cpe:/a:oracle:linux:kernel-uek-tools", "p-cpe:/a:oracle:linux:kernel-uek-tools-libs", "p-cpe:/a:oracle:linux:kernel-uek-tools-libs-devel"], "id": "ORACLELINUX_ELSA-2020-5913.NASL", "href": "https://www.tenable.com/plugins/nessus/180881", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2020-5913.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(180881);\n script_version(\"1.0\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/09/07\");\n\n script_cve_id(\n \"CVE-2019-12380\",\n \"CVE-2019-16089\",\n \"CVE-2019-19377\",\n \"CVE-2019-19448\",\n \"CVE-2020-8694\",\n \"CVE-2020-8695\",\n \"CVE-2020-14356\",\n \"CVE-2020-14385\",\n \"CVE-2020-14390\",\n \"CVE-2020-25211\",\n \"CVE-2020-25641\",\n \"CVE-2020-25643\",\n \"CVE-2020-25645\",\n \"CVE-2020-26541\"\n );\n\n script_name(english:\"Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2020-5913)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nELSA-2020-5913 advisory.\n\n - In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and\n unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c. (CVE-2019-19377)\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found\n in the way when reboot the system. A local user could use this flaw to crash the system or escalate their\n privileges on the system. (CVE-2020-14356)\n\n - A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in\n XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can\n lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading\n to a denial of service. The highest threat from this vulnerability is to system availability.\n (CVE-2020-14385)\n\n - In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could\n overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in\n ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.\n (CVE-2020-25211)\n\n - A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption\n and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause\n the system to crash or cause a denial of service. The highest threat from this vulnerability is to data\n confidentiality and integrity as well as system availability. (CVE-2020-25643)\n\n - The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database\n (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.\n (CVE-2020-26541)\n\n - Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an\n authenticated user to potentially enable information disclosure via local access. (CVE-2020-8694)\n\n - Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to\n potentially enable information disclosure via local access. (CVE-2020-8695)\n\n - An issue was discovered in the Linux kernel through 5.2.13. nbd_genl_status in drivers/block/nbd.c does\n not check the nla_nest_start_noflag return value. (CVE-2019-16089)\n\n - A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-\n bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of\n the flaw, privilege escalation cannot be fully ruled out. (CVE-2020-14390)\n\n - A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may\n be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE\n tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from\n this vulnerability is to data confidentiality. (CVE-2020-25645)\n\n - **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5.\n phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in\n arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not\n being an issue because All the code touched by the referenced commit runs only at boot, before any user\n processes are started. Therefore, there is no possibility for an unprivileged user to control it..\n (CVE-2019-12380)\n\n - In the Linux kernel 5.0.21 and 5.3.11, mounting a crafted btrfs filesystem image, performing some\n operations, and then making a syncfs system call can lead to a use-after-free in try_merge_free_space in\n fs/btrfs/free-space-cache.c because the pointer to a left data structure can be the same as the pointer to\n a right data structure. (CVE-2019-19448)\n\n - A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length\n biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a\n denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block\n device, resulting in a denial of service. The highest threat from this vulnerability is to system\n availability. (CVE-2020-25641)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2020-5913.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-25643\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-14356\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/05/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/09/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-perf\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(os_release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:os_release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 7', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['4.14.35-2025.402.2.1.el7uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2020-5913');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '4.14';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-doc-4.14.35-2025.402.2.1.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.14.35'},\n {'reference':'kernel-uek-4.14.35-2025.402.2.1.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.14.35'},\n {'reference':'kernel-uek-debug-4.14.35-2025.402.2.1.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.14.35'},\n {'reference':'kernel-uek-debug-devel-4.14.35-2025.402.2.1.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.14.35'},\n {'reference':'kernel-uek-devel-4.14.35-2025.402.2.1.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.14.35'},\n {'reference':'kernel-uek-headers-4.14.35-2025.402.2.1.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-headers-4.14.35'},\n {'reference':'kernel-uek-tools-4.14.35-2025.402.2.1.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-4.14.35'},\n {'reference':'kernel-uek-tools-libs-4.14.35-2025.402.2.1.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-libs-4.14.35'},\n {'reference':'kernel-uek-tools-libs-devel-4.14.35-2025.402.2.1.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-libs-devel-4.14.35'},\n {'reference':'perf-4.14.35-2025.402.2.1.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'perf-4.14.35'},\n {'reference':'python-perf-4.14.35-2025.402.2.1.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'python-perf-4.14.35'},\n {'reference':'kernel-uek-4.14.35-2025.402.2.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.14.35'},\n {'reference':'kernel-uek-debug-4.14.35-2025.402.2.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.14.35'},\n {'reference':'kernel-uek-debug-devel-4.14.35-2025.402.2.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.14.35'},\n {'reference':'kernel-uek-devel-4.14.35-2025.402.2.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.14.35'},\n {'reference':'kernel-uek-tools-4.14.35-2025.402.2.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-4.14.35'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && _release) {\n if (exists_check) {\n if (rpm_exists(release:_release, rpm:exists_check) && rpm_check(release:_release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-debug / kernel-uek-debug-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:32:35", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system:\n memory allocation, process allocation, device input and output, etc.Security Fix(es):kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux->alu_limit.(CVE-2021-33200)A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.(CVE-2020-25670)A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.(CVE-2020-25671)A memory leak vulnerability was found in Linux kernel in llcp_sock_connect(CVE-2020-25672)An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/ Node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.(CVE-2021-3506)The Linux kernel 4.9.x before 4.9.233, 4.14.x before 4.14.194, and 4.19.x before 4.19.140 has a use-after-free because skcd->no_refcnt was not considered during a backport of a CVE-2020-14356 patch. This is related to the cgroups feature.(CVE-2020-25220)The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.(CVE-2021-33033)kernel/bpf/verifier.c in the Linux kernel through 5.12.1 performs undesirable speculative loads, leading to disclosure of stack content via side-channel attacks, aka CID-801c6058d14a.\n The specific concern is not protecting the BPF stack area against speculative loads. Also, the BPF stack can contain uninitialized data that might represent sensitive information previously operated on by the kernel.(CVE-2021-31829)An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8.\n A(CVE-2021-28950)net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.(CVE-2021-32399)In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.(CVE-2021-33034)An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.(CVE-2021-31916)Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.(CVE-2021-23134)An issue was discovered in the Linux kernel before 5.9.\n arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.(CVE-2020-36311)An issue was discovered in the Linux kernel before 5.8.10.\n virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.(CVE-2020-36312)The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ('bpf: Fix truncation handling for mod32 dst reg wrt zero') and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.(CVE-2021-3444)An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.(CVE-2021-29155)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-08-09T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP9 : kernel (EulerOS-SA-2021-2272)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-14356", "CVE-2020-25220", "CVE-2020-25670", "CVE-2020-25671", "CVE-2020-25672", "CVE-2020-36311", "CVE-2020-36312", "CVE-2021-23134", "CVE-2021-28950", "CVE-2021-29155", "CVE-2021-31829", "CVE-2021-31916", "CVE-2021-32399", "CVE-2021-33033", "CVE-2021-33034", "CVE-2021-33200", "CVE-2021-3444", "CVE-2021-3506"], "modified": "2021-08-11T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:python3-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-2272.NASL", "href": "https://www.tenable.com/plugins/nessus/152313", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(152313);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/08/11\");\n\n script_cve_id(\n \"CVE-2020-25220\",\n \"CVE-2020-25670\",\n \"CVE-2020-25671\",\n \"CVE-2020-25672\",\n \"CVE-2020-36311\",\n \"CVE-2020-36312\",\n \"CVE-2021-23134\",\n \"CVE-2021-28950\",\n \"CVE-2021-29155\",\n \"CVE-2021-31829\",\n \"CVE-2021-31916\",\n \"CVE-2021-32399\",\n \"CVE-2021-33033\",\n \"CVE-2021-33034\",\n \"CVE-2021-33200\",\n \"CVE-2021-3444\",\n \"CVE-2021-3506\"\n );\n\n script_name(english:\"EulerOS 2.0 SP9 : kernel (EulerOS-SA-2021-2272)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - The kernel package contains the Linux kernel (vmlinuz),\n the core of any Linux operating system. The kernel\n handles the basic functions of the operating system:\n memory allocation, process allocation, device input and\n output, etc.Security Fix(es):kernel/bpf/verifier.c in\n the Linux kernel through 5.12.7 enforces incorrect\n limits for pointer arithmetic operations, aka\n CID-bb01a1bba579. This can be abused to perform\n out-of-bounds reads and writes in kernel memory,\n leading to local privilege escalation to root. In\n particular, there is a corner case where the off reg\n causes a masking direction change, which then results\n in an incorrect final aux->alu_limit.(CVE-2021-33200)A\n vulnerability was found in Linux Kernel where refcount\n leak in llcp_sock_bind() causing use-after-free which\n might lead to privilege escalations.(CVE-2020-25670)A\n vulnerability was found in Linux Kernel, where a\n refcount leak in llcp_sock_connect() causing\n use-after-free which might lead to privilege\n escalations.(CVE-2020-25671)A memory leak vulnerability\n was found in Linux kernel in\n llcp_sock_connect(CVE-2020-25672)An out-of-bounds (OOB)\n memory access flaw was found in fs/f2fs/ Node.c in the\n f2fs module in the Linux kernel in versions before\n 5.12.0-rc4. A bounds check failure allows a local\n attacker to gain access to out-of-bounds memory leading\n to a system crash or a leak of internal kernel\n information. The highest threat from this vulnerability\n is to system availability.(CVE-2021-3506)The Linux\n kernel 4.9.x before 4.9.233, 4.14.x before 4.14.194,\n and 4.19.x before 4.19.140 has a use-after-free because\n skcd->no_refcnt was not considered during a backport of\n a CVE-2020-14356 patch. This is related to the cgroups\n feature.(CVE-2020-25220)The Linux kernel before 5.11.14\n has a use-after-free in cipso_v4_genopt in\n net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO\n refcounting for the DOI definitions is mishandled, aka\n CID-ad5d07f4a9cd. This leads to writing an arbitrary\n value.(CVE-2021-33033)kernel/bpf/verifier.c in the\n Linux kernel through 5.12.1 performs undesirable\n speculative loads, leading to disclosure of stack\n content via side-channel attacks, aka CID-801c6058d14a.\n The specific concern is not protecting the BPF stack\n area against speculative loads. Also, the BPF stack can\n contain uninitialized data that might represent\n sensitive information previously operated on by the\n kernel.(CVE-2021-31829)An issue was discovered in\n fs/fuse/fuse_i.h in the Linux kernel before 5.11.8.\n A(CVE-2021-28950)net/bluetooth/hci_request.c in the\n Linux kernel through 5.12.2 has a race condition for\n removal of the HCI controller.(CVE-2021-32399)In the\n Linux kernel before 5.12.4, net/bluetooth/hci_event.c\n has a use-after-free when destroying an hci_chan, aka\n CID-5c4c8c954409. This leads to writing an arbitrary\n value.(CVE-2021-33034)An out-of-bounds (OOB) memory\n write flaw was found in list_devices in\n drivers/md/dm-ioctl.c in the Multi-device driver module\n in the Linux kernel before 5.12. A bound check failure\n allows an attacker with special user (CAP_SYS_ADMIN)\n privilege to gain access to out-of-bounds memory\n leading to a system crash or a leak of internal kernel\n information. The highest threat from this vulnerability\n is to system availability.(CVE-2021-31916)Use After\n Free vulnerability in nfc sockets in the Linux Kernel\n before 5.12.4 allows local attackers to elevate their\n privileges. In typical configurations, the issue can\n only be triggered by a privileged local user with the\n CAP_NET_RAW capability.(CVE-2021-23134)An issue was\n discovered in the Linux kernel before 5.9.\n arch/x86/kvm/svm/sev.c allows attackers to cause a\n denial of service (soft lockup) by triggering\n destruction of a large SEV VM (which requires\n unregistering many encrypted regions), aka\n CID-7be74942f184.(CVE-2020-36311)An issue was\n discovered in the Linux kernel before 5.8.10.\n virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev\n memory leak upon a kmalloc failure, aka\n CID-f65886606c2d.