ID ALA_ALAS-2019-1167.NASL Type nessus Reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-02-02T00:00:00
Description
In the Linux kernel af_alg_release() in crypto/af_alg.c neglects to
set a NULL value for a certain structure member, which leads to a
use-after-free (UAF) in sockfs_setattr. A local attacker can use this
flaw to escalate privileges and take control of the system.
(CVE-2019-8912)
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Amazon Linux AMI Security Advisory ALAS-2019-1167.
#
include("compat.inc");
if (description)
{
script_id(122759);
script_version("1.2");
script_cvs_date("Date: 2020/02/05");
script_cve_id("CVE-2019-8912");
script_xref(name:"ALAS", value:"2019-1167");
script_name(english:"Amazon Linux AMI : kernel (ALAS-2019-1167)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote Amazon Linux AMI host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"In the Linux kernel af_alg_release() in crypto/af_alg.c neglects to
set a NULL value for a certain structure member, which leads to a
use-after-free (UAF) in sockfs_setattr. A local attacker can use this
flaw to escalate privileges and take control of the system.
(CVE-2019-8912)"
);
script_set_attribute(
attribute:"see_also",
value:"https://alas.aws.amazon.com/ALAS-2019-1167.html"
);
script_set_attribute(
attribute:"solution",
value:"Run 'yum update kernel' to update your system."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:kernel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:kernel-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:kernel-debuginfo-common-i686");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:kernel-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:kernel-headers");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:kernel-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:kernel-tools-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:kernel-tools-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:perf");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:perf-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:amazon:linux");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/02/18");
script_set_attribute(attribute:"patch_publication_date", value:"2019/03/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/03/12");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Amazon Linux Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/AmazonLinux/release", "Host/AmazonLinux/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/AmazonLinux/release");
if (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, "Amazon Linux");
os_ver = pregmatch(pattern: "^AL(A|\d)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Amazon Linux");
os_ver = os_ver[1];
if (os_ver != "A")
{
if (os_ver == 'A') os_ver = 'AMI';
audit(AUDIT_OS_NOT, "Amazon Linux AMI", "Amazon Linux " + os_ver);
}
if (!get_kb_item("Host/AmazonLinux/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (rpm_check(release:"ALA", reference:"kernel-4.14.104-78.84.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"kernel-debuginfo-4.14.104-78.84.amzn1")) flag++;
if (rpm_check(release:"ALA", cpu:"i686", reference:"kernel-debuginfo-common-i686-4.14.104-78.84.amzn1")) flag++;
if (rpm_check(release:"ALA", cpu:"x86_64", reference:"kernel-debuginfo-common-x86_64-4.14.104-78.84.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"kernel-devel-4.14.104-78.84.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"kernel-headers-4.14.104-78.84.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"kernel-tools-4.14.104-78.84.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"kernel-tools-debuginfo-4.14.104-78.84.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"kernel-tools-devel-4.14.104-78.84.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"perf-4.14.104-78.84.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"perf-debuginfo-4.14.104-78.84.amzn1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kernel / kernel-debuginfo / kernel-debuginfo-common-i686 / etc");
}
{"id": "ALA_ALAS-2019-1167.NASL", "bulletinFamily": "scanner", "title": "Amazon Linux AMI : kernel (ALAS-2019-1167)", "description": "In the Linux kernel af_alg_release() in crypto/af_alg.c neglects to\nset a NULL value for a certain structure member, which leads to a\nuse-after-free (UAF) in sockfs_setattr. A local attacker can use this\nflaw to escalate privileges and take control of the system.\n(CVE-2019-8912)", "published": "2019-03-12T00:00:00", "modified": "2021-02-02T00:00:00", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "href": "https://www.tenable.com/plugins/nessus/122759", "reporter": "This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://alas.aws.amazon.com/ALAS-2019-1167.html"], "cvelist": ["CVE-2019-8912"], "type": "nessus", "lastseen": "2021-02-01T01:22:13", "edition": 18, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2019-8912"]}, {"type": "f5", "idList": ["F5:K31739796"]}, {"type": "fedora", "idList": ["FEDORA:22D77604972B", "FEDORA:9ECF26002DC7", "FEDORA:85FBF6076011", "FEDORA:6B6B360567FC", "FEDORA:CD9C2608BFE6", "FEDORA:4612C608B7ED", "FEDORA:4CF35608BFEA", "FEDORA:20DCB60779B2", "FEDORA:296826040AED", "FEDORA:00AE7601DEEC"]}, {"type": "amazon", "idList": ["ALAS2-2019-1167", "ALAS-2019-1167"]}, {"type": "paloalto", "idList": ["PAN-SA-2019-0017"]}, {"type": "avleonov", "idList": ["AVLEONOV:D3596F92B2F86A7724B8DAF5CD2B6684"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310875941", "OPENVAS:1361412562310852420", "OPENVAS:1361412562310843960", "OPENVAS:1361412562310875834", "OPENVAS:1361412562310843952", "OPENVAS:1361412562310875772", "OPENVAS:1361412562310843954", "OPENVAS:1361412562310875479", "OPENVAS:1361412562310875478", "OPENVAS:1361412562310843959"]}, {"type": "nessus", "idList": ["OPENSUSE-2019-1193.NASL", "PHOTONOS_PHSA-2019-2_0-0134_LINUX.NASL", "AL2_ALAS-2019-1167.NASL", "FEDORA_2019-7BDEED7FC5.NASL", "PHOTONOS_PHSA-2019-2_0-0134_BINUTILS.NASL", "PHOTONOS_PHSA-2019-2_0-0134_KEEPALIVED.NASL", "PALO_ALTO_PAN-SA-2019-0017.NASL", "FEDORA_2019-16DE0047D4.NASL", "PHOTONOS_PHSA-2019-2_0-0134_RSYSLOG.NASL", "PHOTONOS_PHSA-2019-2_0-0134_GLIBC.NASL"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:1193-1"]}, {"type": "oraclelinux", "idList": ["ELSA-2019-4612"]}, {"type": "redhat", "idList": ["RHSA-2020:0174"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:DAEEFC1E9FDBBF02A1D3ACCD6434010C"]}, {"type": "ubuntu", "idList": ["USN-3930-2", "USN-3931-2", "USN-3931-1", "USN-3930-1"]}], "modified": "2021-02-01T01:22:13", "rev": 2}, "score": {"value": 5.8, "vector": "NONE", "modified": "2021-02-01T01:22:13", "rev": 2}, "vulnersScore": 5.8}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2019-1167.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122759);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/02/05\");\n\n script_cve_id(\"CVE-2019-8912\");\n script_xref(name:\"ALAS\", value:\"2019-1167\");\n\n script_name(english:\"Amazon Linux AMI : kernel (ALAS-2019-1167)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"In the Linux kernel af_alg_release() in crypto/af_alg.c neglects to\nset a NULL value for a certain structure member, which leads to a\nuse-after-free (UAF) in sockfs_setattr. A local attacker can use this\nflaw to escalate privileges and take control of the system.\n(CVE-2019-8912)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2019-1167.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update kernel' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-i686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/03/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"kernel-4.14.104-78.84.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-debuginfo-4.14.104-78.84.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", cpu:\"i686\", reference:\"kernel-debuginfo-common-i686-4.14.104-78.84.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-4.14.104-78.84.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-devel-4.14.104-78.84.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-headers-4.14.104-78.84.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-4.14.104-78.84.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-debuginfo-4.14.104-78.84.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-devel-4.14.104-78.84.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"perf-4.14.104-78.84.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"perf-debuginfo-4.14.104-78.84.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debuginfo / kernel-debuginfo-common-i686 / etc\");\n}\n", "naslFamily": "Amazon Linux Local Security Checks", "pluginID": "122759", "cpe": ["p-cpe:/a:amazon:linux:kernel-tools-debuginfo", "p-cpe:/a:amazon:linux:kernel", "p-cpe:/a:amazon:linux:perf", "p-cpe:/a:amazon:linux:kernel-tools", "p-cpe:/a:amazon:linux:kernel-devel", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:amazon:linux:kernel-debuginfo", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-i686", "p-cpe:/a:amazon:linux:perf-debuginfo", "p-cpe:/a:amazon:linux:kernel-tools-devel", "p-cpe:/a:amazon:linux:kernel-headers", "cpe:/o:amazon:linux"], "scheme": null, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}}
{"cve": [{"lastseen": "2021-02-02T07:13:06", "description": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "edition": 7, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-02-18T18:29:00", "title": "CVE-2019-8912", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8912"], "modified": "2019-04-12T12:29:00", "cpe": ["cpe:/o:redhat:enterprise_linux:7.0", "cpe:/o:linux:linux_kernel:4.20.11"], "id": "CVE-2019-8912", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8912", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.20.11:*:*:*:*:*:*:*"]}], "f5": [{"lastseen": "2020-04-06T22:39:57", "bulletinFamily": "software", "cvelist": ["CVE-2019-8912"], "description": "\nF5 Product Development has evaluated the currently supported releases for potential vulnerability, and no F5 products were found to be vulnerable.\n\nNone\n\n * [K51812227: Understanding Security Advisory versioning](<https://support.f5.com/csp/article/K51812227>)\n * [K41942608: Overview of AskF5 Security Advisory articles](<https://support.f5.com/csp/article/K41942608>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n", "edition": 1, "modified": "2019-03-01T19:11:00", "published": "2019-03-01T19:11:00", "id": "F5:K31739796", "href": "https://support.f5.com/csp/article/K31739796", "title": "Linux kernel vulnerability CVE-2019-8912", "type": "f5", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-29T12:51:22", "description": "The version of Palo Alto Networks PAN-OS running on the remote host is 7.1.x prior to 7.1.24 or 8.0.x prior to 8.0.18\nor 8.1.x prior to 8.1.9 or 9.0.x prior to 9.0.3. It is, therefore, affected by a vulnerability.\n\n- A privilege escalation vulnerability exists in the Linux kernel's sockfs_setattr. An unauthenticated, local attacker\n can exploit this to gain privileged access to the system.", "edition": 18, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-10-02T00:00:00", "title": "Palo Alto Networks PAN-OS 7.1.x < 7.1.24 / 8.0.x < 8.0.18 / 8.1.x < 8.1.9 / 9.0.x < 9.0.3 Vulnerability", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8912"], "modified": "2019-10-02T00:00:00", "cpe": ["cpe:/o:paloaltonetworks:pan-os"], "id": "PALO_ALTO_PAN-SA-2019-0017.NASL", "href": "https://www.tenable.com/plugins/nessus/129502", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(129502);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/28\");\n\n script_cve_id(\"CVE-2019-8912\");\n script_bugtraq_id(107063);\n\n script_name(english:\"Palo Alto Networks PAN-OS 7.1.x < 7.1.24 / 8.0.x < 8.0.18 / 8.1.x < 8.1.9 / 9.0.x < 9.0.3 Vulnerability\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote PAN-OS host is affected by vulnerability\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Palo Alto Networks PAN-OS running on the remote host is 7.1.x prior to 7.1.24 or 8.0.x prior to 8.0.18\nor 8.1.x prior to 8.1.9 or 9.0.x prior to 9.0.3. It is, therefore, affected by a vulnerability.\n\n- A privilege escalation vulnerability exists in the Linux kernel's sockfs_setattr. An unauthenticated, local attacker\n can exploit this to gain privileged access to the system.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://securityadvisories.paloaltonetworks.com/Home/Detail/155\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to PAN-OS 7.1.24 / 8.0.18 / 8.1.9 / 9.0.3 or later\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8912\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/10/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:paloaltonetworks:pan-os\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Palo Alto Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"palo_alto_version.nbin\");\n script_require_keys(\"Host/Palo_Alto/Firewall/Version\", \"Host/Palo_Alto/Firewall/Full_Version\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\napp_name = 'Palo Alto Networks PAN-OS';\n\napp_info = vcf::get_app_info(app:app_name, kb_ver:'Host/Palo_Alto/Firewall/Full_Version', kb_source:'Host/Palo_Alto/Firewall/Source');\n\nconstraints = [\n { 'min_version' : '7.1.0', 'max_version' : '7.1.23', 'fixed_display' : '7.1.24' },\n { 'min_version' : '8.0.0', 'max_version' : '8.0.17', 'fixed_display' : '8.0.18' },\n { 'min_version' : '8.1.0', 'max_version' : '8.1.8', 'fixed_display' : '8.1.9' },\n { 'min_version' : '9.0.0', 'max_version' : '9.0.2', 'fixed_display' : '9.0.3' }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T01:09:39", "description": "An update of the linux package has been released.", "edition": 18, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-03-18T00:00:00", "title": "Photon OS 2.0: Linux PHSA-2019-2.0-0134", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8912"], "modified": "2021-02-02T00:00:00", "cpe": ["p-cpe:/a:vmware:photonos:linux", "cpe:/o:vmware:photonos:2.0"], "id": "PHOTONOS_PHSA-2019-2_0-0134_LINUX.NASL", "href": "https://www.tenable.com/plugins/nessus/122917", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from VMware Security Advisory PHSA-2019-2.0-0134. The text\n# itself is copyright (C) VMware, Inc.\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122917);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/02/04\");\n\n script_cve_id(\"CVE-2019-8912\");\n\n script_name(english:\"Photon OS 2.0: Linux PHSA-2019-2.0-0134\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote PhotonOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update of the linux package has been released.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/vmware/photon/wiki/Security-Updates-2-134.md\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected Linux packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8912\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/11/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:vmware:photonos:linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:photonos:2.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"PhotonOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/PhotonOS/release\", \"Host/PhotonOS/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/PhotonOS/release\");\nif (isnull(release) || release !~ \"^VMware Photon\") audit(AUDIT_OS_NOT, \"PhotonOS\");\nif (release !~ \"^VMware Photon (?:Linux|OS) 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"PhotonOS 2.0\");\n\nif (!get_kb_item(\"Host/PhotonOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"PhotonOS\", cpu);\n\nflag = 0;\n\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-aws-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-aws-debuginfo-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-aws-devel-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-aws-docs-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-aws-drivers-gpu-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-aws-oprofile-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-aws-sound-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-aws-tools-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-debuginfo-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-devel-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-docs-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-drivers-gpu-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-esx-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-esx-debuginfo-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-esx-devel-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-esx-docs-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-oprofile-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-secure-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-secure-debuginfo-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-secure-devel-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-secure-docs-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-secure-lkcm-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-sound-4.9.154-2.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"linux-tools-4.9.154-2.ph2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T01:18:39", "description": "In the Linux kernel af_alg_release() in crypto/af_alg.c neglects to\nset a NULL value for a certain structure member, which leads to a\nuse-after-free (UAF) in sockfs_setattr. A local attacker can use this\nflaw to escalate privileges and take control of the\nsystem.(CVE-2019-8912)", "edition": 18, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-03-08T00:00:00", "title": "Amazon Linux 2 : kernel (ALAS-2019-1167)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8912"], "modified": "2021-02-02T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:kernel-tools-debuginfo", "p-cpe:/a:amazon:linux:kernel", "p-cpe:/a:amazon:linux:python-perf", "cpe:/o:amazon:linux:2", "p-cpe:/a:amazon:linux:perf", "p-cpe:/a:amazon:linux:kernel-tools", "p-cpe:/a:amazon:linux:python-perf-debuginfo", "p-cpe:/a:amazon:linux:kernel-devel", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:amazon:linux:kernel-debuginfo", "p-cpe:/a:amazon:linux:perf-debuginfo", "p-cpe:/a:amazon:linux:kernel-tools-devel", "p-cpe:/a:amazon:linux:kernel-headers"], "id": "AL2_ALAS-2019-1167.NASL", "href": "https://www.tenable.com/plugins/nessus/122673", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux 2 Security Advisory ALAS-2019-1167.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122673);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/02/06\");\n\n script_cve_id(\"CVE-2019-8912\");\n script_xref(name:\"ALAS\", value:\"2019-1167\");\n\n script_name(english:\"Amazon Linux 2 : kernel (ALAS-2019-1167)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux 2 host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"In the Linux kernel af_alg_release() in crypto/af_alg.c neglects to\nset a NULL value for a certain structure member, which leads to a\nuse-after-free (UAF) in sockfs_setattr. A local attacker can use this\nflaw to escalate privileges and take control of the\nsystem.(CVE-2019-8912)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/AL2/ALAS-2019-1167.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update kernel' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux:2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/03/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/08\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"2\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux 2\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-4.14.104-95.84.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-debuginfo-4.14.104-95.84.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-4.14.104-95.84.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-devel-4.14.104-95.84.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"kernel-headers-4.14.104-95.84.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-tools-4.14.104-95.84.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-tools-debuginfo-4.14.104-95.84.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-tools-devel-4.14.104-95.84.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"perf-4.14.104-95.84.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"perf-debuginfo-4.14.104-95.84.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"python-perf-4.14.104-95.84.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-4.14.104-95.84.amzn2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debuginfo / kernel-debuginfo-common-x86_64 / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T02:29:07", "description": "The 4.20.11 stable kernel update contains a number of important fixes\nacross the tree.\n\n----\n\nThe 4.20.10 stable kernel update contains a number of important fixes\nacross the tree.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 18, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-02-26T00:00:00", "title": "Fedora 28 : kernel / kernel-headers / kernel-tools (2019-16de0047d4)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8912"], "modified": "2021-02-02T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:kernel", "p-cpe:/a:fedoraproject:fedora:kernel-tools", "p-cpe:/a:fedoraproject:fedora:kernel-headers", "cpe:/o:fedoraproject:fedora:28"], "id": "FEDORA_2019-16DE0047D4.NASL", "href": "https://www.tenable.com/plugins/nessus/122436", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-16de0047d4.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122436);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2020/02/07\");\n\n script_cve_id(\"CVE-2019-8912\");\n script_xref(name:\"FEDORA\", value:\"2019-16de0047d4\");\n\n script_name(english:\"Fedora 28 : kernel / kernel-headers / kernel-tools (2019-16de0047d4)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The 4.20.11 stable kernel update contains a number of important fixes\nacross the tree.\n\n----\n\nThe 4.20.10 stable kernel update contains a number of important fixes\nacross the tree.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-16de0047d4\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected kernel, kernel-headers and / or kernel-tools\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:28\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/02/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^28([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 28\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-8912\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for FEDORA-2019-16de0047d4\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\nif (rpm_check(release:\"FC28\", reference:\"kernel-4.20.11-100.fc28\")) flag++;\nif (rpm_check(release:\"FC28\", reference:\"kernel-headers-4.20.11-100.fc28\")) flag++;\nif (rpm_check(release:\"FC28\", reference:\"kernel-tools-4.20.11-100.fc28\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-headers / kernel-tools\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T02:33:18", "description": "The 4.20.11 stable kernel update contains a number of important fixes\nacross the tree.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 18, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-02-26T00:00:00", "title": "Fedora 29 : kernel / kernel-headers / kernel-tools (2019-7bdeed7fc5)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8912"], "modified": "2021-02-02T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:kernel", "cpe:/o:fedoraproject:fedora:29", "p-cpe:/a:fedoraproject:fedora:kernel-tools", "p-cpe:/a:fedoraproject:fedora:kernel-headers"], "id": "FEDORA_2019-7BDEED7FC5.NASL", "href": "https://www.tenable.com/plugins/nessus/122440", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-7bdeed7fc5.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122440);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2020/02/07\");\n\n script_cve_id(\"CVE-2019-8912\");\n script_xref(name:\"FEDORA\", value:\"2019-7bdeed7fc5\");\n\n script_name(english:\"Fedora 29 : kernel / kernel-headers / kernel-tools (2019-7bdeed7fc5)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The 4.20.11 stable kernel update contains a number of important fixes\nacross the tree.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-7bdeed7fc5\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected kernel, kernel-headers and / or kernel-tools\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:29\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/02/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^29([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 29\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-8912\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for FEDORA-2019-7bdeed7fc5\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\nif (rpm_check(release:\"FC29\", reference:\"kernel-4.20.11-200.fc29\")) flag++;\nif (rpm_check(release:\"FC29\", reference:\"kernel-headers-4.20.11-200.fc29\")) flag++;\nif (rpm_check(release:\"FC29\", reference:\"kernel-tools-4.20.11-200.fc29\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-headers / kernel-tools\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T01:09:39", "description": "An update of the glibc package has been released.", "edition": 18, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-03-18T00:00:00", "title": "Photon OS 2.0: Glibc PHSA-2019-2.0-0134", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8912", "CVE-2018-19591"], "modified": "2021-02-02T00:00:00", "cpe": ["p-cpe:/a:vmware:photonos:glibc", "cpe:/o:vmware:photonos:2.0"], "id": "PHOTONOS_PHSA-2019-2_0-0134_GLIBC.NASL", "href": "https://www.tenable.com/plugins/nessus/122915", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from VMware Security Advisory PHSA-2019-2.0-0134. The text\n# itself is copyright (C) VMware, Inc.\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122915);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/02/04\");\n\n script_cve_id(\"CVE-2018-19591\");\n\n script_name(english:\"Photon OS 2.0: Glibc PHSA-2019-2.0-0134\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote PhotonOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update of the glibc package has been released.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/vmware/photon/wiki/Security-Updates-2-134.md\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected Linux packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8912\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/11/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:vmware:photonos:glibc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:photonos:2.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"PhotonOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/PhotonOS/release\", \"Host/PhotonOS/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/PhotonOS/release\");\nif (isnull(release) || release !~ \"^VMware Photon\") audit(AUDIT_OS_NOT, \"PhotonOS\");\nif (release !~ \"^VMware Photon (?:Linux|OS) 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"PhotonOS 2.0\");\n\nif (!get_kb_item(\"Host/PhotonOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"PhotonOS\", cpu);\n\nflag = 0;\n\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"glibc-2.26-14.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"glibc-debuginfo-2.26-14.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"glibc-devel-2.26-14.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"glibc-i18n-2.26-14.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"glibc-iconv-2.26-14.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"glibc-lang-2.26-14.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"glibc-nscd-2.26-14.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"glibc-tools-2.26-14.ph2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"glibc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T01:09:39", "description": "An update of the keepalived package has been released.", "edition": 18, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-03-18T00:00:00", "title": "Photon OS 2.0: Keepalived PHSA-2019-2.0-0134", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8912", "CVE-2018-19044"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/o:vmware:photonos:2.0", "p-cpe:/a:vmware:photonos:keepalived"], "id": "PHOTONOS_PHSA-2019-2_0-0134_KEEPALIVED.NASL", "href": "https://www.tenable.com/plugins/nessus/122916", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from VMware Security Advisory PHSA-2019-2.0-0134. The text\n# itself is copyright (C) VMware, Inc.\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122916);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/02/04\");\n\n script_cve_id(\"CVE-2018-19044\");\n\n script_name(english:\"Photon OS 2.0: Keepalived PHSA-2019-2.0-0134\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote PhotonOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update of the keepalived package has been released.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/vmware/photon/wiki/Security-Updates-2-134.md\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected Linux packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8912\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/11/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:vmware:photonos:keepalived\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:photonos:2.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"PhotonOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/PhotonOS/release\", \"Host/PhotonOS/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/PhotonOS/release\");\nif (isnull(release) || release !~ \"^VMware Photon\") audit(AUDIT_OS_NOT, \"PhotonOS\");\nif (release !~ \"^VMware Photon (?:Linux|OS) 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"PhotonOS 2.0\");\n\nif (!get_kb_item(\"Host/PhotonOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"PhotonOS\", cpu);\n\nflag = 0;\n\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"keepalived-1.3.5-3.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"keepalived-debuginfo-1.3.5-3.ph2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"keepalived\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T01:09:39", "description": "An update of the rsyslog package has been released.", "edition": 18, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-03-18T00:00:00", "title": "Photon OS 2.0: Rsyslog PHSA-2019-2.0-0134", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-16881", "CVE-2019-8912"], "modified": "2021-02-02T00:00:00", "cpe": ["p-cpe:/a:vmware:photonos:rsyslog", "cpe:/o:vmware:photonos:2.0"], "id": "PHOTONOS_PHSA-2019-2_0-0134_RSYSLOG.NASL", "href": "https://www.tenable.com/plugins/nessus/122918", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from VMware Security Advisory PHSA-2019-2.0-0134. The text\n# itself is copyright (C) VMware, Inc.\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122918);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/02/04\");\n\n script_cve_id(\"CVE-2018-16881\");\n\n script_name(english:\"Photon OS 2.0: Rsyslog PHSA-2019-2.0-0134\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote PhotonOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update of the rsyslog package has been released.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/vmware/photon/wiki/Security-Updates-2-134.md\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected Linux packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8912\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/11/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:vmware:photonos:rsyslog\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:photonos:2.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"PhotonOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/PhotonOS/release\", \"Host/PhotonOS/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/PhotonOS/release\");\nif (isnull(release) || release !~ \"^VMware Photon\") audit(AUDIT_OS_NOT, \"PhotonOS\");\nif (release !~ \"^VMware Photon (?:Linux|OS) 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"PhotonOS 2.0\");\n\nif (!get_kb_item(\"Host/PhotonOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"PhotonOS\", cpu);\n\nflag = 0;\n\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"rsyslog-8.26.0-7.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"rsyslog-debuginfo-8.26.0-7.ph2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"rsyslog\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T01:09:39", "description": "An update of the binutils package has been released.", "edition": 18, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-03-18T00:00:00", "title": "Photon OS 2.0: Binutils PHSA-2019-2.0-0134", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000876", "CVE-2019-8912", "CVE-2018-19931"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/o:vmware:photonos:2.0", "p-cpe:/a:vmware:photonos:binutils"], "id": "PHOTONOS_PHSA-2019-2_0-0134_BINUTILS.NASL", "href": "https://www.tenable.com/plugins/nessus/122914", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from VMware Security Advisory PHSA-2019-2.0-0134. The text\n# itself is copyright (C) VMware, Inc.\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122914);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/02/04\");\n\n script_cve_id(\"CVE-2018-19931\", \"CVE-2018-1000876\");\n\n script_name(english:\"Photon OS 2.0: Binutils PHSA-2019-2.0-0134\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote PhotonOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update of the binutils package has been released.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/vmware/photon/wiki/Security-Updates-2-134.md\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected Linux packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8912\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/11/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:vmware:photonos:binutils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:photonos:2.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"PhotonOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/PhotonOS/release\", \"Host/PhotonOS/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/PhotonOS/release\");\nif (isnull(release) || release !~ \"^VMware Photon\") audit(AUDIT_OS_NOT, \"PhotonOS\");\nif (release !~ \"^VMware Photon (?:Linux|OS) 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"PhotonOS 2.0\");\n\nif (!get_kb_item(\"Host/PhotonOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"PhotonOS\", cpu);\n\nflag = 0;\n\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"binutils-2.31-3.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"binutils-debuginfo-2.31-3.ph2\")) flag++;\nif (rpm_check(release:\"PhotonOS-2.0\", reference:\"binutils-devel-2.31-3.ph2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"binutils\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:40:53", "description": "The openSUSE Leap 15.0 was updated to receive various security and\nbugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-2024: A use-after-free when disconnecting a\n source was fixed which could lead to crashes.\n bnc#1129179).\n\n - CVE-2019-3819: A flaw was found in the Linux kernel in\n the function hid_debug_events_read() in\n drivers/hid/hid-debug.c file which may enter an infinite\n loop with certain parameters passed from a userspace. A\n local privileged user ('root') can cause a system lock\n up and a denial of service. Versions from v4.18 and\n newer are vulnerable (bnc#1123161).\n\n - CVE-2019-7308: kernel/bpf/verifier.c performed\n undesirable out-of-bounds speculation on pointer\n arithmetic in various cases, including cases of\n different branches with different state or limits to\n sanitize, leading to side-channel attacks (bnc#1124055).\n\n - CVE-2019-8912: af_alg_release() in crypto/af_alg.c\n neglected to set a NULL value for a certain structure\n member, which leads to a use-after-free in\n sockfs_setattr (bnc#1125907).\n\n - CVE-2019-8980: A memory leak in the kernel_read_file\n function in fs/exec.c allowed attackers to cause a\n denial of service (memory consumption) by triggering\n vfs_read failures (bnc#1126209).\n\n - CVE-2019-9213: expand_downwards in mm/mmap.c lacked a\n check for the mmap minimum address, which made it easier\n for attackers to exploit kernel NULL pointer\n dereferences on non-SMAP platforms. This is related to a\n capability check for the wrong task (bnc#1128166).\n\nThe following non-security bugs were fixed :\n\n - 9p/net: fix memory leak in p9_client_create\n (bsc#1051510).\n\n - 9p: use inode->i_lock to protect i_size_write() under\n 32-bit (bsc#1051510).\n\n - acpi: acpi_pad: Do not launch acpi_pad threads on idle\n cpus (bsc#1113399).\n\n - acpi/APEI: Clear GHES block_status before panic()\n (bsc#1051510).\n\n - acpi/device_sysfs: Avoid OF modalias creation for\n removed device (bsc#1051510).\n\n - acpi/nfit: Fix bus command validation (bsc#1051510).\n\n - acpi: NUMA: Use correct type for printing addresses on\n i386-PAE (bsc#1051510).\n\n - acpi / video: Extend chassis-type detection with a\n 'Lunch Box' check (bsc#1051510).\n\n - acpi / video: Refactor and fix dmi_is_desktop()\n (bsc#1051510).\n\n - alsa: bebob: use more identical mod_alias for Saffire\n Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n\n - alsa: compress: prevent potential divide by zero bugs\n (bsc#1051510).\n\n - alsa: echoaudio: add a check for ioremap_nocache\n (bsc#1051510).\n\n - alsa: firewire: add const qualifier to identifiers for\n read-only symbols (bsc#1051510).\n\n - alsa: firewire-motu: add a flag for AES/EBU on XLR\n interface (bsc#1051510).\n\n - alsa: firewire-motu: add specification flag for position\n of flag for MIDI messages (bsc#1051510).\n\n - alsa: firewire-motu: add support for MOTU Audio Express\n (bsc#1051510).\n\n - alsa: firewire-motu: add support for Motu Traveler\n (bsc#1051510).\n\n - alsa: firewire-motu: fix construction of PCM frame for\n capture direction (bsc#1051510).\n\n - alsa: firewire-motu: use 'version' field of unit\n directory to identify model (bsc#1051510).\n\n - alsa: hda - add Lenovo IdeaCentre B550 to the\n power_save_blacklist (bsc#1051510).\n\n - alsa: hda - Add quirk for HP EliteBook 840 G5\n (bsc#1051510).\n\n - alsa: hda - Enforces runtime_resume after S3 and S4 for\n each codec (bsc#1051510).\n\n - alsa: hda/realtek - Add support for Acer Aspire\n E5-523G/ES1-432 headset mic (bsc#1051510).\n\n - alsa: hda/realtek: Disable PC beep in passthrough on\n alc285 (bsc#1051510).\n\n - alsa: hda/realtek: Enable ASUS X441MB and X705FD headset\n MIC with ALC256 (bsc#1051510).\n\n - alsa: hda/realtek: Enable audio jacks of ASUS UX362FA\n with ALC294 (bsc#1051510).\n\n - alsa: hda/realtek: Enable headset MIC of Acer AIO with\n ALC286 (bsc#1051510).\n\n - alsa: hda/realtek: Enable headset MIC of Acer Aspire\n Z24-890 with ALC286 (bsc#1051510).\n\n - alsa: hda/realtek: Enable headset mic of ASUS P5440FF\n with ALC256 (bsc#1051510).\n\n - alsa: hda/realtek - Headset microphone and internal\n speaker support for System76 oryp5 (bsc#1051510).\n\n - alsa: hda/realtek - Headset microphone support for\n System76 darp5 (bsc#1051510).\n\n - alsa: hda/realtek - Reduce click noise on Dell Precision\n 5820 headphone (bsc#1126131).\n\n - alsa: hda - Record the current power state before\n suspend/resume calls (bsc#1051510).\n\n - alsa: opl3: fix mismatch between snd_opl3_drum_switch\n definition and declaration (bsc#1051510).\n\n - alsa: pcm: Do not suspend stream in unrecoverable PCM\n state (bsc#1051510).\n\n - alsa: pcm: Fix possible OOB access in PCM oss plugins\n (bsc#1051510).\n\n - alsa: rawmidi: Fix potential Spectre v1 vulnerability\n (bsc#1051510).\n\n - alsa: sb8: add a check for request_region (bsc#1051510).\n\n - alsa: seq: oss: Fix Spectre v1 vulnerability\n (bsc#1051510).\n\n - alsa: usb-audio: Fix implicit fb endpoint setup by quirk\n (bsc#1051510).\n\n - altera-stapl: check for a null key before strcasecmp'ing\n it (bsc#1051510).\n\n - apparmor: Fix aa_label_build() error handling for failed\n merges (bsc#1051510).\n\n - applicom: Fix potential Spectre v1 vulnerabilities\n (bsc#1051510).\n\n - aquantia: Setup max_mtu in ndev to enable jumbo frames\n (bsc#1051510).\n\n - arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n\n - arm: 8808/1: kexec:offline panic_smp_self_stop CPU\n (bsc#1051510).\n\n - arm/arm64: KVM: Rename function\n kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n\n - arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n\n - arm: OMAP2+: hwmod: Fix some section annotations\n (bsc#1051510).\n\n - arm: pxa: avoid section mismatch warning (bsc#1051510).\n\n - arm: tango: Improve ARCH_MULTIPLATFORM compatibility\n (bsc#1051510).\n\n - ASoC: atom: fix a missing check of\n snd_pcm_lib_malloc_pages (bsc#1051510).\n\n - ASoC: dapm: change snprintf to scnprintf for possible\n overflow (bsc#1051510).\n\n - ASoC: fsl_esai: fix register setting issue in RIGHT_J\n mode (bsc#1051510).\n\n - ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on\n i.MX8M (bsc#1051510).\n\n - ASoC: imx-audmux: change snprintf to scnprintf for\n possible overflow (bsc#1051510).\n\n - ASoC: imx-sgtl5000: put of nodes if finding codec fails\n (bsc#1051510).\n\n - ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic\n field (bsc#1051510).\n\n - ASoC: msm8916-wcd-analog: add missing license\n information (bsc#1051510).\n\n - ASoC: qcom: Fix of-node refcount unbalance in\n apq8016_sbc_parse_of() (bsc#1051510).\n\n - ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count\n check (bsc#1051510).\n\n - assoc_array: Fix shortcut creation (bsc#1051510).\n\n - ata: ahci: mvebu: remove stale comment (bsc#1051510).\n\n - ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom\n (bsc#1051510).\n\n - ath9k: dynack: check da->enabled first in sampling\n routines (bsc#1051510).\n\n - ath9k: dynack: make ewma estimation faster\n (bsc#1051510).\n\n - ath9k: dynack: use authentication messages for 'late'\n ack (bsc#1051510).\n\n - atm: he: fix sign-extension overflow on large shift\n (bsc#1051510).\n\n - auxdisplay: hd44780: Fix memory leak on ->remove()\n (bsc#1051510).\n\n - auxdisplay: ht16k33: fix potential user-after-free on\n module unload (bsc#1051510).\n\n - ax25: fix possible use-after-free (bsc#1051510).\n\n - backlight: pwm_bl: Use gpiod_get_value_cansleep() to get\n initial (bsc#1113722)\n\n - batman-adv: Avoid WARN on net_device without parent in\n netns (bsc#1051510).\n\n - batman-adv: fix uninit-value in batadv_interface_tx()\n (bsc#1051510).\n\n - batman-adv: Force mac header to start of data on xmit\n (bsc#1051510).\n\n - bio: Introduce BIO_ALLOCED flag and check it in bio_free\n (bsc#1128094).\n\n - blk-mq: fix a hung issue when fsync (bsc#1125252).\n\n - block_dev: fix crash on chained bios with O_DIRECT\n (bsc#1128094).\n\n - block_dev: fix crash on chained bios with O_DIRECT\n (bsc#1128094).\n\n - blockdev: Fix livelocks on loop device (bsc#1124984).\n\n - block: do not use bio->bi_vcnt to figure out segment\n number (bsc#1128895).\n\n - block: do not warn when doing fsync on read-only devices\n (bsc#1125252).\n\n - block/loop: Use global lock for ioctl() operation\n (bsc#1124974).\n\n - block: move bio_integrity_(intervals,bytes) into\n blkdev.h (bsc#1114585).\n\n - bluetooth: Fix decrementing reference count twice in\n releasing socket (bsc#1051510).\n\n - bluetooth: Fix locking in bt_accept_enqueue() for BH\n context (bsc#1051510).\n\n - bluetooth: Fix unnecessary error message for HCI request\n completion (bsc#1051510).\n\n - bluetooth: hci_ldisc: Initialize hci_dev before open()\n (bsc#1051510).\n\n - bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit\n set in hci_uart_set_proto() (bsc#1051510).\n\n - bnxt_en: Fix typo in firmware message timeout logic\n (bsc#1086282 ).\n\n - bnxt_en: Wait longer for the firmware message response\n to complete (bsc#1086282).\n\n - bpf: decrease usercnt if bpf_map_new_fd() fails in\n bpf_map_get_fd_by_id() (bsc#1083647).\n\n - bpf: drop refcount if bpf_map_new_fd() fails in\n map_create() (bsc#1083647).\n\n - bpf: fix lockdep false positive in percpu_freelist\n (bsc#1083647).\n\n - bpf: fix replace_map_fd_with_map_ptr's ldimm64 second\n imm field (bsc#1083647).\n\n - bpf: fix sanitation rewrite in case of non-pointers\n (bsc#1083647).\n\n - bpf: Fix syscall's stackmap lookup potential deadlock\n (bsc#1083647).\n\n - bpf, lpm: fix lookup bug in map_delete_elem\n (bsc#1083647).\n\n - bpf/verifier: fix verifier instability (bsc#1056787).\n\n - bsg: Do not copy sense if no response buffer is\n allocated (bsc#1106811,bsc#1126555).\n\n - btrfs: dedupe_file_range ioctl: remove 16MiB restriction\n (bsc#1127494).\n\n - btrfs: do not unnecessarily pass write_lock_level when\n processing leaf (bsc#1126802).\n\n - btrfs: ensure that a DUP or RAID1 block group has\n exactly two stripes (bsc#1128451).\n\n - btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n\n - btrfs: fix corruption reading shared and compressed\n extents after hole punching (bsc#1126476).\n\n - btrfs: fix deadlock between clone/dedupe and rename\n (bsc#1130518).\n\n - btrfs: fix deadlock when allocating tree block during\n leaf/node split (bsc#1126806).\n\n - btrfs: fix deadlock when using free space tree due to\n block group creation (bsc#1126804).\n\n - btrfs: fix fsync after succession of renames and\n unlink/rmdir (bsc#1126488).\n\n - btrfs: fix fsync after succession of renames of\n different files (bsc#1126481).\n\n - btrfs: fix invalid-free in btrfs_extent_same\n (bsc#1127498).\n\n - btrfs: fix reading stale metadata blocks after degraded\n raid1 mounts (bsc#1126803).\n\n - btrfs: fix use-after-free of cmp workspace pages\n (bsc#1127603).\n\n - btrfs: grab write lock directly if write_lock_level is\n the max level (bsc#1126802).\n\n - btrfs: Improve btrfs_search_slot description\n (bsc#1126802).\n\n - btrfs: move get root out of btrfs_search_slot to a\n helper (bsc#1126802).\n\n - btrfs: qgroup: Cleanup old subtree swap code\n (bsc#1063638).\n\n - btrfs: qgroup: Do not trace subtree if we're dropping\n reloc tree (bsc#1063638).\n\n - btrfs: qgroup: Finish rescan when hit the last leaf of\n extent tree (bsc#1129327).\n\n - btrfs: qgroup: Introduce function to find all new tree\n blocks of reloc tree (bsc#1063638).\n\n - btrfs: qgroup: Introduce function to trace two swaped\n extents (bsc#1063638).\n\n - btrfs: qgroup: Introduce per-root swapped blocks\n infrastructure (bsc#1063638).\n\n - btrfs: qgroup: Introduce trace event to analyse the\n number of dirty extents accounted (bsc#1063638\n dependency).\n\n - btrfs: qgroup: Make qgroup async transaction commit more\n aggressive (bsc#1113042).\n\n - btrfs: qgroup: Only trace data extents in leaves if\n we're relocating data block group (bsc#1063638).\n\n - btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap\n (bsc#1063638).\n\n - btrfs: qgroup: Search commit root for rescan to avoid\n missing extent (bsc#1129326).\n\n - btrfs: qgroup: Use delayed subtree rescan for balance\n (bsc#1063638).\n\n - btrfs: qgroup: Use generation-aware subtree swap to mark\n dirty extents (bsc#1063638).\n\n - btrfs: quota: Set rescan progress to (u64)-1 if we hit\n last leaf (bsc#1129327).\n\n - btrfs: relocation: Delay reloc tree deletion after\n merge_reloc_roots (bsc#1063638).\n\n - btrfs: reloc: Fix NULL pointer dereference due to\n expanded reloc_root lifespan (bsc#1129497).\n\n - btrfs: remove always true check in unlock_up\n (bsc#1126802).\n\n - btrfs: remove superfluous free_extent_buffer in\n read_block_for_search (bsc#1126802).\n\n - btrfs: remove unnecessary level check in balance_level\n (bsc#1126802).\n\n - btrfs: remove unused check of skip_locking\n (bsc#1126802).\n\n - btrfs: reuse cmp workspace in EXTENT_SAME ioctl\n (bsc#1127495).\n\n - btrfs: send, fix race with transaction commits that\n create snapshots (bsc#1126802).\n\n - btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n\n - btrfs: split btrfs_extent_same (bsc#1127493).\n\n - btrfs: use kvzalloc for EXTENT_SAME temporary data\n (bsc#1127496).\n\n - btrfs: use more straightforward extent_buffer_uptodate\n check (bsc#1126802).\n\n - cdc-wdm: pass return value of recover_from_urb_loss\n (bsc#1051510).\n\n - ceph: avoid repeatedly adding inode to\n mdsc->snap_flush_list (bsc#1126790).\n\n - ceph: clear inode pointer when snap realm gets dropped\n by its inode (bsc#1125799).\n\n - cfg80211: extend range deviation for DMG (bsc#1051510).\n\n - ch: add missing mutex_lock()/mutex_unlock() in\n ch_release() (bsc#1124235).\n\n - ch: fixup refcounting imbalance for SCSI devices\n (bsc#1124235).\n\n - cifs: allow guest mounts to work for smb3.11\n (bsc#1051510).\n\n - cifs: Always resolve hostname before reconnecting\n (bsc#1051510).\n\n - cifs: connect to servername instead of IP for IPC$ share\n (bsc#1051510).\n\n - cifs: Fix NULL pointer dereference of devname\n (bnc#1129519).\n\n - cifs: invalidate cache when we truncate a file\n (bsc#1051510).\n\n - cifs: OFD locks do not conflict with eachothers\n (bsc#1051510).\n\n - clk: armada-370: fix refcount leak in a370_clk_init()\n (bsc#1051510).\n\n - clk: armada-xp: fix refcount leak in axp_clk_init()\n (bsc#1051510).\n\n - clk: clk-twl6040: Fix imprecise external abort for\n pdmclk (bsc#1051510).\n\n - clk: dove: fix refcount leak in dove_clk_init()\n (bsc#1051510).\n\n - clk: highbank: fix refcount leak in hb_clk_init()\n (bsc#1051510).\n\n - clk: imx6q: fix refcount leak in imx6q_clocks_init()\n (bsc#1051510).\n\n - clk: imx6sl: ensure MMDC CH0 handshake is bypassed\n (bsc#1051510).\n\n - clk: imx6sx: fix refcount leak in imx6sx_clocks_init()\n (bsc#1051510).\n\n - clk: imx7d: fix refcount leak in imx7d_clocks_init()\n (bsc#1051510).\n\n - clk: ingenic: Fix doc of ingenic_cgu_div_info\n (bsc#1051510).\n\n - clk: ingenic: Fix round_rate misbehaving with\n non-integer dividers (bsc#1051510).\n\n - clk: kirkwood: fix refcount leak in kirkwood_clk_init()\n (bsc#1051510).\n\n - clk: mv98dx3236: fix refcount leak in\n mv98dx3236_clk_init() (bsc#1051510).\n\n - clk: qoriq: fix refcount leak in clockgen_init()\n (bsc#1051510).\n\n - clk: samsung: exynos4: fix refcount leak in\n exynos4_get_xom() (bsc#1051510).\n\n - clk: socfpga: fix refcount leak (bsc#1051510).\n\n - clk: sunxi: A31: Fix wrong AHB gate number\n (bsc#1051510).\n\n - clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all\n audio module clocks (bsc#1051510).\n\n - clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when\n ungating it (bsc#1051510).\n\n - clk: sunxi-ng: v3s: Fix TCON reset de-assert bit\n (bsc#1051510).\n\n - clk: uniphier: Fix update register for CPU-gear\n (bsc#1051510).\n\n - clk: vc5: Abort clock configuration without upstream\n clock (bsc#1051510).\n\n - clk: vf610: fix refcount leak in vf610_clocks_init()\n (bsc#1051510).\n\n - clocksource/drivers/exynos_mct: Clear timer interrupt\n when shutdown (bsc#1051510).\n\n - clocksource/drivers/exynos_mct: Fix error path in timer\n resources initialization (bsc#1051510).\n\n - clocksource/drivers/exynos_mct: Move one-shot check from\n tick clear to ISR (bsc#1051510).\n\n - clocksource/drivers/integrator-ap: Add missing\n of_node_put() (bsc#1051510).\n\n - clocksource/drivers/sun5i: Fail gracefully when clock\n rate is unavailable (bsc#1051510).\n\n - configfs: fix registered group removal (bsc#1051510).\n\n - copy_mount_string: Limit string length to PATH_MAX\n (bsc#1082943).\n\n - cpcap-charger: generate events for userspace\n (bsc#1051510).\n\n - cpufreq: Cap the default transition delay value to 10 ms\n (bsc#1127042).\n\n - cpufreq: conservative: Take limits changes into account\n properly (bsc#1051510).\n\n - cpufreq: governor: Avoid accessing invalid governor_data\n (bsc#1051510).\n\n - cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n\n - cpufreq: governor: Ensure sufficiently large sampling\n intervals (bsc#1127042).\n\n - cpufreq: pxa2xx: remove incorrect __init annotation\n (bsc#1051510).\n\n - cpufreq: tegra124: add missing of_node_put()\n (bsc#1051510).\n\n - cpufreq: Use transition_delay_us for legacy governors as\n well (bsc#1127042).\n\n - cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n\n - crypto: aes_ti - disable interrupts while accessing\n S-box (bsc#1051510).\n\n - crypto: ahash - fix another early termination in hash\n walk (bsc#1051510).\n\n - crypto: arm64/aes-ccm - fix logical bug in AAD MAC\n handling (bsc#1051510).\n\n - crypto: arm/crct10dif - revert to C code for short\n inputs (bsc#1051510).\n\n - crypto: brcm - Fix some set-but-not-used warning\n (bsc#1051510).\n\n - crypto: caam - fixed handling of sg list (bsc#1051510).\n\n - crypto: cavium/zip - fix collision with generic\n cra_driver_name (bsc#1051510).\n\n - crypto: crypto4xx - add missing of_node_put after\n of_device_is_available (bsc#1051510).\n\n - crypto: crypto4xx - Fix wrong\n ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments\n (bsc#1051510).\n\n - crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey()\n fails (bsc#1051510).\n\n - crypto: testmgr - skip crc32c context test for ahash\n algorithms (bsc#1051510).\n\n - crypto: tgr192 - fix unaligned memory access\n (bsc#1051510).\n\n - crypto: ux500 - Use proper enum in cryp_set_dma_transfer\n (bsc#1051510).\n\n - crypto: ux500 - Use proper enum in hash_set_dma_transfer\n (bsc#1051510).\n\n - cw1200: drop useless LIST_HEAD (bsc#1051510).\n\n - cw1200: Fix concurrency use-after-free bugs in\n cw1200_hw_scan() (bsc#1051510).\n\n - cw1200: fix missing unlock on error in cw1200_hw_scan()\n (bsc#1051510).\n\n - dccp: fool proof ccid_hc_[rt]x_parse_options()\n (bsc#1051510).\n\n - debugfs: fix debugfs_rename parameter checking\n (bsc#1051510).\n\n - device property: Fix the length used in\n PROPERTY_ENTRY_STRING() (bsc#1051510).\n\n - dlm: Do not swamp the CPU with callbacks queued during\n recovery (bsc#1051510).\n\n - dmaengine: at_hdmac: drop useless LIST_HEAD\n (bsc#1051510).\n\n - dmaengine: at_xdmac: Fix wrongfull report of a channel\n as in use (bsc#1051510).\n\n - dmaengine: bcm2835: Fix abort of transactions\n (bsc#1051510).\n\n - dmaengine: bcm2835: Fix interrupt race on RT\n (bsc#1051510).\n\n - dmaengine: dmatest: Abort test in case of mapping error\n (bsc#1051510).\n\n - dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n\n - dmaengine: imx-dma: fix wrong callback invoke\n (bsc#1051510).\n\n - dmaengine: mv_xor: Use correct device for DMA API\n (bsc#1051510).\n\n - dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n\n - dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n\n - dmaengine: st_fdma: drop useless LIST_HEAD\n (bsc#1051510).\n\n - dmaengine: stm32-dma: fix incomplete configuration in\n cyclic mode (bsc#1051510).\n\n - dma: Introduce dma_max_mapping_size() (bsc#1120008).\n\n - doc: rcu: Suspicious RCU usage is a warning\n (bsc#1051510).\n\n - Do not log confusing message on reconnect by default\n (bsc#1129664).\n\n - driver core: Do not resume suppliers under\n device_links_write_lock() (bsc#1051510).\n\n - drivers: hv: vmbus: Check for ring when getting debug\n info (bsc#1126389, bsc#1126579).\n\n - drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo\n kABI (bsc#1126389, bsc#1126579).\n\n - drivers: hv: vmbus: Return -EINVAL for the sys files for\n unopened channels (bsc#1126389, bsc#1126579).\n\n - drm/amdgpu: Add delay after enable RLC ucode\n (bsc#1051510).\n\n - drm/ast: Fix connector leak during driver unload\n (bsc#1051510).\n\n - drm/ast: fixed reading monitor EDID not stable issue\n (bsc#1051510).\n\n - drm/atomic-helper: Complete fake_commit->flip_done\n potentially earlier (bsc#1051510).\n\n - drm: Block fb changes for async plane updates\n (bsc#1051510).\n\n - drm/bridge: tc358767: add defines for DP1_SRCCTRL &\n PHY_2LANE (bsc#1051510).\n\n - drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value\n (bsc#1051510).\n\n - drm/bridge: tc358767: fix output H/V syncs\n (bsc#1051510).\n\n - drm/bridge: tc358767: fix single lane configuration\n (bsc#1051510).\n\n - drm/bridge: tc358767: reject modes which require too\n much BW (bsc#1051510).\n\n - drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n\n - drm: Clear state->acquire_ctx before leaving\n drm_atomic_helper_commit_duplicated_state()\n (bsc#1051510).\n\n - drm: disable uncached DMA optimization for ARM and arm64\n (bsc#1051510).\n\n - drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump()\n (bsc#1113722)\n\n - drm/etnaviv: potential NULL dereference (bsc#1113722)\n\n - drm: Fix error handling in drm_legacy_addctx\n (bsc#1113722)\n\n - drm/i915/bios: assume eDP is present on port A when\n there is no VBT (bsc#1051510).\n\n - drm/i915: Block fbdev HPD processing during suspend\n (bsc#1113722)\n\n - drm/i915/fbdev: Actually configure untiled displays\n (bsc#1113722)\n\n - drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n\n - drm/i915/gvt: free VFIO region space in vgpu detach\n (bsc#1113722)\n\n - drm/i915/gvt: release shadow batch buffer and wa_ctx\n before destroy one workload (bsc#1051510).\n\n - drm/i915/opregion: fix version check (bsc#1113722)\n\n - drm/i915/opregion: rvda is relative from opregion base\n in opregion (bsc#1113722)\n\n - drm/i915: Prevent a race during I915_GEM_MMAP ioctl with\n WC set (bsc#1113722)\n\n - drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n\n - drm/i915: Relax mmap VMA check (bsc#1051510).\n\n - drm/i915: Use the correct crtc when sanitizing plane\n mapping (bsc#1113722)\n\n - drm/imx: ignore plane updates on disabled crtcs\n (bsc#1051510).\n\n - drm/imx: imx-ldb: add missing of_node_puts\n (bsc#1051510).\n\n - drm/meson: add missing of_node_put (bsc#1051510).\n\n - drm/modes: Prevent division by zero htotal\n (bsc#1051510).\n\n - drm/msm: Fix error return checking (bsc#1051510).\n\n - drm/msm: Grab a vblank reference when waiting for\n commit_done (bsc#1051510).\n\n - drm/msm: Unblock writer if reader closes file\n (bsc#1051510).\n\n - drm/nouveau/bios/ramcfg: fix missing parentheses when\n calculating RON (bsc#1113722)\n\n - drm/nouveau/debugfs: Fix check of pm_runtime_get_sync\n failure (bsc#1051510).\n\n - drm/nouveau: Do not spew kernel WARNING for each timeout\n (bsc#1126480).\n\n - drm/nouveau: Do not WARN_ON VCPI allocation failures\n (bsc#1113722)\n\n - drm/nouveau/falcon: avoid touching registers if engine\n is off (bsc#1051510).\n\n - drm/nouveau/pmu: do not print reply values if exec is\n false (bsc#1113722)\n\n - drm/radeon/evergreen_cs: fix missing break in switch\n statement (bsc#1113722)\n\n - drm: Reorder set_property_atomic to avoid returning with\n an active ww_ctx (bsc#1051510).\n\n - drm/rockchip: fix for mailbox read size (bsc#1051510).\n\n - drm/shmob: Fix return value check in shmob_drm_probe\n (bsc#1113722)\n\n - drm/sun4i: tcon: Prepare and enable TCON channel 0 clock\n at init (bsc#1051510).\n\n - drm/vmwgfx: Do not double-free the mode stored in\n par->set_mode (bsc#1103429)\n\n - earlycon: Initialize port->uartclk based on\n clock-frequency property (bsc#1051510).\n\n - earlycon: Remove hardcoded port->uartclk initialization\n in of_setup_earlycon (bsc#1051510).\n\n - Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n\n - Enable livepatch test drivers in lib/ Livepatch\n kselftests need those.\n\n - enic: fix build warning without CONFIG_CPUMASK_OFFSTACK\n (bsc#1051510).\n\n - enic: fix checksum validation for IPv6 (bsc#1051510).\n\n - esp6: fix memleak on error path in esp6_input\n (bsc#1051510).\n\n - esp: Fix locking on page fragment allocation\n (bsc#1051510).\n\n - esp: Fix memleaks on error paths (bsc#1051510).\n\n - esp: Fix skb tailroom calculation (bsc#1051510).\n\n - ext4: avoid kernel warning when writing the superblock\n to a dead device (bsc#1124981).\n\n - ext4: Avoid panic during forced reboot (bsc#1126356).\n\n - ext4: check for shutdown and r/o file system in\n ext4_write_inode() (bsc#1124978).\n\n - ext4: fix a potential fiemap/page fault deadlock w/\n inline_data (bsc#1124980).\n\n - ext4: force inode writes when nfsd calls\n commit_metadata() (bsc#1125125).\n\n - ext4: include terminating u32 in size of xattr entries\n when expanding inodes (bsc#1124976).\n\n - ext4: make sure enough credits are reserved for\n dioread_nolock writes (bsc#1124979).\n\n - ext4: track writeback errors using the generic tracking\n infrastructure (bsc#1124982).\n\n - fbdev: chipsfb: remove set but not used variable 'size'\n (bsc#1113722)\n\n - firmware/efi: Add NULL pointer checks in efivars API\n functions (bsc#1051510).\n\n - floppy: check_events callback should not return a\n negative number (bsc#1051510).\n\n - fs/dax: deposit pagetable even when installing zero page\n (bsc#1126740).\n\n - fs/dcache: Fix incorrect nr_dentry_unused accounting in\n shrink_dcache_sb() (git-fixes).\n\n - fs/devpts: always delete dcache dentry-s in dput()\n (git-fixes).\n\n - fuse: call pipe_buf_release() under pipe lock\n (bsc#1051510).\n\n - fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN\n returns ENOSYS (bsc#1051510).\n\n - fuse: decrement NR_WRITEBACK_TEMP on the right page\n (bsc#1051510).\n\n - fuse: handle zero sized retrieve correctly\n (bsc#1051510).\n\n - futex: Fix (possible) missed wakeup (bsc#1050549).\n\n - gdrom: fix a memory leak bug (bsc#1051510).\n\n - geneve: cleanup hard coded value for Ethernet header\n length (bsc#1123456).\n\n - geneve: correctly handle ipv6.disable module parameter\n (bsc#1051510).\n\n - geneve, vxlan: Do not check skb_dst() twice\n (bsc#1123456).\n\n - geneve, vxlan: Do not set exceptions if skb->len < mtu\n (bsc#1123456).\n\n - genwqe: Fix size check (bsc#1051510).\n\n - gfs2: Revert 'Fix loop in gfs2_rbm_find' (bsc#1120601).\n\n - gianfar: fix a flooded alignment reports because of\n padding issue (bsc#1051510).\n\n - gianfar: Fix Rx byte accounting for ndev stats\n (bsc#1051510).\n\n - gianfar: prevent integer wrapping in the rx handler\n (bsc#1051510).\n\n - gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n\n - gpu: ipu-v3: Fix i.MX51 CSI control registers offset\n (bsc#1113722)\n\n - gpu: ipu-v3: image-convert: Prevent race between run and\n unprepare (bsc#1051510).\n\n - gro_cells: make sure device is up in gro_cells_receive()\n (git-fixes).\n\n - hid: lenovo: Add checks to fix of_led_classdev_register\n (bsc#1051510).\n\n - hpet: Fix missing '=' character in the __setup() code of\n hpet_mmap_enable (git-fixes).\n\n - hvc_opal: do not set tb_ticks_per_usec in\n udbg_init_opal_common() (bsc#1051510).\n\n - hv: reduce storvsc_ringbuffer_size from 1M to 128K to\n simplify booting with 1k vcpus ().\n\n - hv: v4.12 API for hyperv-iommu (bsc#1122822).\n\n - hwmon: (lm80) fix a missing check of bus read in lm80\n probe (bsc#1051510).\n\n - hwmon: (lm80) fix a missing check of the status of SMBus\n read (bsc#1051510).\n\n - hwmon: (lm80) Fix missing unlock on error in\n set_fan_div() (bsc#1051510).\n\n - hwmon: (tmp421) Correct the misspelling of the tmp442\n compatible attribute in OF device ID table\n (bsc#1051510).\n\n - HYPERV/IOMMU: Add Hyper-V stub IOMMU driver\n (bsc#1122822).\n\n - i2c-axxia: check for error conditions first\n (bsc#1051510).\n\n - i2c: bcm2835: Clear current buffer pointers and counts\n after a transfer (bsc#1051510).\n\n - i2c: cadence: Fix the hold bit setting (bsc#1051510).\n\n - i2c: omap: Use noirq system sleep pm ops to idle device\n for suspend (bsc#1051510).\n\n - i2c: sh_mobile: add support for r8a77990 (R-Car E3)\n (bsc#1051510).\n\n - i2c: tegra: fix maximum transfer size (bsc#1051510).\n\n - ib/core: Destroy QP if XRC QP fails (bsc#1046306).\n\n - ib/core: Fix potential memory leak while creating MAD\n agents (bsc#1046306).\n\n - ib/core: Unregister notifier before freeing MAD security\n (bsc#1046306).\n\n - ib/hfi1: Close race condition on user context disable\n and close (bsc#1060463).\n\n - ib/mlx5: Unmap DMA addr from HCA before IOMMU\n (bsc#1046305 ).\n\n - ibmvnic: Report actual backing device speed and duplex\n values (bsc#1129923).\n\n - ibmvscsi: Fix empty event pool access during host\n removal (bsc#1119019).\n\n - ibmvscsi: Protect ibmvscsi_head from concurrent\n modificaiton (bsc#1119019).\n\n - ieee802154: ca8210: fix possible u8 overflow in\n ca8210_rx_done (bsc#1051510).\n\n - igb: Fix an issue that PME is not enabled during runtime\n suspend (bsc#1051510).\n\n - iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID\n (bsc#1051510).\n\n - iio: adc: exynos-adc: Fix NULL pointer exception on\n unbind (bsc#1051510).\n\n - iio: chemical: atlas-ph-sensor: correct IIO_TEMP values\n to millicelsius (bsc#1051510).\n\n - Input: bma150 - register input device after setting\n private data (bsc#1051510).\n\n - input: cap11xx - switch to using\n set_brightness_blocking() (bsc#1051510).\n\n - Input: elan_i2c - add ACPI ID for touchpad in Lenovo\n V330-15ISK (bsc#1051510).\n\n - Input: elan_i2c - add id for touchpad found in Lenovo\n s21e-20 (bsc#1051510).\n\n - Input: elantech - enable 3rd button support on Fujitsu\n CELSIUS H780 (bsc#1051510).\n\n - input: matrix_keypad - use flush_delayed_work()\n (bsc#1051510).\n\n - Input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV\n (git-fixes).\n\n - input: st-keyscan - fix potential zalloc NULL\n dereference (bsc#1051510).\n\n - input: uinput - fix undefined behavior in\n uinput_validate_absinfo() (bsc#1120902).\n\n - Input: wacom_serial4 - add support for Wacom ArtPad II\n tablet (bsc#1051510).\n\n - intel_th: Do not reference unassigned outputs\n (bsc#1051510).\n\n - intel_th: gth: Fix an off-by-one in output unassigning\n (bsc#1051510).\n\n - iomap: fix integer truncation issues in the zeroing and\n dirtying helpers (bsc#1125947).\n\n - iomap: warn on zero-length mappings (bsc#1127062).\n\n - iommu/amd: Fix NULL dereference bug in match_hid_uid\n (bsc#1130336).\n\n - iommu/amd: fix sg->dma_address for sg->offset bigger\n than PAGE_SIZE (bsc#1130337).\n\n - iommu/amd: Reserve exclusion range in iova-domain\n (bsc#1130425).\n\n - iommu/dmar: Fix buffer overflow during PCI bus\n notification (bsc#1129181).\n\n - iommu: Document iommu_ops.is_attach_deferred()\n (bsc#1129182).\n\n - iommu: Do not print warning when IOMMU driver only\n supports unmanaged domains (bsc#1130130).\n\n - iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables\n (bsc#1129205).\n\n - iommu/vt-d: Check capability before disabling protected\n memory (bsc#1130338).\n\n - iommu/vt-d: Check identity map for hot-added devices\n (bsc#1129183).\n\n - iommu/vt-d: Fix NULL pointer reference in\n intel_svm_bind_mm() (bsc#1129184).\n\n - ip6: fix PMTU discovery when using /127 subnets\n (git-fixes).\n\n - ip6mr: Do not call __IP6_INC_STATS() from preemptible\n context (git-fixes).\n\n - ip6_tunnel: get the min mtu properly in ip6_tnl_xmit\n (bsc#1123456).\n\n - ip6_tunnel: use the right value for ipv4 min mtu check\n in ip6_tnl_xmit (bsc#1123456).\n\n - ipsec: check return value of skb_to_sgvec always\n (bsc#1051510).\n\n - ipv4/route: fail early when inet dev is missing\n (git-fixes).\n\n - ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n\n - ipv6: addrlabel: per netns list (bsc#1122982).\n\n - ipv6: Consider sk_bound_dev_if when binding a socket to\n an address (networking-stable-19_02_01).