(CVE-2020-36312)The bpf verifier in\n the Linux kernel did not properly handle mod32\n destination register truncation when the source\n register was known to be 0. A local attacker with the\n ability to load bpf programs could use this gain\n out-of-bounds reads in kernel memory leading to\n information disclosure (kernel memory), and possibly\n out-of-bounds writes that could potentially lead to\n code execution. This issue was addressed in the\n upstream kernel in commit 9b00f1b78809 ('bpf: Fix\n truncation handling for mod32 dst reg wrt zero') and in\n Linux stable kernels 5.11.2, 5.10.19, and\n 5.4.101.(CVE-2021-3444)An issue was discovered in the\n Linux kernel through 5.11.x. kernel/bpf/verifier.c\n performs undesirable out-of-bounds speculation on\n pointer arithmetic, leading to side-channel attacks\n that defeat Spectre mitigations and obtain sensitive\n information from kernel memory. Specifically, for\n sequences of pointer arithmetic operations, the pointer\n modification performed by the first operation is not\n correctly accounted for when restricting subsequent\n operations.(CVE-2021-29155)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-2272\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0abdb7aa\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python3-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(9)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP9\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP9\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-4.19.90-vhulk2103.1.0.h487.eulerosv2r9\",\n \"kernel-tools-4.19.90-vhulk2103.1.0.h487.eulerosv2r9\",\n \"kernel-tools-libs-4.19.90-vhulk2103.1.0.h487.eulerosv2r9\",\n \"python3-perf-4.19.90-vhulk2103.1.0.h487.eulerosv2r9\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"9\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-29T14:24:29", "description": "Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service, or information leak.\n\nCVE-2019-3874\n\nKernel buffers allocated by the SCTP network protocol were not limited by the memory cgroup controller. A local user could potentially use this to evade container memory limits and to cause a denial of service (excessive memory use).\n\nCVE-2019-19448, CVE-2019-19813, CVE-2019-19816\n\n'Team bobfuzzer' reported bugs in Btrfs that could lead to a use-after-free or heap buffer overflow, and could be triggered by crafted filesystem images. A user permitted to mount and access arbitrary filesystems could use these to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.\n\nCVE-2020-10781\n\nLuca Bruno of Red Hat discovered that the zram control file /sys/class/zram-control/hot_add was readable by all users. On a system with zram enabled, a local user could use this to cause a denial of service (memory exhaustion).\n\nCVE-2020-12888\n\nIt was discovered that the PCIe Virtual Function I/O (vfio-pci) driver allowed users to disable a device's memory space while it was still mapped into a process. On some hardware platforms, local users or guest virtual machines permitted to access PCIe Virtual Functions could use this to cause a denial of service (hardware error and crash).\n\nCVE-2020-14314\n\nA bug was discovered in the ext4 filesystem that could lead to an out-of-bound read. A local user permitted to mount and access arbitrary filesystem images could use this to cause a denial of service (crash).\n\nCVE-2020-14331\n\nA bug was discovered in the VGA console driver's soft-scrollback feature that could lead to a heap buffer overflow. On a system with a custom kernel that has CONFIG_VGACON_SOFT_SCROLLBACK enabled, a local user with access to a console could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.\n\nCVE-2020-14356\n\nA bug was discovered in the cgroup subsystem's handling of socket references to cgroups. In some cgroup configurations, this could lead to a use-after-free. A local user might be able to use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.\n\nCVE-2020-14385\n\nA bug was discovered in XFS, which could lead to an extended attribute (xattr) wrongly being detected as invalid. A local user with access to an XFS filesystem could use this to cause a denial of service (filesystem shutdown).\n\nCVE-2020-14386\n\nOr Cohen discovered a bug in the packet socket (AF_PACKET) implementation which could lead to a heap buffer overflow. A local user with the CAP_NET_RAW capability (in any user namespace) could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.\n\nCVE-2020-14390\n\nMinh Yuan discovered a bug in the framebuffer console driver's scrollback feature that could lead to a heap buffer overflow. On a system using framebuffer consoles, a local user with access to a console could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.\n\nThe scrollback feature has been disabled for now, as no other fix was available for this issue.\n\nCVE-2020-16166\n\nAmit Klein reported that the random number generator used by the network stack might not be re-seeded for long periods of time, making e.g. client port number allocations more predictable. This made it easier for remote attackers to carry out some network- based attacks such as DNS cache poisoning or device tracking.\n\nCVE-2020-25212\n\nA bug was discovered in the NFSv4 client implementation that could lead to a heap buffer overflow. A malicious NFS server could use this to cause a denial of service (crash or memory corruption) or possibly to execute arbitrary code on the client.\n\nCVE-2020-25284\n\nIt was discovered that the Rados block device (rbd) driver allowed tasks running as uid 0 to add and remove rbd devices, even if they dropped capabilities. On a system with the rbd driver loaded, this might allow privilege escalation from a container with a task running as root.\n\nCVE-2020-25285\n\nA race condition was discovered in the hugetlb filesystem's sysctl handlers, that could lead to stack corruption. A local user permitted to write to hugepages sysctls could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation. By default only the root user can do this.\n\nCVE-2020-25641\n\nThe syzbot tool found a bug in the block layer that could lead to an infinite loop. A local user with access to a raw block device could use this to cause a denial of service (unbounded CPU use and possible system hang).\n\nCVE-2020-26088\n\nIt was discovered that the NFC (Near Field Communication) socket implementation allowed any user to create raw sockets. On a system with an NFC interface, this allowed local users to evade local network security policy.\n\nFor Debian 9 stretch, these problems have been fixed in version 4.19.146-1~deb9u1. This update additionally fixes Debian bugs #966846, #966917, and #968567; and includes many more bug fixes from stable updates 4.19.133-4.19.146 inclusive.\n\nWe recommend that you upgrade your linux-4.19 packages.\n\nFor the detailed security status of linux-4.19 please refer to its security tracker page at:\nhttps://security-tracker.debian.org/tracker/linux-4.19\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-29T00:00:00", "type": "nessus", "title": "Debian DLA-2385-1 : linux-4.19 security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19448", "CVE-2019-19813", "CVE-2019-19816", "CVE-2019-3874", "CVE-2020-10781", "CVE-2020-12888", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-14385", "CVE-2020-14386", "CVE-2020-14390", "CVE-2020-16166", "CVE-2020-25212", "CVE-2020-25284", "CVE-2020-25285", "CVE-2020-25641", "CVE-2020-26088"], "modified": "2022-05-13T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:linux-config-4.19", "p-cpe:/a:debian:debian_linux:linux-doc-4.19", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-686", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-686-pae", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-amd64", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-arm64", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-armel", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-armhf", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-i386", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-amd64", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-arm64", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-armmp", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-armmp-lpae", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-cloud-amd64", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-common", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-common-rt", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-marvell", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rpi", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-686-pae", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-amd64", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-arm64", "p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-armmp", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686-pae", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686-pae-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-amd64", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-amd64-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-arm64", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-arm64-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp-lpae", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp-lpae-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-cloud-amd64", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-cloud-amd64-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-marvell", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-marvell-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rpi", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rpi-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-686-pae", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-686-pae-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-amd64", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-amd64-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-arm64", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-arm64-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-armmp", "p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-armmp-dbg", "p-cpe:/a:debian:debian_linux:linux-kbuild-4.19", "p-cpe:/a:debian:debian_linux:linux-perf-4.19", "p-cpe:/a:debian:debian_linux:linux-source-4.19", "p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.10", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DLA-2385.NASL", "href": "https://www.tenable.com/plugins/nessus/140933", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-2385-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(140933);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/13\");\n\n script_cve_id(\"CVE-2019-19448\", \"CVE-2019-19813\", \"CVE-2019-19816\", \"CVE-2019-3874\", \"CVE-2020-10781\", \"CVE-2020-12888\", \"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-14385\", \"CVE-2020-14386\", \"CVE-2020-14390\", \"CVE-2020-16166\", \"CVE-2020-25212\", \"CVE-2020-25284\", \"CVE-2020-25285\", \"CVE-2020-25641\", \"CVE-2020-26088\");\n\n script_name(english:\"Debian DLA-2385-1 : linux-4.19 security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service, or information\nleak.\n\nCVE-2019-3874\n\nKernel buffers allocated by the SCTP network protocol were not limited\nby the memory cgroup controller. A local user could potentially use\nthis to evade container memory limits and to cause a denial of service\n(excessive memory use).\n\nCVE-2019-19448, CVE-2019-19813, CVE-2019-19816\n\n'Team bobfuzzer' reported bugs in Btrfs that could lead to a\nuse-after-free or heap buffer overflow, and could be triggered by\ncrafted filesystem images. A user permitted to mount and access\narbitrary filesystems could use these to cause a denial of service\n(crash or memory corruption) or possibly for privilege escalation.\n\nCVE-2020-10781\n\nLuca Bruno of Red Hat discovered that the zram control file\n/sys/class/zram-control/hot_add was readable by all users. On a system\nwith zram enabled, a local user could use this to cause a denial of\nservice (memory exhaustion).\n\nCVE-2020-12888\n\nIt was discovered that the PCIe Virtual Function I/O (vfio-pci) driver\nallowed users to disable a device's memory space while it was still\nmapped into a process. On some hardware platforms, local users or\nguest virtual machines permitted to access PCIe Virtual Functions\ncould use this to cause a denial of service (hardware error and\ncrash).\n\nCVE-2020-14314\n\nA bug was discovered in the ext4 filesystem that could lead to an\nout-of-bound read. A local user permitted to mount and access\narbitrary filesystem images could use this to cause a denial of\nservice (crash).\n\nCVE-2020-14331\n\nA bug was discovered in the VGA console driver's soft-scrollback\nfeature that could lead to a heap buffer overflow. On a system with a\ncustom kernel that has CONFIG_VGACON_SOFT_SCROLLBACK enabled, a local\nuser with access to a console could use this to cause a denial of\nservice (crash or memory corruption) or possibly for privilege\nescalation.\n\nCVE-2020-14356\n\nA bug was discovered in the cgroup subsystem's handling of socket\nreferences to cgroups. In some cgroup configurations, this could lead\nto a use-after-free. A local user might be able to use this to cause a\ndenial of service (crash or memory corruption) or possibly for\nprivilege escalation.\n\nCVE-2020-14385\n\nA bug was discovered in XFS, which could lead to an extended attribute\n(xattr) wrongly being detected as invalid. A local user with access to\nan XFS filesystem could use this to cause a denial of service\n(filesystem shutdown).\n\nCVE-2020-14386\n\nOr Cohen discovered a bug in the packet socket (AF_PACKET)\nimplementation which could lead to a heap buffer overflow. A local\nuser with the CAP_NET_RAW capability (in any user namespace) could use\nthis to cause a denial of service (crash or memory corruption) or\npossibly for privilege escalation.\n\nCVE-2020-14390\n\nMinh Yuan discovered a bug in the framebuffer console driver's\nscrollback feature that could lead to a heap buffer overflow. On a\nsystem using framebuffer consoles, a local user with access to a\nconsole could use this to cause a denial of service (crash or memory\ncorruption) or possibly for privilege escalation.\n\nThe scrollback feature has been disabled for now, as no\nother fix was available for this issue.\n\nCVE-2020-16166\n\nAmit Klein reported that the random number generator used by the\nnetwork stack might not be re-seeded for long periods of time, making\ne.g. client port number allocations more predictable. This made it\neasier for remote attackers to carry out some network- based attacks\nsuch as DNS cache poisoning or device tracking.\n\nCVE-2020-25212\n\nA bug was discovered in the NFSv4 client implementation that could\nlead to a heap buffer overflow. A malicious NFS server could use this\nto cause a denial of service (crash or memory corruption) or possibly\nto execute arbitrary code on the client.