\n\n - ipv6: Consider sk_bound_dev_if when binding a socket to\n a v4 mapped address (networking-stable-19_01_22).\n\n - ipv6: fix kernel-infoleak in ipv6_local_error()\n (networking-stable-19_01_20).\n\n - ipv6: speedup ipv6 tunnels dismantle (bsc#1122982).\n Refresh\n patches.suse/ip6_vti-fix-a-null-pointer-deference-when-d\n estroy-vt.patch\n\n - ipv6: Take rcu_read_lock in __inet6_bind for mapped\n addresses (networking-stable-19_01_22).\n\n - ipvlan, l3mdev: fix broken l3s mode wrt local routes\n (networking-stable-19_02_01).\n\n - irqchip/gic-v3-its: Align PCI Multi-MSI allocation on\n their size (bsc#1051510).\n\n - irqchip/gic-v3-its: Avoid parsing _indirect_ twice for\n Device table (bsc#1051510).\n\n - irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA\n node (bsc#1051510).\n\n - irqchip/gic-v3-its: Fix ITT_entry_size accessor\n (bsc#1051510).\n\n - irqchip/mmp: Only touch the PJ4 IRQ & FIQ bits on\n enable/disable (bsc#1051510).\n\n - iscsi_ibft: Fix missing break in switch statement\n (bsc#1051510).\n\n - isdn: avm: Fix string plus integer warning from Clang\n (bsc#1051510).\n\n - isdn: hisax: hfc_pci: Fix a possible concurrency\n use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n\n - isdn: i4l: isdn_tty: Fix some concurrency double-free\n bugs (bsc#1051510).\n\n - iser: set sector for ambiguous mr status errors\n (bsc#1051510).\n\n - iwlwifi: mvm: avoid possible access out of array\n (bsc#1051510).\n\n - iwlwifi: mvm: fix A-MPDU reference assignment\n (bsc#1051510).\n\n - iwlwifi: mvm: fix firmware statistics usage\n (bsc#1129770).\n\n - iwlwifi: mvm: fix RSS config command (bsc#1051510).\n\n - iwlwifi: pcie: fix emergency path (bsc#1051510).\n\n - iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n\n - ixgbe: Be more careful when modifying MAC filters\n (bsc#1051510).\n\n - ixgbe: check return value of napi_complete_done()\n (bsc#1051510).\n\n - ixgbe: recognize 1000BaseLX SFP modules as 1Gbps\n (bsc#1051510).\n\n - kabi: cpufreq: keep min_sampling_rate in struct dbs_data\n (bsc#1127042).\n\n - kabi: handle addition of ip6addrlbl_table into struct\n netns_ipv6 (bsc#1122982).\n\n - kabi: handle addition of uevent_sock into struct net\n (bsc#1122982).\n\n - kabi: Preserve kABI for dma_max_mapping_size()\n (bsc#1120008).\n\n - kabi: protect vhost_log_write (kabi).\n\n - kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n\n - kabi workaround for ath9k ath_node.ackto type change\n (bsc#1051510).\n\n - kABI workaround for bt_accept_enqueue() change\n (bsc#1051510).\n\n - kallsyms: Handle too long symbols in kallsyms.c\n (bsc#1126805).\n\n - kasan: fix shadow_size calculation error in\n kasan_module_alloc (bsc#1051510).\n\n - kbuild: fix false positive warning/error about missing\n libelf (bsc#1051510).\n\n - kconfig: fix file name and line number of\n warn_ignored_character() (bsc#1051510).\n\n - kconfig: fix line numbers for if-entries in menu tree\n (bsc#1051510).\n\n - kconfig: fix memory leak when EOF is encountered in\n quotation (bsc#1051510).\n\n - kconfig: fix the rule of mainmenu_stmt symbol\n (bsc#1051510).\n\n - keys: allow reaching the keys quotas exactly\n (bsc#1051510).\n\n - keys: Timestamp new keys (bsc#1051510).\n\n - kgdboc: fix KASAN global-out-of-bounds bug in\n param_set_kgdboc_var() (bsc#1051510).\n\n - kgdboc: Fix restrict error (bsc#1051510).\n\n - kgdboc: Fix warning with module build (bsc#1051510).\n\n - kobject: add kobject_uevent_net_broadcast()\n (bsc#1122982).\n\n - kobject: copy env blob in one go (bsc#1122982).\n\n - kobject: factorize skb setup in\n kobject_uevent_net_broadcast() (bsc#1122982).\n\n - kprobes: Return error if we fail to reuse kprobe instead\n of BUG_ON() (bsc#1051510).\n\n - kvm: mmu: Fix race in emulated page table writes\n (bsc#1129284).\n\n - kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if\n alloc_kvm_area() fails (bsc#1129291).\n\n - kvm: nVMX: NMI-window and interrupt-window exiting\n should wake L2 from HLT (bsc#1129292).\n\n - kvm: nVMX: Set VM instruction error for VMPTRLD of\n unbacked page (bsc#1129293).\n\n - kvm: vmx: Set IA32_TSC_AUX for legacy mode guests\n (bsc#1129294).\n\n - kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs\n (bsc#1127082).\n\n - kvm: x86: Fix single-step debugging (bsc#1129295).\n\n - kvm: x86: Use jmp to invoke kvm_spurious_fault() from\n .fixup (bsc#1129296).\n\n - l2tp: copy 4 more bytes to linear part if necessary\n (networking-stable-19_02_01).\n\n - l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n\n - l2tp: fix reading optional fields of L2TPv3\n (networking-stable-19_02_01).\n\n - leds: lp5523: fix a missing check of return value of\n lp55xx_read (bsc#1051510).\n\n - leds: lp55xx: fix null deref on firmware load failure\n (bsc#1051510).\n\n - libceph: avoid KEEPALIVE_PENDING races in\n ceph_con_keepalive() (bsc#1125800).\n\n - libceph: handle an empty authorize reply (bsc#1126789).\n\n - libceph: wait for latest osdmap in\n ceph_monc_blacklist_add() (bsc#1130427).\n\n - lib/div64.c: off by one in shift (bsc#1051510).\n\n - libertas_tf: do not set URB_ZERO_PACKET on IN USB\n transfer (bsc#1051510).\n\n - libnvdimm: Fix altmap reservation size calculation\n (bsc#1127682).\n\n - libnvdimm/label: Clear 'updating' flag after label-set\n update (bsc#1129543).\n\n - libnvdimm/pmem: Honor force_raw for legacy pmem regions\n (bsc#1129551).\n\n - lightnvm: fail fast on passthrough commands\n (bsc#1125780).\n\n - livepatch: Change unsigned long old_addr -> void\n *old_func in struct klp_func (bsc#1071995).\n\n - livepatch: Consolidate klp_free functions (bsc#1071995\n ).\n\n - livepatch: core: Return EOPNOTSUPP instead of ENOSYS\n (bsc#1071995).\n\n - livepatch: Define a macro for new API identification\n (bsc#1071995).\n\n - livepatch: Do not block the removal of patches loaded\n after a forced transition (bsc#1071995).\n\n - livepatch: Introduce klp_for_each_patch macro\n (bsc#1071995 ).\n\n - livepatch: Module coming and going callbacks can proceed\n with all listed patches (bsc#1071995).\n\n - livepatch: Proper error handling in the shadow variables\n selftest (bsc#1071995).\n\n - livepatch: Remove ordering (stacking) of the livepatches\n (bsc#1071995).\n\n - livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n\n - livepatch: return -ENOMEM on ptr_id() allocation failure\n (bsc#1071995).\n\n - livepatch: Send a fake signal periodically (bsc#1071995\n ).\n\n - livepatch: Shuffle\n klp_enable_patch()/klp_disable_patch() code\n (bsc#1071995).\n\n - livepatch: Simplify API by removing registration step\n (bsc#1071995).\n\n - llc: do not use sk_eat_skb() (bsc#1051510).\n\n - locking/rwsem: Fix (possible) missed wakeup\n (bsc#1050549).\n\n - loop: drop caches if offset or block_size are changed\n (bsc#1124975).\n\n - loop: Reintroduce lo_ctl_mutex removed by commit\n 310ca162d (bsc#1124974).\n\n - mac80211: Add attribute aligned(2) to struct 'action'\n (bsc#1051510).\n\n - mac80211: do not initiate TDLS connection if station is\n not associated to AP (bsc#1051510).\n\n - mac80211: ensure that mgmt tx skbs have tailroom for\n encryption (bsc#1051510).\n\n - mac80211: fix miscounting of ttl-dropped frames\n (bsc#1051510).\n\n - mac80211: fix radiotap vendor presence bitmap handling\n (bsc#1051510).\n\n - mac80211: Fix Tx aggregation session tear down with\n ITXQs (bsc#1051510).\n\n - mac80211: Free mpath object when rhashtable insertion\n fails (bsc#1051510).\n\n - mac80211_hwsim: propagate genlmsg_reply return code\n (bsc#1051510).\n\n - mac80211: Restore vif beacon interval if start ap fails\n (bsc#1051510).\n\n - macvlan: Only deliver one copy of the frame to the\n macvlan interface (bsc#1051510).\n\n - mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush\n timeout issue (bsc#1051510).\n\n - mdio_bus: Fix use-after-free on device_register fails\n (bsc#1051510).\n\n - media: adv*/tc358743/ths8200: fill in min\n width/height/pixelclock (bsc#1051510).\n\n - media: DaVinci-VPBE: fix error handling in\n vpbe_initialize() (bsc#1051510).\n\n - media: dt-bindings: media: i2c: Fix i2c address for\n OV5645 camera sensor (bsc#1051510).\n\n - media: mtk-vcodec: Release device nodes in\n mtk_vcodec_init_enc_pm() (bsc#1051510).\n\n - media: rc: mce_kbd decoder: fix stuck keys\n (bsc#1100132).\n\n - media: s5k4ecgx: delete a bogus error message\n (bsc#1051510).\n\n - media: s5p-jpeg: Check for fmt_ver_flag when doing fmt\n enumeration (bsc#1051510).\n\n - media: s5p-jpeg: Correct step and max values for\n V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n\n - media: s5p-mfc: fix incorrect bus assignment in virtual\n child device (bsc#1051510).\n\n - media: uvcvideo: Avoid NULL pointer dereference at the\n end of streaming (bsc#1051510).\n\n - media: uvcvideo: Fix 'type' check leading to overflow\n (bsc#1051510).\n\n - media: v4l2-ctrls.c/uvc: zero v4l2_event (bsc#1051510).\n\n - media: v4l2: i2c: ov7670: Fix PLL bypass register values\n (bsc#1051510).\n\n - media: vb2: do not call __vb2_queue_cancel if\n vb2_start_streaming failed (bsc#1119086).\n\n - memremap: fix softlockup reports at teardown\n (bnc#1130154).\n\n - memstick: Prevent memstick host from getting runtime\n suspended during card detection (bsc#1051510).\n\n - mfd: db8500-prcmu: Fix some section annotations\n (bsc#1051510).\n\n - mfd: mc13xxx: Fix a missing check of a register-read\n failure (bsc#1051510).\n\n - mfd: mt6397: Do not call irq_domain_remove if PMIC\n unsupported (bsc#1051510).\n\n - mfd: qcom_rpm: write fw_version to CTRL_REG\n (bsc#1051510).\n\n - mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while\n registering mfd cells (bsc#1051510).\n\n - mfd: tps65218: Use devm_regmap_add_irq_chip and clean up\n error path in probe() (bsc#1051510).\n\n - mfd: twl-core: Fix section annotations on\n (,un)protect_pm_master (bsc#1051510).\n\n - mfd: wm5110: Add missing ASRC rate register\n (bsc#1051510).\n\n - misc: hpilo: Do not claim unsupported hardware\n (bsc#1129330).\n\n - misc: hpilo: Exclude unsupported device via blacklist\n (bsc#1129330).\n\n - mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n\n - mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of\n local variable (git-fixes).\n\n - mlxsw: spectrum: Disable lag port TX before removing it\n (networking-stable-19_01_22).\n\n - mmap: introduce sane default mmap limits (git fixes\n (mm/mmap)).\n\n - mmap: relax file size limit for regular files (git fixes\n (mm/mmap)).\n\n - mmc: bcm2835: Recover from MMC_SEND_EXT_CSD\n (bsc#1051510).\n\n - mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS\n (bsc#1051510).\n\n - mmc: omap: fix the maximum timeout setting\n (bsc#1051510).\n\n - mmc: pxamci: fix enum type confusion (bsc#1051510).\n\n - mmc: sdhci-brcmstb: handle mmc_of_parse() errors during\n probe (bsc#1051510).\n\n - mmc: sdhci-esdhc-imx: fix HS400 timing issue\n (bsc#1051510).\n\n - mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n\n - mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n\n - mmc: spi: Fix card detection during probe (bsc#1051510).\n\n - mm: do not drop unused pages when userfaultd is running\n (git fixes (mm/userfaultfd)).\n\n - mm: Fix modifying of page protection by insert_pfn()\n (bsc#1126740).\n\n - mm: Fix warning in insert_pfn() (bsc#1126740).\n\n - mm/hmm: hmm_pfns_bad() was accessing wrong struct (git\n fixes (mm/hmm)).\n\n - mm: hwpoison: use do_send_sig_info() instead of\n force_sig() (git fixes (mm/hwpoison)).\n\n - mm/ksm.c: ignore STABLE_FLAG of rmap_item->address in\n rmap_walk_ksm() (git fixes (mm/ksm)).\n\n - mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git\n fixes (mm/madvise)).\n\n - mm,memory_hotplug: fix scan_movable_pages() for gigantic\n hugepages (bsc#1127731).\n\n - mm: migrate: do not rely on __PageMovable() of newpage\n after unlocking it (git fixes (mm/migrate)).\n\n - mm, oom: fix use-after-free in oom_kill_process (git\n fixes (mm/oom)).\n\n - mm: use swp_offset as key in shmem_replace_page() (git\n fixes (mm/shmem)).\n\n - mm,vmscan: Make unregister_shrinker() no-op if\n register_shrinker() failed (git fixes (mm/vmscan)).\n\n - Move upstreamed ALSA and BT patches into sorted section\n\n - Move upstreamed libnvdimm patch into sorted section\n\n - mtd: cfi_cmdset_0002: Avoid walking all chips when\n unlocking (bsc#1051510).\n\n - mtd: cfi_cmdset_0002: Change write buffer to check\n correct value (bsc#1051510).\n\n - mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips\n (bsc#1051510).\n\n - mtd: cfi_cmdset_0002: Fix unlocking requests crossing a\n chip boudary (bsc#1051510).\n\n - mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock()\n (bsc#1051510).\n\n - mtdchar: fix overflows in adjustment of `count`\n (bsc#1051510).\n\n - mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n\n - mtd: docg3: do not set conflicting BCH_CONST_PARAMS\n option (bsc#1051510).\n\n - mtd/maps: fix solutionengine.c printk format warnings\n (bsc#1051510).\n\n - mtd: mtd_oobtest: Handle bitflips during reads\n (bsc#1051510).\n\n - mtd: nand: atmel: fix buffer overflow in\n atmel_pmecc_user (bsc#1051510).\n\n - mtd: nand: atmel: Fix get_sectorsize() function\n (bsc#1051510).\n\n - mtd: nand: atmel: fix of_irq_get() error check\n (bsc#1051510).\n\n - mtd: nand: brcmnand: Disable prefetch by default\n (bsc#1051510).\n\n - mtd: nand: brcmnand: Zero bitflip is not an error\n (bsc#1051510).\n\n - mtd: nand: denali_pci: add missing\n MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n\n - mtd: nand: fix interpretation of NAND_CMD_NONE in\n nand_command[_lp]() (bsc#1051510).\n\n - mtd: nand: Fix nand_do_read_oob() return value\n (bsc#1051510).\n\n - mtd: nand: Fix writing mtdoops to nand flash\n (bsc#1051510).\n\n - mtd: nand: fsl_ifc: Fix nand waitfunc return value\n (bsc#1051510).\n\n - mtd: nand: gpmi: Fix failure when a erased page has a\n bitflip at BBM (bsc#1051510).\n\n - mtd: nand: ifc: update bufnum mask for ver >= 2.0.0\n (bsc#1051510).\n\n - mtd: nand: mtk: fix infinite ECC decode IRQ issue\n (bsc#1051510).\n\n - mtd: nand: omap2: Fix subpage write (bsc#1051510).\n\n - mtd: nand: pxa3xx: Fix READOOB implementation\n (bsc#1051510).\n\n - mtd: nand: qcom: Add a NULL check for devm_kasprintf()\n (bsc#1051510).\n\n - mtd: nandsim: remove debugfs entries in error path\n (bsc#1051510).\n\n - mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n\n - mtd: nand: sunxi: fix potential divide-by-zero error\n (bsc#1051510).\n\n - mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n\n - mtd: spi-nor: cadence-quadspi: Fix page fault kernel\n panic (bsc#1051510).\n\n - mtd: spi-nor: Fix Cadence QSPI page fault kernel panic\n (bsc#1051510).\n\n - mtd: spi-nor: fsl-quadspi: fix read error for flash size\n larger than 16MB (bsc#1051510).\n\n - mtd: spi-nor: stm32-quadspi: Fix uninitialized error\n return code (bsc#1051510).\n\n - mv88e6060: disable hardware level MAC learning\n (bsc#1051510).\n\n - nbd: Use set_blocksize() to set device blocksize\n (bsc#1124984).\n\n - net: add uevent socket member (bsc#1122982).\n\n - net: aquantia: driver should correctly declare\n vlan_features bits (bsc#1051510).\n\n - net: aquantia: fixed instack structure overflow\n (git-fixes).\n\n - net: aquantia: Fix hardware DMA stream overload on large\n MRRS (bsc#1051510).\n\n - net: bcmgenet: abort suspend on error (bsc#1051510).\n\n - net: bcmgenet: code movement (bsc#1051510).\n\n - net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n\n - net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n\n - net: bcmgenet: return correct value 'ret' from\n bcmgenet_power_down (bsc#1051510).\n\n - net: bridge: fix a bug on using a neighbour cache entry\n without checking its state (networking-stable-19_01_20).\n\n - net: bridge: Fix ethernet header pointer before check\n skb forwardable (networking-stable-19_01_26).\n\n - net: do not call update_pmtu unconditionally\n (bsc#1123456).\n\n - net: Do not default Cavium PTP driver to 'y'\n (bsc#1110096).\n\n - net: dp83640: expire old TX-skb\n (networking-stable-19_02_10).\n\n - net: dsa: mv88e6xxx: handle unknown duplex modes\n gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n\n - net: dsa: mv88x6xxx: mv88e6390 errata\n (networking-stable-19_01_22).\n\n - net: dsa: slave: Do not propagate flag changes on down\n slave interfaces (networking-stable-19_02_10).\n\n - net: ena: fix race between link up and device\n initalization (bsc#1083548).\n\n - net: ena: update driver version from 2.0.2 to 2.0.3\n (bsc#1129276 bsc#1125342).\n\n - netfilter: check for seqadj ext existence before adding\n it in nf_nat_setup_info (git-fixes).\n\n - netfilter: nf_tables: check the result of dereferencing\n base_chain->stats (git-fixes).\n\n - net: Fix usage of pskb_trim_rcsum\n (networking-stable-19_01_26).\n\n - net: ipv4: Fix memory leak in network namespace\n dismantle (networking-stable-19_01_26).\n\n - net/mlx4_core: Add masking for a few queries on HCA caps\n (networking-stable-19_02_01).\n\n - net/mlx4_core: Fix locking in SRIOV mode when switching\n between events and polling (git-fixes).\n\n - net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n\n - net/mlx4_core: Fix reset flow when in command polling\n mode (git-fixes).\n\n - net/mlx5e: Allow MAC invalidation while spoofchk is ON\n (networking-stable-19_02_01).\n\n - net/mlx5e: IPoIB, Fix RX checksum statistics update\n (git-fixes).\n\n - net/mlx5e: RX, Fix wrong early return in receive queue\n poll (bsc#1046305).\n\n - net/mlx5: fix uaccess beyond 'count' in debugfs\n read/write handlers (git-fixes).\n\n - net/mlx5: Release resource on error flow (git-fixes).\n\n - net/mlx5: Return success for PAGE_FAULT_RESUME in\n internal error state (git-fixes).\n\n - net/mlx5: Use multi threaded workqueue for page fault\n handling (git-fixes).\n\n - net/ncsi: Fix AEN HNCDSC packet length (git-fixes).\n\n - net/ncsi: Stop monitor if channel times out or is\n inactive (git-fixes).\n\n - net: netem: fix skb length BUG_ON in __skb_to_sgvec\n (git-fixes).\n\n - netns: restrict uevents (bsc#1122982).\n\n - net: phy: marvell: Errata for mv88e6390 internal PHYs\n (networking-stable-19_01_26).\n\n - net: phy: mdio_bus: add missing device_del() in\n mdiobus_register() error handling\n (networking-stable-19_01_26).\n\n - net: phy: Micrel KSZ8061: link failure after cable\n connect (git-fixes).\n\n - netrom: switch to sock timer API (bsc#1051510).\n\n - net/rose: fix NULL ax25_cb kernel panic\n (networking-stable-19_02_01).\n\n - net/sched: act_tunnel_key: fix memory leak in case of\n action replace (networking-stable-19_01_26).\n\n - net_sched: refetch skb protocol for each filter\n (networking-stable-19_01_26).\n\n - net: set default network namespace in\n init_dummy_netdev() (networking-stable-19_02_01).\n\n - net: stmmac: Fix a race in EEE enable callback\n (git-fixes).\n\n - net: stmmac: fix broken dma_interrupt handling for\n multi-queues (git-fixes).\n\n - net: stmmac: handle endianness in dwmac4_get_timestamp\n (git-fixes).\n\n - net: stmmac: Use mutex instead of spinlock (git-fixes).\n\n - net-sysfs: Fix mem leak in netdev_register_kobject\n (git-fixes).\n\n - net: systemport: Fix WoL with password after deep sleep\n (networking-stable-19_02_10).\n\n - net: thunderx: fix NULL pointer dereference in\n nic_remove (git-fixes).\n\n - nfit: acpi_nfit_ctl(): Check out_obj->type in the right\n place (bsc#1129547).\n\n - nfit/ars: Attempt a short-ARS whenever the ARS state is\n idle at boot (bsc#1051510).\n\n - nfit/ars: Attempt short-ARS even in the no_init_ars case\n (bsc#1051510).\n\n - nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n\n - nfsd: fix memory corruption caused by readdir\n (bsc#1127445).\n\n - niu: fix missing checks of niu_pci_eeprom_read\n (bsc#1051510).\n\n - ntb_transport: Fix bug with max_mw_size parameter\n (bsc#1051510).\n\n - nvme-fc: reject reconnect if io queue count is reduced\n to zero (bsc#1128351).\n\n - nvme: flush namespace scanning work just before removing\n namespaces (bsc#1108101).\n\n - nvme: kABI fix for scan_lock (bsc#1123882).\n\n - nvme: lock NS list changes while handling command\n effects (bsc#1123882).\n\n - nvme-loop: fix kernel oops in case of unhandled command\n (bsc#1126807).\n\n - nvme-multipath: drop optimization for static ANA group\n IDs (bsc#1113939).\n\n - nvme-pci: fix out of bounds access in nvme_cqe_pending\n (bsc#1127595).\n\n - nvme: schedule requeue whenever a LIVE state is entered\n (bsc#1123105).\n\n - of, numa: Validate some distance map rules\n (bsc#1051510).\n\n - of: unittest: Disable interrupt node tests for old world\n MAC systems (bsc#1051510).\n\n - openvswitch: Avoid OOB read when parsing flow nlattrs\n (bsc#1051510).\n\n - openvswitch: fix the incorrect flow action alloc size\n (bsc#1051510).\n\n - openvswitch: Remove padding from packet before L3+\n conntrack processing (bsc#1051510).\n\n - parport_pc: fix find_superio io compare code, should use\n equal test (bsc#1051510).\n\n - Partially revert 'block: fail op_is_write() requests to\n (bsc#1125252).\n\n - pci: add USR vendor id and use it in r8169 and w6692\n driver (networking-stable-19_01_22).\n\n - pci: designware-ep: dw_pcie_ep_set_msi() should only set\n MMC bits (bsc#1051510).\n\n - pci: endpoint: functions: Use\n memcpy_fromio()/memcpy_toio() (bsc#1051510).\n\n - pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle\n 1792 vcpus (bsc#1122822).\n\n - pci/pme: Fix hotplug/sysfs remove deadlock in\n pcie_pme_remove() (bsc#1051510).\n\n - pci: qcom: Do not deassert reset GPIO during probe\n (bsc#1129281).\n\n - pcrypt: use format specifier in kobject_add\n (bsc#1051510).\n\n - perf/x86: Add sysfs entry to freeze counters on SMI\n (bsc#1121805).\n\n - perf/x86/intel: Delay memory deallocation until\n x86_pmu_dead_cpu() (bsc#1121805).\n\n - perf/x86/intel: Do not enable freeze-on-smi for PerfMon\n V1 (bsc#1121805).\n\n - perf/x86/intel: Fix memory corruption (bsc#1121805).\n\n - perf/x86/intel: Generalize dynamic constraint creation\n (bsc#1121805).\n\n - perf/x86/intel: Implement support for TSX Force Abort\n (bsc#1121805).\n\n - perf/x86/intel: Make cpuc allocations consistent\n (bsc#1121805).\n\n - phy: allwinner: sun4i-usb: poll vbus changes on A23/A33\n when driving VBUS (bsc#1051510).\n\n - phy: qcom-qmp: Fix failure path in phy_init functions\n (bsc#1051510).\n\n - phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n\n - phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role\n sysfs (bsc#1051510).\n\n - phy: rockchip-emmc: retry calpad busy trimming\n (bsc#1051510).\n\n - phy: sun4i-usb: add support for missing USB PHY index\n (bsc#1051510).\n\n - phy: tegra: remove redundant self assignment of 'map'\n (bsc#1051510).\n\n - phy: work around 'phys' references to usb-nop-xceiv\n devices (bsc#1051510).\n\n - pinctrl: max77620: Use define directive for\n max77620_pinconf_param values (bsc#1051510).\n\n - pinctrl: meson: fix pull enable register calculation\n (bsc#1051510).\n\n - pinctrl: meson: meson8b: fix the GPIO function for the\n GPIOAO pins (bsc#1051510).\n\n - pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins\n (bsc#1051510).\n\n - pinctrl: meson: meson8: fix the GPIO function for the\n GPIOAO pins (bsc#1051510).\n\n - pinctrl: msm: fix gpio-hog related boot issues\n (bsc#1051510).\n\n - pinctrl: sh-pfc: emev2: Add missing pinmux functions\n (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to\n lcd0_data24_1 group (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to\n gether_gmii group (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names\n (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group\n (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from\n qspi_data4_b group (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7791: Remove bogus marks from\n vin1_b_data18 group (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group\n (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field\n (bsc#1051510).\n\n - pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register\n configuration (bsc#1051510).\n\n - pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field\n (bsc#1051510).\n\n - pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3\n group (bsc#1051510).\n\n - pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups\n (bsc#1051510).\n\n - pinctrl: sh-pfc: sh7734: Add missing IPSR11 field\n (bsc#1051510).\n\n - pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10\n (bsc#1051510).\n\n - pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value\n (bsc#1051510).\n\n - pinctrl: sunxi: a64: Rename function csi0 to csi\n (bsc#1051510).\n\n - pinctrl: sunxi: a64: Rename function ts0 to ts\n (bsc#1051510).\n\n - pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11\n (bsc#1051510).\n\n - pinctrl: sx150x: handle failure case of devm_kstrdup\n (bsc#1051510).\n\n - pktcdvd: Fix possible Spectre-v1 for pkt_devs\n (bsc#1051510).\n\n - platform/x86: Fix unmet dependency warning for\n SAMSUNG_Q10 (bsc#1051510).\n\n - pm / wakeup: Rework wakeup source timer cancellation\n (bsc#1051510).\n\n - powercap: intel_rapl: add support for Jacobsville ().\n\n - powerpc/64s: Clear on-stack exception marker upon\n exception return (bsc#1071995).\n\n - powerpc/livepatch: relax reliable stack tracer checks\n for first-frame (bsc#1071995).\n\n - powerpc/livepatch: small cleanups in\n save_stack_trace_tsk_reliable() (bsc#1071995).\n\n - powerpc/pseries: export timebase register sample in\n lparcfg (bsc#1127750).\n\n - powerpc/pseries/mce: Fix misleading print for TLB\n mutlihit (bsc#1094244, git-fixes).\n\n - powerpc/pseries: Perform full re-add of CPU for topology\n update post-migration (bsc#1125728).\n\n - power: supply: charger-manager: Fix incorrect return\n value (bsc#1051510).\n\n - pptp: dst_release sk_dst_cache in pptp_sock_destruct\n (git-fixes).\n\n - proc/sysctl: do not return ENOMEM on lookup when a table\n is unregistering (git-fixes).\n\n - pseries/energy: Use OF accessor function to read\n ibm,drc-indexes (bsc#1129080).\n\n - ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl\n (bsc#1051510).\n\n - ptp: Fix pass zero to ERR_PTR() in ptp_clock_register\n (bsc#1051510).\n\n - pwm-backlight: Enable/disable the PWM before/after LCD\n enable toggle (bsc#1051510).\n\n - qmi_wwan: add MTU default to qmap network interface\n (networking-stable-19_01_22).\n\n - qmi_wwan: apply SET_DTR quirk to Sierra WP7607\n (bsc#1051510).\n\n - qmi_wwan: Fix qmap header retrieval in qmimux_rx_fixup\n (bsc#1051510).\n\n - r8169: Add support for new Realtek Ethernet\n (networking-stable-19_01_22).\n\n - r8169: use PCI_VDEVICE macro\n (networking-stable-19_01_22).\n\n - rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING\n is set (bsc#1125797).\n\n - rcu: Fix up pending cbs check in rcu_prepare_for_idle\n (git fixes (kernel/rcu)).\n\n - rcu: Make need_resched() respond to urgent RCU-QS needs\n (git fixes (kernel/rcu)).\n\n - rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n\n - Refresh\n patches.suse/scsi-do-not-print-reservation-conflict-for-\n TEST-UNIT.patch (bsc#1119843)\n\n - regulator: act8865: Fix act8600_sudcdc_voltage_ranges\n setting (bsc#1051510).\n\n - regulator: max77620: Initialize values for DT properties\n (bsc#1051510).\n\n - regulator: pv88060: Fix array out-of-bounds access\n (bsc#1051510).\n\n - regulator: pv88080: Fix array out-of-bounds access\n (bsc#1051510).\n\n - regulator: pv88090: Fix array out-of-bounds access\n (bsc#1051510).\n\n - regulator: s2mpa01: Fix step values for some LDOs\n (bsc#1051510).\n\n - regulator: s2mps11: Fix steps for buck7, buck8 and LDO35\n (bsc#1051510).\n\n - regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim\n from mA to uA (bsc#1051510).\n\n - Remove blacklist of virtio patch so we can install it\n (bsc#1114585)\n\n - Remove patches rejected upstream ().\n\n - Revert drm/i915 patches that caused regressions\n (bsc#1131062)\n\n - Revert 'drm/rockchip: Allow driver to be shutdown on\n reboot/kexec' (bsc#1051510).\n\n - Revert 'Input: elan_i2c - add ACPI ID for touchpad in\n ASUS Aspire F5-573G' (bsc#1051510).\n\n - Revert 'ipv4: keep skb->dst around in presence of IP\n options' (git-fixes).\n\n - Revert 'openvswitch: Fix template leak in error cases.'\n (bsc#1051510).\n\n - Revert 'scsi: qla2xxx: Fix NVMe Target discovery'\n (bsc#1125252).\n\n - Revert 'sd: disable logical block provisioning if\n 'lbpme' is not set' This reverts commit\n e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not\n accepted upstream.\n\n - Revert the previous merge of drm fixes The branch was\n merged mistakenly and breaks the build. Revert it.\n\n - Revert 'xhci: Reset Renesas uPD72020x USB controller for\n 32-bit DMA issue' (bsc#1120854).\n\n - rhashtable: Still do rehash when we get EEXIST\n (bsc#1051510).\n\n - rocker: fix rocker_tlv_put_* functions for KASAN\n (bsc#1051510).\n\n - rpm/kernel-source.changes.old: Really drop old\n changelogs (bsc#1098995)\n\n - rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620\n (bsc#1120902).\n\n - rtc: 88pm80x: fix unintended sign extension\n (bsc#1051510).\n\n - rtc: 88pm860x: fix unintended sign extension\n (bsc#1051510).\n\n - rtc: cmos: ignore bogus century byte (bsc#1051510).\n\n - rtc: ds1672: fix unintended sign extension\n (bsc#1051510).\n\n - rtc: Fix overflow when converting time64_t to rtc_time\n (bsc#1051510).\n\n - rtc: pm8xxx: fix unintended sign extension\n (bsc#1051510).\n\n - rtnetlink: bring NETDEV_CHANGE_TX_QUEUE_LEN event\n process back in rtnetlink_event (git-fixes).\n\n - rtnetlink: bring NETDEV_CHANGEUPPER event process back\n in rtnetlink_event (git-fixes).\n\n - rtnetlink: bring NETDEV_POST_TYPE_CHANGE event process\n back in rtnetlink_event (git-fixes).\n\n - rtnetlink: check DO_SETLINK_NOTIFY correctly in\n do_setlink (git-fixes).\n\n - rxrpc: bad unlock balance in rxrpc_recvmsg\n (networking-stable-19_02_10).\n\n - s390/cio: Fix how vfio-ccw checks pinned pages\n (git-fixes).\n\n - s390/cpum_cf: Reject request for sampling in event\n initialization (git-fixes).\n\n - s390/early: improve machine detection (git-fixes).\n\n - s390/mm: always force a load of the primary ASCE on\n context switch (git-fixes).\n\n - s390/mm: fix addressing exception after suspend/resume\n (bsc#1125252).\n\n - s390/qeth: cancel close_dev work before removing a card\n (LTC#175898, bsc#1127561).\n\n - s390/qeth: conclude all event processing before\n offlining a card (LTC#175901, bsc#1127567).\n\n - s390/qeth: fix use-after-free in error path\n (bsc#1127534).\n\n - s390/qeth: invoke softirqs after napi_schedule()\n (git-fixes).\n\n - s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU\n (git-fixes).\n\n - s390/smp: fix CPU hotplug deadlock with CPU rescan\n (git-fixes).\n\n - s390/sthyi: Fix machine name validity indication\n (git-fixes).\n\n - sata_rcar: fix deferred probing (bsc#1051510).\n\n - sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n\n - sched: Do not re-read h_load_next during hierarchical\n load calculation (bnc#1120909).\n\n - sched/wake_q: Document wake_q_add() (bsc#1050549).\n\n - sched/wake_q: Fix wakeup ordering for wake_q\n (bsc#1050549).\n\n - sched/wake_q: Reduce reference counting for special\n users (bsc#1050549).\n\n - sch_multiq: fix double free on init failure\n (bsc#1051510).\n\n - scripts/git_sort/git_sort.py: add vfs 'fixes' branch\n\n - scsi: core: reset host byte in DID_NEXUS_FAILURE case\n (bsc#1122764).\n\n - scsi: csiostor: remove flush_scheduled_work()\n (bsc#1127363).\n\n - scsi: fix queue cleanup race before queue initialization\n is done (bsc#1125252).\n\n - scsi: ibmvscsi: Fix empty event pool access during host\n removal (bsc#1119019).\n\n - scsi: ibmvscsi: Protect ibmvscsi_head from concurrent\n modificaiton (bsc#1119019).\n\n - scsi: libiscsi: fix possible NULL pointer dereference in\n case of TMF (bsc#1127378).\n\n - scsi: libiscsi: Fix race between iscsi_xmit_task and\n iscsi_complete_task (bsc#1122192).\n\n - scsi: lpfc: Add log messages to aid in debugging fc4type\n discovery issues (bsc#1121317).\n\n - scsi: lpfc: Correct MDS loopback diagnostics support\n (bsc#1121317).\n\n - scsi: lpfc: do not set queue->page_count to 0 if\n pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n\n - scsi: lpfc: Fix discovery failure when PLOGI is defered\n (bsc#1121317).\n\n - scsi: lpfc: Fix link state reporting for trunking when\n adapter is offline (bsc#1121317).\n\n - scsi: lpfc: fix remoteport access (bsc#1125252).\n\n - scsi: lpfc: remove an unnecessary NULL check\n (bsc#1121317).\n\n - scsi: lpfc: update fault value on successful trunk\n events (bsc#1121317).\n\n - scsi: lpfc: Update lpfc version to 12.0.0.10\n (bsc#1121317).\n\n - scsi: mpt3sas: Add ioc_<level> logging macros\n (bsc#1117108).\n\n - scsi: mpt3sas: Annotate switch/case fall-through\n (bsc#1117108).\n\n - scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and\n reply_q_name to %s: (bsc#1117108).\n\n - scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT\n without logging levels (bsc#1117108).\n\n - scsi: mpt3sas: Convert mlsleading uses of pr_<level>\n with MPT3SAS_FMT (bsc#1117108).\n\n - scsi: mpt3sas: Convert uses of pr_<level> with\n MPT3SAS_FMT to ioc_<level> (bsc#1117108).\n\n - scsi: mpt3sas: Fix a race condition in\n mpt3sas_base_hard_reset_handler() (bsc#1117108).\n\n - scsi: mpt3sas: Fix indentation (bsc#1117108).\n\n - scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n\n - scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd\n (bsc#1117108).\n\n - scsi: mpt3sas: Remove KERN_WARNING from panic uses\n (bsc#1117108).\n\n - scsi: mpt3sas: Remove set-but-not-used variables\n (bsc#1117108).\n\n - scsi: mpt3sas: Remove unnecessary parentheses and\n simplify null checks (bsc#1117108).\n\n - scsi: mpt3sas: Remove unused macro MPT3SAS_FMT\n (bsc#1117108).\n\n - scsi: mpt3sas: Split _base_reset_handler(),\n mpt3sas_scsih_reset_handler() and\n mpt3sas_ctl_reset_handler() (bsc#1117108).\n\n - scsi: mpt3sas: Swap I/O memory read value back to cpu\n endianness (bsc#1117108).\n\n - scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n\n - scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n\n - scsi: mptsas: Fixup device hotplug for VMware ESXi\n (bsc#1129046).\n\n - scsi: qla2xxx: Enable FC-NVME on NPIV ports\n (bsc#1094555).\n\n - scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC\n (bsc#1094555).\n\n - scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port\n (bsc#1094555).\n\n - scsi: qla2xxx: Fix NPIV handling for FC-NVMe\n (bsc#1094555).\n\n - scsi: qla2xxx: Initialize port speed to avoid setting\n lower speed (bsc#1094555).\n\n - scsi: qla2xxx: Modify fall-through annotations\n (bsc#1094555).\n\n - scsi: qla2xxx: Remove unnecessary self assignment\n (bsc#1094555).\n\n - scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n\n - scsi: qla2xxx: Update driver version to 10.00.00.12-k\n (bsc#1094555).\n\n - scsi: storvsc: Fix a race in sub-channel creation that\n can cause panic ().\n\n - scsi: sym53c8xx: fix NULL pointer dereference panic in\n sym_int_sir() (bsc#1125315).\n\n - scsi: virtio_scsi: fix pi_bytes(out,in) on 4 KiB block\n size devices (bsc#1114585).\n\n - sctp: add a ceiling to optlen in some sockopts\n (bnc#1129163).\n\n - sctp: improve the events for sctp stream adding\n (networking-stable-19_02_01).\n\n - sctp: improve the events for sctp stream reset\n (networking-stable-19_02_01).\n\n - sd: disable logical block provisioning if 'lbpme' is not\n set (bsc#1086095 bsc#1078355).\n\n - selftests/livepatch: add DYNAMIC_DEBUG config dependency\n (bsc#1071995).\n\n - selftests/livepatch: introduce tests (bsc#1071995).\n\n - selinux: always allow mounting submounts (bsc#1051510).\n\n - seq_buf: Make seq_buf_puts() null-terminate the buffer\n (bsc#1051510).\n\n - serial: 8250_of: assume reg-shift of 2 for mrvl,mmp-uart\n (bsc#1051510).\n\n - serial: 8250_pci: Fix number of ports for ACCES serial\n cards (bsc#1051510).\n\n - serial: 8250_pci: Have ACCES cards that use the four\n port Pericom PI7C9X7954 chip use the pci_pericom_setup()\n (bsc#1051510).\n\n - serial: fix race between flush_to_ldisc and tty_open\n (bsc#1051510).\n\n - serial: fsl_lpuart: clear parity enable bit when disable\n parity (bsc#1051510).\n\n - serial: fsl_lpuart: fix maximum acceptable baud rate\n with over-sampling (bsc#1051510).\n\n - serial: imx: Update cached mctrl value when changing RTS\n (bsc#1051510).\n\n - serial: uartps: Fix stuck ISR if RX disabled with\n non-empty FIFO (bsc#1051510).\n\n - skge: potential memory corruption in skge_get_regs()\n (bsc#1051510).\n\n - sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79\n (bsc#1051510).\n\n - sky2: Increase D3 delay again (bsc#1051510).\n\n - smb311: Improve checking of negotiate security contexts\n (bsc#1051510).\n\n - smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n\n - smb3: Fix 3.11 encryption to Windows and handle\n encrypted smb3 tcon (bsc#1051510).\n\n - smb3: Fix SMB3.1.1 guest mounts to Samba (bsc#1051510).\n\n - smb3: remove noisy warning message on mount\n (bsc#1129664).\n\n - soc: bcm: brcmstb: Do not leak device tree node\n reference (bsc#1051510).\n\n - soc: fsl: qbman: avoid race in clearing QMan interrupt\n (bsc#1051510).\n\n - soc/tegra: Do not leak device tree node reference\n (bsc#1051510).\n\n - spi: pxa2xx: Setup maximum supported DMA transfer length\n (bsc#1051510).\n\n - spi: ti-qspi: Fix mmap read when more than one CS in use\n (bsc#1051510).\n\n - spi/topcliff_pch: Fix potential NULL dereference on\n allocation error (bsc#1051510).\n\n - splice: do not merge into linked buffers (git-fixes).\n\n - staging: comedi: ni_660x: fix missing break in switch\n statement (bsc#1051510).\n\n - staging:iio:ad2s90: Make probe handle spi_setup failure\n (bsc#1051510).\n\n - staging: iio: ad7780: update voltage on read\n (bsc#1051510).\n\n - staging: iio: adc: ad7280a: handle error from\n __ad7280_read32() (bsc#1051510).\n\n - staging: iio: adt7316: allow adt751x to use internal\n vref for all dacs (bsc#1051510).\n\n - staging: iio: adt7316: fix register and bit definitions\n (bsc#1051510).\n\n - staging: iio: adt7316: fix the dac read calculation\n (bsc#1051510).\n\n - staging: iio: adt7316: fix the dac write calculation\n (bsc#1051510).\n\n - staging: rtl8723bs: Fix build error with Clang when\n inlining is disabled (bsc#1051510).\n\n - staging: speakup: Replace strncpy with memcpy\n (bsc#1051510).\n\n - staging: wilc1000: fix to set correct value for\n 'vif_num' (bsc#1051510).\n\n - supported.conf\n\n - svm: Add mutex_lock to protect apic_access_page_done on\n AMD systems (bsc#1129285).\n\n - svm: Fix improper check when deactivate AVIC\n (bsc#1130335).\n\n - swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n\n - swiotlb: Introduce swiotlb_max_mapping_size()\n (bsc#1120008).\n\n - switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags\n overwrite (bsc#1051510).\n\n - switchtec: Remove immediate status check after\n submitting MRPC command (bsc#1051510).\n\n - sysfs: Disable lockdep for driver bind/unbind files\n (bsc#1051510).\n\n - tcp: batch tcp_net_metrics_exit (bsc#1122982).\n\n - tcp: change txhash on SYN-data timeout\n (networking-stable-19_01_20).\n\n - tcp: handle inet_csk_reqsk_queue_add() failures\n (git-fixes).\n\n - team: avoid complex list operations in\n team_nl_cmd_options_set() (bsc#1051510).\n\n - team: Free BPF filter when unregistering netdev\n (bsc#1051510).\n\n - thermal: bcm2835: Fix crash in bcm2835_thermal_debugfs\n (bsc#1051510).\n\n - thermal: do not clear passive state during system sleep\n (bsc#1051510).\n\n - thermal/drivers/hisi: Encapsulate register writes into\n helpers (bsc#1051510).\n\n - thermal/drivers/hisi: Fix configuration register setting\n (bsc#1051510).\n\n - thermal: generic-adc: Fix adc to temp interpolation\n (bsc#1051510).\n\n - thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON\n is not set (bsc#1051510).\n\n - thermal/intel_powerclamp: fix truncated kthread name ().\n\n - thermal: mediatek: fix register index error\n (bsc#1051510).\n\n - timekeeping: Use proper seqcount initializer\n (bsc#1051510).\n\n - tipc: eliminate KMSAN uninit-value in strcmp complaint\n (bsc#1051510).\n\n - tipc: error path leak fixes in tipc_enable_bearer()\n (bsc#1051510).\n\n - tipc: fix a race condition of releasing subscriber\n object (bsc#1051510).\n\n - tipc: fix bug in function tipc_nl_node_dump_monitor\n (bsc#1051510).\n\n - tipc: fix infinite loop when dumping link monitor\n summary (bsc#1051510).\n\n - tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n\n - tipc: fix uninit-value in tipc_nl_compat_bearer_enable\n (bsc#1051510).\n\n - tipc: fix uninit-value in tipc_nl_compat_doit\n (bsc#1051510).\n\n - tipc: fix uninit-value in\n tipc_nl_compat_link_reset_stats (bsc#1051510).\n\n - tipc: fix uninit-value in tipc_nl_compat_link_set\n (bsc#1051510).\n\n - tipc: fix uninit-value in tipc_nl_compat_name_table_dump\n (bsc#1051510).\n\n - tpm: fix kdoc for tpm2_flush_context_cmd()\n (bsc#1051510).\n\n - tpm: Fix some name collisions with drivers/char/tpm.h\n (bsc#1051510).\n\n - tpm: return a TPM_RC_COMMAND_CODE response if command is\n not implemented (bsc#1051510).\n\n - tpm: Return the actual size when receiving an\n unsupported command (bsc#1051510).\n\n - tpm: suppress transmit cmd error logs when TPM 1.2 is\n disabled/deactivated (bsc#1051510).\n\n - tpm_tis_spi: Pass the SPI IRQ down to the driver\n (bsc#1051510).\n\n - tpm/tpm_crb: Avoid unaligned reads in crb_recv()\n (bsc#1051510).\n\n - tpm/tpm_i2c_infineon: switch to i2c_lock_bus(...,\n I2C_LOCK_SEGMENT) (bsc#1051510).\n\n - tpm: tpm_i2c_nuvoton: use correct command duration for\n TPM 2.x (bsc#1051510).\n\n - tpm: tpm_try_transmit() refactor error flow\n (bsc#1051510).\n\n - tracing: Do not free iter->trace in fail path of\n tracing_open_pipe() (bsc#1129581).\n\n - tracing/uprobes: Fix output for multiple string\n arguments (bsc#1126495).\n\n - tracing: Use strncpy instead of memcpy for string keys\n in hist triggers (bsc#1129625).\n\n - Tree connect for SMB3.1.1 must be signed for\n non-encrypted shares (bsc#1051510).\n\n - tty: ipwireless: Fix potential NULL pointer dereference\n (bsc#1051510).\n\n - tty: serial: samsung: Properly set flags in autoCTS mode\n (bsc#1051510).\n\n - ucc_geth: Reset BQL queue when stopping device\n (networking-stable-19_02_01).\n\n - ucma: fix a use-after-free in ucma_resolve_ip()\n (bsc#1051510).\n\n - uevent: add alloc_uevent_skb() helper (bsc#1122982).\n\n - uio: Reduce return paths from uio_write() (bsc#1051510).\n\n - Update config files. Remove conditional support for SMB2\n and SMB3 :\n\n - Update\n patches.arch/s390-sles15-zcrypt-fix-specification-except\n ion.patch (LTC#174936, bsc#1123060, bsc#1123061).\n\n - Update\n patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch\n (bsc#1051510, bsc#1121789).\n\n - Update\n patches.fixes/acpi-nfit-Fix-command-supported-detection.\n patch (bsc#1051510, bsc#1121789). Add more detailed\n bugzilla reference.\n\n - uprobes: Fix handle_swbp() vs. unregister() + register()\n race once more (bsc#1051510).\n\n - usb: Add new USB LPM helpers (bsc#1120902).\n\n - usb: cdc-acm: fix race during wakeup blocking TX traffic\n (bsc#1129770).\n\n - usb: common: Consider only available nodes for dr_mode\n (bsc#1129770).\n\n - usb: Consolidate LPM checks to avoid enabling LPM twice\n (bsc#1120902).\n\n - usb: core: only clean up what we allocated\n (bsc#1051510).\n\n - usb: dwc3: Correct the logic for checking TRB full in\n __dwc3_prepare_one_trb() (bsc#1051510).\n\n - usb: dwc3: gadget: Disable CSP for stream OUT ep\n (bsc#1051510).\n\n - usb: dwc3: gadget: Fix the uninitialized link_state when\n udc starts (bsc#1051510).\n\n - usb: dwc3: gadget: Handle 0 xfer length for OUT EP\n (bsc#1051510).\n\n - usb: dwc3: gadget: synchronize_irq dwc irq in suspend\n (bsc#1051510).\n\n - usb: gadget: f_hid: fix deadlock in f_hidg_write()\n (bsc#1129770).\n\n - usb: gadget: musb: fix short isoc packets with inventra\n dma (bsc#1051510).\n\n - usb: gadget: Potential NULL dereference on allocation\n error (bsc#1051510).\n\n - usb: gadget: udc: net2272: Fix bitwise and boolean\n operations (bsc#1051510).\n\n - usb: hub: delay hub autosuspend if USB3 port is still\n link training (bsc#1051510).\n\n - usb: mtu3: fix the issue about SetFeature(U1/U2_Enable)\n (bsc#1051510).\n\n - usb: musb: dsps: fix otg state machine (bsc#1051510).\n\n - usb: musb: dsps: fix runtime pm for peripheral mode\n (bsc#1120902).\n\n - usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n\n - usb: phy: am335x: fix race condition in _probe\n (bsc#1051510).\n\n - usb: phy: fix link errors (bsc#1051510).\n\n - usb: phy: twl6030-usb: fix possible use-after-free on\n remove (bsc#1051510).\n\n - usb: serial: cp210x: add ID for Ingenico 3070\n (bsc#1129770).\n\n - usb: serial: ftdi_sio: add ID for Hjelmslund Electronics\n USB485 (bsc#1129770).\n\n - usb: serial: mos7720: fix mos_parport refcount imbalance\n on error path (bsc#1129770).\n\n - usb: serial: option: add Telit ME910 ECM composition\n (bsc#1129770).\n\n - usb: serial: option: set driver_info for SIM5218 and\n compatibles (bsc#1129770).\n\n - usb: serial: pl2303: add new PID to support PL2303TB\n (bsc#1051510).\n\n - usb: serial: simple: add Motorola Tetra TPG2200 device\n id (bsc#1051510).\n\n - veth: set peer GSO values (bsc#1051510).\n\n - vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n\n - vfio: ccw: process ssch with interrupts disabled\n (git-fixes).\n\n - vfs: Add iomap_seek_hole and iomap_seek_data helpers\n (bsc#1070995).\n\n - vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n\n - vfs: in iomap seek_(hole,data), return -ENXIO for\n negative offsets (bsc#1070995).\n\n - vhost: correctly check the return value of\n translate_desc() in log_used() (bsc#1051510).\n\n - vhost: log dirty page correctly\n (networking-stable-19_01_26).\n\n - vhost/vsock: fix uninitialized vhost_vsock->guest_cid\n (bsc#1051510).\n\n - video: clps711x-fb: release disp device node in probe()\n (bsc#1051510).\n\n - virtio-blk: Consider virtio_max_dma_size() for maximum\n segment size (bsc#1120008).\n\n - virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n\n - virtio_net: Do not call free_old_xmit_skbs for\n xdp_frames (networking-stable-19_02_01).\n\n - virtio/s390: avoid race on vcdev->config (git-fixes).\n\n - virtio/s390: fix race in ccw_io_helper() (git-fixes).\n\n - vmci: Support upto 64-bit PPNs (bsc#1127286).\n\n - vsock: cope with memory allocation failure at socket\n creation time (bsc#1051510).\n\n - vxge: ensure data0 is initialized in when fetching\n firmware version information (bsc#1051510).\n\n - vxlan: Fix GRO cells race condition between receive and\n link delete (git-fixes).\n\n - vxlan: test dev->flags & IFF_UP before calling\n gro_cells_receive() (git-fixes).\n\n - vxlan: update skb dst pmtu on tx path (bsc#1123456).\n\n - w90p910_ether: remove incorrect __init annotation\n (bsc#1051510).\n\n - watchdog: docs: kernel-api: do not reference removed\n functions (bsc#1051510).\n\n - x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n\n - x86/a.out: Clear the dump structure initially\n (bsc#1114279).\n\n - x86/apic: Provide apic_ack_irq() (bsc#1122822).\n\n - x86/boot/e820: Avoid overwriting e820_table_firmware\n (bsc#1127154).\n\n - x86/boot/e820: Introduce the bootloader provided\n e820_table_firmware[] table (bsc#1127154).\n\n - x86/boot/e820: Rename the e820_table_firmware to\n e820_table_kexec (bsc#1127154).\n\n - x86/cpu: Add Atom Tremont (Jacobsville) ().\n\n - x86/CPU/AMD: Set the CPB bit unconditionally on F17h\n (bsc#1114279).\n\n - x86/efi: Allocate e820 buffer before calling\n efi_exit_boot_service (bsc#1127307).\n\n - x86/Hyper-V: Set x2apic destination mode to physical\n when x2apic is available (bsc#1122822).\n\n - x86/kaslr: Fix incorrect i8254 outb() parameters\n (bsc#1114279).\n\n - x86/mce: Improve error message when kernel cannot\n recover, p2 (bsc#1114279).\n\n - x86/mtrr: Do not copy uninitialized gentry fields back\n to userspace (bsc#1114279).\n\n - x86/pkeys: Properly copy pkey state at fork()\n (bsc#1129366).\n\n - x86/platform/UV: Use efi_runtime_lock to serialise BIOS\n calls (bsc#1125614).\n\n - x86: respect memory size limiting via mem= parameter\n (bsc#1117645).\n\n - x86/vdso: Remove obsolete 'fake section table'\n reservation (bsc#1114279).\n\n - x86/xen: dont add memory above max allowed allocation\n (bsc#1117645).\n\n - xen, cpu_hotplug: Prevent an out of bounds access\n (bsc#1065600).\n\n - xen: fix dom0 boot on huge systems (bsc#1127836).\n\n - xen/manage: do not complain about an empty value in\n control/sysrq node (bsc#1065600).\n\n - xen: remove pre-xen3 fallback handlers (bsc#1065600).\n\n - xfs: add option to mount with barrier=0 or barrier=1\n (bsc#1088133).\n\n - xfs: fix contiguous dquot chunk iteration livelock\n (bsc#1070995).\n\n - xfs: remove filestream item xfs_inode reference\n (bsc#1127961).\n\n - xfs: rewrite xfs_dq_get_next_id using\n xfs_iext_lookup_extent (bsc#1070995).\n\n - xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA\n (bsc#1070995).\n\n - yama: Check for pid death before checking ancestry\n (bsc#1051510).\n\n - yam: fix a missing-check bug (bsc#1051510).\n\n - zswap: re-check zswap_is_full() after do zswap_shrink()\n (bsc#1051510).\n\n - x86/uaccess: Do not leak the AC flag into __put_user()\n value evaluation (bsc#1114279).", "edition": 18, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-04-15T00:00:00", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2019-1193)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8980", "CVE-2019-8912", "CVE-2019-2024", "CVE-2019-9213", "CVE-2019-7308", "CVE-2019-3819"], "modified": "2019-04-15T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "cpe:/o:novell:opensuse:15.0", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo"], "id": "OPENSUSE-2019-1193.NASL", "href": "https://www.tenable.com/plugins/nessus/124050", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-1193.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(124050);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2019-2024\", \"CVE-2019-3819\", \"CVE-2019-7308\", \"CVE-2019-8912\", \"CVE-2019-8980\", \"CVE-2019-9213\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2019-1193)\");\n script_summary(english:\"Check for the openSUSE-2019-1193 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The openSUSE Leap 15.0 was updated to receive various security and\nbugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-2024: A use-after-free when disconnecting a\n source was fixed which could lead to crashes.\n bnc#1129179).\n\n - CVE-2019-3819: A flaw was found in the Linux kernel in\n the function hid_debug_events_read() in\n drivers/hid/hid-debug.c file which may enter an infinite\n loop with certain parameters passed from a userspace. A\n local privileged user ('root') can cause a system lock\n up and a denial of service. Versions from v4.18 and\n newer are vulnerable (bnc#1123161).\n\n - CVE-2019-7308: kernel/bpf/verifier.c performed\n undesirable out-of-bounds speculation on pointer\n arithmetic in various cases, including cases of\n different branches with different state or limits to\n sanitize, leading to side-channel attacks (bnc#1124055).\n\n - CVE-2019-8912: af_alg_release() in crypto/af_alg.c\n neglected to set a NULL value for a certain structure\n member, which leads to a use-after-free in\n sockfs_setattr (bnc#1125907).\n\n - CVE-2019-8980: A memory leak in the kernel_read_file\n function in fs/exec.c allowed attackers to cause a\n denial of service (memory consumption) by triggering\n vfs_read failures (bnc#1126209).\n\n - CVE-2019-9213: expand_downwards in mm/mmap.c lacked a\n check for the mmap minimum address, which made it easier\n for attackers to exploit kernel NULL pointer\n dereferences on non-SMAP platforms. This is related to a\n capability check for the wrong task (bnc#1128166).\n\nThe following non-security bugs were fixed :\n\n - 9p/net: fix memory leak in p9_client_create\n (bsc#1051510).\n\n - 9p: use inode->i_lock to protect i_size_write() under\n 32-bit (bsc#1051510).\n\n - acpi: acpi_pad: Do not launch acpi_pad threads on idle\n cpus (bsc#1113399).\n\n - acpi/APEI: Clear GHES block_status before panic()\n (bsc#1051510).\n\n - acpi/device_sysfs: Avoid OF modalias creation for\n removed device (bsc#1051510).\n\n - acpi/nfit: Fix bus command validation (bsc#1051510).\n\n - acpi: NUMA: Use correct type for printing addresses on\n i386-PAE (bsc#1051510).\n\n - acpi / video: Extend chassis-type detection with a\n 'Lunch Box' check (bsc#1051510).\n\n - acpi / video: Refactor and fix dmi_is_desktop()\n (bsc#1051510).\n\n - alsa: bebob: use more identical mod_alias for Saffire\n Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n\n - alsa: compress: prevent potential divide by zero bugs\n (bsc#1051510).\n\n - alsa: echoaudio: add a check for ioremap_nocache\n (bsc#1051510).\n\n - alsa: firewire: add const qualifier to identifiers for\n read-only symbols (bsc#1051510).\n\n - alsa: firewire-motu: add a flag for AES/EBU on XLR\n interface (bsc#1051510).\n\n - alsa: firewire-motu: add specification flag for position\n of flag for MIDI messages (bsc#1051510).\n\n - alsa: firewire-motu: add support for MOTU Audio Express\n (bsc#1051510).\n\n - alsa: firewire-motu: add support for Motu Traveler\n (bsc#1051510).\n\n - alsa: firewire-motu: fix construction of PCM frame for\n capture direction (bsc#1051510).\n\n - alsa: firewire-motu: use 'version' field of unit\n directory to identify model (bsc#1051510).\n\n - alsa: hda - add Lenovo IdeaCentre B550 to the\n power_save_blacklist (bsc#1051510).\n\n - alsa: hda - Add quirk for HP EliteBook 840 G5\n (bsc#1051510).\n\n - alsa: hda - Enforces runtime_resume after S3 and S4 for\n each codec (bsc#1051510).\n\n - alsa: hda/realtek - Add support for Acer Aspire\n E5-523G/ES1-432 headset mic (bsc#1051510).\n\n - alsa: hda/realtek: Disable PC beep in passthrough on\n alc285 (bsc#1051510).\n\n - alsa: hda/realtek: Enable ASUS X441MB and X705FD headset\n MIC with ALC256 (bsc#1051510).\n\n - alsa: hda/realtek: Enable audio jacks of ASUS UX362FA\n with ALC294 (bsc#1051510).\n\n - alsa: hda/realtek: Enable headset MIC of Acer AIO with\n ALC286 (bsc#1051510).\n\n - alsa: hda/realtek: Enable headset MIC of Acer Aspire\n Z24-890 with ALC286 (bsc#1051510).\n\n - alsa: hda/realtek: Enable headset mic of ASUS P5440FF\n with ALC256 (bsc#1051510).\n\n - alsa: hda/realtek - Headset microphone and internal\n speaker support for System76 oryp5 (bsc#1051510).\n\n - alsa: hda/realtek - Headset microphone support for\n System76 darp5 (bsc#1051510).\n\n - alsa: hda/realtek - Reduce click noise on Dell Precision\n 5820 headphone (bsc#1126131).\n\n - alsa: hda - Record the current power state before\n suspend/resume calls (bsc#1051510).\n\n - alsa: opl3: fix mismatch between snd_opl3_drum_switch\n definition and declaration (bsc#1051510).\n\n - alsa: pcm: Do not suspend stream in unrecoverable PCM\n state (bsc#1051510).\n\n - alsa: pcm: Fix possible OOB access in PCM oss plugins\n (bsc#1051510).\n\n - alsa: rawmidi: Fix potential Spectre v1 vulnerability\n (bsc#1051510).\n\n - alsa: sb8: add a check for request_region (bsc#1051510).\n\n - alsa: seq: oss: Fix Spectre v1 vulnerability\n (bsc#1051510).\n\n - alsa: usb-audio: Fix implicit fb endpoint setup by quirk\n (bsc#1051510).\n\n - altera-stapl: check for a null key before strcasecmp'ing\n it (bsc#1051510).\n\n - apparmor: Fix aa_label_build() error handling for failed\n merges (bsc#1051510).\n\n - applicom: Fix potential Spectre v1 vulnerabilities\n (bsc#1051510).\n\n - aquantia: Setup max_mtu in ndev to enable jumbo frames\n (bsc#1051510).\n\n - arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n\n - arm: 8808/1: kexec:offline panic_smp_self_stop CPU\n (bsc#1051510).\n\n - arm/arm64: KVM: Rename function\n kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n\n - arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n\n - arm: OMAP2+: hwmod: Fix some section annotations\n (bsc#1051510).\n\n - arm: pxa: avoid section mismatch warning (bsc#1051510).\n\n - arm: tango: Improve ARCH_MULTIPLATFORM compatibility\n (bsc#1051510).\n\n - ASoC: atom: fix a missing check of\n snd_pcm_lib_malloc_pages (bsc#1051510).\n\n - ASoC: dapm: change snprintf to scnprintf for possible\n overflow (bsc#1051510).\n\n - ASoC: fsl_esai: fix register setting issue in RIGHT_J\n mode (bsc#1051510).\n\n - ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on\n i.MX8M (bsc#1051510).\n\n - ASoC: imx-audmux: change snprintf to scnprintf for\n possible overflow (bsc#1051510).\n\n - ASoC: imx-sgtl5000: put of nodes if finding codec fails\n (bsc#1051510).\n\n - ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic\n field (bsc#1051510).\n\n - ASoC: msm8916-wcd-analog: add missing license\n information (bsc#1051510).\n\n - ASoC: qcom: Fix of-node refcount unbalance in\n apq8016_sbc_parse_of() (bsc#1051510).\n\n - ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count\n check (bsc#1051510).\n\n - assoc_array: Fix shortcut creation (bsc#1051510).\n\n - ata: ahci: mvebu: remove stale comment (bsc#1051510).\n\n - ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom\n (bsc#1051510).\n\n - ath9k: dynack: check da->enabled first in sampling\n routines (bsc#1051510).\n\n - ath9k: dynack: make ewma estimation faster\n (bsc#1051510).\n\n - ath9k: dynack: use authentication messages for 'late'\n ack (bsc#1051510).\n\n - atm: he: fix sign-extension overflow on large shift\n (bsc#1051510).\n\n - auxdisplay: hd44780: Fix memory leak on ->remove()\n (bsc#1051510).\n\n - auxdisplay: ht16k33: fix potential user-after-free on\n module unload (bsc#1051510).\n\n - ax25: fix possible use-after-free (bsc#1051510).\n\n - backlight: pwm_bl: Use gpiod_get_value_cansleep() to get\n initial (bsc#1113722)\n\n - batman-adv: Avoid WARN on net_device without parent in\n netns (bsc#1051510).\n\n - batman-adv: fix uninit-value in batadv_interface_tx()\n (bsc#1051510).\n\n - batman-adv: Force mac header to start of data on xmit\n (bsc#1051510).\n\n - bio: Introduce BIO_ALLOCED flag and check it in bio_free\n (bsc#1128094).\n\n - blk-mq: fix a hung issue when fsync (bsc#1125252).\n\n - block_dev: fix crash on chained bios with O_DIRECT\n (bsc#1128094).\n\n - block_dev: fix crash on chained bios with O_DIRECT\n (bsc#1128094).\n\n - blockdev: Fix livelocks on loop device (bsc#1124984).\n\n - block: do not use bio->bi_vcnt to figure out segment\n number (bsc#1128895).\n\n - block: do not warn when doing fsync on read-only devices\n (bsc#1125252).\n\n - block/loop: Use global lock for ioctl() operation\n (bsc#1124974).\n\n - block: move bio_integrity_(intervals,bytes) into\n blkdev.h (bsc#1114585).\n\n - bluetooth: Fix decrementing reference count twice in\n releasing socket (bsc#1051510).\n\n - bluetooth: Fix locking in bt_accept_enqueue() for BH\n context (bsc#1051510).\n\n - bluetooth: Fix unnecessary error message for HCI request\n completion (bsc#1051510).\n\n - bluetooth: hci_ldisc: Initialize hci_dev before open()\n (bsc#1051510).\n\n - bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit\n set in hci_uart_set_proto() (bsc#1051510).\n\n - bnxt_en: Fix typo in firmware message timeout logic\n (bsc#1086282 ).\n\n - bnxt_en: Wait longer for the firmware message response\n to complete (bsc#1086282).\n\n - bpf: decrease usercnt if bpf_map_new_fd() fails in\n bpf_map_get_fd_by_id() (bsc#1083647).\n\n - bpf: drop refcount if bpf_map_new_fd() fails in\n map_create() (bsc#1083647).\n\n - bpf: fix lockdep false positive in percpu_freelist\n (bsc#1083647).\n\n - bpf: fix replace_map_fd_with_map_ptr's ldimm64 second\n imm field (bsc#1083647).\n\n - bpf: fix sanitation rewrite in case of non-pointers\n (bsc#1083647).\n\n - bpf: Fix syscall's stackmap lookup potential deadlock\n (bsc#1083647).\n\n - bpf, lpm: fix lookup bug in map_delete_elem\n (bsc#1083647).\n\n - bpf/verifier: fix verifier instability (bsc#1056787).\n\n - bsg: Do not copy sense if no response buffer is\n allocated (bsc#1106811,bsc#1126555).\n\n - btrfs: dedupe_file_range ioctl: remove 16MiB restriction\n (bsc#1127494).\n\n - btrfs: do not unnecessarily pass write_lock_level when\n processing leaf (bsc#1126802).\n\n - btrfs: ensure that a DUP or RAID1 block group has\n exactly two stripes (bsc#1128451).\n\n - btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n\n - btrfs: fix corruption reading shared and compressed\n extents after hole punching (bsc#1126476).\n\n - btrfs: fix deadlock between clone/dedupe and rename\n (bsc#1130518).\n\n - btrfs: fix deadlock when allocating tree block during\n leaf/node split (bsc#1126806).\n\n - btrfs: fix deadlock when using free space tree due to\n block group creation (bsc#1126804).\n\n - btrfs: fix fsync after succession of renames and\n unlink/rmdir (bsc#1126488).\n\n - btrfs: fix fsync after succession of renames of\n different files (bsc#1126481).\n\n - btrfs: fix invalid-free in btrfs_extent_same\n (bsc#1127498).\n\n - btrfs: fix reading stale metadata blocks after degraded\n raid1 mounts (bsc#1126803).\n\n - btrfs: fix use-after-free of cmp workspace pages\n (bsc#1127603).\n\n - btrfs: grab write lock directly if write_lock_level is\n the max level (bsc#1126802).\n\n - btrfs: Improve btrfs_search_slot description\n (bsc#1126802).\n\n - btrfs: move get root out of btrfs_search_slot to a\n helper (bsc#1126802).\n\n - btrfs: qgroup: Cleanup old subtree swap code\n (bsc#1063638).\n\n - btrfs: qgroup: Do not trace subtree if we're dropping\n reloc tree (bsc#1063638).\n\n - btrfs: qgroup: Finish rescan when hit the last leaf of\n extent tree (bsc#1129327).\n\n - btrfs: qgroup: Introduce function to find all new tree\n blocks of reloc tree (bsc#1063638).\n\n - btrfs: qgroup: Introduce function to trace two swaped\n extents (bsc#1063638).\n\n - btrfs: qgroup: Introduce per-root swapped blocks\n infrastructure (bsc#1063638).\n\n - btrfs: qgroup: Introduce trace event to analyse the\n number of dirty extents accounted (bsc#1063638\n dependency).\n\n - btrfs: qgroup: Make qgroup async transaction commit more\n aggressive (bsc#1113042).\n\n - btrfs: qgroup: Only trace data extents in leaves if\n we're relocating data block group (bsc#1063638).\n\n - btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap\n (bsc#1063638).\n\n - btrfs: qgroup: Search commit root for rescan to avoid\n missing extent (bsc#1129326).\n\n - btrfs: qgroup: Use delayed subtree rescan for balance\n (bsc#1063638).\n\n - btrfs: qgroup: Use generation-aware subtree swap to mark\n dirty extents (bsc#1063638).\n\n - btrfs: quota: Set rescan progress to (u64)-1 if we hit\n last leaf (bsc#1129327).\n\n - btrfs: relocation: Delay reloc tree deletion after\n merge_reloc_roots (bsc#1063638).\n\n - btrfs: reloc: Fix NULL pointer dereference due to\n expanded reloc_root lifespan (bsc#1129497).\n\n - btrfs: remove always true check in unlock_up\n (bsc#1126802).\n\n - btrfs: remove superfluous free_extent_buffer in\n read_block_for_search (bsc#1126802).\n\n - btrfs: remove unnecessary level check in balance_level\n (bsc#1126802).\n\n - btrfs: remove unused check of skip_locking\n (bsc#1126802).\n\n - btrfs: reuse cmp workspace in EXTENT_SAME ioctl\n (bsc#1127495).\n\n - btrfs: send, fix race with transaction commits that\n create snapshots (bsc#1126802).\n\n - btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n\n - btrfs: split btrfs_extent_same (bsc#1127493).\n\n - btrfs: use kvzalloc for EXTENT_SAME temporary data\n (bsc#1127496).\n\n - btrfs: use more straightforward extent_buffer_uptodate\n check (bsc#1126802).\n\n - cdc-wdm: pass return value of recover_from_urb_loss\n (bsc#1051510).\n\n - ceph: avoid repeatedly adding inode to\n mdsc->snap_flush_list (bsc#1126790).\n\n - ceph: clear inode pointer when snap realm gets dropped\n by its inode (bsc#1125799).\n\n - cfg80211: extend range deviation for DMG (bsc#1051510).\n\n - ch: add missing mutex_lock()/mutex_unlock() in\n ch_release() (bsc#1124235).\n\n - ch: fixup refcounting imbalance for SCSI devices\n (bsc#1124235).\n\n - cifs: allow guest mounts to work for smb3.11\n (bsc#1051510).\n\n - cifs: Always resolve hostname before reconnecting\n (bsc#1051510).\n\n - cifs: connect to servername instead of IP for IPC$ share\n (bsc#1051510).\n\n - cifs: Fix NULL pointer dereference of devname\n (bnc#1129519).\n\n - cifs: invalidate cache when we truncate a file\n (bsc#1051510).\n\n - cifs: OFD locks do not conflict with eachothers\n (bsc#1051510).\n\n - clk: armada-370: fix refcount leak in a370_clk_init()\n (bsc#1051510).\n\n - clk: armada-xp: fix refcount leak in axp_clk_init()\n (bsc#1051510).\n\n - clk: clk-twl6040: Fix imprecise external abort for\n pdmclk (bsc#1051510).\n\n - clk: dove: fix refcount leak in dove_clk_init()\n (bsc#1051510).\n\n - clk: highbank: fix refcount leak in hb_clk_init()\n (bsc#1051510).\n\n - clk: imx6q: fix refcount leak in imx6q_clocks_init()\n (bsc#1051510).\n\n - clk: imx6sl: ensure MMDC CH0 handshake is bypassed\n (bsc#1051510).\n\n - clk: imx6sx: fix refcount leak in imx6sx_clocks_init()\n (bsc#1051510).\n\n - clk: imx7d: fix refcount leak in imx7d_clocks_init()\n (bsc#1051510).\n\n - clk: ingenic: Fix doc of ingenic_cgu_div_info\n (bsc#1051510).\n\n - clk: ingenic: Fix round_rate misbehaving with\n non-integer dividers (bsc#1051510).\n\n - clk: kirkwood: fix refcount leak in kirkwood_clk_init()\n (bsc#1051510).\n\n - clk: mv98dx3236: fix refcount leak in\n mv98dx3236_clk_init() (bsc#1051510).\n\n - clk: qoriq: fix refcount leak in clockgen_init()\n (bsc#1051510).\n\n - clk: samsung: exynos4: fix refcount leak in\n exynos4_get_xom() (bsc#1051510).\n\n - clk: socfpga: fix refcount leak (bsc#1051510).\n\n - clk: sunxi: A31: Fix wrong AHB gate number\n (bsc#1051510).\n\n - clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all\n audio module clocks (bsc#1051510).\n\n - clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when\n ungating it (bsc#1051510).\n\n - clk: sunxi-ng: v3s: Fix TCON reset de-assert bit\n (bsc#1051510).\n\n - clk: uniphier: Fix update register for CPU-gear\n (bsc#1051510).\n\n - clk: vc5: Abort clock configuration without upstream\n clock (bsc#1051510).\n\n - clk: vf610: fix refcount leak in vf610_clocks_init()\n (bsc#1051510).\n\n - clocksource/drivers/exynos_mct: Clear timer interrupt\n when shutdown (bsc#1051510).\n\n - clocksource/drivers/exynos_mct: Fix error path in timer\n resources initialization (bsc#1051510).\n\n - clocksource/drivers/exynos_mct: Move one-shot check from\n tick clear to ISR (bsc#1051510).\n\n - clocksource/drivers/integrator-ap: Add missing\n of_node_put() (bsc#1051510).\n\n - clocksource/drivers/sun5i: Fail gracefully when clock\n rate is unavailable (bsc#1051510).\n\n - configfs: fix registered group removal (bsc#1051510).\n\n - copy_mount_string: Limit string length to PATH_MAX\n (bsc#1082943).\n\n - cpcap-charger: generate events for userspace\n (bsc#1051510).\n\n - cpufreq: Cap the default transition delay value to 10 ms\n (bsc#1127042).\n\n - cpufreq: conservative: Take limits changes into account\n properly (bsc#1051510).\n\n - cpufreq: governor: Avoid accessing invalid governor_data\n (bsc#1051510).