\n\nCVE-2020-25284\n\nIt was discovered that the Rados block device (rbd) driver allowed\ntasks running as uid 0 to add and remove rbd devices, even if they\ndropped capabilities. On a system with the rbd driver loaded, this\nmight allow privilege escalation from a container with a task running\nas root.\n\nCVE-2020-25285\n\nA race condition was discovered in the hugetlb filesystem's sysctl\nhandlers, that could lead to stack corruption. A local user permitted\nto write to hugepages sysctls could use this to cause a denial of\nservice (crash or memory corruption) or possibly for privilege\nescalation. By default only the root user can do this.\n\nCVE-2020-25641\n\nThe syzbot tool found a bug in the block layer that could lead to an\ninfinite loop. A local user with access to a raw block device could\nuse this to cause a denial of service (unbounded CPU use and possible\nsystem hang).\n\nCVE-2020-26088\n\nIt was discovered that the NFC (Near Field Communication) socket\nimplementation allowed any user to create raw sockets. On a system\nwith an NFC interface, this allowed local users to evade local network\nsecurity policy.\n\nFor Debian 9 stretch, these problems have been fixed in version\n4.19.146-1~deb9u1. This update additionally fixes Debian bugs #966846,\n#966917, and #968567; and includes many more bug fixes from stable\nupdates 4.19.133-4.19.146 inclusive.\n\nWe recommend that you upgrade your linux-4.19 packages.\n\nFor the detailed security status of linux-4.19 please refer to its\nsecurity tracker page at:\nhttps://security-tracker.debian.org/tracker/linux-4.19\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/linux-4.19\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/linux-4.19\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-19816\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-config-4.19\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-doc-4.19\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-686-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-amd64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-arm64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-armel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-armhf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-i386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-amd64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-arm64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-armmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-armmp-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-cloud-amd64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-common-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-marvell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rpi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-686-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-amd64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-arm64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-armmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686-pae-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-amd64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-amd64-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-arm64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-arm64-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp-lpae-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-cloud-amd64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-cloud-amd64-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-marvell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-marvell-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rpi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rpi-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-686-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-686-pae-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-amd64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-amd64-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-arm64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-arm64-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-armmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-armmp-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-kbuild-4.19\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-perf-4.19\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-source-4.19\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"linux-config-4.19\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-doc-4.19\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-686\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-686-pae\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-all\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-all-amd64\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-all-arm64\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-all-armel\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-all-armhf\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-all-i386\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-amd64\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-arm64\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-armmp\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-armmp-lpae\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-cloud-amd64\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-common\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-common-rt\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-marvell\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-rpi\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-rt-686-pae\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-rt-amd64\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-rt-arm64\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.19.0-0.bpo.10-rt-armmp\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-686\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-686-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-686-pae\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-686-pae-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-amd64\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-amd64-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-arm64\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-arm64-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-armmp\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-armmp-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-armmp-lpae\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-armmp-lpae-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-cloud-amd64\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-cloud-amd64-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-marvell\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-marvell-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-rpi\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-rpi-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-rt-686-pae\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-rt-686-pae-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-rt-amd64\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-rt-amd64-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-rt-arm64\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-rt-arm64-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-rt-armmp\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-image-4.19.0-0.bpo.10-rt-armmp-dbg\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-kbuild-4.19\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-perf-4.19\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-source-4.19\", reference:\"4.19.146-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-support-4.19.0-0.bpo.10\", reference:\"4.19.146-1~deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:37:42", "description": "The remote NewStart CGSL host, running version MAIN 6.02, has kernel packages installed that are affected by multiple vulnerabilities:\n\n - In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c. (CVE-2019-19447)\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system. (CVE-2020-14356)\n\n - A flaw was found in the Linux kernel's futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2020-14381)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c. (CVE-2020-16166)\n\n - In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.\n (CVE-2020-25211)\n\n - A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13.\n drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.\n (CVE-2020-29661)\n\n - In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel (CVE-2021-0512)\n\n - An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. (CVE-2021-22543)\n\n - A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c.\n This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space (CVE-2021-22555)\n\n - A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. (CVE-2021-23133)\n\n - The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value. (CVE-2021-33033)\n\n - nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after- free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71. (CVE-2021-3348)\n\n - .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.\n (CVE-2021-3609)\n\n - A flaw was found in the Routing decision classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition.\n This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2021-3715)\n\n - arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e. (CVE-2021-37576)\n\n - net/sunrpc/xdr.c in the Linux kernel before 5.13.4 allows remote attackers to cause a denial of service (xdr_set_page_base slab-out-of-bounds access) by performing many NFS 4.2 READ_PLUS operations.\n (CVE-2021-38201)\n\n - A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.\n This flaw affects Linux kernel versions prior to 5.16-rc4. (CVE-2021-4083)\n\n - A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them. (CVE-2021-4155)\n\n - A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.\n (CVE-2022-0492)\n\n - A flaw was found in the way the flags member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system. (CVE-2022-0847)\n\n - A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat. (CVE-2022-27666)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-11-15T00:00:00", "type": "nessus", "title": "NewStart CGSL MAIN 6.02 : kernel Multiple Vulnerabilities (NS-SA-2022-0089)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19447", "CVE-2020-14356", "CVE-2020-14381", "CVE-2020-16166", "CVE-2020-25211", "CVE-2020-29661", "CVE-2021-0512", "CVE-2021-22543", "CVE-2021-22555", "CVE-2021-23133", "CVE-2021-33033", "CVE-2021-3348", "CVE-2021-3609", "CVE-2021-3715", "CVE-2021-37576", "CVE-2021-38201", "CVE-2021-4083", "CVE-2021-4155", "CVE-2022-0492", "CVE-2022-0847", "CVE-2022-27666"], "modified": "2023-01-12T00:00:00", "cpe": ["p-cpe:/a:zte:cgsl_main:bpftool", "p-cpe:/a:zte:cgsl_main:kernel", "p-cpe:/a:zte:cgsl_main:kernel-core", "p-cpe:/a:zte:cgsl_main:kernel-devel", "p-cpe:/a:zte:cgsl_main:kernel-headers", "p-cpe:/a:zte:cgsl_main:kernel-modules", "p-cpe:/a:zte:cgsl_main:kernel-modules-extra", "p-cpe:/a:zte:cgsl_main:kernel-tools", "p-cpe:/a:zte:cgsl_main:kernel-tools-libs", "p-cpe:/a:zte:cgsl_main:perf", "p-cpe:/a:zte:cgsl_main:python3-perf", "cpe:/o:zte:cgsl_main:6"], "id": "NEWSTART_CGSL_NS-SA-2022-0089_KERNEL.NASL", "href": "https://www.tenable.com/plugins/nessus/167480", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from ZTE advisory NS-SA-2022-0089. The text\n# itself is copyright (C) ZTE, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(167480);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/12\");\n\n script_cve_id(\n \"CVE-2019-19447\",\n \"CVE-2020-14356\",\n \"CVE-2020-14381\",\n \"CVE-2020-16166\",\n \"CVE-2020-25211\",\n \"CVE-2020-29661\",\n \"CVE-2021-0512\",\n \"CVE-2021-3348\",\n \"CVE-2021-3609\",\n \"CVE-2021-3715\",\n \"CVE-2021-4083\",\n \"CVE-2021-4155\",\n \"CVE-2021-22543\",\n \"CVE-2021-22555\",\n \"CVE-2021-23133\",\n \"CVE-2021-33033\",\n \"CVE-2021-37576\",\n \"CVE-2021-38201\",\n \"CVE-2022-0492\",\n \"CVE-2022-0847\",\n \"CVE-2022-27666\"\n );\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/05/16\");\n\n script_name(english:\"NewStart CGSL MAIN 6.02 : kernel Multiple Vulnerabilities (NS-SA-2022-0089)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote NewStart CGSL host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote NewStart CGSL host, running version MAIN 6.02, has kernel packages installed that are affected by multiple\nvulnerabilities:\n\n - In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and\n unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list\n in fs/ext4/super.c. (CVE-2019-19447)\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found\n in the way when reboot the system. A local user could use this flaw to crash the system or escalate their\n privileges on the system. (CVE-2020-14356)\n\n - A flaw was found in the Linux kernel's futex implementation. This flaw allows a local attacker to corrupt\n system memory or escalate their privileges when creating a futex on a filesystem that is about to be\n unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system\n availability. (CVE-2020-14381)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive\n information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and kernel/time/timer.c. (CVE-2020-16166)\n\n - In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could\n overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in\n ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.\n (CVE-2020-25211)\n\n - A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13.\n drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.\n (CVE-2020-29661)\n\n - In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to\n a heap buffer overflow. This could lead to local escalation of privilege with no additional execution\n privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android\n kernelAndroid ID: A-173843328References: Upstream kernel (CVE-2021-0512)\n\n - An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass\n RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users\n with the ability to start and control a VM to read/write random pages of memory and can result in local\n privilege escalation. (CVE-2021-22543)\n\n - A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c.\n This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name\n space (CVE-2021-22555)\n\n - A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel\n privilege escalation from the context of a network service or an unprivileged process. If\n sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the\n auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network\n service privileges to escalate to root or from the context of an unprivileged user directly if a\n BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. (CVE-2021-23133)\n\n - The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because\n the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads\n to writing an arbitrary value. (CVE-2021-33033)\n\n - nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-\n free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a\n certain point during device setup, aka CID-b98e762e3d71. (CVE-2021-3348)\n\n - .