\n\n - cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n\n - cpufreq: governor: Ensure sufficiently large sampling\n intervals (bsc#1127042).\n\n - cpufreq: pxa2xx: remove incorrect __init annotation\n (bsc#1051510).\n\n - cpufreq: tegra124: add missing of_node_put()\n (bsc#1051510).\n\n - cpufreq: Use transition_delay_us for legacy governors as\n well (bsc#1127042).\n\n - cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n\n - crypto: aes_ti - disable interrupts while accessing\n S-box (bsc#1051510).\n\n - crypto: ahash - fix another early termination in hash\n walk (bsc#1051510).\n\n - crypto: arm64/aes-ccm - fix logical bug in AAD MAC\n handling (bsc#1051510).\n\n - crypto: arm/crct10dif - revert to C code for short\n inputs (bsc#1051510).\n\n - crypto: brcm - Fix some set-but-not-used warning\n (bsc#1051510).\n\n - crypto: caam - fixed handling of sg list (bsc#1051510).\n\n - crypto: cavium/zip - fix collision with generic\n cra_driver_name (bsc#1051510).\n\n - crypto: crypto4xx - add missing of_node_put after\n of_device_is_available (bsc#1051510).\n\n - crypto: crypto4xx - Fix wrong\n ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments\n (bsc#1051510).\n\n - crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey()\n fails (bsc#1051510).\n\n - crypto: testmgr - skip crc32c context test for ahash\n algorithms (bsc#1051510).\n\n - crypto: tgr192 - fix unaligned memory access\n (bsc#1051510).\n\n - crypto: ux500 - Use proper enum in cryp_set_dma_transfer\n (bsc#1051510).\n\n - crypto: ux500 - Use proper enum in hash_set_dma_transfer\n (bsc#1051510).\n\n - cw1200: drop useless LIST_HEAD (bsc#1051510).\n\n - cw1200: Fix concurrency use-after-free bugs in\n cw1200_hw_scan() (bsc#1051510).\n\n - cw1200: fix missing unlock on error in cw1200_hw_scan()\n (bsc#1051510).\n\n - dccp: fool proof ccid_hc_[rt]x_parse_options()\n (bsc#1051510).\n\n - debugfs: fix debugfs_rename parameter checking\n (bsc#1051510).\n\n - device property: Fix the length used in\n PROPERTY_ENTRY_STRING() (bsc#1051510).\n\n - dlm: Do not swamp the CPU with callbacks queued during\n recovery (bsc#1051510).\n\n - dmaengine: at_hdmac: drop useless LIST_HEAD\n (bsc#1051510).\n\n - dmaengine: at_xdmac: Fix wrongfull report of a channel\n as in use (bsc#1051510).\n\n - dmaengine: bcm2835: Fix abort of transactions\n (bsc#1051510).\n\n - dmaengine: bcm2835: Fix interrupt race on RT\n (bsc#1051510).\n\n - dmaengine: dmatest: Abort test in case of mapping error\n (bsc#1051510).\n\n - dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n\n - dmaengine: imx-dma: fix wrong callback invoke\n (bsc#1051510).\n\n - dmaengine: mv_xor: Use correct device for DMA API\n (bsc#1051510).\n\n - dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n\n - dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n\n - dmaengine: st_fdma: drop useless LIST_HEAD\n (bsc#1051510).\n\n - dmaengine: stm32-dma: fix incomplete configuration in\n cyclic mode (bsc#1051510).\n\n - dma: Introduce dma_max_mapping_size() (bsc#1120008).\n\n - doc: rcu: Suspicious RCU usage is a warning\n (bsc#1051510).\n\n - Do not log confusing message on reconnect by default\n (bsc#1129664).\n\n - driver core: Do not resume suppliers under\n device_links_write_lock() (bsc#1051510).\n\n - drivers: hv: vmbus: Check for ring when getting debug\n info (bsc#1126389, bsc#1126579).\n\n - drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo\n kABI (bsc#1126389, bsc#1126579).\n\n - drivers: hv: vmbus: Return -EINVAL for the sys files for\n unopened channels (bsc#1126389, bsc#1126579).\n\n - drm/amdgpu: Add delay after enable RLC ucode\n (bsc#1051510).\n\n - drm/ast: Fix connector leak during driver unload\n (bsc#1051510).\n\n - drm/ast: fixed reading monitor EDID not stable issue\n (bsc#1051510).\n\n - drm/atomic-helper: Complete fake_commit->flip_done\n potentially earlier (bsc#1051510).\n\n - drm: Block fb changes for async plane updates\n (bsc#1051510).\n\n - drm/bridge: tc358767: add defines for DP1_SRCCTRL &\n PHY_2LANE (bsc#1051510).\n\n - drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value\n (bsc#1051510).\n\n - drm/bridge: tc358767: fix output H/V syncs\n (bsc#1051510).\n\n - drm/bridge: tc358767: fix single lane configuration\n (bsc#1051510).\n\n - drm/bridge: tc358767: reject modes which require too\n much BW (bsc#1051510).\n\n - drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n\n - drm: Clear state->acquire_ctx before leaving\n drm_atomic_helper_commit_duplicated_state()\n (bsc#1051510).\n\n - drm: disable uncached DMA optimization for ARM and arm64\n (bsc#1051510).\n\n - drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump()\n (bsc#1113722)\n\n - drm/etnaviv: potential NULL dereference (bsc#1113722)\n\n - drm: Fix error handling in drm_legacy_addctx\n (bsc#1113722)\n\n - drm/i915/bios: assume eDP is present on port A when\n there is no VBT (bsc#1051510).\n\n - drm/i915: Block fbdev HPD processing during suspend\n (bsc#1113722)\n\n - drm/i915/fbdev: Actually configure untiled displays\n (bsc#1113722)\n\n - drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n\n - drm/i915/gvt: free VFIO region space in vgpu detach\n (bsc#1113722)\n\n - drm/i915/gvt: release shadow batch buffer and wa_ctx\n before destroy one workload (bsc#1051510).\n\n - drm/i915/opregion: fix version check (bsc#1113722)\n\n - drm/i915/opregion: rvda is relative from opregion base\n in opregion (bsc#1113722)\n\n - drm/i915: Prevent a race during I915_GEM_MMAP ioctl with\n WC set (bsc#1113722)\n\n - drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n\n - drm/i915: Relax mmap VMA check (bsc#1051510).\n\n - drm/i915: Use the correct crtc when sanitizing plane\n mapping (bsc#1113722)\n\n - drm/imx: ignore plane updates on disabled crtcs\n (bsc#1051510).\n\n - drm/imx: imx-ldb: add missing of_node_puts\n (bsc#1051510).\n\n - drm/meson: add missing of_node_put (bsc#1051510).\n\n - drm/modes: Prevent division by zero htotal\n (bsc#1051510).\n\n - drm/msm: Fix error return checking (bsc#1051510).\n\n - drm/msm: Grab a vblank reference when waiting for\n commit_done (bsc#1051510).\n\n - drm/msm: Unblock writer if reader closes file\n (bsc#1051510).\n\n - drm/nouveau/bios/ramcfg: fix missing parentheses when\n calculating RON (bsc#1113722)\n\n - drm/nouveau/debugfs: Fix check of pm_runtime_get_sync\n failure (bsc#1051510).\n\n - drm/nouveau: Do not spew kernel WARNING for each timeout\n (bsc#1126480).\n\n - drm/nouveau: Do not WARN_ON VCPI allocation failures\n (bsc#1113722)\n\n - drm/nouveau/falcon: avoid touching registers if engine\n is off (bsc#1051510).\n\n - drm/nouveau/pmu: do not print reply values if exec is\n false (bsc#1113722)\n\n - drm/radeon/evergreen_cs: fix missing break in switch\n statement (bsc#1113722)\n\n - drm: Reorder set_property_atomic to avoid returning with\n an active ww_ctx (bsc#1051510).\n\n - drm/rockchip: fix for mailbox read size (bsc#1051510).\n\n - drm/shmob: Fix return value check in shmob_drm_probe\n (bsc#1113722)\n\n - drm/sun4i: tcon: Prepare and enable TCON channel 0 clock\n at init (bsc#1051510).\n\n - drm/vmwgfx: Do not double-free the mode stored in\n par->set_mode (bsc#1103429)\n\n - earlycon: Initialize port->uartclk based on\n clock-frequency property (bsc#1051510).\n\n - earlycon: Remove hardcoded port->uartclk initialization\n in of_setup_earlycon (bsc#1051510).\n\n - Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n\n - Enable livepatch test drivers in lib/ Livepatch\n kselftests need those.\n\n - enic: fix build warning without CONFIG_CPUMASK_OFFSTACK\n (bsc#1051510).\n\n - enic: fix checksum validation for IPv6 (bsc#1051510).\n\n - esp6: fix memleak on error path in esp6_input\n (bsc#1051510).\n\n - esp: Fix locking on page fragment allocation\n (bsc#1051510).\n\n - esp: Fix memleaks on error paths (bsc#1051510).\n\n - esp: Fix skb tailroom calculation (bsc#1051510).\n\n - ext4: avoid kernel warning when writing the superblock\n to a dead device (bsc#1124981).\n\n - ext4: Avoid panic during forced reboot (bsc#1126356).\n\n - ext4: check for shutdown and r/o file system in\n ext4_write_inode() (bsc#1124978).\n\n - ext4: fix a potential fiemap/page fault deadlock w/\n inline_data (bsc#1124980).\n\n - ext4: force inode writes when nfsd calls\n commit_metadata() (bsc#1125125).\n\n - ext4: include terminating u32 in size of xattr entries\n when expanding inodes (bsc#1124976).\n\n - ext4: make sure enough credits are reserved for\n dioread_nolock writes (bsc#1124979).\n\n - ext4: track writeback errors using the generic tracking\n infrastructure (bsc#1124982).\n\n - fbdev: chipsfb: remove set but not used variable 'size'\n (bsc#1113722)\n\n - firmware/efi: Add NULL pointer checks in efivars API\n functions (bsc#1051510).\n\n - floppy: check_events callback should not return a\n negative number (bsc#1051510).\n\n - fs/dax: deposit pagetable even when installing zero page\n (bsc#1126740).\n\n - fs/dcache: Fix incorrect nr_dentry_unused accounting in\n shrink_dcache_sb() (git-fixes).\n\n - fs/devpts: always delete dcache dentry-s in dput()\n (git-fixes).\n\n - fuse: call pipe_buf_release() under pipe lock\n (bsc#1051510).\n\n - fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN\n returns ENOSYS (bsc#1051510).\n\n - fuse: decrement NR_WRITEBACK_TEMP on the right page\n (bsc#1051510).\n\n - fuse: handle zero sized retrieve correctly\n (bsc#1051510).\n\n - futex: Fix (possible) missed wakeup (bsc#1050549).\n\n - gdrom: fix a memory leak bug (bsc#1051510).\n\n - geneve: cleanup hard coded value for Ethernet header\n length (bsc#1123456).\n\n - geneve: correctly handle ipv6.disable module parameter\n (bsc#1051510).\n\n - geneve, vxlan: Do not check skb_dst() twice\n (bsc#1123456).\n\n - geneve, vxlan: Do not set exceptions if skb->len < mtu\n (bsc#1123456).\n\n - genwqe: Fix size check (bsc#1051510).\n\n - gfs2: Revert 'Fix loop in gfs2_rbm_find' (bsc#1120601).\n\n - gianfar: fix a flooded alignment reports because of\n padding issue (bsc#1051510).\n\n - gianfar: Fix Rx byte accounting for ndev stats\n (bsc#1051510).\n\n - gianfar: prevent integer wrapping in the rx handler\n (bsc#1051510).\n\n - gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n\n - gpu: ipu-v3: Fix i.MX51 CSI control registers offset\n (bsc#1113722)\n\n - gpu: ipu-v3: image-convert: Prevent race between run and\n unprepare (bsc#1051510).\n\n - gro_cells: make sure device is up in gro_cells_receive()\n (git-fixes).\n\n - hid: lenovo: Add checks to fix of_led_classdev_register\n (bsc#1051510).\n\n - hpet: Fix missing '=' character in the __setup() code of\n hpet_mmap_enable (git-fixes).\n\n - hvc_opal: do not set tb_ticks_per_usec in\n udbg_init_opal_common() (bsc#1051510).\n\n - hv: reduce storvsc_ringbuffer_size from 1M to 128K to\n simplify booting with 1k vcpus ().\n\n - hv: v4.12 API for hyperv-iommu (bsc#1122822).\n\n - hwmon: (lm80) fix a missing check of bus read in lm80\n probe (bsc#1051510).\n\n - hwmon: (lm80) fix a missing check of the status of SMBus\n read (bsc#1051510).\n\n - hwmon: (lm80) Fix missing unlock on error in\n set_fan_div() (bsc#1051510).\n\n - hwmon: (tmp421) Correct the misspelling of the tmp442\n compatible attribute in OF device ID table\n (bsc#1051510).\n\n - HYPERV/IOMMU: Add Hyper-V stub IOMMU driver\n (bsc#1122822).\n\n - i2c-axxia: check for error conditions first\n (bsc#1051510).\n\n - i2c: bcm2835: Clear current buffer pointers and counts\n after a transfer (bsc#1051510).\n\n - i2c: cadence: Fix the hold bit setting (bsc#1051510).\n\n - i2c: omap: Use noirq system sleep pm ops to idle device\n for suspend (bsc#1051510).\n\n - i2c: sh_mobile: add support for r8a77990 (R-Car E3)\n (bsc#1051510).\n\n - i2c: tegra: fix maximum transfer size (bsc#1051510).\n\n - ib/core: Destroy QP if XRC QP fails (bsc#1046306).\n\n - ib/core: Fix potential memory leak while creating MAD\n agents (bsc#1046306).\n\n - ib/core: Unregister notifier before freeing MAD security\n (bsc#1046306).\n\n - ib/hfi1: Close race condition on user context disable\n and close (bsc#1060463).\n\n - ib/mlx5: Unmap DMA addr from HCA before IOMMU\n (bsc#1046305 ).\n\n - ibmvnic: Report actual backing device speed and duplex\n values (bsc#1129923).\n\n - ibmvscsi: Fix empty event pool access during host\n removal (bsc#1119019).\n\n - ibmvscsi: Protect ibmvscsi_head from concurrent\n modificaiton (bsc#1119019).\n\n - ieee802154: ca8210: fix possible u8 overflow in\n ca8210_rx_done (bsc#1051510).\n\n - igb: Fix an issue that PME is not enabled during runtime\n suspend (bsc#1051510).\n\n - iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID\n (bsc#1051510).\n\n - iio: adc: exynos-adc: Fix NULL pointer exception on\n unbind (bsc#1051510).\n\n - iio: chemical: atlas-ph-sensor: correct IIO_TEMP values\n to millicelsius (bsc#1051510).\n\n - Input: bma150 - register input device after setting\n private data (bsc#1051510).\n\n - input: cap11xx - switch to using\n set_brightness_blocking() (bsc#1051510).\n\n - Input: elan_i2c - add ACPI ID for touchpad in Lenovo\n V330-15ISK (bsc#1051510).\n\n - Input: elan_i2c - add id for touchpad found in Lenovo\n s21e-20 (bsc#1051510).\n\n - Input: elantech - enable 3rd button support on Fujitsu\n CELSIUS H780 (bsc#1051510).\n\n - input: matrix_keypad - use flush_delayed_work()\n (bsc#1051510).\n\n - Input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV\n (git-fixes).\n\n - input: st-keyscan - fix potential zalloc NULL\n dereference (bsc#1051510).\n\n - input: uinput - fix undefined behavior in\n uinput_validate_absinfo() (bsc#1120902).\n\n - Input: wacom_serial4 - add support for Wacom ArtPad II\n tablet (bsc#1051510).\n\n - intel_th: Do not reference unassigned outputs\n (bsc#1051510).\n\n - intel_th: gth: Fix an off-by-one in output unassigning\n (bsc#1051510).\n\n - iomap: fix integer truncation issues in the zeroing and\n dirtying helpers (bsc#1125947).\n\n - iomap: warn on zero-length mappings (bsc#1127062).\n\n - iommu/amd: Fix NULL dereference bug in match_hid_uid\n (bsc#1130336).\n\n - iommu/amd: fix sg->dma_address for sg->offset bigger\n than PAGE_SIZE (bsc#1130337).\n\n - iommu/amd: Reserve exclusion range in iova-domain\n (bsc#1130425).\n\n - iommu/dmar: Fix buffer overflow during PCI bus\n notification (bsc#1129181).\n\n - iommu: Document iommu_ops.is_attach_deferred()\n (bsc#1129182).\n\n - iommu: Do not print warning when IOMMU driver only\n supports unmanaged domains (bsc#1130130).\n\n - iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables\n (bsc#1129205).\n\n - iommu/vt-d: Check capability before disabling protected\n memory (bsc#1130338).\n\n - iommu/vt-d: Check identity map for hot-added devices\n (bsc#1129183).\n\n - iommu/vt-d: Fix NULL pointer reference in\n intel_svm_bind_mm() (bsc#1129184).\n\n - ip6: fix PMTU discovery when using /127 subnets\n (git-fixes).\n\n - ip6mr: Do not call __IP6_INC_STATS() from preemptible\n context (git-fixes).\n\n - ip6_tunnel: get the min mtu properly in ip6_tnl_xmit\n (bsc#1123456).\n\n - ip6_tunnel: use the right value for ipv4 min mtu check\n in ip6_tnl_xmit (bsc#1123456).\n\n - ipsec: check return value of skb_to_sgvec always\n (bsc#1051510).\n\n - ipv4/route: fail early when inet dev is missing\n (git-fixes).\n\n - ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n\n - ipv6: addrlabel: per netns list (bsc#1122982).\n\n - ipv6: Consider sk_bound_dev_if when binding a socket to\n an address (networking-stable-19_02_01).\n\n - ipv6: Consider sk_bound_dev_if when binding a socket to\n a v4 mapped address (networking-stable-19_01_22).\n\n - ipv6: fix kernel-infoleak in ipv6_local_error()\n (networking-stable-19_01_20).\n\n - ipv6: speedup ipv6 tunnels dismantle (bsc#1122982).\n Refresh\n patches.suse/ip6_vti-fix-a-null-pointer-deference-when-d\n estroy-vt.patch\n\n - ipv6: Take rcu_read_lock in __inet6_bind for mapped\n addresses (networking-stable-19_01_22).\n\n - ipvlan, l3mdev: fix broken l3s mode wrt local routes\n (networking-stable-19_02_01).\n\n - irqchip/gic-v3-its: Align PCI Multi-MSI allocation on\n their size (bsc#1051510).\n\n - irqchip/gic-v3-its: Avoid parsing _indirect_ twice for\n Device table (bsc#1051510).\n\n - irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA\n node (bsc#1051510).\n\n - irqchip/gic-v3-its: Fix ITT_entry_size accessor\n (bsc#1051510).\n\n - irqchip/mmp: Only touch the PJ4 IRQ & FIQ bits on\n enable/disable (bsc#1051510).\n\n - iscsi_ibft: Fix missing break in switch statement\n (bsc#1051510).\n\n - isdn: avm: Fix string plus integer warning from Clang\n (bsc#1051510).\n\n - isdn: hisax: hfc_pci: Fix a possible concurrency\n use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n\n - isdn: i4l: isdn_tty: Fix some concurrency double-free\n bugs (bsc#1051510).\n\n - iser: set sector for ambiguous mr status errors\n (bsc#1051510).\n\n - iwlwifi: mvm: avoid possible access out of array\n (bsc#1051510).\n\n - iwlwifi: mvm: fix A-MPDU reference assignment\n (bsc#1051510).\n\n - iwlwifi: mvm: fix firmware statistics usage\n (bsc#1129770).\n\n - iwlwifi: mvm: fix RSS config command (bsc#1051510).\n\n - iwlwifi: pcie: fix emergency path (bsc#1051510).\n\n - iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n\n - ixgbe: Be more careful when modifying MAC filters\n (bsc#1051510).\n\n - ixgbe: check return value of napi_complete_done()\n (bsc#1051510).\n\n - ixgbe: recognize 1000BaseLX SFP modules as 1Gbps\n (bsc#1051510).\n\n - kabi: cpufreq: keep min_sampling_rate in struct dbs_data\n (bsc#1127042).\n\n - kabi: handle addition of ip6addrlbl_table into struct\n netns_ipv6 (bsc#1122982).\n\n - kabi: handle addition of uevent_sock into struct net\n (bsc#1122982).\n\n - kabi: Preserve kABI for dma_max_mapping_size()\n (bsc#1120008).\n\n - kabi: protect vhost_log_write (kabi).\n\n - kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n\n - kabi workaround for ath9k ath_node.ackto type change\n (bsc#1051510).\n\n - kABI workaround for bt_accept_enqueue() change\n (bsc#1051510).\n\n - kallsyms: Handle too long symbols in kallsyms.c\n (bsc#1126805).\n\n - kasan: fix shadow_size calculation error in\n kasan_module_alloc (bsc#1051510).\n\n - kbuild: fix false positive warning/error about missing\n libelf (bsc#1051510).\n\n - kconfig: fix file name and line number of\n warn_ignored_character() (bsc#1051510).\n\n - kconfig: fix line numbers for if-entries in menu tree\n (bsc#1051510).\n\n - kconfig: fix memory leak when EOF is encountered in\n quotation (bsc#1051510).\n\n - kconfig: fix the rule of mainmenu_stmt symbol\n (bsc#1051510).\n\n - keys: allow reaching the keys quotas exactly\n (bsc#1051510).\n\n - keys: Timestamp new keys (bsc#1051510).\n\n - kgdboc: fix KASAN global-out-of-bounds bug in\n param_set_kgdboc_var() (bsc#1051510).\n\n - kgdboc: Fix restrict error (bsc#1051510).\n\n - kgdboc: Fix warning with module build (bsc#1051510).\n\n - kobject: add kobject_uevent_net_broadcast()\n (bsc#1122982).\n\n - kobject: copy env blob in one go (bsc#1122982).\n\n - kobject: factorize skb setup in\n kobject_uevent_net_broadcast() (bsc#1122982).\n\n - kprobes: Return error if we fail to reuse kprobe instead\n of BUG_ON() (bsc#1051510).\n\n - kvm: mmu: Fix race in emulated page table writes\n (bsc#1129284).\n\n - kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if\n alloc_kvm_area() fails (bsc#1129291).\n\n - kvm: nVMX: NMI-window and interrupt-window exiting\n should wake L2 from HLT (bsc#1129292).\n\n - kvm: nVMX: Set VM instruction error for VMPTRLD of\n unbacked page (bsc#1129293).\n\n - kvm: vmx: Set IA32_TSC_AUX for legacy mode guests\n (bsc#1129294).\n\n - kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs\n (bsc#1127082).\n\n - kvm: x86: Fix single-step debugging (bsc#1129295).\n\n - kvm: x86: Use jmp to invoke kvm_spurious_fault() from\n .fixup (bsc#1129296).\n\n - l2tp: copy 4 more bytes to linear part if necessary\n (networking-stable-19_02_01).\n\n - l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n\n - l2tp: fix reading optional fields of L2TPv3\n (networking-stable-19_02_01).\n\n - leds: lp5523: fix a missing check of return value of\n lp55xx_read (bsc#1051510).\n\n - leds: lp55xx: fix null deref on firmware load failure\n (bsc#1051510).\n\n - libceph: avoid KEEPALIVE_PENDING races in\n ceph_con_keepalive() (bsc#1125800).\n\n - libceph: handle an empty authorize reply (bsc#1126789).\n\n - libceph: wait for latest osdmap in\n ceph_monc_blacklist_add() (bsc#1130427).\n\n - lib/div64.c: off by one in shift (bsc#1051510).\n\n - libertas_tf: do not set URB_ZERO_PACKET on IN USB\n transfer (bsc#1051510).\n\n - libnvdimm: Fix altmap reservation size calculation\n (bsc#1127682).\n\n - libnvdimm/label: Clear 'updating' flag after label-set\n update (bsc#1129543).\n\n - libnvdimm/pmem: Honor force_raw for legacy pmem regions\n (bsc#1129551).\n\n - lightnvm: fail fast on passthrough commands\n (bsc#1125780).\n\n - livepatch: Change unsigned long old_addr -> void\n *old_func in struct klp_func (bsc#1071995).\n\n - livepatch: Consolidate klp_free functions (bsc#1071995\n ).\n\n - livepatch: core: Return EOPNOTSUPP instead of ENOSYS\n (bsc#1071995).\n\n - livepatch: Define a macro for new API identification\n (bsc#1071995).\n\n - livepatch: Do not block the removal of patches loaded\n after a forced transition (bsc#1071995).\n\n - livepatch: Introduce klp_for_each_patch macro\n (bsc#1071995 ).\n\n - livepatch: Module coming and going callbacks can proceed\n with all listed patches (bsc#1071995).\n\n - livepatch: Proper error handling in the shadow variables\n selftest (bsc#1071995).\n\n - livepatch: Remove ordering (stacking) of the livepatches\n (bsc#1071995).\n\n - livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n\n - livepatch: return -ENOMEM on ptr_id() allocation failure\n (bsc#1071995).\n\n - livepatch: Send a fake signal periodically (bsc#1071995\n ).\n\n - livepatch: Shuffle\n klp_enable_patch()/klp_disable_patch() code\n (bsc#1071995).\n\n - livepatch: Simplify API by removing registration step\n (bsc#1071995).\n\n - llc: do not use sk_eat_skb() (bsc#1051510).\n\n - locking/rwsem: Fix (possible) missed wakeup\n (bsc#1050549).\n\n - loop: drop caches if offset or block_size are changed\n (bsc#1124975).\n\n - loop: Reintroduce lo_ctl_mutex removed by commit\n 310ca162d (bsc#1124974).\n\n - mac80211: Add attribute aligned(2) to struct 'action'\n (bsc#1051510).\n\n - mac80211: do not initiate TDLS connection if station is\n not associated to AP (bsc#1051510).\n\n - mac80211: ensure that mgmt tx skbs have tailroom for\n encryption (bsc#1051510).\n\n - mac80211: fix miscounting of ttl-dropped frames\n (bsc#1051510).\n\n - mac80211: fix radiotap vendor presence bitmap handling\n (bsc#1051510).\n\n - mac80211: Fix Tx aggregation session tear down with\n ITXQs (bsc#1051510).\n\n - mac80211: Free mpath object when rhashtable insertion\n fails (bsc#1051510).\n\n - mac80211_hwsim: propagate genlmsg_reply return code\n (bsc#1051510).\n\n - mac80211: Restore vif beacon interval if start ap fails\n (bsc#1051510).\n\n - macvlan: Only deliver one copy of the frame to the\n macvlan interface (bsc#1051510).\n\n - mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush\n timeout issue (bsc#1051510).\n\n - mdio_bus: Fix use-after-free on device_register fails\n (bsc#1051510).\n\n - media: adv*/tc358743/ths8200: fill in min\n width/height/pixelclock (bsc#1051510).\n\n - media: DaVinci-VPBE: fix error handling in\n vpbe_initialize() (bsc#1051510).\n\n - media: dt-bindings: media: i2c: Fix i2c address for\n OV5645 camera sensor (bsc#1051510).\n\n - media: mtk-vcodec: Release device nodes in\n mtk_vcodec_init_enc_pm() (bsc#1051510).\n\n - media: rc: mce_kbd decoder: fix stuck keys\n (bsc#1100132).\n\n - media: s5k4ecgx: delete a bogus error message\n (bsc#1051510).\n\n - media: s5p-jpeg: Check for fmt_ver_flag when doing fmt\n enumeration (bsc#1051510).\n\n - media: s5p-jpeg: Correct step and max values for\n V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n\n - media: s5p-mfc: fix incorrect bus assignment in virtual\n child device (bsc#1051510).\n\n - media: uvcvideo: Avoid NULL pointer dereference at the\n end of streaming (bsc#1051510).\n\n - media: uvcvideo: Fix 'type' check leading to overflow\n (bsc#1051510).\n\n - media: v4l2-ctrls.c/uvc: zero v4l2_event (bsc#1051510).\n\n - media: v4l2: i2c: ov7670: Fix PLL bypass register values\n (bsc#1051510).\n\n - media: vb2: do not call __vb2_queue_cancel if\n vb2_start_streaming failed (bsc#1119086).\n\n - memremap: fix softlockup reports at teardown\n (bnc#1130154).\n\n - memstick: Prevent memstick host from getting runtime\n suspended during card detection (bsc#1051510).\n\n - mfd: db8500-prcmu: Fix some section annotations\n (bsc#1051510).\n\n - mfd: mc13xxx: Fix a missing check of a register-read\n failure (bsc#1051510).\n\n - mfd: mt6397: Do not call irq_domain_remove if PMIC\n unsupported (bsc#1051510).\n\n - mfd: qcom_rpm: write fw_version to CTRL_REG\n (bsc#1051510).\n\n - mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while\n registering mfd cells (bsc#1051510).\n\n - mfd: tps65218: Use devm_regmap_add_irq_chip and clean up\n error path in probe() (bsc#1051510).\n\n - mfd: twl-core: Fix section annotations on\n (,un)protect_pm_master (bsc#1051510).\n\n - mfd: wm5110: Add missing ASRC rate register\n (bsc#1051510).\n\n - misc: hpilo: Do not claim unsupported hardware\n (bsc#1129330).\n\n - misc: hpilo: Exclude unsupported device via blacklist\n (bsc#1129330).\n\n - mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n\n - mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of\n local variable (git-fixes).\n\n - mlxsw: spectrum: Disable lag port TX before removing it\n (networking-stable-19_01_22).\n\n - mmap: introduce sane default mmap limits (git fixes\n (mm/mmap)).\n\n - mmap: relax file size limit for regular files (git fixes\n (mm/mmap)).\n\n - mmc: bcm2835: Recover from MMC_SEND_EXT_CSD\n (bsc#1051510).\n\n - mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS\n (bsc#1051510).\n\n - mmc: omap: fix the maximum timeout setting\n (bsc#1051510).\n\n - mmc: pxamci: fix enum type confusion (bsc#1051510).\n\n - mmc: sdhci-brcmstb: handle mmc_of_parse() errors during\n probe (bsc#1051510).\n\n - mmc: sdhci-esdhc-imx: fix HS400 timing issue\n (bsc#1051510).\n\n - mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n\n - mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n\n - mmc: spi: Fix card detection during probe (bsc#1051510).\n\n - mm: do not drop unused pages when userfaultd is running\n (git fixes (mm/userfaultfd)).\n\n - mm: Fix modifying of page protection by insert_pfn()\n (bsc#1126740).\n\n - mm: Fix warning in insert_pfn() (bsc#1126740).\n\n - mm/hmm: hmm_pfns_bad() was accessing wrong struct (git\n fixes (mm/hmm)).\n\n - mm: hwpoison: use do_send_sig_info() instead of\n force_sig() (git fixes (mm/hwpoison)).\n\n - mm/ksm.c: ignore STABLE_FLAG of rmap_item->address in\n rmap_walk_ksm() (git fixes (mm/ksm)).\n\n - mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git\n fixes (mm/madvise)).\n\n - mm,memory_hotplug: fix scan_movable_pages() for gigantic\n hugepages (bsc#1127731).\n\n - mm: migrate: do not rely on __PageMovable() of newpage\n after unlocking it (git fixes (mm/migrate)).\n\n - mm, oom: fix use-after-free in oom_kill_process (git\n fixes (mm/oom)).\n\n - mm: use swp_offset as key in shmem_replace_page() (git\n fixes (mm/shmem)).\n\n - mm,vmscan: Make unregister_shrinker() no-op if\n register_shrinker() failed (git fixes (mm/vmscan)).\n\n - Move upstreamed ALSA and BT patches into sorted section\n\n - Move upstreamed libnvdimm patch into sorted section\n\n - mtd: cfi_cmdset_0002: Avoid walking all chips when\n unlocking (bsc#1051510).\n\n - mtd: cfi_cmdset_0002: Change write buffer to check\n correct value (bsc#1051510).\n\n - mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips\n (bsc#1051510).\n\n - mtd: cfi_cmdset_0002: Fix unlocking requests crossing a\n chip boudary (bsc#1051510).\n\n - mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock()\n (bsc#1051510).\n\n - mtdchar: fix overflows in adjustment of `count`\n (bsc#1051510).\n\n - mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n\n - mtd: docg3: do not set conflicting BCH_CONST_PARAMS\n option (bsc#1051510).\n\n - mtd/maps: fix solutionengine.c printk format warnings\n (bsc#1051510).\n\n - mtd: mtd_oobtest: Handle bitflips during reads\n (bsc#1051510).\n\n - mtd: nand: atmel: fix buffer overflow in\n atmel_pmecc_user (bsc#1051510).\n\n - mtd: nand: atmel: Fix get_sectorsize() function\n (bsc#1051510).\n\n - mtd: nand: atmel: fix of_irq_get() error check\n (bsc#1051510).\n\n - mtd: nand: brcmnand: Disable prefetch by default\n (bsc#1051510).\n\n - mtd: nand: brcmnand: Zero bitflip is not an error\n (bsc#1051510).\n\n - mtd: nand: denali_pci: add missing\n MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n\n - mtd: nand: fix interpretation of NAND_CMD_NONE in\n nand_command[_lp]() (bsc#1051510).\n\n - mtd: nand: Fix nand_do_read_oob() return value\n (bsc#1051510).\n\n - mtd: nand: Fix writing mtdoops to nand flash\n (bsc#1051510).\n\n - mtd: nand: fsl_ifc: Fix nand waitfunc return value\n (bsc#1051510).\n\n - mtd: nand: gpmi: Fix failure when a erased page has a\n bitflip at BBM (bsc#1051510).\n\n - mtd: nand: ifc: update bufnum mask for ver >= 2.0.0\n (bsc#1051510).\n\n - mtd: nand: mtk: fix infinite ECC decode IRQ issue\n (bsc#1051510).\n\n - mtd: nand: omap2: Fix subpage write (bsc#1051510).\n\n - mtd: nand: pxa3xx: Fix READOOB implementation\n (bsc#1051510).\n\n - mtd: nand: qcom: Add a NULL check for devm_kasprintf()\n (bsc#1051510).\n\n - mtd: nandsim: remove debugfs entries in error path\n (bsc#1051510).\n\n - mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n\n - mtd: nand: sunxi: fix potential divide-by-zero error\n (bsc#1051510).\n\n - mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n\n - mtd: spi-nor: cadence-quadspi: Fix page fault kernel\n panic (bsc#1051510).\n\n - mtd: spi-nor: Fix Cadence QSPI page fault kernel panic\n (bsc#1051510).\n\n - mtd: spi-nor: fsl-quadspi: fix read error for flash size\n larger than 16MB (bsc#1051510).\n\n - mtd: spi-nor: stm32-quadspi: Fix uninitialized error\n return code (bsc#1051510).\n\n - mv88e6060: disable hardware level MAC learning\n (bsc#1051510).\n\n - nbd: Use set_blocksize() to set device blocksize\n (bsc#1124984).\n\n - net: add uevent socket member (bsc#1122982).\n\n - net: aquantia: driver should correctly declare\n vlan_features bits (bsc#1051510).\n\n - net: aquantia: fixed instack structure overflow\n (git-fixes).\n\n - net: aquantia: Fix hardware DMA stream overload on large\n MRRS (bsc#1051510).\n\n - net: bcmgenet: abort suspend on error (bsc#1051510).\n\n - net: bcmgenet: code movement (bsc#1051510).\n\n - net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n\n - net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n\n - net: bcmgenet: return correct value 'ret' from\n bcmgenet_power_down (bsc#1051510).\n\n - net: bridge: fix a bug on using a neighbour cache entry\n without checking its state (networking-stable-19_01_20).\n\n - net: bridge: Fix ethernet header pointer before check\n skb forwardable (networking-stable-19_01_26).\n\n - net: do not call update_pmtu unconditionally\n (bsc#1123456).\n\n - net: Do not default Cavium PTP driver to 'y'\n (bsc#1110096).\n\n - net: dp83640: expire old TX-skb\n (networking-stable-19_02_10).\n\n - net: dsa: mv88e6xxx: handle unknown duplex modes\n gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n\n - net: dsa: mv88x6xxx: mv88e6390 errata\n (networking-stable-19_01_22).\n\n - net: dsa: slave: Do not propagate flag changes on down\n slave interfaces (networking-stable-19_02_10).\n\n - net: ena: fix race between link up and device\n initalization (bsc#1083548).\n\n - net: ena: update driver version from 2.0.2 to 2.0.3\n (bsc#1129276 bsc#1125342).\n\n - netfilter: check for seqadj ext existence before adding\n it in nf_nat_setup_info (git-fixes).\n\n - netfilter: nf_tables: check the result of dereferencing\n base_chain->stats (git-fixes).\n\n - net: Fix usage of pskb_trim_rcsum\n (networking-stable-19_01_26).\n\n - net: ipv4: Fix memory leak in network namespace\n dismantle (networking-stable-19_01_26).\n\n - net/mlx4_core: Add masking for a few queries on HCA caps\n (networking-stable-19_02_01).\n\n - net/mlx4_core: Fix locking in SRIOV mode when switching\n between events and polling (git-fixes).\n\n - net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n\n - net/mlx4_core: Fix reset flow when in command polling\n mode (git-fixes).\n\n - net/mlx5e: Allow MAC invalidation while spoofchk is ON\n (networking-stable-19_02_01).\n\n - net/mlx5e: IPoIB, Fix RX checksum statistics update\n (git-fixes).\n\n - net/mlx5e: RX, Fix wrong early return in receive queue\n poll (bsc#1046305).\n\n - net/mlx5: fix uaccess beyond 'count' in debugfs\n read/write handlers (git-fixes).\n\n - net/mlx5: Release resource on error flow (git-fixes).\n\n - net/mlx5: Return success for PAGE_FAULT_RESUME in\n internal error state (git-fixes).\n\n - net/mlx5: Use multi threaded workqueue for page fault\n handling (git-fixes).\n\n - net/ncsi: Fix AEN HNCDSC packet length (git-fixes).\n\n - net/ncsi: Stop monitor if channel times out or is\n inactive (git-fixes).\n\n - net: netem: fix skb length BUG_ON in __skb_to_sgvec\n (git-fixes).\n\n - netns: restrict uevents (bsc#1122982).\n\n - net: phy: marvell: Errata for mv88e6390 internal PHYs\n (networking-stable-19_01_26).\n\n - net: phy: mdio_bus: add missing device_del() in\n mdiobus_register() error handling\n (networking-stable-19_01_26).\n\n - net: phy: Micrel KSZ8061: link failure after cable\n connect (git-fixes).\n\n - netrom: switch to sock timer API (bsc#1051510).\n\n - net/rose: fix NULL ax25_cb kernel panic\n (networking-stable-19_02_01).\n\n - net/sched: act_tunnel_key: fix memory leak in case of\n action replace (networking-stable-19_01_26).\n\n - net_sched: refetch skb protocol for each filter\n (networking-stable-19_01_26).\n\n - net: set default network namespace in\n init_dummy_netdev() (networking-stable-19_02_01).\n\n - net: stmmac: Fix a race in EEE enable callback\n (git-fixes).\n\n - net: stmmac: fix broken dma_interrupt handling for\n multi-queues (git-fixes).\n\n - net: stmmac: handle endianness in dwmac4_get_timestamp\n (git-fixes).\n\n - net: stmmac: Use mutex instead of spinlock (git-fixes).\n\n - net-sysfs: Fix mem leak in netdev_register_kobject\n (git-fixes).\n\n - net: systemport: Fix WoL with password after deep sleep\n (networking-stable-19_02_10).\n\n - net: thunderx: fix NULL pointer dereference in\n nic_remove (git-fixes).\n\n - nfit: acpi_nfit_ctl(): Check out_obj->type in the right\n place (bsc#1129547).\n\n - nfit/ars: Attempt a short-ARS whenever the ARS state is\n idle at boot (bsc#1051510).\n\n - nfit/ars: Attempt short-ARS even in the no_init_ars case\n (bsc#1051510).\n\n - nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n\n - nfsd: fix memory corruption caused by readdir\n (bsc#1127445).\n\n - niu: fix missing checks of niu_pci_eeprom_read\n (bsc#1051510).\n\n - ntb_transport: Fix bug with max_mw_size parameter\n (bsc#1051510).\n\n - nvme-fc: reject reconnect if io queue count is reduced\n to zero (bsc#1128351).\n\n - nvme: flush namespace scanning work just before removing\n namespaces (bsc#1108101).\n\n - nvme: kABI fix for scan_lock (bsc#1123882).\n\n - nvme: lock NS list changes while handling command\n effects (bsc#1123882).\n\n - nvme-loop: fix kernel oops in case of unhandled command\n (bsc#1126807).\n\n - nvme-multipath: drop optimization for static ANA group\n IDs (bsc#1113939).\n\n - nvme-pci: fix out of bounds access in nvme_cqe_pending\n (bsc#1127595).\n\n - nvme: schedule requeue whenever a LIVE state is entered\n (bsc#1123105).\n\n - of, numa: Validate some distance map rules\n (bsc#1051510).\n\n - of: unittest: Disable interrupt node tests for old world\n MAC systems (bsc#1051510).\n\n - openvswitch: Avoid OOB read when parsing flow nlattrs\n (bsc#1051510).\n\n - openvswitch: fix the incorrect flow action alloc size\n (bsc#1051510).\n\n - openvswitch: Remove padding from packet before L3+\n conntrack processing (bsc#1051510).\n\n - parport_pc: fix find_superio io compare code, should use\n equal test (bsc#1051510).\n\n - Partially revert 'block: fail op_is_write() requests to\n (bsc#1125252).\n\n - pci: add USR vendor id and use it in r8169 and w6692\n driver (networking-stable-19_01_22).\n\n - pci: designware-ep: dw_pcie_ep_set_msi() should only set\n MMC bits (bsc#1051510).\n\n - pci: endpoint: functions: Use\n memcpy_fromio()/memcpy_toio() (bsc#1051510).\n\n - pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle\n 1792 vcpus (bsc#1122822).\n\n - pci/pme: Fix hotplug/sysfs remove deadlock in\n pcie_pme_remove() (bsc#1051510).\n\n - pci: qcom: Do not deassert reset GPIO during probe\n (bsc#1129281).\n\n - pcrypt: use format specifier in kobject_add\n (bsc#1051510).\n\n - perf/x86: Add sysfs entry to freeze counters on SMI\n (bsc#1121805).\n\n - perf/x86/intel: Delay memory deallocation until\n x86_pmu_dead_cpu() (bsc#1121805).\n\n - perf/x86/intel: Do not enable freeze-on-smi for PerfMon\n V1 (bsc#1121805).\n\n - perf/x86/intel: Fix memory corruption (bsc#1121805).\n\n - perf/x86/intel: Generalize dynamic constraint creation\n (bsc#1121805).\n\n - perf/x86/intel: Implement support for TSX Force Abort\n (bsc#1121805).\n\n - perf/x86/intel: Make cpuc allocations consistent\n (bsc#1121805).\n\n - phy: allwinner: sun4i-usb: poll vbus changes on A23/A33\n when driving VBUS (bsc#1051510).\n\n - phy: qcom-qmp: Fix failure path in phy_init functions\n (bsc#1051510).\n\n - phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n\n - phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role\n sysfs (bsc#1051510).\n\n - phy: rockchip-emmc: retry calpad busy trimming\n (bsc#1051510).\n\n - phy: sun4i-usb: add support for missing USB PHY index\n (bsc#1051510).\n\n - phy: tegra: remove redundant self assignment of 'map'\n (bsc#1051510).\n\n - phy: work around 'phys' references to usb-nop-xceiv\n devices (bsc#1051510).\n\n - pinctrl: max77620: Use define directive for\n max77620_pinconf_param values (bsc#1051510).\n\n - pinctrl: meson: fix pull enable register calculation\n (bsc#1051510).\n\n - pinctrl: meson: meson8b: fix the GPIO function for the\n GPIOAO pins (bsc#1051510).\n\n - pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins\n (bsc#1051510).\n\n - pinctrl: meson: meson8: fix the GPIO function for the\n GPIOAO pins (bsc#1051510).\n\n - pinctrl: msm: fix gpio-hog related boot issues\n (bsc#1051510).\n\n - pinctrl: sh-pfc: emev2: Add missing pinmux functions\n (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to\n lcd0_data24_1 group (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to\n gether_gmii group (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names\n (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group\n (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from\n qspi_data4_b group (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7791: Remove bogus marks from\n vin1_b_data18 group (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group\n (bsc#1051510).\n\n - pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field\n (bsc#1051510).\n\n - pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register\n configuration (bsc#1051510).\n\n - pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field\n (bsc#1051510).\n\n - pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3\n group (bsc#1051510).\n\n - pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups\n (bsc#1051510).\n\n - pinctrl: sh-pfc: sh7734: Add missing IPSR11 field\n (bsc#1051510).\n\n - pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10\n (bsc#1051510).\n\n - pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value\n (bsc#1051510).\n\n - pinctrl: sunxi: a64: Rename function csi0 to csi\n (bsc#1051510).\n\n - pinctrl: sunxi: a64: Rename function ts0 to ts\n (bsc#1051510).\n\n - pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11\n (bsc#1051510).\n\n - pinctrl: sx150x: handle failure case of devm_kstrdup\n (bsc#1051510).\n\n - pktcdvd: Fix possible Spectre-v1 for pkt_devs\n (bsc#1051510).\n\n - platform/x86: Fix unmet dependency warning for\n SAMSUNG_Q10 (bsc#1051510).\n\n - pm / wakeup: Rework wakeup source timer cancellation\n (bsc#1051510).\n\n - powercap: intel_rapl: add support for Jacobsville ().\n\n - powerpc/64s: Clear on-stack exception marker upon\n exception return (bsc#1071995).\n\n - powerpc/livepatch: relax reliable stack tracer checks\n for first-frame (bsc#1071995).\n\n - powerpc/livepatch: small cleanups in\n save_stack_trace_tsk_reliable() (bsc#1071995).\n\n - powerpc/pseries: export timebase register sample in\n lparcfg (bsc#1127750).\n\n - powerpc/pseries/mce: Fix misleading print for TLB\n mutlihit (bsc#1094244, git-fixes).\n\n - powerpc/pseries: Perform full re-add of CPU for topology\n update post-migration (bsc#1125728).\n\n - power: supply: charger-manager: Fix incorrect return\n value (bsc#1051510).\n\n - pptp: dst_release sk_dst_cache in pptp_sock_destruct\n (git-fixes).\n\n - proc/sysctl: do not return ENOMEM on lookup when a table\n is unregistering (git-fixes).\n\n - pseries/energy: Use OF accessor function to read\n ibm,drc-indexes (bsc#1129080).\n\n - ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl\n (bsc#1051510).\n\n - ptp: Fix pass zero to ERR_PTR() in ptp_clock_register\n (bsc#1051510).\n\n - pwm-backlight: Enable/disable the PWM before/after LCD\n enable toggle (bsc#1051510).\n\n - qmi_wwan: add MTU default to qmap network interface\n (networking-stable-19_01_22).\n\n - qmi_wwan: apply SET_DTR quirk to Sierra WP7607\n (bsc#1051510).\n\n - qmi_wwan: Fix qmap header retrieval in qmimux_rx_fixup\n (bsc#1051510).\n\n - r8169: Add support for new Realtek Ethernet\n (networking-stable-19_01_22).\n\n - r8169: use PCI_VDEVICE macro\n (networking-stable-19_01_22).\n\n - rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING\n is set (bsc#1125797).\n\n - rcu: Fix up pending cbs check in rcu_prepare_for_idle\n (git fixes (kernel/rcu)).\n\n - rcu: Make need_resched() respond to urgent RCU-QS needs\n (git fixes (kernel/rcu)).\n\n - rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n\n - Refresh\n patches.suse/scsi-do-not-print-reservation-conflict-for-\n TEST-UNIT.patch (bsc#1119843)\n\n - regulator: act8865: Fix act8600_sudcdc_voltage_ranges\n setting (bsc#1051510).\n\n - regulator: max77620: Initialize values for DT properties\n (bsc#1051510).\n\n - regulator: pv88060: Fix array out-of-bounds access\n (bsc#1051510).\n\n - regulator: pv88080: Fix array out-of-bounds access\n (bsc#1051510).\n\n - regulator: pv88090: Fix array out-of-bounds access\n (bsc#1051510).\n\n - regulator: s2mpa01: Fix step values for some LDOs\n (bsc#1051510).\n\n - regulator: s2mps11: Fix steps for buck7, buck8 and LDO35\n (bsc#1051510).\n\n - regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim\n from mA to uA (bsc#1051510).\n\n - Remove blacklist of virtio patch so we can install it\n (bsc#1114585)\n\n - Remove patches rejected upstream ().\n\n - Revert drm/i915 patches that caused regressions\n (bsc#1131062)\n\n - Revert 'drm/rockchip: Allow driver to be shutdown on\n reboot/kexec' (bsc#1051510).\n\n - Revert 'Input: elan_i2c - add ACPI ID for touchpad in\n ASUS Aspire F5-573G' (bsc#1051510).\n\n - Revert 'ipv4: keep skb->dst around in presence of IP\n options' (git-fixes).\n\n - Revert 'openvswitch: Fix template leak in error cases.'\n (bsc#1051510).\n\n - Revert 'scsi: qla2xxx: Fix NVMe Target discovery'\n (bsc#1125252).\n\n - Revert 'sd: disable logical block provisioning if\n 'lbpme' is not set' This reverts commit\n e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not\n accepted upstream.\n\n - Revert the previous merge of drm fixes The branch was\n merged mistakenly and breaks the build. Revert it.\n\n - Revert 'xhci: Reset Renesas uPD72020x USB controller for\n 32-bit DMA issue' (bsc#1120854).\n\n - rhashtable: Still do rehash when we get EEXIST\n (bsc#1051510).\n\n - rocker: fix rocker_tlv_put_* functions for KASAN\n (bsc#1051510).\n\n - rpm/kernel-source.changes.old: Really drop old\n changelogs (bsc#1098995)\n\n - rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620\n (bsc#1120902).\n\n - rtc: 88pm80x: fix unintended sign extension\n (bsc#1051510).\n\n - rtc: 88pm860x: fix unintended sign extension\n (bsc#1051510).\n\n - rtc: cmos: ignore bogus century byte (bsc#1051510).\n\n - rtc: ds1672: fix unintended sign extension\n (bsc#1051510).\n\n - rtc: Fix overflow when converting time64_t to rtc_time\n (bsc#1051510).\n\n - rtc: pm8xxx: fix unintended sign extension\n (bsc#1051510).\n\n - rtnetlink: bring NETDEV_CHANGE_TX_QUEUE_LEN event\n process back in rtnetlink_event (git-fixes).\n\n - rtnetlink: bring NETDEV_CHANGEUPPER event process back\n in rtnetlink_event (git-fixes).\n\n - rtnetlink: bring NETDEV_POST_TYPE_CHANGE event process\n back in rtnetlink_event (git-fixes).\n\n - rtnetlink: check DO_SETLINK_NOTIFY correctly in\n do_setlink (git-fixes).\n\n - rxrpc: bad unlock balance in rxrpc_recvmsg\n (networking-stable-19_02_10).\n\n - s390/cio: Fix how vfio-ccw checks pinned pages\n (git-fixes).\n\n - s390/cpum_cf: Reject request for sampling in event\n initialization (git-fixes).\n\n - s390/early: improve machine detection (git-fixes).\n\n - s390/mm: always force a load of the primary ASCE on\n context switch (git-fixes).\n\n - s390/mm: fix addressing exception after suspend/resume\n (bsc#1125252).\n\n - s390/qeth: cancel close_dev work before removing a card\n (LTC#175898, bsc#1127561).\n\n - s390/qeth: conclude all event processing before\n offlining a card (LTC#175901, bsc#1127567).\n\n - s390/qeth: fix use-after-free in error path\n (bsc#1127534).\n\n - s390/qeth: invoke softirqs after napi_schedule()\n (git-fixes).\n\n - s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU\n (git-fixes).\n\n - s390/smp: fix CPU hotplug deadlock with CPU rescan\n (git-fixes).\n\n - s390/sthyi: Fix machine name validity indication\n (git-fixes).\n\n - sata_rcar: fix deferred probing (bsc#1051510).\n\n - sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n\n - sched: Do not re-read h_load_next during hierarchical\n load calculation (bnc#1120909).\n\n - sched/wake_q: Document wake_q_add() (bsc#1050549).\n\n - sched/wake_q: Fix wakeup ordering for wake_q\n (bsc#1050549).\n\n - sched/wake_q: Reduce reference counting for special\n users (bsc#1050549).\n\n - sch_multiq: fix double free on init failure\n (bsc#1051510).\n\n - scripts/git_sort/git_sort.py: add vfs 'fixes' branch\n\n - scsi: core: reset host byte in DID_NEXUS_FAILURE case\n (bsc#1122764).\n\n - scsi: csiostor: remove flush_scheduled_work()\n (bsc#1127363).\n\n - scsi: fix queue cleanup race before queue initialization\n is done (bsc#1125252).\n\n - scsi: ibmvscsi: Fix empty event pool access during host\n removal (bsc#1119019).\n\n - scsi: ibmvscsi: Protect ibmvscsi_head from concurrent\n modificaiton (bsc#1119019).\n\n - scsi: libiscsi: fix possible NULL pointer dereference in\n case of TMF (bsc#1127378).\n\n - scsi: libiscsi: Fix race between iscsi_xmit_task and\n iscsi_complete_task (bsc#1122192).\n\n - scsi: lpfc: Add log messages to aid in debugging fc4type\n discovery issues (bsc#1121317).\n\n - scsi: lpfc: Correct MDS loopback diagnostics support\n (bsc#1121317).\n\n - scsi: lpfc: do not set queue->page_count to 0 if\n pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n\n - scsi: lpfc: Fix discovery failure when PLOGI is defered\n (bsc#1121317).\n\n - scsi: lpfc: Fix link state reporting for trunking when\n adapter is offline (bsc#1121317).\n\n - scsi: lpfc: fix remoteport access (bsc#1125252).\n\n - scsi: lpfc: remove an unnecessary NULL check\n (bsc#1121317).\n\n - scsi: lpfc: update fault value on successful trunk\n events (bsc#1121317).\n\n - scsi: lpfc: Update lpfc version to 12.0.0.10\n (bsc#1121317).\n\n - scsi: mpt3sas: Add ioc_<level> logging macros\n (bsc#1117108).\n\n - scsi: mpt3sas: Annotate switch/case fall-through\n (bsc#1117108).\n\n - scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and\n reply_q_name to %s: (bsc#1117108).\n\n - scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT\n without logging levels (bsc#1117108).\n\n - scsi: mpt3sas: Convert mlsleading uses of pr_<level>\n with MPT3SAS_FMT (bsc#1117108).\n\n - scsi: mpt3sas: Convert uses of pr_<level> with\n MPT3SAS_FMT to ioc_<level> (bsc#1117108).\n\n - scsi: mpt3sas: Fix a race condition in\n mpt3sas_base_hard_reset_handler() (bsc#1117108).\n\n - scsi: mpt3sas: Fix indentation (bsc#1117108).\n\n - scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n\n - scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd\n (bsc#1117108).\n\n - scsi: mpt3sas: Remove KERN_WARNING from panic uses\n (bsc#1117108).\n\n - scsi: mpt3sas: Remove set-but-not-used variables\n (bsc#1117108).\n\n - scsi: mpt3sas: Remove unnecessary parentheses and\n simplify null checks (bsc#1117108).\n\n - scsi: mpt3sas: Remove unused macro MPT3SAS_FMT\n (bsc#1117108).\n\n - scsi: mpt3sas: Split _base_reset_handler(),\n mpt3sas_scsih_reset_handler() and\n mpt3sas_ctl_reset_handler() (bsc#1117108).\n\n - scsi: mpt3sas: Swap I/O memory read value back to cpu\n endianness (bsc#1117108).\n\n - scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n\n - scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n\n - scsi: mptsas: Fixup device hotplug for VMware ESXi\n (bsc#1129046).\n\n - scsi: qla2xxx: Enable FC-NVME on NPIV ports\n (bsc#1094555).\n\n - scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC\n (bsc#1094555).\n\n - scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port\n (bsc#1094555).\n\n - scsi: qla2xxx: Fix NPIV handling for FC-NVMe\n (bsc#1094555).\n\n - scsi: qla2xxx: Initialize port speed to avoid setting\n lower speed (bsc#1094555).\n\n - scsi: qla2xxx: Modify fall-through annotations\n (bsc#1094555).\n\n - scsi: qla2xxx: Remove unnecessary self assignment\n (bsc#1094555).\n\n - scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n\n - scsi: qla2xxx: Update driver version to 10.00.00.12-k\n (bsc#1094555).\n\n - scsi: storvsc: Fix a race in sub-channel creation that\n can cause panic ().\n\n - scsi: sym53c8xx: fix NULL pointer dereference panic in\n sym_int_sir() (bsc#1125315).\n\n - scsi: virtio_scsi: fix pi_bytes(out,in) on 4 KiB block\n size devices (bsc#1114585).\n\n - sctp: add a ceiling to optlen in some sockopts\n (bnc#1129163).\n\n - sctp: improve the events for sctp stream adding\n (networking-stable-19_02_01).\n\n - sctp: improve the events for sctp stream reset\n (networking-stable-19_02_01).\n\n - sd: disable logical block provisioning if 'lbpme' is not\n set (bsc#1086095 bsc#1078355).\n\n - selftests/livepatch: add DYNAMIC_DEBUG config dependency\n (bsc#1071995).\n\n - selftests/livepatch: introduce tests (bsc#1071995).\n\n - selinux: always allow mounting submounts (bsc#1051510).\n\n - seq_buf: Make seq_buf_puts() null-terminate the buffer\n (bsc#1051510).\n\n - serial: 8250_of: assume reg-shift of 2 for mrvl,mmp-uart\n (bsc#1051510).\n\n - serial: 8250_pci: Fix number of ports for ACCES serial\n cards (bsc#1051510).\n\n - serial: 8250_pci: Have ACCES cards that use the four\n port Pericom PI7C9X7954 chip use the pci_pericom_setup()\n (bsc#1051510).\n\n - serial: fix race between flush_to_ldisc and tty_open\n (bsc#1051510).\n\n - serial: fsl_lpuart: clear parity enable bit when disable\n parity (bsc#1051510).\n\n - serial: fsl_lpuart: fix maximum acceptable baud rate\n with over-sampling (bsc#1051510).\n\n - serial: imx: Update cached mctrl value when changing RTS\n (bsc#1051510).\n\n - serial: uartps: Fix stuck ISR if RX disabled with\n non-empty FIFO (bsc#1051510).\n\n - skge: potential memory corruption in skge_get_regs()\n (bsc#1051510).\n\n - sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79\n (bsc#1051510).\n\n - sky2: Increase D3 delay again (bsc#1051510).\n\n - smb311: Improve checking of negotiate security contexts\n (bsc#1051510).\n\n - smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n\n - smb3: Fix 3.11 encryption to Windows and handle\n encrypted smb3 tcon (bsc#1051510).\n\n - smb3: Fix SMB3.1.1 guest mounts to Samba (bsc#1051510).\n\n - smb3: remove noisy warning message on mount\n (bsc#1129664).\n\n - soc: bcm: brcmstb: Do not leak device tree node\n reference (bsc#1051510).\n\n - soc: fsl: qbman: avoid race in clearing QMan interrupt\n (bsc#1051510).\n\n - soc/tegra: Do not leak device tree node reference\n (bsc#1051510).\n\n - spi: pxa2xx: Setup maximum supported DMA transfer length\n (bsc#1051510).\n\n - spi: ti-qspi: Fix mmap read when more than one CS in use\n (bsc#1051510).\n\n - spi/topcliff_pch: Fix potential NULL dereference on\n allocation error (bsc#1051510).\n\n - splice: do not merge into linked buffers (git-fixes).\n\n - staging: comedi: ni_660x: fix missing break in switch\n statement (bsc#1051510).\n\n - staging:iio:ad2s90: Make probe handle spi_setup failure\n (bsc#1051510).\n\n - staging: iio: ad7780: update voltage on read\n (bsc#1051510).\n\n - staging: iio: adc: ad7280a: handle error from\n __ad7280_read32() (bsc#1051510).\n\n - staging: iio: adt7316: allow adt751x to use internal\n vref for all dacs (bsc#1051510).\n\n - staging: iio: adt7316: fix register and bit definitions\n (bsc#1051510).\n\n - staging: iio: adt7316: fix the dac read calculation\n (bsc#1051510).\n\n - staging: iio: adt7316: fix the dac write calculation\n (bsc#1051510).\n\n - staging: rtl8723bs: Fix build error with Clang when\n inlining is disabled (bsc#1051510).\n\n - staging: speakup: Replace strncpy with memcpy\n (bsc#1051510).\n\n - staging: wilc1000: fix to set correct value for\n 'vif_num' (bsc#1051510).\n\n - supported.conf\n\n - svm: Add mutex_lock to protect apic_access_page_done on\n AMD systems (bsc#1129285).\n\n - svm: Fix improper check when deactivate AVIC\n (bsc#1130335).\n\n - swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n\n - swiotlb: Introduce swiotlb_max_mapping_size()\n (bsc#1120008).\n\n - switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags\n overwrite (bsc#1051510).\n\n - switchtec: Remove immediate status check after\n submitting MRPC command (bsc#1051510).\n\n - sysfs: Disable lockdep for driver bind/unbind files\n (bsc#1051510).\n\n - tcp: batch tcp_net_metrics_exit (bsc#1122982).\n\n - tcp: change txhash on SYN-data timeout\n (networking-stable-19_01_20).\n\n - tcp: handle inet_csk_reqsk_queue_add() failures\n (git-fixes).\n\n - team: avoid complex list operations in\n team_nl_cmd_options_set() (bsc#1051510).\n\n - team: Free BPF filter when unregistering netdev\n (bsc#1051510).\n\n - thermal: bcm2835: Fix crash in bcm2835_thermal_debugfs\n (bsc#1051510).\n\n - thermal: do not clear passive state during system sleep\n (bsc#1051510).\n\n - thermal/drivers/hisi: Encapsulate register writes into\n helpers (bsc#1051510).\n\n - thermal/drivers/hisi: Fix configuration register setting\n (bsc#1051510).\n\n - thermal: generic-adc: Fix adc to temp interpolation\n (bsc#1051510).\n\n - thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON\n is not set (bsc#1051510).\n\n - thermal/intel_powerclamp: fix truncated kthread name ().\n\n - thermal: mediatek: fix register index error\n (bsc#1051510).\n\n - timekeeping: Use proper seqcount initializer\n (bsc#1051510).\n\n - tipc: eliminate KMSAN uninit-value in strcmp complaint\n (bsc#1051510).\n\n - tipc: error path leak fixes in tipc_enable_bearer()\n (bsc#1051510).\n\n - tipc: fix a race condition of releasing subscriber\n object (bsc#1051510).\n\n - tipc: fix bug in function tipc_nl_node_dump_monitor\n (bsc#1051510).\n\n - tipc: fix infinite loop when dumping link monitor\n summary (bsc#1051510).\n\n - tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n\n - tipc: fix uninit-value in tipc_nl_compat_bearer_enable\n (bsc#1051510).\n\n - tipc: fix uninit-value in tipc_nl_compat_doit\n (bsc#1051510).\n\n - tipc: fix uninit-value in\n tipc_nl_compat_link_reset_stats (bsc#1051510).\n\n - tipc: fix uninit-value in tipc_nl_compat_link_set\n (bsc#1051510).\n\n - tipc: fix uninit-value in tipc_nl_compat_name_table_dump\n (bsc#1051510).\n\n - tpm: fix kdoc for tpm2_flush_context_cmd()\n (bsc#1051510).\n\n - tpm: Fix some name collisions with drivers/char/tpm.h\n (bsc#1051510).\n\n - tpm: return a TPM_RC_COMMAND_CODE response if command is\n not implemented (bsc#1051510).\n\n - tpm: Return the actual size when receiving an\n unsupported command (bsc#1051510).\n\n - tpm: suppress transmit cmd error logs when TPM 1.2 is\n disabled/deactivated (bsc#1051510).\n\n - tpm_tis_spi: Pass the SPI IRQ down to the driver\n (bsc#1051510).\n\n - tpm/tpm_crb: Avoid unaligned reads in crb_recv()\n (bsc#1051510).\n\n - tpm/tpm_i2c_infineon: switch to i2c_lock_bus(...,\n I2C_LOCK_SEGMENT) (bsc#1051510).\n\n - tpm: tpm_i2c_nuvoton: use correct command duration for\n TPM 2.x (bsc#1051510).\n\n - tpm: tpm_try_transmit() refactor error flow\n (bsc#1051510).\n\n - tracing: Do not free iter->trace in fail path of\n tracing_open_pipe() (bsc#1129581).\n\n - tracing/uprobes: Fix output for multiple string\n arguments (bsc#1126495).\n\n - tracing: Use strncpy instead of memcpy for string keys\n in hist triggers (bsc#1129625).\n\n - Tree connect for SMB3.1.1 must be signed for\n non-encrypted shares (bsc#1051510).\n\n - tty: ipwireless: Fix potential NULL pointer dereference\n (bsc#1051510).\n\n - tty: serial: samsung: Properly set flags in autoCTS mode\n (bsc#1051510).\n\n - ucc_geth: Reset BQL queue when stopping device\n (networking-stable-19_02_01).\n\n - ucma: fix a use-after-free in ucma_resolve_ip()\n (bsc#1051510).\n\n - uevent: add alloc_uevent_skb() helper (bsc#1122982).\n\n - uio: Reduce return paths from uio_write() (bsc#1051510).\n\n - Update config files. Remove conditional support for SMB2\n and SMB3 :\n\n - Update\n patches.arch/s390-sles15-zcrypt-fix-specification-except\n ion.patch (LTC#174936, bsc#1123060, bsc#1123061).\n\n - Update\n patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch\n (bsc#1051510, bsc#1121789).\n\n - Update\n patches.fixes/acpi-nfit-Fix-command-supported-detection.\n patch (bsc#1051510, bsc#1121789). Add more detailed\n bugzilla reference.\n\n - uprobes: Fix handle_swbp() vs. unregister() + register()\n race once more (bsc#1051510).\n\n - usb: Add new USB LPM helpers (bsc#1120902).\n\n - usb: cdc-acm: fix race during wakeup blocking TX traffic\n (bsc#1129770).\n\n - usb: common: Consider only available nodes for dr_mode\n (bsc#1129770).\n\n - usb: Consolidate LPM checks to avoid enabling LPM twice\n (bsc#1120902).\n\n - usb: core: only clean up what we allocated\n (bsc#1051510).\n\n - usb: dwc3: Correct the logic for checking TRB full in\n __dwc3_prepare_one_trb() (bsc#1051510).\n\n - usb: dwc3: gadget: Disable CSP for stream OUT ep\n (bsc#1051510).\n\n - usb: dwc3: gadget: Fix the uninitialized link_state when\n udc starts (bsc#1051510).\n\n - usb: dwc3: gadget: Handle 0 xfer length for OUT EP\n (bsc#1051510).\n\n - usb: dwc3: gadget: synchronize_irq dwc irq in suspend\n (bsc#1051510).\n\n - usb: gadget: f_hid: fix deadlock in f_hidg_write()\n (bsc#1129770).\n\n - usb: gadget: musb: fix short isoc packets with inventra\n dma (bsc#1051510).\n\n - usb: gadget: Potential NULL dereference on allocation\n error (bsc#1051510).\n\n - usb: gadget: udc: net2272: Fix bitwise and boolean\n operations (bsc#1051510).\n\n - usb: hub: delay hub autosuspend if USB3 port is still\n link training (bsc#1051510).\n\n - usb: mtu3: fix the issue about SetFeature(U1/U2_Enable)\n (bsc#1051510).\n\n - usb: musb: dsps: fix otg state machine (bsc#1051510).\n\n - usb: musb: dsps: fix runtime pm for peripheral mode\n (bsc#1120902).\n\n - usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n\n - usb: phy: am335x: fix race condition in _probe\n (bsc#1051510).\n\n - usb: phy: fix link errors (bsc#1051510).\n\n - usb: phy: twl6030-usb: fix possible use-after-free on\n remove (bsc#1051510).\n\n - usb: serial: cp210x: add ID for Ingenico 3070\n (bsc#1129770).\n\n - usb: serial: ftdi_sio: add ID for Hjelmslund Electronics\n USB485 (bsc#1129770).\n\n - usb: serial: mos7720: fix mos_parport refcount imbalance\n on error path (bsc#1129770).\n\n - usb: serial: option: add Telit ME910 ECM composition\n (bsc#1129770).\n\n - usb: serial: option: set driver_info for SIM5218 and\n compatibles (bsc#1129770).\n\n - usb: serial: pl2303: add new PID to support PL2303TB\n (bsc#1051510).\n\n - usb: serial: simple: add Motorola Tetra TPG2200 device\n id (bsc#1051510).\n\n - veth: set peer GSO values (bsc#1051510).\n\n - vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n\n - vfio: ccw: process ssch with interrupts disabled\n (git-fixes).\n\n - vfs: Add iomap_seek_hole and iomap_seek_data helpers\n (bsc#1070995).\n\n - vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n\n - vfs: in iomap seek_(hole,data), return -ENXIO for\n negative offsets (bsc#1070995).\n\n - vhost: correctly check the return value of\n translate_desc() in log_used() (bsc#1051510).\n\n - vhost: log dirty page correctly\n (networking-stable-19_01_26).\n\n - vhost/vsock: fix uninitialized vhost_vsock->guest_cid\n (bsc#1051510).\n\n - video: clps711x-fb: release disp device node in probe()\n (bsc#1051510).\n\n - virtio-blk: Consider virtio_max_dma_size() for maximum\n segment size (bsc#1120008).\n\n - virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n\n - virtio_net: Do not call free_old_xmit_skbs for\n xdp_frames (networking-stable-19_02_01).\n\n - virtio/s390: avoid race on vcdev->config (git-fixes).\n\n - virtio/s390: fix race in ccw_io_helper() (git-fixes).\n\n - vmci: Support upto 64-bit PPNs (bsc#1127286).\n\n - vsock: cope with memory allocation failure at socket\n creation time (bsc#1051510).\n\n - vxge: ensure data0 is initialized in when fetching\n firmware version information (bsc#1051510).\n\n - vxlan: Fix GRO cells race condition between receive and\n link delete (git-fixes).\n\n - vxlan: test dev->flags & IFF_UP before calling\n gro_cells_receive() (git-fixes).\n\n - vxlan: update skb dst pmtu on tx path (bsc#1123456).\n\n - w90p910_ether: remove incorrect __init annotation\n (bsc#1051510).\n\n - watchdog: docs: kernel-api: do not reference removed\n functions (bsc#1051510).\n\n - x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n\n - x86/a.out: Clear the dump structure initially\n (bsc#1114279).\n\n - x86/apic: Provide apic_ack_irq() (bsc#1122822).\n\n - x86/boot/e820: Avoid overwriting e820_table_firmware\n (bsc#1127154).\n\n - x86/boot/e820: Introduce the bootloader provided\n e820_table_firmware[] table (bsc#1127154).\n\n - x86/boot/e820: Rename the e820_table_firmware to\n e820_table_kexec (bsc#1127154).\n\n - x86/cpu: Add Atom Tremont (Jacobsville) ().\n\n - x86/CPU/AMD: Set the CPB bit unconditionally on F17h\n (bsc#1114279).\n\n - x86/efi: Allocate e820 buffer before calling\n efi_exit_boot_service (bsc#1127307).\n\n - x86/Hyper-V: Set x2apic destination mode to physical\n when x2apic is available (bsc#1122822).\n\n - x86/kaslr: Fix incorrect i8254 outb() parameters\n (bsc#1114279).\n\n - x86/mce: Improve error message when kernel cannot\n recover, p2 (bsc#1114279).\n\n - x86/mtrr: Do not copy uninitialized gentry fields back\n to userspace (bsc#1114279).\n\n - x86/pkeys: Properly copy pkey state at fork()\n (bsc#1129366).\n\n - x86/platform/UV: Use efi_runtime_lock to serialise BIOS\n calls (bsc#1125614).\n\n - x86: respect memory size limiting via mem= parameter\n (bsc#1117645).\n\n - x86/vdso: Remove obsolete 'fake section table'\n reservation (bsc#1114279).\n\n - x86/xen: dont add memory above max allowed allocation\n (bsc#1117645).\n\n - xen, cpu_hotplug: Prevent an out of bounds access\n (bsc#1065600).\n\n - xen: fix dom0 boot on huge systems (bsc#1127836).\n\n - xen/manage: do not complain about an empty value in\n control/sysrq node (bsc#1065600).\n\n - xen: remove pre-xen3 fallback handlers (bsc#1065600).\n\n - xfs: add option to mount with barrier=0 or barrier=1\n (bsc#1088133).\n\n - xfs: fix contiguous dquot chunk iteration livelock\n (bsc#1070995).\n\n - xfs: remove filestream item xfs_inode reference\n (bsc#1127961).\n\n - xfs: rewrite xfs_dq_get_next_id using\n xfs_iext_lookup_extent (bsc#1070995).\n\n - xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA\n (bsc#1070995).\n\n - yama: Check for pid death before checking ancestry\n (bsc#1051510).\n\n - yam: fix a missing-check bug (bsc#1051510).\n\n - zswap: re-check zswap_is_full() after do zswap_shrink()\n (bsc#1051510).\n\n - x86/uaccess: Do not leak the AC flag into __put_user()\n value evaluation (bsc#1114279).