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse\n a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race\n condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.\n (CVE-2021-3609)\n\n - A flaw was found in the Routing decision classifier in the Linux kernel's Traffic Control networking\n subsystem in the way it handled changing of classification filters, leading to a use-after-free condition.\n This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat\n from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2021-3715)\n\n - arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest\n OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e. (CVE-2021-37576)\n\n - net/sunrpc/xdr.c in the Linux kernel before 5.13.4 allows remote attackers to cause a denial of service\n (xdr_set_page_base slab-out-of-bounds access) by performing many NFS 4.2 READ_PLUS operations.\n (CVE-2021-38201)\n\n - A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket\n file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race\n condition. This flaw allows a local user to crash the system or escalate their privileges on the system.\n This flaw affects Linux kernel versions prior to 5.16-rc4. (CVE-2021-4083)\n\n - A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size\n increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS\n filesystem otherwise not accessible to them. (CVE-2021-4155)\n\n - A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the\n kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups\n v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.\n (CVE-2022-0492)\n\n - A flaw was found in the way the flags member of the new pipe buffer structure was lacking proper\n initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus\n contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache\n backed by read only files and as such escalate their privileges on the system. (CVE-2022-0847)\n\n - A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and\n net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap\n objects and may cause a local privilege escalation threat. (CVE-2022-27666)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/notice/NS-SA-2022-0089\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2019-19447\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2020-14356\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2020-14381\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2020-16166\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2020-25211\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2020-29661\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-0512\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-22543\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-22555\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-23133\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-33033\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-3348\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-3609\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-3715\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-37576\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-38201\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-4083\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-4155\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2022-0492\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2022-0847\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2022-27666\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the vulnerable CGSL kernel packages. Note that updated packages may not be available yet. Please contact ZTE for\nmore information.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-0847\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2022-27666\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Netfilter x_tables Heap OOB Write Privilege Escalation');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:\"CANVAS\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/11/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:python3-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:zte:cgsl_main:6\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"NewStart CGSL Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/ZTE-CGSL/release\", \"Host/ZTE-CGSL/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nvar os_release = get_kb_item('Host/ZTE-CGSL/release');\nif (isnull(os_release) || os_release !~ \"^CGSL (MAIN|CORE)\") audit(AUDIT_OS_NOT, 'NewStart Carrier Grade Server Linux');\n\nif (os_release !~ \"CGSL MAIN 6.02\")\n audit(AUDIT_OS_NOT, 'NewStart CGSL MAIN 6.02');\n\nif (!get_kb_item('Host/ZTE-CGSL/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'NewStart Carrier Grade Server Linux', cpu);\n\nvar flag = 0;\n\nvar pkgs = {\n 'CGSL MAIN 6.02': [\n 'bpftool-4.18.0-193.14.2.el8_2.cgslv6_2.493.gfad234822',\n 'kernel-4.18.0-193.14.2.el8_2.cgslv6_2.493.gfad234822',\n 'kernel-core-4.18.0-193.14.2.el8_2.cgslv6_2.493.gfad234822',\n 'kernel-devel-4.18.0-193.14.2.el8_2.cgslv6_2.493.gfad234822',\n 'kernel-headers-4.18.0-193.14.2.el8_2.cgslv6_2.493.gfad234822',\n 'kernel-modules-4.18.0-193.14.2.el8_2.cgslv6_2.493.gfad234822',\n 'kernel-modules-extra-4.18.0-193.14.2.el8_2.cgslv6_2.493.gfad234822',\n 'kernel-tools-4.18.0-193.14.2.el8_2.cgslv6_2.493.gfad234822',\n 'kernel-tools-libs-4.18.0-193.14.2.el8_2.cgslv6_2.493.gfad234822',\n 'perf-4.18.0-193.14.2.el8_2.cgslv6_2.493.gfad234822',\n 'python3-perf-4.18.0-193.14.2.el8_2.cgslv6_2.493.gfad234822'\n ]\n};\nvar pkg_list = pkgs[os_release];\n\nforeach (pkg in pkg_list)\n if (rpm_check(release:'ZTE ' + os_release, reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:32", "description": "The remote CentOS Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the CESA-2021:1578 advisory.\n\n - kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c (CVE-2019-18811)\n\n - kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)\n\n - kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)\n\n - kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)\n\n - kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)\n\n - kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)\n\n - kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n - kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)\n\n - kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)\n\n - kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)\n\n - kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)\n\n - kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)\n\n - kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)\n\n - kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)\n\n - kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)\n\n - kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)\n\n - kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n - kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)\n\n - kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)\n\n - kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)\n\n - kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)\n\n - kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)\n\n - kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-24T00:00:00", "type": "nessus", "title": "CentOS 8 : kernel (CESA-2021:1578)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-18811", "CVE-2019-19523", "CVE-2019-19528", "CVE-2020-0431", "CVE-2020-11608", "CVE-2020-12114", "CVE-2020-12362", "CVE-2020-12464", "CVE-2020-14314", "CVE-2020-14356", "CVE-2020-15437", "CVE-2020-24394", "CVE-2020-25212", "CVE-2020-25284", "CVE-2020-25285", "CVE-2020-25643", "CVE-2020-25704", "CVE-2020-27786", "CVE-2020-27835", "CVE-2020-28974", "CVE-2020-35508", "CVE-2020-36322", "CVE-2021-0342"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:centos:centos:8-stream", "p-cpe:/a:centos:centos:bpftool", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-abi-stablelists", "p-cpe:/a:centos:centos:kernel-core", "p-cpe:/a:centos:centos:kernel-cross-headers", "p-cpe:/a:centos:centos:kernel-debug", "p-cpe:/a:centos:centos:kernel-debug-core", "p-cpe:/a:centos:centos:kernel-debug-devel", "p-cpe:/a:centos:centos:kernel-debug-modules", "p-cpe:/a:centos:centos:kernel-debug-modules-extra", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel-modules", "p-cpe:/a:centos:centos:kernel-modules-extra", "p-cpe:/a:centos:centos:kernel-tools", "p-cpe:/a:centos:centos:kernel-tools-libs", "p-cpe:/a:centos:centos:kernel-tools-libs-devel", "p-cpe:/a:centos:centos:perf", "p-cpe:/a:centos:centos:python3-perf"], "id": "CENTOS8_RHSA-2021-1578.NASL", "href": "https://www.tenable.com/plugins/nessus/149874", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# Red Hat Security Advisory RHSA-2021:1578. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149874);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2019-18811\",\n \"CVE-2019-19523\",\n \"CVE-2019-19528\",\n \"CVE-2020-0431\",\n \"CVE-2020-11608\",\n \"CVE-2020-12114\",\n \"CVE-2020-12362\",\n \"CVE-2020-12464\",\n \"CVE-2020-14314\",\n \"CVE-2020-14356\",\n \"CVE-2020-15437\",\n \"CVE-2020-24394\",\n \"CVE-2020-25212\",\n \"CVE-2020-25284\",\n \"CVE-2020-25285\",\n \"CVE-2020-25643\",\n \"CVE-2020-25704\",\n \"CVE-2020-27786\",\n \"CVE-2020-27835\",\n \"CVE-2020-28974\",\n \"CVE-2020-35508\",\n \"CVE-2020-36322\",\n \"CVE-2021-0342\"\n );\n script_xref(name:\"RHSA\", value:\"2021:1578\");\n\n script_name(english:\"CentOS 8 : kernel (CESA-2021:1578)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote CentOS host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote CentOS Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nCESA-2021:1578 advisory.\n\n - kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c (CVE-2019-18811)\n\n - kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver\n (CVE-2019-19523)\n\n - kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver\n (CVE-2019-19528)\n\n - kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)\n\n - kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in\n drivers/media/usb/gspca/ov519.c (CVE-2020-11608)\n\n - kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)\n\n - kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n - kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)\n\n - kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)\n\n - kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)\n\n - kernel: NULL pointer dereference in serial8250_isa_init_ports function in\n drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)\n\n - kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)\n\n - kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)\n\n - kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)\n\n - kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)\n\n - kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow\n (CVE-2020-25643)\n\n - kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n - kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)\n\n - kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)\n\n - kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)\n\n - kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)\n\n - kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)\n\n - kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege\n (CVE-2021-0342)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2021:1578\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-25643\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-27786\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:8-stream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-abi-stablelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-cross-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:python3-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CentOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('rhel.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/CentOS/release');\nif (isnull(release) || 'CentOS' >!< release) audit(AUDIT_OS_NOT, 'CentOS');\nos_ver = pregmatch(pattern: \"CentOS(?: Stream)?(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'CentOS');\nos_ver = os_ver[1];\nif ('CentOS Stream' >!< release) audit(AUDIT_OS_NOT, 'CentOS 8-Stream');\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '8')) audit(AUDIT_OS_NOT, 'CentOS 8.x', 'CentOS ' + os_ver);\n\nif (!get_kb_item('Host/CentOS/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'CentOS', cpu);\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n rm_kb_item(name:'Host/uptrack-uname-r');\n cve_list = make_list('CVE-2019-18811', 'CVE-2019-19523', 'CVE-2019-19528', 'CVE-2020-0431', 'CVE-2020-11608', 'CVE-2020-12114', 'CVE-2020-12362', 'CVE-2020-12464', 'CVE-2020-14314', 'CVE-2020-14356', 'CVE-2020-15437', 'CVE-2020-24394', 'CVE-2020-25212', 'CVE-2020-25284', 'CVE-2020-25285', 'CVE-2020-25643', 'CVE-2020-25704', 'CVE-2020-27786', 'CVE-2020-27835', 'CVE-2020-28974', 'CVE-2020-35508', 'CVE-2020-36322', 'CVE-2021-0342');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for CESA-2021:1578');\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\npkgs = [\n {'reference':'bpftool-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'bpftool-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-abi-stablelists-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-abi-stablelists-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-core-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-core-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-cross-headers-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-cross-headers-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-core-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-core-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-devel-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-devel-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-modules-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-modules-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-modules-extra-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-modules-extra-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-devel-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-devel-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-modules-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-modules-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-modules-extra-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-modules-extra-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-libs-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-libs-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-libs-devel-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-libs-devel-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'perf-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'perf-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python3-perf-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python3-perf-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'CentOS-' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'bpftool / kernel / kernel-abi-stablelists / kernel-core / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:18", "description": "The remote Oracle Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2021-1578 advisory.\n\n - In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79. (CVE-2019-19523)\n\n - An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d. (CVE-2020-11608)\n\n - In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d. (CVE-2019-19528)\n\n - usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925. (CVE-2020-12464)\n\n - In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered. (CVE-2020-24394)\n\n - A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter. (CVE-2020-12114)\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system. (CVE-2020-14356)\n\n - A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-25643)\n\n - A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service. (CVE-2020-25704)\n\n - A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height. (CVE-2020-28974)\n\n - A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.\n (CVE-2020-14314)\n\n - A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452. (CVE-2020-25212)\n\n - The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe. (CVE-2020-25284)\n\n - A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812. (CVE-2020-25285)\n\n - A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process. (CVE-2020-35508)\n\n - A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1. (CVE-2019-18811)\n\n - The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized. (CVE-2020-15437)\n\n - A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.\n (CVE-2020-27835)\n\n - Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access. (CVE-2020-12362)\n\n - An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950. (CVE-2020-36322)\n\n - In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327. (CVE-2021-0342)\n\n - In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459 (CVE-2020-0431)\n\n - A flaw was found in the Linux kernels implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2020-27786)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-26T00:00:00", "type": "nessus", "title": "Oracle Linux 8 : kernel (ELSA-2021-1578)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-18811", "CVE-2019-19523", "CVE-2019-19528", "CVE-2020-0431", "CVE-2020-11608", "CVE-2020-12114", "CVE-2020-12362", "CVE-2020-12464", "CVE-2020-14314", "CVE-2020-14356", "CVE-2020-15437", "CVE-2020-24394", "CVE-2020-25212", "CVE-2020-25284", "CVE-2020-25285", "CVE-2020-25643", "CVE-2020-25704", "CVE-2020-27786", "CVE-2020-27835", "CVE-2020-28974", "CVE-2020-35508", "CVE-2020-36322", "CVE-2021-0342", "CVE-2021-28950"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:oracle:linux:8", "p-cpe:/a:oracle:linux:bpftool", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-abi-stablelists", "p-cpe:/a:oracle:linux:kernel-core", "p-cpe:/a:oracle:linux:kernel-cross-headers", "p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-debug-core", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-debug-modules", "p-cpe:/a:oracle:linux:kernel-debug-modules-extra", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-modules", "p-cpe:/a:oracle:linux:kernel-modules-extra", "p-cpe:/a:oracle:linux:kernel-tools", "p-cpe:/a:oracle:linux:kernel-tools-libs", "p-cpe:/a:oracle:linux:kernel-tools-libs-devel", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:python3-perf"], "id": "ORACLELINUX_ELSA-2021-1578.NASL", "href": "https://www.tenable.com/plugins/nessus/149914", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2021-1578.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149914);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2019-18811\",\n \"CVE-2019-19523\",\n \"CVE-2019-19528\",\n \"CVE-2020-0431\",\n \"CVE-2020-11608\",\n \"CVE-2020-12114\",\n \"CVE-2020-12362\",\n \"CVE-2020-12464\",\n \"CVE-2020-14314\",\n \"CVE-2020-14356\",\n \"CVE-2020-15437\",\n \"CVE-2020-24394\",\n \"CVE-2020-25212\",\n \"CVE-2020-25284\",\n \"CVE-2020-25285\",\n \"CVE-2020-25643\",\n \"CVE-2020-25704\",\n \"CVE-2020-27786\",\n \"CVE-2020-27835\",\n \"CVE-2020-28974\",\n \"CVE-2020-35508\",\n \"CVE-2020-36322\",\n \"CVE-2021-0342\"\n );\n\n script_name(english:\"Oracle Linux 8 : kernel (ELSA-2021-1578)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nELSA-2021-1578 advisory.\n\n - In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB\n device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79. (CVE-2019-19523)\n\n - An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL\n pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka\n CID-998912346c0d. (CVE-2020-11608)\n\n - In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB\n device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d. (CVE-2019-19528)\n\n - usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because\n a transfer occurs without a reference, aka CID-056ad39ee925. (CVE-2020-12464)\n\n - In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new\n filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the\n current umask is not considered. (CVE-2020-24394)\n\n - A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before\n 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a\n denial of service (panic) by corrupting a mountpoint reference counter. (CVE-2020-12114)\n\n - A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found\n in the way when reboot the system. A local user could use this flaw to crash the system or escalate their\n privileges on the system. (CVE-2020-14356)\n\n - A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption\n and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause\n the system to crash or cause a denial of service. The highest threat from this vulnerability is to data\n confidentiality and integrity as well as system availability. (CVE-2020-25643)\n\n - A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using\n PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of\n service. (CVE-2020-25704)\n\n - A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to\n read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because\n KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height. (CVE-2020-28974)\n\n - A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file\n system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash\n the system if the directory exists. The highest threat from this vulnerability is to system availability.\n (CVE-2020-14314)\n\n - A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers\n to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c\n instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452. (CVE-2020-25212)\n\n - The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete\n permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap\n rbd block devices, aka CID-f44d04e696fe. (CVE-2020-25284)\n\n - A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be\n used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified\n other impact, aka CID-17743798d812. (CVE-2020-25285)\n\n - A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux\n kernel child/parent process identification handling while filtering signal handlers. A local attacker is\n able to abuse this flaw to bypass checks to send any signal to a privileged process. (CVE-2020-35508)\n\n - A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel\n through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering\n sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1. (CVE-2019-18811)\n\n - The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in\n drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial\n of service by using the p->serial_in pointer which uninitialized. (CVE-2020-15437)\n\n - A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the\n way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.\n (CVE-2020-27835)\n\n - Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version\n 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an\n escalation of privilege via local access. (CVE-2020-12362)\n\n - An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka\n CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system\n crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as\n CVE-2021-28950. (CVE-2020-36322)\n\n - In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to\n local escalation of privilege with System execution privileges required. User interaction is not required\n for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327. (CVE-2021-0342)\n\n - In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This\n could lead to local escalation of privilege with no additional execution privileges needed. User\n interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459\n (CVE-2020-0431)\n\n - A flaw was found in the Linux kernels implementation of MIDI, where an attacker with a local account and\n the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to\n this specific memory while freed and before use causes the flow of execution to change and possibly allow\n for memory corruption or privilege escalation. The highest threat from this vulnerability is to\n confidentiality, integrity, as well as system availability. (CVE-2020-27786)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2021-1578.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-25643\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-27786\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/26\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-abi-stablelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-cross-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python3-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 8', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['4.18.0-305.el8'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2021-1578');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '4.18';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'bpftool-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'bpftool-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-4.18.0'},\n {'reference':'kernel-abi-stablelists-4.18.0-305.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-abi-stablelists-4.18.0'},\n {'reference':'kernel-core-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-core-4.18.0'},\n {'reference':'kernel-cross-headers-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-cross-headers-4.18.0'},\n {'reference':'kernel-cross-headers-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-cross-headers-4.18.0'},\n {'reference':'kernel-debug-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-debug-4.18.0'},\n {'reference':'kernel-debug-core-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-debug-core-4.18.0'},\n {'reference':'kernel-debug-devel-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-debug-devel-4.18.0'},\n {'reference':'kernel-debug-modules-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-debug-modules-4.18.0'},\n {'reference':'kernel-debug-modules-extra-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-debug-modules-extra-4.18.0'},\n {'reference':'kernel-devel-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-devel-4.18.0'},\n {'reference':'kernel-headers-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-headers-4.18.0'},\n {'reference':'kernel-headers-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-headers-4.18.0'},\n {'reference':'kernel-modules-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-modules-4.18.0'},\n {'reference':'kernel-modules-extra-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-modules-extra-4.18.0'},\n {'reference':'kernel-tools-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-tools-4.18.0'},\n {'reference':'kernel-tools-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-tools-4.18.0'},\n {'reference':'kernel-tools-libs-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-tools-libs-4.18.0'},\n {'reference':'kernel-tools-libs-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-tools-libs-4.18.0'},\n {'reference':'kernel-tools-libs-devel-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-tools-libs-devel-4.18.0'},\n {'reference':'kernel-tools-libs-devel-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-tools-libs-devel-4.18.0'},\n {'reference':'perf-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'perf-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python3-perf-4.18.0-305.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python3-perf-4.18.0-305.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'bpftool / kernel / kernel-abi-stablelists / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:15", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2021:1739 advisory.\n\n - kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)\n\n - kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)\n\n - kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)\n\n - kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)\n\n - kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)\n\n - kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n - kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363)\n\n - kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364)\n\n - kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)\n\n - kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)\n\n - kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)\n\n - kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)\n\n - kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)\n\n - kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)\n\n - kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)\n\n - kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)\n\n - kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)\n\n - kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n - kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)\n\n - kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)\n\n - kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)\n\n - kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)\n\n - kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)\n\n - kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds (CVE-2021-0605)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-19T00:00:00", "type": "nessus", "title": "RHEL 8 : kernel-rt (RHSA-2021:1739)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19523", "CVE-2019-19528", "CVE-2020-0431", "CVE-2020-11608", "CVE-2020-12114", "CVE-2020-12362", "CVE-2020-12363", "CVE-2020-12364", "CVE-2020-12464", "CVE-2020-14314", "CVE-2020-14356", "CVE-2020-15437", "CVE-2020-24394", "CVE-2020-25212", "CVE-2020-25284", "CVE-2020-25285", "CVE-2020-25643", "CVE-2020-25704", "CVE-2020-27786", "CVE-2020-27835", "CVE-2020-28974", "CVE-2020-35508", "CVE-2021-0342", "CVE-2021-0605"], "modified": "2023-01-23T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:rhel_aus:8.4", "cpe:/o:redhat:rhel_aus:8.6", "cpe:/o:redhat:rhel_e4s:8.4", "cpe:/o:redhat:rhel_e4s:8.6", "cpe:/o:redhat:rhel_eus:8.4", "cpe:/o:redhat:rhel_eus:8.6", "cpe:/o:redhat:rhel_tus:8.4", "cpe:/o:redhat:rhel_tus:8.6", "p-cpe:/a:redhat:enterprise_linux:kernel-rt", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-core", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules"], "id": "REDHAT-RHSA-2021-1739.NASL", "href": "https://www.tenable.com/plugins/nessus/149660", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2021:1739. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149660);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/23\");\n\n script_cve_id(\n \"CVE-2019-19523\",\n \"CVE-2019-19528\",\n \"CVE-2020-0431\",\n \"CVE-2020-11608\",\n \"CVE-2020-12114\",\n \"CVE-2020-12362\",\n \"CVE-2020-12464\",\n \"CVE-2020-14314\",\n \"CVE-2020-14356\",\n \"CVE-2020-15437\",\n \"CVE-2020-24394\",\n \"CVE-2020-25212\",\n \"CVE-2020-25284\",\n \"CVE-2020-25285\",\n \"CVE-2020-25643\",\n \"CVE-2020-25704\",\n \"CVE-2020-27786\",\n \"CVE-2020-27835\",\n \"CVE-2020-28974\",\n \"CVE-2020-35508\",\n \"CVE-2021-0342\"\n );\n script_xref(name:\"RHSA\", value:\"2021:1739\");\n\n script_name(english:\"RHEL 8 : kernel-rt (RHSA-2021:1739)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the RHSA-2021:1739 advisory.\n\n - kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver\n (CVE-2019-19523)\n\n - kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver\n (CVE-2019-19528)\n\n - kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)\n\n - kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in\n drivers/media/usb/gspca/ov519.c (CVE-2020-11608)\n\n - kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)\n\n - kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n - kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363)\n\n - kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364)\n\n - kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)\n\n - kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)\n\n - kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)\n\n - kernel: NULL pointer dereference in serial8250_isa_init_ports function in\n drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)\n\n - kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)\n\n - kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)\n\n - kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)\n\n - kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)\n\n - kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow\n (CVE-2020-25643)\n\n - kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n - kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)\n\n - kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)\n\n - kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)\n\n - kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)\n\n - kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege\n (CVE-2021-0342)\n\n - kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out\n of bounds (CVE-2021-0605)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19523\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19528\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-0431\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-11608\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12114\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12362\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12363\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12364\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12464\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-14314\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-14356\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-15437\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-24394\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-25212\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-25284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-25285\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-25643\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-25704\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-27786\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-27835\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-28974\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-35508\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-0342\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-0605\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2021:1739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1783434\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1783507\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1831726\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1833445\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1848652\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1853922\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1868453\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1869141\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1877575\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1879981\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1882591\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1882594\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1895961\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1900933\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1901161\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1901709\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1902724\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1903126\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1915799\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1919889\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1930246\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1930249\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1930251\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1974823\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-25643\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-27786\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 119, 125, 190, 284, 362, 367, 400, 401, 416, 476, 665, 732);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/19\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '8')) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n rm_kb_item(name:'Host/uptrack-uname-r');\n var cve_list = make_list('CVE-2019-19523', 'CVE-2019-19528', 'CVE-2020-0431', 'CVE-2020-11608', 'CVE-2020-12114', 'CVE-2020-12362', 'CVE-2020-12363', 'CVE-2020-12364', 'CVE-2020-12464', 'CVE-2020-14314', 'CVE-2020-14356', 'CVE-2020-15437', 'CVE-2020-24394', 'CVE-2020-25212', 'CVE-2020-25284', 'CVE-2020-25285', 'CVE-2020-25643', 'CVE-2020-25704', 'CVE-2020-27786', 'CVE-2020-27835', 'CVE-2020-28974', 'CVE-2020-35508', 'CVE-2021-0342', 'CVE-2021-0605');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2021:1739');\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nvar constraints = [\n {\n 'repo_relative_urls': [\n 'content/aus/rhel8/8.4/x86_64/appstream/debug',\n 'content/aus/rhel8/8.4/x86_64/appstream/os',\n 'content/aus/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/aus/rhel8/8.4/x86_64/baseos/debug',\n 'content/aus/rhel8/8.4/x86_64/baseos/os',\n 'content/aus/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/appstream/debug',\n 'content/e4s/rhel8/8.4/x86_64/appstream/os',\n 'content/e4s/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/baseos/debug',\n 'content/e4s/rhel8/8.4/x86_64/baseos/os',\n 'content/e4s/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/highavailability/debug',\n 'content/e4s/rhel8/8.4/x86_64/highavailability/os',\n 'content/e4s/rhel8/8.4/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/sap-solutions/debug',\n 'content/e4s/rhel8/8.4/x86_64/sap-solutions/os',\n 'content/e4s/rhel8/8.4/x86_64/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/sap/debug',\n 'content/e4s/rhel8/8.4/x86_64/sap/os',\n 'content/e4s/rhel8/8.4/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/appstream/debug',\n 'content/eus/rhel8/8.4/x86_64/appstream/os',\n 'content/eus/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/baseos/debug',\n 'content/eus/rhel8/8.4/x86_64/baseos/os',\n 'content/eus/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/codeready-builder/debug',\n 'content/eus/rhel8/8.4/x86_64/codeready-builder/os',\n 'content/eus/rhel8/8.4/x86_64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/highavailability/debug',\n 'content/eus/rhel8/8.4/x86_64/highavailability/os',\n 'content/eus/rhel8/8.4/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/resilientstorage/debug',\n 'content/eus/rhel8/8.4/x86_64/resilientstorage/os',\n 'content/eus/rhel8/8.4/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/sap-solutions/debug',\n 'content/eus/rhel8/8.4/x86_64/sap-solutions/os',\n 'content/eus/rhel8/8.4/x86_64/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/sap/debug',\n 'content/eus/rhel8/8.4/x86_64/sap/os',\n 'content/eus/rhel8/8.4/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/supplementary/debug',\n 'content/eus/rhel8/8.4/x86_64/supplementary/os',\n 'content/eus/rhel8/8.4/x86_64/supplementary/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/appstream/debug',\n 'content/tus/rhel8/8.4/x86_64/appstream/os',\n 'content/tus/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/baseos/debug',\n 'content/tus/rhel8/8.4/x86_64/baseos/os',\n 'content/tus/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/highavailability/debug',\n 'content/tus/rhel8/8.4/x86_64/highavailability/os',\n 'content/tus/rhel8/8.4/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/nfv/debug',\n 'content/tus/rhel8/8.4/x86_64/nfv/os',\n 'content/tus/rhel8/8.4/x86_64/nfv/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/rt/debug',\n 'content/tus/rhel8/8.4/x86_64/rt/os',\n 'content/tus/rhel8/8.4/x86_64/rt/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'kernel-rt-4.18.0-305.rt7.72.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-core-4.18.0-305.rt7.72.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-4.18.0-305.rt7.72.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-core-4.18.0-305.rt7.72.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-devel-4.18.0-305.rt7.72.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-kvm-4.18.0-305.rt7.72.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-modules-4.18.0-305.rt7.72.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-modules-extra-4.18.0-305.rt7.72.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-devel-4.18.0-305.rt7.72.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-kvm-4.18.0-305.rt7.72.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-modules-4.18.0-305.rt7.72.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-modules-extra-4.18.0-305.rt7.72.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n },\n {\n 'repo_relative_urls': [\n 'content/aus/rhel8/8.6/x86_64/appstream/debug',\n 'content/aus/rhel8/8.6/x86_64/appstream/os',\n 'content/aus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/aus/rhel8/8.6/x86_64/baseos/debug',\n 'content/aus/rhel8/8.6/x86_64/baseos/os',\n 'content/aus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/appstream/debug',\n 'content/e4s/rhel8/8.6/x86_64/appstream/os',\n 'content/e4s/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/baseos/debug',\n 'content/e4s/rhel8/8.6/x86_64/baseos/os',\n 'content/e4s/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/debug',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/os',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/debug',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/os',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/sap/debug',\n 'content/e4s/rhel8/8.6/x86_64/sap/os',\n 'content/e4s/rhel8/8.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/appstream/debug',\n 'content/eus/rhel8/8.6/x86_64/appstream/os',\n 'content/eus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/baseos/debug',\n 'content/eus/rhel8/8.6/x86_64/baseos/os',\n 'content/eus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/debug',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/os',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/highavailability/debug',\n 'content/eus/rhel8/8.6/x86_64/highavailability/os',\n 'content/eus/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/debug',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/os',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/debug',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/os',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/sap/debug',\n 'content/eus/rhel8/8.6/x86_64/sap/os',\n 'content/eus/rhel8/8.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/supplementary/debug',\n 'content/eus/rhel8/8.6/x86_64/supplementary/os',\n 'content/eus/rhel8/8.6/x86_64/supplementary/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/appstream/debug',\n 'content/tus/rhel8/8.6/x86_64/appstream/os',\n 'content/tus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/baseos/debug',\n 'content/tus/rhel8/8.6/x86_64/baseos/os',\n 'content/tus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/highavailability/debug',\n 'content/tus/rhel8/8.6/x86_64/highavailability/os',\n 'content/tus/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/rt/os',\n 'content/tus/rhel8/8.6/x86_64/rt/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'kernel-rt-4.18.0-305.rt7.72.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-core-4.18.0-305.rt7.72.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-4.18.0-305.rt7.72.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-core-4.18.0-305.rt7.72.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-devel-4.18.0-305.rt7.72.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-kvm-4.18.0-305.rt7.72.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-modules-4.18.0-305.rt7.72.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-modules-extra-4.18.0-305.rt7.72.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-devel-4.18.0-305.rt7.72.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-kvm-4.18.0-305.rt7.72.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-modules-4.18.0-305.rt7.72.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-modules-extra-4.18.0-305.rt7.72.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n },\n {\n 'repo_relative_urls': [\n 'content/dist/rhel8/8/x86_64/appstream/debug',\n 'content/dist/rhel8/8/x86_64/appstream/os',\n 'content/dist/rhel8/8/x86_64/appstream/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/baseos/debug',\n 'content/dist/rhel8/8/x86_64/baseos/os',\n 'content/dist/rhel8/8/x86_64/baseos/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/codeready-builder/debug',\n 'content/dist/rhel8/8/x86_64/codeready-builder/os',\n 'content/dist/rhel8/8/x86_64/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/highavailability/debug',\n 'content/dist/rhel8/8/x86_64/highavailability/os',\n 'content/dist/rhel8/8/x86_64/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/nfv/debug',\n 'content/dist/rhel8/8/x86_64/nfv/os',\n 'content/dist/rhel8/8/x86_64/nfv/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/resilientstorage/debug',\n 'content/dist/rhel8/8/x86_64/resilientstorage/os',\n 'content/dist/rhel8/8/x86_64/resilientstorage/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/rt/debug',\n 'content/dist/rhel8/8/x86_64/rt/os',\n 'content/dist/rhel8/8/x86_64/rt/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/sap-solutions/debug',\n 'content/dist/rhel8/8/x86_64/sap-solutions/os',\n 'content/dist/rhel8/8/x86_64/sap-solutions/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/sap/debug',\n 'content/dist/rhel8/8/x86_64/sap/os',\n 'content/dist/rhel8/8/x86_64/sap/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/supplementary/debug',\n 'content/dist/rhel8/8/x86_64/supplementary/os',\n 'content/dist/rhel8/8/x86_64/supplementary/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'kernel-rt-4.18.0-305.rt7.72.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-core-4.18.0-305.rt7.72.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-4.18.0-305.rt7.72.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-core-4.18.0-305.rt7.72.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-devel-4.18.0-305.rt7.72.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-kvm-4.18.0-305.rt7.72.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-modules-4.18.0-305.rt7.72.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-debug-modules-extra-4.18.0-305.rt7.72.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-devel-4.18.0-305.rt7.72.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-kvm-4.18.0-305.rt7.72.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-modules-4.18.0-305.rt7.72.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-rt-modules-extra-4.18.0-305.rt7.72.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nforeach var constraint_array ( constraints ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];\n var enterprise_linux_flag = rhel_repo_urls_has_content_dist_rhel(repo_urls:repo_relative_urls);\n foreach var pkg ( constraint_array['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp']) && !enterprise_linux_flag) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-rt / kernel-rt-core / kernel-rt-debug / kernel-rt-debug-core / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-11T15:47:38", "description": "This update corrects a regression in some Xen virtual machine environments. For reference the original advisory text follows.\n\nSeveral vulnerabilities have been discovered in the Linux kernel that may lead to the execution of arbitrary code, privilege escalation, denial of service or information leaks.\n\nCVE-2019-9445\n\nA potential out-of-bounds read was discovered in the F2FS implementation. A user permitted to mount and access arbitrary filesystems could potentially use this to cause a denial of service (crash) or to read sensitive information.\n\nCVE-2019-19073, CVE-2019-19074\n\nNavid Emamdoost discovered potential memory leaks in the ath9k and ath9k_htc drivers. The security impact of these is unclear.\n\nCVE-2019-19448\n\n'Team bobfuzzer' reported a bug in Btrfs that could lead to a use-after-free, and could be triggered by crafted filesystem images. A user permitted to mount and access arbitrary filesystems could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.\n\nCVE-2020-12351\n\nAndy Nguyen discovered a flaw in the Bluetooth implementation in the way L2CAP packets with A2MP CID are handled. A remote attacker within a short distance, knowing the victim's Bluetooth device address, can send a malicious l2cap packet and cause a denial of service or possibly arbitrary code execution with kernel privileges.\n\nCVE-2020-12352\n\nAndy Nguyen discovered a flaw in the Bluetooth implementation. Stack memory is not properly initialised when handling certain AMP packets.\nA remote attacker within a short distance, knowing the victim's Bluetooth device address address, can retrieve kernel stack information.\n\nCVE-2020-12655\n\nZheng Bin reported that crafted XFS volumes could trigger a system hang. An attacker able to mount such a volume could use this to cause a denial of service.\n\nCVE-2020-12771\n\nZhiqiang Liu reported a bug in the bcache block driver that could lead to a system hang. The security impact of this is unclear.\n\nCVE-2020-12888\n\nIt was discovered that the PCIe Virtual Function I/O (vfio-pci) driver allowed users to disable a device's memory space while it was still mapped into a process. On some hardware platforms, local users or guest virtual machines permitted to access PCIe Virtual Functions could use this to cause a denial of service (hardware error and crash).\n\nCVE-2020-14305\n\nVasily Averin of Virtuozzo discovered a potential heap buffer overflow in the netfilter nf_contrack_h323 module. When this module is used to perform connection tracking for TCP/IPv6, a remote attacker could use this to cause a denial of service (crash or memory corruption) or possibly for remote code execution with kernel privilege.\n\nCVE-2020-14314\n\nA bug was discovered in the ext4 filesystem that could lead to an out-of-bound read. A local user permitted to mount and access arbitrary filesystem images could use this to cause a denial of service (crash).\n\nCVE-2020-14331\n\nA bug was discovered in the VGA console driver's soft-scrollback feature that could lead to a heap buffer overflow. On a system with a custom kernel that has CONFIG_VGACON_SOFT_SCROLLBACK enabled, a local user with access to a console could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.\n\nCVE-2020-14356, CVE-2020-25220\n\nA bug was discovered in the cgroup subsystem's handling of socket references to cgroups. In some cgroup configurations, this could lead to a use-after-free. A local user might be able to use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.\n\nThe original fix for this bug introudced a new security issue, which is also addressed in this update.\n\nCVE-2020-14386\n\nOr Cohen discovered a bug in the packet socket (AF_PACKET) implementation which could lead to a heap buffer overflow. A local user with the CAP_NET_RAW capability (in any user namespace) could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.\n\nCVE-2020-14390\n\nMinh Yuan discovered a bug in the framebuffer console driver's scrollback feature that could lead to a heap buffer overflow. On a system using framebuffer consoles, a local user with access to a console could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.\n\nThe scrollback feature has been disabled for now, as no other fix was available for this issue.\n\nCVE-2020-15393\n\nKyungtae Kim reported a memory leak in the usbtest driver. The security impact of this is unclear.\n\nCVE-2020-16166\n\nAmit Klein reported that the random number generator used by the network stack might not be re-seeded for long periods of time, making e.g. client port number allocations more predictable. This made it easier for remote attackers to carry out some network- based attacks such as DNS cache poisoning or device tracking.\n\nCVE-2020-24490\n\nAndy Nguyen discovered a flaw in the Bluetooth implementation that can lead to a heap buffer overflow. On systems with a Bluetooth 5 hardware interface, a remote attacker within a short distance can use this to cause a denial of service (crash or memory corruption) or possibly for remote code execution with kernel privilege.\n\nCVE-2020-25211\n\nA flaw was discovered in netfilter subsystem. A local attacker able to inject conntrack Netlink configuration can cause a denial of service.\n\nCVE-2020-25212\n\nA bug was discovered in the NFSv4 client implementation that could lead to a heap buffer overflow. A malicious NFS server could use this to cause a denial of service (crash or memory corruption) or possibly to execute arbitrary code on the client.\n\nCVE-2020-25284\n\nIt was discovered that the Rados block device (rbd) driver allowed tasks running as uid 0 to add and remove rbd devices, even if they dropped capabilities. On a system with the rbd driver loaded, this might allow privilege escalation from a container with a task running as root.\n\nCVE-2020-25285\n\nA race condition was discovered in the hugetlb filesystem's sysctl handlers, that could lead to stack corruption. A local user permitted to write to hugepages sysctls could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation. By default only the root user can do this.\n\nCVE-2020-25641\n\nThe syzbot tool found a bug in the block layer that could lead to an infinite loop. A local user with access to a raw block device could use this to cause a denial of service (unbounded CPU use and possible system hang).\n\nCVE-2020-25643\n\nChenNan Of Chaitin Security Research Lab discovered a flaw in the hdlc_ppp module. Improper input validation in the ppp_cp_parse_cr() function may lead to memory corruption and information disclosure.\n\nCVE-2020-26088\n\nIt was discovered that the NFC (Near Field Communication) socket implementation allowed any user to create raw sockets. On a system with an NFC interface, this allowed local users to evade local network security policy.\n\nFor Debian 9 stretch, these problems have been fixed in version 4.9.240-1. This update additionally includes many more bug fixes from stable updates 4.9.229-4.9.240 inclusive.\n\nWe recommend that you upgrade your linux packages.\n\nFor the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-11-02T00:00:00", "type": "nessus", "title": "Debian DLA-2420-2 : linux regression update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19073", "CVE-2019-19074", "CVE-2019-19448", "CVE-2019-9445", "CVE-2020-12351", "CVE-2020-12352", "CVE-2020-12655", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-14305", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-14386", "CVE-2020-14390", "CVE-2020-15393", "CVE-2020-16166", "CVE-2020-24490", "CVE-2020-25211", "CVE-2020-25212", "CVE-2020-25220", "CVE-2020-25284", "CVE-2020-25285", "CVE-2020-25641", "CVE-2020-25643", "CVE-2020-26088"], "modified": "2022-05-12T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:hyperv-daemons", "p-cpe:/a:debian:debian_linux:libcpupower-dev", "p-cpe:/a:debian:debian_linux:libcpupower1", "p-cpe:/a:debian:debian_linux:libusbip-dev", "p-cpe:/a:debian:debian_linux:linux-compiler-gcc-6-arm", "p-cpe:/a:debian:debian_linux:linux-compiler-gcc-6-s390", "p-cpe:/a:debian:debian_linux:linux-compiler-gcc-6-x86", "p-cpe:/a:debian:debian_linux:linux-cpupower", "p-cpe:/a:debian:debian_linux:linux-doc-4.9", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-4kc-malta", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-octeon", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-powerpc64le", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-rt-686-pae", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-rt-amd64", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-s390x", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-4kc-malta", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-4kc-malta-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-5kc-malta", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-5kc-malta-dbg", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-5kc-malta", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-686", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-686-pae", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-amd64", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-arm64", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-armel", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-armhf", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-i386", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-mips", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-mips64el", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-mipsel", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-ppc64el", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-s390x", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-amd64", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-arm64", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-armmp", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-armmp-lpae", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-686", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-686-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-686-pae", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-686-pae-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-amd64", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-amd64-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-arm64", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-arm64-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-armmp", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-armmp-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-armmp-lpae", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-armmp-lpae-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-loongson-3", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-loongson-3-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-marvell", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-marvell-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-octeon", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-octeon-dbg", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-common", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-common-rt", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-loongson-3", "p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-marvell", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-powerpc64le", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-powerpc64le-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-rt-686-pae", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-rt-686-pae-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-rt-amd64", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-rt-amd64-dbg", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-s390x", "p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-s390x-dbg", "p-cpe:/a:debian:debian_linux:linux-kbuild-4.9", "p-cpe:/a:debian:debian_linux:linux-libc-dev", "p-cpe:/a:debian:debian_linux:linux-manual-4.9", "p-cpe:/a:debian:debian_linux:linux-perf-4.9", "p-cpe:/a:debian:debian_linux:linux-source-4.9", "p-cpe:/a:debian:debian_linux:linux-support-4.9.0-9", "p-cpe:/a:debian:debian_linux:usbip", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DLA-2420.NASL", "href": "https://www.tenable.com/plugins/nessus/142176", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-2420-2. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(142176);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/12\");\n\n script_cve_id(\"CVE-2019-19073\", \"CVE-2019-19074\", \"CVE-2019-19448\", \"CVE-2019-9445\", \"CVE-2020-12351\", \"CVE-2020-12352\", \"CVE-2020-12655\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-14305\", \"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-14386\", \"CVE-2020-14390\", \"CVE-2020-15393\", \"CVE-2020-16166\", \"CVE-2020-24490\", \"CVE-2020-25211\", \"CVE-2020-25212\", \"CVE-2020-25220\", \"CVE-2020-25284\", \"CVE-2020-25285\", \"CVE-2020-25641\", \"CVE-2020-25643\", \"CVE-2020-26088\");\n\n script_name(english:\"Debian DLA-2420-2 : linux regression update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update corrects a regression in some Xen virtual machine\nenvironments. For reference the original advisory text follows.\n\nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to the execution of arbitrary code, privilege escalation,\ndenial of service or information leaks.\n\nCVE-2019-9445\n\nA potential out-of-bounds read was discovered in the F2FS\nimplementation. A user permitted to mount and access arbitrary\nfilesystems could potentially use this to cause a denial of service\n(crash) or to read sensitive information.\n\nCVE-2019-19073, CVE-2019-19074\n\nNavid Emamdoost discovered potential memory leaks in the ath9k and\nath9k_htc drivers. The security impact of these is unclear.\n\nCVE-2019-19448\n\n'Team bobfuzzer' reported a bug in Btrfs that could lead to a\nuse-after-free, and could be triggered by crafted filesystem images. A\nuser permitted to mount and access arbitrary filesystems could use\nthis to cause a denial of service (crash or memory corruption) or\npossibly for privilege escalation.\n\nCVE-2020-12351\n\nAndy Nguyen discovered a flaw in the Bluetooth implementation in the\nway L2CAP packets with A2MP CID are handled. A remote attacker within\na short distance, knowing the victim's Bluetooth device address, can\nsend a malicious l2cap packet and cause a denial of service or\npossibly arbitrary code execution with kernel privileges.\n\nCVE-2020-12352\n\nAndy Nguyen discovered a flaw in the Bluetooth implementation. Stack\nmemory is not properly initialised when handling certain AMP packets.\nA remote attacker within a short distance, knowing the victim's\nBluetooth device address address, can retrieve kernel stack\ninformation.\n\nCVE-2020-12655\n\nZheng Bin reported that crafted XFS volumes could trigger a system\nhang. An attacker able to mount such a volume could use this to cause\na denial of service.\n\nCVE-2020-12771\n\nZhiqiang Liu reported a bug in the bcache block driver that could lead\nto a system hang. The security impact of this is unclear.\n\nCVE-2020-12888\n\nIt was discovered that the PCIe Virtual Function I/O (vfio-pci) driver\nallowed users to disable a device's memory space while it was still\nmapped into a process. On some hardware platforms, local users or\nguest virtual machines permitted to access PCIe Virtual Functions\ncould use this to cause a denial of service (hardware error and\ncrash).\n\nCVE-2020-14305\n\nVasily Averin of Virtuozzo discovered a potential heap buffer overflow\nin the netfilter nf_contrack_h323 module. When this module is used to\nperform connection tracking for TCP/IPv6, a remote attacker could use\nthis to cause a denial of service (crash or memory corruption) or\npossibly for remote code execution with kernel privilege.\n\nCVE-2020-14314\n\nA bug was discovered in the ext4 filesystem that could lead to an\nout-of-bound read. A local user permitted to mount and access\narbitrary filesystem images could use this to cause a denial of\nservice (crash).\n\nCVE-2020-14331\n\nA bug was discovered in the VGA console driver's soft-scrollback\nfeature that could lead to a heap buffer overflow. On a system with a\ncustom kernel that has CONFIG_VGACON_SOFT_SCROLLBACK enabled, a local\nuser with access to a console could use this to cause a denial of\nservice (crash or memory corruption) or possibly for privilege\nescalation.\n\nCVE-2020-14356, CVE-2020-25220\n\nA bug was discovered in the cgroup subsystem's handling of socket\nreferences to cgroups. In some cgroup configurations, this could lead\nto a use-after-free. A local user might be able to use this to cause a\ndenial of service (crash or memory corruption) or possibly for\nprivilege escalation.\n\nThe original fix for this bug introudced a new security\nissue, which is also addressed in this update.\n\nCVE-2020-14386\n\nOr Cohen discovered a bug in the packet socket (AF_PACKET)\nimplementation which could lead to a heap buffer overflow. A local\nuser with the CAP_NET_RAW capability (in any user namespace) could use\nthis to cause a denial of service (crash or memory corruption) or\npossibly for privilege escalation.\n\nCVE-2020-14390\n\nMinh Yuan discovered a bug in the framebuffer console driver's\nscrollback feature that could lead to a heap buffer overflow. On a\nsystem using framebuffer consoles, a local user with access to a\nconsole could use this to cause a denial of service (crash or memory\ncorruption) or possibly for privilege escalation.\n\nThe scrollback feature has been disabled for now, as no\nother fix was available for this issue.\n\nCVE-2020-15393\n\nKyungtae Kim reported a memory leak in the usbtest driver. The\nsecurity impact of this is unclear.\n\nCVE-2020-16166\n\nAmit Klein reported that the random number generator used by the\nnetwork stack might not be re-seeded for long periods of time, making\ne.g. client port number allocations more predictable. This made it\neasier for remote attackers to carry out some network- based attacks\nsuch as DNS cache poisoning or device tracking.\n\nCVE-2020-24490\n\nAndy Nguyen discovered a flaw in the Bluetooth implementation that can\nlead to a heap buffer overflow. On systems with a Bluetooth 5 hardware\ninterface, a remote attacker within a short distance can use this to\ncause a denial of service (crash or memory corruption) or possibly for\nremote code execution with kernel privilege.\n\nCVE-2020-25211\n\nA flaw was discovered in netfilter subsystem. A local attacker able to\ninject conntrack Netlink configuration can cause a denial of service.\n\nCVE-2020-25212\n\nA bug was discovered in the NFSv4 client implementation that could\nlead to a heap buffer overflow. A malicious NFS server could use this\nto cause a denial of service (crash or memory corruption) or possibly\nto execute arbitrary code on the client.\n\nCVE-2020-25284\n\nIt was discovered that the Rados block device (rbd) driver allowed\ntasks running as uid 0 to add and remove rbd devices, even if they\ndropped capabilities. On a system with the rbd driver loaded, this\nmight allow privilege escalation from a container with a task running\nas root.\n\nCVE-2020-25285\n\nA race condition was discovered in the hugetlb filesystem's sysctl\nhandlers, that could lead to stack corruption. A local user permitted\nto write to hugepages sysctls could use this to cause a denial of\nservice (crash or memory corruption) or possibly for privilege\nescalation. By default only the root user can do this.\n\nCVE-2020-25641\n\nThe syzbot tool found a bug in the block layer that could lead to an\ninfinite loop. A local user with access to a raw block device could\nuse this to cause a denial of service (unbounded CPU use and possible\nsystem hang).\n\nCVE-2020-25643\n\nChenNan Of Chaitin Security Research Lab discovered a flaw in the\nhdlc_ppp module. Improper input validation in the ppp_cp_parse_cr()\nfunction may lead to memory corruption and information disclosure.\n\nCVE-2020-26088\n\nIt was discovered that the NFC (Near Field Communication) socket\nimplementation allowed any user to create raw sockets. On a system\nwith an NFC interface, this allowed local users to evade local network\nsecurity policy.\n\nFor Debian 9 stretch, these problems have been fixed in version\n4.9.240-1. This update additionally includes many more bug fixes from\nstable updates 4.9.229-4.9.240 inclusive.\n\nWe recommend that you upgrade your linux packages.\n\nFor the detailed security status of linux please refer to its security\ntracker page at: https://security-tracker.debian.org/tracker/linux\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/linux\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/linux\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14305\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:hyperv-daemons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libcpupower-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libcpupower1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libusbip-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-compiler-gcc-6-arm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-compiler-gcc-6-s390\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-compiler-gcc-6-x86\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-cpupower\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-doc-4.9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-4kc-malta\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-5kc-malta\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-686-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-amd64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-arm64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-armel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-armhf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-i386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-mips\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-mips64el\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-mipsel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-ppc64el\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-all-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-amd64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-arm64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-armmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-armmp-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-common-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-loongson-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-marvell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-octeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-powerpc64le\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-rt-686-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-rt-amd64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-9-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-4kc-malta\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-4kc-malta-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-5kc-malta\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-5kc-malta-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-686-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-686-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-686-pae-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-amd64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-amd64-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-arm64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-arm64-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-armmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-armmp-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-armmp-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-armmp-lpae-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-loongson-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-loongson-3-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-marvell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-marvell-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-octeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-octeon-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-powerpc64le\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-powerpc64le-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-rt-686-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-rt-686-pae-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-rt-amd64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-rt-amd64-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-image-4.9.0-9-s390x-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-kbuild-4.9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-libc-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-manual-4.9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-perf-4.9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-source-4.9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-support-4.9.0-9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:usbip\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/10/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"hyperv-daemons\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libcpupower-dev\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libcpupower1\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libusbip-dev\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-compiler-gcc-6-arm\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-compiler-gcc-6-s390\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-compiler-gcc-6-x86\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-cpupower\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-doc-4.9\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-4kc-malta\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-5kc-malta\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-686\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-686-pae\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-all\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-all-amd64\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-all-arm64\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-all-armel\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-all-armhf\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-all-i386\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-all-mips\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-all-mips64el\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-all-mipsel\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-all-ppc64el\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-all-s390x\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-amd64\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-arm64\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-armmp\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-armmp-lpae\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-common\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-common-rt\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-loongson-3\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-marvell\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-octeon\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-powerpc64le\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-headers-4.9.0-9-rt-686-pae\", reference:\"4.9.240-2\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"linux-he