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1046305\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1046306\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1050549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1056787\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1060463\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1063638\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1070995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1078355\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1082943\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083647\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1086095\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1086282\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1088133\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1094244\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1094555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1098995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1100132\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103429\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1107078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1107665\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1108101\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1110096\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113042\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113399\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113722\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113939\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114585\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1117108\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1117645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1119019\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1119086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1119843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120008\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120601\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120854\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120902\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120909\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1121317\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1121789\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1121805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1122192\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1122764\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1122822\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1122982\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1123060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1123061\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1123105\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1123161\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1123456\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1123882\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124055\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124235\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124974\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124975\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124976\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124978\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124979\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124980\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124981\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124982\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124984\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125125\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125252\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125315\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125342\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125614\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125728\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125797\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125799\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125800\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125947\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126131\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126209\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126389\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126476\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126480\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126481\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126488\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126495\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126579\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126740\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126789\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126804\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126807\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127042\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127082\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127154\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127285\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127286\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127307\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127363\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127378\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127445\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127493\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127494\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127495\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127496\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127497\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127498\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127534\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127561\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127595\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127603\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127682\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127731\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127750\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127836\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127961\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128094\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128166\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128351\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128451\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128895\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129046\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129080\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129179\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129181\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129182\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129183\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129184\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129276\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129281\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129285\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129291\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129292\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129293\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129294\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129295\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129326\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129327\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129330\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129363\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129366\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129497\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129519\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129547\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129551\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129581\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129664\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129923\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1130130\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1130154\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1130335\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1130336\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1130337\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1130338\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1130425\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1130427\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1130518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1131062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=824948\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8912\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Reliable Datagram Sockets (RDS) rds_atomic_free_op NULL pointer dereference Privilege Escalation');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-base-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-base-debuginfo-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-debuginfo-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-debugsource-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-devel-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-devel-debuginfo-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-base-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-base-debuginfo-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-debuginfo-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-debugsource-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-devel-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-devel-debuginfo-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-devel-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-docs-html-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-base-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-debugsource-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-devel-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-macros-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-build-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-build-debugsource-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-qa-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-source-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-source-vanilla-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-syms-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-base-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-debuginfo-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-debugsource-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-devel-4.12.14-lp150.12.58.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-lp150.12.58.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:32:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8912"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2019-02-26T00:00:00", "id": "OPENVAS:1361412562310875478", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310875478", "type": "openvas", "title": "Fedora Update for kernel-headers FEDORA-2019-16de0047d4", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.875478\");\n script_version(\"$Revision: 14223 $\");\n script_cve_id(\"CVE-2019-8912\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2019-02-26 04:17:28 +0100 (Tue, 26 Feb 2019)\");\n script_name(\"Fedora Update for kernel-headers FEDORA-2019-16de0047d4\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC28\");\n\n script_xref(name:\"FEDORA\", value:\"2019-16de0047d4\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MSGX6TBO56YR6QM6CKHPUDZ3TAZHZCR2\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel-headers'\n package(s) announced via the FEDORA-2019-16de0047d4 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"affected\", value:\"kernel-headers on Fedora 28.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~4.20.11~100.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:32:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8912"], "description": "The remote host is missing an update for the ", "modified": "2019-05-14T00:00:00", "published": "2019-05-07T00:00:00", "id": "OPENVAS:1361412562310875941", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310875941", "type": "openvas", "title": "Fedora Update for kernel-headers FEDORA-2019-7bdeed7fc5", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.875941\");\n script_version(\"2019-05-14T05:04:40+0000\");\n script_cve_id(\"CVE-2019-8912\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-05-14 05:04:40 +0000 (Tue, 14 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-05-07 02:28:15 +0000 (Tue, 07 May 2019)\");\n script_name(\"Fedora Update for kernel-headers FEDORA-2019-7bdeed7fc5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC29\");\n\n script_xref(name:\"FEDORA\", value:\"2019-7bdeed7fc5\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPF6N25BBWBMRTLSHG6RASXC7PVDKKFH\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel-headers'\n package(s) announced via the FEDORA-2019-7bdeed7fc5 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Kernel-headers includes the C header files that specify the interface\nbetween the Linux kernel and userspace libraries and programs. The\nheader files define structures and constants that are needed for\nbuilding most standard programs and are also needed for rebuilding the\nglibc package.\");\n\n script_tag(name:\"affected\", value:\"'kernel-headers' package(s) on Fedora 29.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC29\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~4.20.11~200.fc29\", rls:\"FC29\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:32:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8912"], "description": "The remote host is missing an update for the ", "modified": "2019-05-14T00:00:00", "published": "2019-05-07T00:00:00", "id": "OPENVAS:1361412562310875772", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310875772", "type": "openvas", "title": "Fedora Update for kernel-tools FEDORA-2019-7bdeed7fc5", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.875772\");\n script_version(\"2019-05-14T05:04:40+0000\");\n script_cve_id(\"CVE-2019-8912\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-05-14 05:04:40 +0000 (Tue, 14 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-05-07 02:20:03 +0000 (Tue, 07 May 2019)\");\n script_name(\"Fedora Update for kernel-tools FEDORA-2019-7bdeed7fc5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC29\");\n\n script_xref(name:\"FEDORA\", value:\"2019-7bdeed7fc5\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JW3AO3TJ3SKTNSQS6LHJOGJJGJPIFLWW\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel-tools'\n package(s) announced via the FEDORA-2019-7bdeed7fc5 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This package contains the tools/ directory from the kernel source\nand the supporting documentation.\");\n\n script_tag(name:\"affected\", value:\"'kernel-tools' package(s) on Fedora 29.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC29\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~4.20.11~200.fc29\", rls:\"FC29\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:32:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8912"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2019-02-26T00:00:00", "id": "OPENVAS:1361412562310875479", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310875479", "type": "openvas", "title": "Fedora Update for kernel-tools FEDORA-2019-16de0047d4", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.875479\");\n script_version(\"$Revision: 14223 $\");\n script_cve_id(\"CVE-2019-8912\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2019-02-26 04:17:31 +0100 (Tue, 26 Feb 2019)\");\n script_name(\"Fedora Update for kernel-tools FEDORA-2019-16de0047d4\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC28\");\n\n script_xref(name:\"FEDORA\", value:\"2019-16de0047d4\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCQIWTGMASRSAY2M5ZQMGQ7TOEDH6SD6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel-tools'\n package(s) announced via the FEDORA-2019-16de0047d4 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"affected\", value:\"kernel-tools on Fedora 28.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~4.20.11~100.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-31T16:53:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8980", "CVE-2019-8912", "CVE-2019-2024", "CVE-2019-9213", "CVE-2019-7308", "CVE-2019-3819"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2019-04-13T00:00:00", "id": "OPENVAS:1361412562310852420", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852420", "type": "openvas", "title": "openSUSE: Security Advisory for the Linux Kernel (openSUSE-SU-2019:1193-1)", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852420\");\n script_version(\"2020-01-31T08:04:39+0000\");\n script_cve_id(\"CVE-2019-2024\", \"CVE-2019-3819\", \"CVE-2019-7308\", \"CVE-2019-8912\", \"CVE-2019-8980\", \"CVE-2019-9213\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-04-13 02:00:56 +0000 (Sat, 13 Apr 2019)\");\n script_name(\"openSUSE: Security Advisory for the Linux Kernel (openSUSE-SU-2019:1193-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.0\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2019:1193-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Linux Kernel'\n package(s) announced via the openSUSE-SU-2019:1193-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The openSUSE Leap 15.0 was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2019-2024: A use-after-free when disconnecting a source was fixed\n which could lead to crashes. bnc#1129179).\n\n - CVE-2019-3819: A flaw was found in the Linux kernel in the function\n hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter\n an infinite loop with certain parameters passed from a userspace. A\n local privileged user ('root') can cause a system lock up and a denial\n of service. Versions from v4.18 and newer are vulnerable (bnc#1123161).\n\n - CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds\n speculation on pointer arithmetic in various cases, including cases of\n different branches with different state or limits to sanitize, leading\n to side-channel attacks (bnc#1124055).\n\n - CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglected to set a\n NULL value for a certain structure member, which leads to a\n use-after-free in sockfs_setattr (bnc#1125907).\n\n - CVE-2019-8980: A memory leak in the kernel_read_file function in\n fs/exec.c allowed attackers to cause a denial of service (memory\n consumption) by triggering vfs_read failures (bnc#1126209).\n\n - CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap\n minimum address, which made it easier for attackers to exploit kernel\n NULL pointer dereferences on non-SMAP platforms. This is related to a\n capability check for the wrong task (bnc#1128166).\n\n The following non-security bugs were fixed:\n\n - 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n\n - 9p: use inode->i_lock to protect i_size_write() under 32-bit\n (bsc#1051510).\n\n - acpi: acpi_pad: Do not launch acpi_pad threads on idle cpus\n (bsc#1113399).\n\n - acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n\n - acpi/device_sysfs: Avoid OF modalias creation for removed device\n (bsc#1051510).\n\n - acpi/nfit: Fix bus command validation (bsc#1051510).\n\n - acpi: NUMA: Use correct type for printing addresses on i386-PAE\n (bsc#1051510).\n\n - acpi / video: Extend chassis-type detection with a 'Lunch Box' check\n (bsc#1051510).\n\n - acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n\n - alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against\n Liquid Saffire 56 (bsc#1051510).\n\n - alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n\n - alsa: echoaudio: add a check for ioremap_nocache (bsc#1051510).\n\n - alsa: firewire: add const qualifier to identifiers for read-only symbols\n (bsc#1051510).\n\n - alsa: firewire-motu: add a flag ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'the' package(s) on openSUSE Leap 15.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs\", rpm:\"kernel-docs~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs-html\", rpm:\"kernel-docs-html~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-macros\", rpm:\"kernel-macros~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source-vanilla\", rpm:\"kernel-source-vanilla~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base\", rpm:\"kernel-debug-base~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base-debuginfo\", rpm:\"kernel-debug-base-debuginfo~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debugsource\", rpm:\"kernel-debug-debugsource~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel-debuginfo\", rpm:\"kernel-debug-devel-debuginfo~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base\", rpm:\"kernel-default-base~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base-debuginfo\", rpm:\"kernel-default-base-debuginfo~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debuginfo\", rpm:\"kernel-default-debuginfo~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debugsource\", rpm:\"kernel-default-debugsource~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel-debuginfo\", rpm:\"kernel-default-devel-debuginfo~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall\", rpm:\"kernel-kvmsmall~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base\", rpm:\"kernel-kvmsmall-base~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base-debuginfo\", rpm:\"kernel-kvmsmall-base-debuginfo~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debuginfo\", rpm:\"kernel-kvmsmall-debuginfo~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debugsource\", rpm:\"kernel-kvmsmall-debugsource~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel\", rpm:\"kernel-kvmsmall-devel~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel-debuginfo\", rpm:\"kernel-kvmsmall-devel-debuginfo~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build\", rpm:\"kernel-obs-build~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build-debugsource\", rpm:\"kernel-obs-build-debugsource~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-qa\", rpm:\"kernel-obs-qa~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla\", rpm:\"kernel-vanilla~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base\", rpm:\"kernel-vanilla-base~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base-debuginfo\", rpm:\"kernel-vanilla-base-debuginfo~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debuginfo\", rpm:\"kernel-vanilla-debuginfo~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debugsource\", rpm:\"kernel-vanilla-debugsource~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel\", rpm:\"kernel-vanilla-devel~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel-debuginfo\", rpm:\"kernel-vanilla-devel-debuginfo~4.12.14~lp150.12.58.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:32:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7222", "CVE-2019-3460", "CVE-2018-19824", "CVE-2019-8912", "CVE-2018-16862", "CVE-2018-18710", "CVE-2019-7221", "CVE-2019-3701", "CVE-2019-6974", "CVE-2019-3459", "CVE-2018-19407", "CVE-2018-16880"], "description": "The remote host is missing an update for the ", "modified": "2019-05-14T00:00:00", "published": "2019-05-07T00:00:00", "id": "OPENVAS:1361412562310875834", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310875834", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2019-7bdeed7fc5", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.875834\");\n script_version(\"2019-05-14T05:04:40+0000\");\n script_cve_id(\"CVE-2019-8912\", \"CVE-2019-7221\", \"CVE-2019-6974\", \"CVE-2019-7222\", \"CVE-2018-16880\", \"CVE-2019-3459\", \"CVE-2019-3460\", \"CVE-2019-3701\", \"CVE-2018-19824\", \"CVE-2018-16862\", \"CVE-2018-19407\", \"CVE-2018-18710\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-05-14 05:04:40 +0000 (Tue, 14 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-05-07 02:22:54 +0000 (Tue, 07 May 2019)\");\n script_name(\"Fedora Update for kernel FEDORA-2019-7bdeed7fc5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC29\");\n\n script_xref(name:\"FEDORA\", value:\"2019-7bdeed7fc5\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BHPV6YAVRZGELKIO7LYXJNKRFHMOJJP7\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2019-7bdeed7fc5 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 29.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC29\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.20.11~200.fc29\", rls:\"FC29\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:32:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7222", "CVE-2019-3460", "CVE-2018-19824", "CVE-2019-8980", "CVE-2019-8912", "CVE-2018-18021", "CVE-2019-7221", "CVE-2019-6974", "CVE-2019-3459", "CVE-2019-9213", "CVE-2018-14678", "CVE-2019-7308"], "description": "The remote host is missing an update for the ", "modified": "2019-04-26T00:00:00", "published": "2019-04-03T00:00:00", "id": "OPENVAS:1361412562310843960", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843960", "type": "openvas", "title": "Ubuntu Update for linux-aws-hwe USN-3931-2", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843960\");\n script_version(\"2019-04-26T08:24:31+0000\");\n script_cve_id(\"CVE-2018-14678\", \"CVE-2018-18021\", \"CVE-2018-19824\", \"CVE-2019-3459\",\n \"CVE-2019-3460\", \"CVE-2019-6974\", \"CVE-2019-7221\", \"CVE-2019-7222\",\n \"CVE-2019-7308\", \"CVE-2019-8912\", \"CVE-2019-8980\", \"CVE-2019-9213\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-04-26 08:24:31 +0000 (Fri, 26 Apr 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-03 06:40:49 +0000 (Wed, 03 Apr 2019)\");\n script_name(\"Ubuntu Update for linux-aws-hwe USN-3931-2\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU14\\.04 LTS|UBUNTU16\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"3931-2\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3931-2/\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-aws-hwe'\n package(s) announced via the USN-3931-2 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"USN-3931-1 fixed vulnerabilities\nin the Linux kernel for Ubuntu 18.04 LTS. This update provides the\ncorresponding updates for the Linux Hardware Enablement (HWE) kernel\nfrom Ubuntu 18.04 LTS for Ubuntu 16.04 LTS and for the Linux Azure kernel\nfor Ubuntu 14.04 LTS.\n\nM. Vefa Bicakci and Andy Lutomirski discovered that the kernel did not\nproperly set up all arguments to an error handler callback used when\nrunning as a paravirtualized guest. An unprivileged attacker in a\nparavirtualized guest VM could use this to cause a denial of service (guest\nVM crash). (CVE-2018-14678)\n\nIt was discovered that the KVM implementation in the Linux kernel on ARM\n64bit processors did not properly handle some ioctls. An attacker with the\nprivilege to create KVM-based virtual machines could use this to cause a\ndenial of service (host system crash) or execute arbitrary code in the\nhost. (CVE-2018-18021)\n\nMathias Payer and Hui Peng discovered a use-after-free vulnerability in the\nAdvanced Linux Sound Architecture (ALSA) subsystem. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2018-19824)\n\nShlomi Oberman, Yuli Shapiro, and Ran Menscher discovered an information\nleak in the Bluetooth implementation of the Linux kernel. An attacker\nwithin Bluetooth range could use this to expose sensitive information\n(kernel memory). (CVE-2019-3459, CVE-2019-3460)\n\nJann Horn discovered that the KVM implementation in the Linux kernel\ncontained a use-after-free vulnerability. An attacker in a guest VM with\naccess to /dev/kvm could use this to cause a denial of service (guest VM\ncrash). (CVE-2019-6974)\n\nJim Mattson and Felix Wilhelm discovered a use-after-free vulnerability in\nthe KVM subsystem of the Linux kernel, when using nested virtual machines.\nA local attacker in a guest VM could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code in the host system.\n(CVE-2019-7221)\n\nFelix Wilhelm discovered that an information leak vulnerability existed in\nthe KVM subsystem of the Linux kernel, when nested virtualization is used.\nA local attacker could use this to expose sensitive information (host\nsystem memory to a guest VM). (CVE-2019-7222)\n\nJann Horn discovered that the eBPF implementation in the Linux kernel was\ninsufficiently hardened against Spectre V1 attacks. A local attacker could\nuse this to expose sensitive information. (CVE-2019-7308)\n\nIt was discovered that a use-after-free vulnerability existed in the user-\nspace API for crypto (af_alg) implementation in the Linux kernel. A local\nattacker could use this to cause a denial ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux-aws-hwe' package(s) on Ubuntu 16.04 LTS, Ubuntu 14.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU14.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1041-azure\", ver:\"4.15.0-1041.45~14.04.1\", rls:\"UBUNTU14.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"4.15.0.1041.28\", rls:\"UBUNTU14.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1010-oracle\", ver:\"4.15.0-1010.12~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1029-gcp\", ver:\"4.15.0-1029.31~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1035-aws\", ver:\"4.15.0-1035.37~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1041-azure\", ver:\"4.15.0-1041.45\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-47-generic\", ver:\"4.15.0-47.50~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-47-generic-lpae\", ver:\"4.15.0-47.50~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-47-lowlatency\", ver:\"4.15.0-47.50~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-hwe\", ver:\"4.15.0.1035.35\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"4.15.0.1041.45\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"4.15.0.1029.43\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-16.04\", ver:\"4.15.0.47.68\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-16.04\", ver:\"4.15.0.47.68\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1029.43\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-16.04\", ver:\"4.15.0.47.68\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.47.68\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"4.15.0.1010.4\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-16.04\", ver:\"4.15.0.47.68\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:32:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7222", "CVE-2019-3460", "CVE-2018-19824", "CVE-2019-8980", "CVE-2019-8912", "CVE-2018-18021", "CVE-2019-7221", "CVE-2019-6974", "CVE-2019-3459", "CVE-2019-9213", "CVE-2018-14678", "CVE-2019-7308"], "description": "The remote host is missing an update for the ", "modified": "2019-04-26T00:00:00", "published": "2019-04-03T00:00:00", "id": "OPENVAS:1361412562310843954", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843954", "type": "openvas", "title": "Ubuntu Update for linux USN-3931-1", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843954\");\n script_version(\"2019-04-26T08:24:31+0000\");\n script_cve_id(\"CVE-2018-14678\", \"CVE-2018-18021\", \"CVE-2018-19824\", \"CVE-2019-3459\",\n \"CVE-2019-3460\", \"CVE-2019-6974\", \"CVE-2019-7221\", \"CVE-2019-7222\",\n \"CVE-2019-7308\", \"CVE-2019-8912\", \"CVE-2019-8980\", \"CVE-2019-9213\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-04-26 08:24:31 +0000 (Fri, 26 Apr 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-03 06:39:53 +0000 (Wed, 03 Apr 2019)\");\n script_name(\"Ubuntu Update for linux USN-3931-1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"3931-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3931-1/\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-3931-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"M. Vefa Bicakci and Andy Lutomirski discovered\nthat the kernel did not properly set up all arguments to an error handler callback\nused when running as a paravirtualized guest. An unprivileged attacker in a\nparavirtualized guest VM could use this to cause a denial of service (guest\nVM crash). (CVE-2018-14678)\n\nIt was discovered that the KVM implementation in the Linux kernel on ARM\n64bit processors did not properly handle some ioctls. An attacker with the\nprivilege to create KVM-based virtual machines could use this to cause a\ndenial of service (host system crash) or execute arbitrary code in the\nhost. (CVE-2018-18021)\n\nMathias Payer and Hui Peng discovered a use-after-free vulnerability in the\nAdvanced Linux Sound Architecture (ALSA) subsystem. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2018-19824)\n\nShlomi Oberman, Yuli Shapiro, and Ran Menscher discovered an information\nleak in the Bluetooth implementation of the Linux kernel. An attacker\nwithin Bluetooth range could use this to expose sensitive information\n(kernel memory). (CVE-2019-3459, CVE-2019-3460)\n\nJann Horn discovered that the KVM implementation in the Linux kernel\ncontained a use-after-free vulnerability. An attacker in a guest VM with\naccess to /dev/kvm could use this to cause a denial of service (guest VM\ncrash). (CVE-2019-6974)\n\nJim Mattson and Felix Wilhelm discovered a use-after-free vulnerability in\nthe KVM subsystem of the Linux kernel, when using nested virtual machines.\nA local attacker in a guest VM could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code in the host system.\n(CVE-2019-7221)\n\nFelix Wilhelm discovered that an information leak vulnerability existed in\nthe KVM subsystem of the Linux kernel, when nested virtualization is used.\nA local attacker could use this to expose sensitive information (host\nsystem memory to a guest VM). (CVE-2019-7222)\n\nJann Horn discovered that the eBPF implementation in the Linux kernel was\ninsufficiently hardened against Spectre V1 attacks. A local attacker could\nuse this to expose sensitive information. (CVE-2019-7308)\n\nIt was discovered that a use-after-free vulnerability existed in the user-\nspace API for crypto (af_alg) implementation in the Linux kernel. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2019-8912)\n\nIt was discovered that the Linux kernel did not properly deallocate memory\nwhen handling certain errors while reading files. A local attacker could\nuse this to cause a denial of service (excessive memory consumpti ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1010-oracle\", ver:\"4.15.0-1010.12\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1029-gcp\", ver:\"4.15.0-1029.31\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1031-kvm\", ver:\"4.15.0-1031.31\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1033-raspi2\", ver:\"4.15.0-1033.35\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1035-aws\", ver:\"4.15.0-1035.37\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1035-oem\", ver:\"4.15.0-1035.40\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-47-generic\", ver:\"4.15.0-47.50\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-47-generic-lpae\", ver:\"4.15.0-47.50\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-47-lowlatency\", ver:\"4.15.0-47.50\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-47-snapdragon\", ver:\"4.15.0-47.50\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.15.0.1035.34\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"4.15.0.1029.31\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.15.0.47.49\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.15.0.47.49\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1029.31\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.15.0.1031.31\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.15.0.47.49\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.1035.40\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"4.15.0.1010.13\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.15.0.1033.31\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.15.0.47.49\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.15.0.47.49\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:32:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7222", "CVE-2019-3460", "CVE-2018-19824", "CVE-2019-9003", "CVE-2019-8980", "CVE-2019-8912", "CVE-2019-9162", "CVE-2019-8956", "CVE-2019-7221", "CVE-2019-6974", "CVE-2019-3459", "CVE-2019-9213", "CVE-2019-7308"], "description": "The remote host is missing an update for the ", "modified": "2019-04-26T00:00:00", "published": "2019-04-03T00:00:00", "id": "OPENVAS:1361412562310843959", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843959", "type": "openvas", "title": "Ubuntu Update for linux-azure USN-3930-2", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843959\");\n script_version(\"2019-04-26T08:24:31+0000\");\n script_cve_id(\"CVE-2018-19824\", \"CVE-2019-3459\", \"CVE-2019-3460\", \"CVE-2019-6974\",\n \"CVE-2019-7221\", \"CVE-2019-7222\", \"CVE-2019-7308\", \"CVE-2019-8912\",\n \"CVE-2019-8956\", \"CVE-2019-8980\", \"CVE-2019-9003\", \"CVE-2019-9162\",\n \"CVE-2019-9213\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-04-26 08:24:31 +0000 (Fri, 26 Apr 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-03 06:40:38 +0000 (Wed, 03 Apr 2019)\");\n script_name(\"Ubuntu Update for linux-azure USN-3930-2\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"3930-2\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3930-2/\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-azure'\n package(s) announced via the USN-3930-2 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"USN-3930-1 fixed vulnerabilities in\nthe Linux kernel for Ubuntu 18.10. This update provides the corresponding\nupdates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.10\nfor Ubuntu 18.04 LTS.\n\nMathias Payer and Hui Peng discovered a use-after-free vulnerability in the\nAdvanced Linux Sound Architecture (ALSA) subsystem. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2018-19824)\n\nShlomi Oberman, Yuli Shapiro, and Ran Menscher discovered an information\nleak in the Bluetooth implementation of the Linux kernel. An attacker\nwithin Bluetooth range could use this to expose sensitive information\n(kernel memory). (CVE-2019-3459, CVE-2019-3460)\n\nJann Horn discovered that the KVM implementation in the Linux kernel\ncontained a use-after-free vulnerability. An attacker in a guest VM with\naccess to /dev/kvm could use this to cause a denial of service (guest VM\ncrash). (CVE-2019-6974)\n\nJim Mattson and Felix Wilhelm discovered a use-after-free vulnerability in\nthe KVM subsystem of the Linux kernel, when using nested virtual machines.\nA local attacker in a guest VM could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code in the host system.\n(CVE-2019-7221)\n\nFelix Wilhelm discovered that an information leak vulnerability existed in\nthe KVM subsystem of the Linux kernel, when nested virtualization is used.\nA local attacker could use this to expose sensitive information (host\nsystem memory to a guest VM). (CVE-2019-7222)\n\nJann Horn discovered that the eBPF implementation in the Linux kernel was\ninsufficiently hardened against Spectre V1 attacks. A local attacker could\nuse this to expose sensitive information. (CVE-2019-7308)\n\nIt was discovered that a use-after-free vulnerability existed in the user-\nspace API for crypto (af_alg) implementation in the Linux kernel. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2019-8912)\n\nJakub Jirasek discovered a use-after-free vulnerability in the SCTP\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2019-8956)\n\nIt was discovered that the Linux kernel did not properly deallocate memory\nwhen handling certain errors while reading files. A local attacker could\nuse this to cause a denial of service (excessive memory consumption).\n(CVE-2019-8980)\n\nIt was discovered that a use-after-free vulnerability existed in the IPMI\nimplementation in the Linux kernel. A local attacker with access to the\nIPMI character ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux-azure' package(s) on Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-1014-azure\", ver:\"4.18.0-1014.14~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-17-generic\", ver:\"4.18.0-17.18~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-17-generic-lpae\", ver:\"4.18.0-17.18~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-17-lowlatency\", ver:\"4.18.0-17.18~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-17-snapdragon\", ver:\"4.18.0-17.18~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"4.18.0.1014.13\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-18.04\", ver:\"4.18.0.17.67\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-18.04\", ver:\"4.18.0.17.67\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-18.04\", ver:\"4.18.0.17.67\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon-hwe-18.04\", ver:\"4.18.0.17.67\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-18.04\", ver:\"4.18.0.17.67\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:32:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7222", "CVE-2019-3460", "CVE-2018-19824", "CVE-2019-9003", "CVE-2019-8980", "CVE-2019-8912", "CVE-2019-9162", "CVE-2019-8956", "CVE-2019-7221", "CVE-2019-6974", "CVE-2019-3459", "CVE-2019-9213", "CVE-2019-7308"], "description": "The remote host is missing an update for the ", "modified": "2019-04-26T00:00:00", "published": "2019-04-03T00:00:00", "id": "OPENVAS:1361412562310843952", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843952", "type": "openvas", "title": "Ubuntu Update for linux USN-3930-1", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843952\");\n script_version(\"2019-04-26T08:24:31+0000\");\n script_cve_id(\"CVE-2018-19824\", \"CVE-2019-3459\", \"CVE-2019-3460\", \"CVE-2019-6974\",\n \"CVE-2019-7221\", \"CVE-2019-7222\", \"CVE-2019-7308\", \"CVE-2019-8912\",\n \"CVE-2019-8956\", \"CVE-2019-8980\", \"CVE-2019-9003\", \"CVE-2019-9162\",\n \"CVE-2019-9213\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-04-26 08:24:31 +0000 (Fri, 26 Apr 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-03 06:39:35 +0000 (Wed, 03 Apr 2019)\");\n script_name(\"Ubuntu Update for linux USN-3930-1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.10\");\n\n script_xref(name:\"USN\", value:\"3930-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3930-1/\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-3930-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Mathias Payer and Hui Peng discovered\na use-after-free vulnerability in the Advanced Linux Sound Architecture\n(ALSA) subsystem. A physically proximate attacker could use this to cause\na denial of service (system crash). (CVE-2018-19824)\n\nShlomi Oberman, Yuli Shapiro, and Ran Menscher discovered an information\nleak in the Bluetooth implementation of the Linux kernel. An attacker\nwithin Bluetooth range could use this to expose sensitive information\n(kernel memory). (CVE-2019-3459, CVE-2019-3460)\n\nJann Horn discovered that the KVM implementation in the Linux kernel\ncontained a use-after-free vulnerability. An attacker in a guest VM with\naccess to /dev/kvm could use this to cause a denial of service (guest VM\ncrash). (CVE-2019-6974)\n\nJim Mattson and Felix Wilhelm discovered a use-after-free vulnerability in\nthe KVM subsystem of the Linux kernel, when using nested virtual machines.\nA local attacker in a guest VM could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code in the host system.\n(CVE-2019-7221)\n\nFelix Wilhelm discovered that an information leak vulnerability existed in\nthe KVM subsystem of the Linux kernel, when nested virtualization is used.\nA local attacker could use this to expose sensitive information (host\nsystem memory to a guest VM). (CVE-2019-7222)\n\nJann Horn discovered that the eBPF implementation in the Linux kernel was\ninsufficiently hardened against Spectre V1 attacks. A local attacker could\nuse this to expose sensitive information. (CVE-2019-7308)\n\nIt was discovered that a use-after-free vulnerability existed in the user-\nspace API for crypto (af_alg) implementation in the Linux kernel. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2019-8912)\n\nJakub Jirasek discovered a use-after-free vulnerability in the SCTP\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2019-8956)\n\nIt was discovered that the Linux kernel did not properly deallocate memory\nwhen handling certain errors while reading files. A local attacker could\nuse this to cause a denial of service (excessive memory consumption).\n(CVE-2019-8980)\n\nIt was discovered that a use-after-free vulnerability existed in the IPMI\nimplementation in the Linux kernel. A local attacker with access to the\nIPMI character device files could use this to cause a denial of service\n(system crash). (CVE-2019-9003)\n\nJann Horn discovered that the SNMP NAT implementation in the Linux kernel\nperformed insufficient ASN.1 length checks. An atta ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 18.10.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-1008-gcp\", ver:\"4.18.0-1008.9\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-1009-kvm\", ver:\"4.18.0-1009.9\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-1011-raspi2\", ver:\"4.18.0-1011.13\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-1012-aws\", ver:\"4.18.0-1012.14\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-1014-azure\", ver:\"4.18.0-1014.14\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-17-generic\", ver:\"4.18.0-17.18\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-17-generic-lpae\", ver:\"4.18.0-17.18\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-17-lowlatency\", ver:\"4.18.0-17.18\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.18.0-17-snapdragon\", ver:\"4.18.0-17.18\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.18.0.1012.12\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"4.18.0.1014.15\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"4.18.0.1008.8\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.18.0.17.18\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.18.0.17.18\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.18.0.1008.8\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.18.0.1009.9\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.18.0.17.18\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.18.0.1011.8\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.18.0.17.18\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.18.0.17.18\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8912"], "description": "This package contains the tools/ directory from the kernel source and the supporting documentation. ", "modified": "2019-02-26T01:31:43", "published": "2019-02-26T01:31:43", "id": "FEDORA:00AE7601DEEC", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: kernel-tools-4.20.11-100.fc28", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8912"], "description": "Kernel-headers includes the C header files that specify the interface between the Linux kernel and userspace libraries and programs. The header files define structures and constants that are needed for building most standard programs and are also needed for rebuilding the glibc package. ", "modified": "2019-02-26T01:31:43", "published": "2019-02-26T01:31:43", "id": "FEDORA:9ECF26002DC7", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: kernel-headers-4.20.11-100.fc28", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8912"], "description": "This package contains the tools/ directory from the kernel source and the supporting documentation. ", "modified": "2019-02-26T03:08:49", "published": "2019-02-26T03:08:49", "id": "FEDORA:CD9C2608BFE6", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: kernel-tools-4.20.11-200.fc29", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8912"], "description": "Kernel-headers includes the C header files that specify the interface between the Linux kernel and userspace libraries and programs. The header files define structures and constants that are needed for building most standard programs and are also needed for rebuilding the glibc package. ", "modified": "2019-02-26T03:08:49", "published": "2019-02-26T03:08:49", "id": "FEDORA:4612C608B7ED", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: kernel-headers-4.20.11-200.fc29", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-16862", "CVE-2018-16880", "CVE-2018-18710", "CVE-2018-19407", "CVE-2018-19824", "CVE-2019-3459", "CVE-2019-3460", "CVE-2019-3701", "CVE-2019-6974", "CVE-2019-7221", "CVE-2019-7222", "CVE-2019-8912"], "description": "The kernel meta package ", "modified": "2019-02-26T03:08:48", "published": "2019-02-26T03:08:48", "id": "FEDORA:296826040AED", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: kernel-4.20.11-200.fc29", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-16862", "CVE-2018-16880", "CVE-2018-18710", "CVE-2018-19407", "CVE-2018-19824", "CVE-2019-3459", "CVE-2019-3460", "CVE-2019-3701", "CVE-2019-6974", "CVE-2019-7221", "CVE-2019-7222", "CVE-2019-8912", "CVE-2019-8980", "CVE-2019-9213"], "description": "The kernel meta package ", "modified": "2019-03-10T18:25:36", "published": "2019-03-10T18:25:36", "id": "FEDORA:22D77604972B", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: kernel-4.20.14-200.fc29", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-16862", "CVE-2018-16880", "CVE-2018-18710", "CVE-2018-19407", "CVE-2018-19824", "CVE-2019-3459", "CVE-2019-3460", "CVE-2019-3701", "CVE-2019-6974", "CVE-2019-7221", "CVE-2019-7222", "CVE-2019-8912", "CVE-2019-8980", "CVE-2019-9162"], "description": "The kernel meta package ", "modified": "2019-03-01T02:41:34", "published": "2019-03-01T02:41:34", "id": "FEDORA:20DCB60779B2", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: kernel-4.20.12-200.fc29", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-16862", "CVE-2018-16880", "CVE-2018-18710", "CVE-2018-19407", "CVE-2018-19824", "CVE-2019-3459", "CVE-2019-3460", "CVE-2019-3701", "CVE-2019-3882", "CVE-2019-6974", "CVE-2019-7221", "CVE-2019-7222", "CVE-2019-8912", "CVE-2019-8980", "CVE-2019-9857"], "description": "The kernel meta package ", "modified": "2019-04-09T02:20:39", "published": "2019-04-09T02:20:39", "id": "FEDORA:4CF35608BFEA", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: kernel-5.0.6-200.fc29", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-16862", "CVE-2018-16880", "CVE-2018-18710", "CVE-2018-19407", "CVE-2018-19824", "CVE-2019-3459", "CVE-2019-3460", "CVE-2019-3701", "CVE-2019-3882", "CVE-2019-6974", "CVE-2019-7221", "CVE-2019-7222", "CVE-2019-8912", "CVE-2019-8980", "CVE-2019-9500", "CVE-2019-9857"], "description": "The kernel meta package ", "modified": "2019-04-25T01:37:08", "published": "2019-04-25T01:37:08", "id": "FEDORA:85FBF6076011", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: kernel-5.0.9-200.fc29", "cvss": {"score": 7.9, "vector": "AV:A/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-16862", "CVE-2018-16880", "CVE-2018-18710", "CVE-2018-19407", "CVE-2018-19824", "CVE-2019-3459", "CVE-2019-3460", "CVE-2019-3701", "CVE-2019-3882", "CVE-2019-3887", "CVE-2019-6974", "CVE-2019-7221", "CVE-2019-7222", "CVE-2019-8912", "CVE-2019-8980", "CVE-2019-9857"], "description": "The kernel meta package ", "modified": "2019-04-13T15:35:30", "published": "2019-04-13T15:35:30", "id": "FEDORA:6B6B360567FC", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: kernel-5.0.7-200.fc29", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "amazon": [{"lastseen": "2020-11-10T12:37:30", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8912"], "description": "**Issue Overview:**\n\nIn the Linux kernel af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free (UAF) in sockfs_setattr. A local attacker can use this flaw to escalate privileges and take control of the system. ([CVE-2019-8912 __](<https://access.redhat.com/security/cve/CVE-2019-8912>))\n\n \n**Affected Packages:** \n\n\nkernel\n\n \n**Issue Correction:** \nRun _yum update kernel_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n i686: \n kernel-debuginfo-common-i686-4.14.104-78.84.amzn1.i686 \n kernel-tools-devel-4.14.104-78.84.amzn1.i686 \n kernel-devel-4.14.104-78.84.amzn1.i686 \n perf-4.14.104-78.84.amzn1.i686 \n kernel-4.14.104-78.84.amzn1.i686 \n kernel-headers-4.14.104-78.84.amzn1.i686 \n perf-debuginfo-4.14.104-78.84.amzn1.i686 \n kernel-tools-debuginfo-4.14.104-78.84.amzn1.i686 \n kernel-debuginfo-4.14.104-78.84.amzn1.i686 \n kernel-tools-4.14.104-78.84.amzn1.i686 \n \n src: \n kernel-4.14.104-78.84.amzn1.src \n \n x86_64: \n perf-debuginfo-4.14.104-78.84.amzn1.x86_64 \n kernel-debuginfo-common-x86_64-4.14.104-78.84.amzn1.x86_64 \n kernel-headers-4.14.104-78.84.amzn1.x86_64 \n kernel-devel-4.14.104-78.84.amzn1.x86_64 \n kernel-tools-debuginfo-4.14.104-78.84.amzn1.x86_64 \n perf-4.14.104-78.84.amzn1.x86_64 \n kernel-debuginfo-4.14.104-78.84.amzn1.x86_64 \n kernel-4.14.104-78.84.amzn1.x86_64 \n kernel-tools-4.14.104-78.84.amzn1.x86_64 \n kernel-tools-devel-4.14.104-78.84.amzn1.x86_64 \n \n \n", "edition": 5, "modified": "2019-03-07T18:18:00", "published": "2019-03-07T18:18:00", "id": "ALAS-2019-1167", "href": "https://alas.aws.amazon.com/ALAS-2019-1167.html", "title": "Important: kernel", "type": "amazon", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-10T12:37:00", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8912"], "description": "**Issue Overview:**\n\nIn the Linux kernel af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free (UAF) in sockfs_setattr. A local attacker can use this flaw to escalate privileges and take control of the system.([CVE-2019-8912 __](<https://access.redhat.com/security/cve/CVE-2019-8912>))\n\n \n**Affected Packages:** \n\n\nkernel\n\n \n**Issue Correction:** \nRun _yum update kernel_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n aarch64: \n kernel-4.14.104-95.84.amzn2.aarch64 \n kernel-headers-4.14.104-95.84.amzn2.aarch64 \n kernel-debuginfo-common-aarch64-4.14.104-95.84.amzn2.aarch64 \n perf-4.14.104-95.84.amzn2.aarch64 \n perf-debuginfo-4.14.104-95.84.amzn2.aarch64 \n python-perf-4.14.104-95.84.amzn2.aarch64 \n python-perf-debuginfo-4.14.104-95.84.amzn2.aarch64 \n kernel-tools-4.14.104-95.84.amzn2.aarch64 \n kernel-tools-devel-4.14.104-95.84.amzn2.aarch64 \n kernel-tools-debuginfo-4.14.104-95.84.amzn2.aarch64 \n kernel-devel-4.14.104-95.84.amzn2.aarch64 \n kernel-debuginfo-4.14.104-95.84.amzn2.aarch64 \n \n i686: \n kernel-headers-4.14.104-95.84.amzn2.i686 \n \n src: \n kernel-4.14.104-95.84.amzn2.src \n \n x86_64: \n kernel-4.14.104-95.84.amzn2.x86_64 \n kernel-headers-4.14.104-95.84.amzn2.x86_64 \n kernel-debuginfo-common-x86_64-4.14.104-95.84.amzn2.x86_64 \n perf-4.14.104-95.84.amzn2.x86_64 \n perf-debuginfo-4.14.104-95.84.amzn2.x86_64 \n python-perf-4.14.104-95.84.amzn2.x86_64 \n python-perf-debuginfo-4.14.104-95.84.amzn2.x86_64 \n kernel-tools-4.14.104-95.84.amzn2.x86_64 \n kernel-tools-devel-4.14.104-95.84.amzn2.x86_64 \n kernel-tools-debuginfo-4.14.104-95.84.amzn2.x86_64 \n kernel-devel-4.14.104-95.84.amzn2.x86_64 \n kernel-debuginfo-4.14.104-95.84.amzn2.x86_64 \n \n \n", "edition": 1, "modified": "2019-03-07T05:52:00", "published": "2019-03-07T05:52:00", "id": "ALAS2-2019-1167", "href": "https://alas.aws.amazon.com/AL2/ALAS-2019-1167.html", "title": "Important: kernel", "type": "amazon", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "paloalto": [{"lastseen": "2020-12-24T13:20:57", "bulletinFamily": "software", "cvelist": ["CVE-2019-8912"], "description": "Palo Alto Networks is aware of a use-after-free (UAF) vulnerability in the Linux kernel's sockfs_setattr. (Ref: PAN-113631/ CVE-2019-8912)\nSuccessful exploitation of this issue may allow an unprivileged local user to escalate their privileges on the system.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.17 and earlier, PAN-OS 8.1.8 and earlier, and PAN-OS 9.0.2 and earlier. \n\n**Work around:**\nN/A", "edition": 3, "modified": "2019-07-15T22:15:00", "published": "2019-07-15T22:15:00", "id": "PAN-SA-2019-0017", "href": "https://securityadvisories.paloaltonetworks.com/CVE-2019-8912", "title": "Privilege Escalation in PAN-OS", "type": "paloalto", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "avleonov": [{"lastseen": "2019-05-29T16:33:42", "bulletinFamily": "blog", "cvelist": ["CVE-2019-8912"], "description": "Well, there should have been an optimistic post about my vulnerability analysis & classification pet-project. Something like \"_blah-blah-blah the situation is pretty bad, tons of vulnerabilities and it's not clear which of them can be used by attackers. BUT there is a way how to make it better using trivial automation_\". And so on. It seems that it won't be any time soon. \u00af\\\\_(\u30c4)_/\u00af \n\nI've spent several weekends on making some code that takes vulnerability description and other related formalized data to \"separate the wheat from the chaff\". And what I get doesn't look like some universal solution at all. \n\nPretty frustrating, but still an interesting experience and great protection from being charmed by trendy and shiny \"predictive prioritization\". \n\n\n\nLiterally, when you start analyzing this vulnerability-related stuff every your assumption becomes wrong: \n\n * that **vulnerability description** is good enough to get an idea how the vulnerability can be exploited (let's discuss it in this post);\n * that CVSS characterizes the vulnerability somehow;\n * that the links to related objects (read: exploits) can be actually used for prioritization.\n\n**Actually, there is no reliable data that can be analyzed, trash is everywhere and everybody lies** \n\nLet's start from the vulnerability description. Great example is the last week critical Linux kernel vulnerability [CVE-2019-8912](<https://nvd.nist.gov/vuln/detail/CVE-2019-8912>).\n\n> In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.\n\nWow! I think every human being who read this, if he/she is not a Linux Kernel geek, will have these questions: \"And what's next? It's something about cryptography (\"crypto\") and sockets (\" sock\u2026\"), but what does this mean exactly for me and my IT infrastructure?\"\n\nThe links don't make it clearer. Securityfocus page is empty, and at ozlabs.org there is just some email messages where not a word is about actual exploitation. \n\n\n\nVulnerability Type \"Use After Free\" also doesn't give much actionable information. \n\nSo, how would you process it automatically, if even the manual analysis is tricky? And what would you do with such vulnerability if you don't get additional data? Just ignore it? Even if the criticality is high (Base Score: 9.8 CRITICAL for this vulnerability)? Lot's of questions.\n\nCertainly, there are some standard of vulnerability description and lot's of them contain the **name of the vulnerable application** and the **issue type** (RCE, DoS, Information Disclosure, etc.), that can be analyzed. But pretty huge part of them DON'T. Especially after Mitre gave third-party organizations ([93 CNAs](<https://cve.mitre.org/cve/request_id.html>)!) power to create their own CVE IDs. Technically for many CNAs NVD became became a bug tracker and they add there whatever they like.\n\nSo, when some Vulnerability Management vendor will tell you how they use advanced neural network and analyze 150 factors to get the sense from vulnerability description, ask them about CVE-2019-8912. \n\nNext time I am going to write about very different types of RCEs (some them are not really RCEs) and exploits (some of them are also not actually exploits). Stay tuned.\n\n", "modified": "2019-02-25T13:14:09", "published": "2019-02-25T13:14:09", "id": "AVLEONOV:D3596F92B2F86A7724B8DAF5CD2B6684", "href": "http://feedproxy.google.com/~r/avleonov/~3/L-sEeASCSOc/", "type": "avleonov", "title": "Martian Vulnerability Chronicles", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2019-04-12T15:14:15", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8980", "CVE-2019-8912", "CVE-2019-2024", "CVE-2019-9213", "CVE-2019-7308", "CVE-2019-3819"], "description": "The openSUSE Leap 15.0 was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2019-2024: A use-after-free when disconnecting a source was fixed\n which could lead to crashes. bnc#1129179).\n - CVE-2019-3819: A flaw was found in the Linux kernel in the function\n hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter\n an infinite loop with certain parameters passed from a userspace. A\n local privileged user ("root") can cause a system lock up and a denial\n of service. Versions from v4.18 and newer are vulnerable (bnc#1123161).\n - CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds\n speculation on pointer arithmetic in various cases, including cases of\n different branches with different state or limits to sanitize, leading\n to side-channel attacks (bnc#1124055).\n - CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglected to set a\n NULL value for a certain structure member, which leads to a\n use-after-free in sockfs_setattr (bnc#1125907).\n - CVE-2019-8980: A memory leak in the kernel_read_file function in\n fs/exec.c allowed attackers to cause a denial of service (memory\n consumption) by triggering vfs_read failures (bnc#1126209).\n - CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap\n minimum address, which made it easier for attackers to exploit kernel\n NULL pointer dereferences on non-SMAP platforms. This is related to a\n capability check for the wrong task (bnc#1128166).\n\n The following non-security bugs were fixed:\n\n - 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n - 9p: use inode->i_lock to protect i_size_write() under 32-bit\n (bsc#1051510).\n - acpi: acpi_pad: Do not launch acpi_pad threads on idle cpus\n (bsc#1113399).\n - acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n - acpi/device_sysfs: Avoid OF modalias creation for removed device\n (bsc#1051510).\n - acpi/nfit: Fix bus command validation (bsc#1051510).\n - acpi: NUMA: Use correct type for printing addresses on i386-PAE\n (bsc#1051510).\n - acpi / video: Extend chassis-type detection with a "Lunch Box" check\n (bsc#1051510).\n - acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n - alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against\n Liquid Saffire 56 (bsc#1051510).\n - alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n - alsa: echoaudio: add a check for ioremap_nocache (bsc#1051510).\n - alsa: firewire: add const qualifier to identifiers for read-only symbols\n (bsc#1051510).\n - alsa: firewire-motu: add a flag for AES/EBU on XLR interface\n (bsc#1051510).\n - alsa: firewire-motu: add specification flag for position of flag for\n MIDI messages (bsc#1051510).\n - alsa: firewire-motu: add support for MOTU Audio Express (bsc#1051510).\n - alsa: firewire-motu: add support for Motu Traveler (bsc#1051510).\n - alsa: firewire-motu: fix construction of PCM frame for capture direction\n (bsc#1051510).\n - alsa: firewire-motu: use 'version' field of unit directory to identify\n model (bsc#1051510).\n - alsa: hda - add Lenovo IdeaCentre B550 to the power_save_blacklist\n (bsc#1051510).\n - alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n - alsa: hda - Enforces runtime_resume after S3 and S4 for each codec\n (bsc#1051510).\n - alsa: hda/realtek - Add support for Acer Aspire E5-523G/ES1-432 headset\n mic (bsc#1051510).\n - alsa: hda/realtek: Disable PC beep in passthrough on alc285\n (bsc#1051510).\n - alsa: hda/realtek: Enable ASUS X441MB and X705FD headset MIC with ALC256\n (bsc#1051510).\n - alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294\n (bsc#1051510).\n - alsa: hda/realtek: Enable headset MIC of Acer AIO with ALC286\n (bsc#1051510).\n - alsa: hda/realtek: Enable headset MIC of Acer Aspire Z24-890 with ALC286\n (bsc#1051510).\n - alsa: hda/realtek: Enable headset mic of ASUS P5440FF with ALC256\n (bsc#1051510).\n - alsa: hda/realtek - Headset microphone and internal speaker support for\n System76 oryp5 (bsc#1051510).\n - alsa: hda/realtek - Headset microphone support for System76 darp5\n (bsc#1051510).\n - alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone\n (bsc#1126131).\n - alsa: hda - Record the current power state before suspend/resume calls\n (bsc#1051510).\n - alsa: opl3: fix mismatch between snd_opl3_drum_switch definition and\n declaration (bsc#1051510).\n - alsa: pcm: Do not suspend stream in unrecoverable PCM state\n (bsc#1051510).\n - alsa: pcm: Fix possible OOB access in PCM oss plugins (bsc#1051510).\n - alsa: rawmidi: Fix potential Spectre v1 vulnerability (bsc#1051510).\n - alsa: sb8: add a check for request_region (bsc#1051510).\n - alsa: seq: oss: Fix Spectre v1 vulnerability (bsc#1051510).\n - alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n - altera-stapl: check for a null key before strcasecmp'ing it\n (bsc#1051510).\n - apparmor: Fix aa_label_build() error handling for failed merges\n (bsc#1051510).\n - applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n - aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n - arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n - arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n - arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension()\n (bsc#1126393).\n - arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n - arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n - arm: pxa: avoid section mismatch warning (bsc#1051510).\n - arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n - ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages\n (bsc#1051510).\n - ASoC: dapm: change snprintf to scnprintf for possible overflow\n (bsc#1051510).\n - ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n - ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n - ASoC: imx-audmux: change snprintf to scnprintf for possible overflow\n (bsc#1051510).\n - ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n - ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field\n (bsc#1051510).\n - ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n - ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of()\n (bsc#1051510).\n - ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check\n (bsc#1051510).\n - assoc_array: Fix shortcut creation (bsc#1051510).\n - ata: ahci: mvebu: remove stale comment (bsc#1051510).\n - ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n - ath9k: dynack: check da->enabled first in sampling routines\n (bsc#1051510).\n - ath9k: dynack: make ewma estimation faster (bsc#1051510).\n - ath9k: dynack: use authentication messages for 'late' ack (bsc#1051510).\n - atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n - auxdisplay: hd44780: Fix memory leak on ->remove() (bsc#1051510).\n - auxdisplay: ht16k33: fix potential user-after-free on module unload\n (bsc#1051510).\n - ax25: fix possible use-after-free (bsc#1051510).\n - backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial\n (bsc#1113722)\n - batman-adv: Avoid WARN on net_device without parent in netns\n (bsc#1051510).\n - batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n - batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n - bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n - blk-mq: fix a hung issue when fsync (bsc#1125252).\n - block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n - block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n - blockdev: Fix livelocks on loop device (bsc#1124984).\n - block: do not use bio->bi_vcnt to figure out segment number\n (bsc#1128895).\n - block: do not warn when doing fsync on read-only devices (bsc#1125252).\n - block/loop: Use global lock for ioctl() operation (bsc#1124974).\n - block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n - bluetooth: Fix decrementing reference count twice in releasing socket\n (bsc#1051510).\n - bluetooth: Fix locking in bt_accept_enqueue() for BH context\n (bsc#1051510).\n - bluetooth: Fix unnecessary error message for HCI request completion\n (bsc#1051510).\n - bluetooth: hci_ldisc: Initialize hci_dev before open() (bsc#1051510).\n - bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in\n hci_uart_set_proto() (bsc#1051510).\n - bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).\n - bnxt_en: Wait longer for the firmware message response to complete\n (bsc#1086282).\n - bpf: decrease usercnt if bpf_map_new_fd() fails in\n bpf_map_get_fd_by_id() (bsc#1083647).\n - bpf: drop refcount if bpf_map_new_fd() fails in map_create()\n (bsc#1083647).\n - bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n - bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field\n (bsc#1083647).\n - bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n - bpf: Fix syscall's stackmap lookup potential deadlock (bsc#1083647).\n - bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n - bpf/verifier: fix verifier instability (bsc#1056787).\n - bsg: Do not copy sense if no response buffer is allocated\n (bsc#1106811,bsc#1126555).\n - btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n - btrfs: do not unnecessarily pass write_lock_level when processing leaf\n (bsc#1126802).\n - btrfs: ensure that a DUP or RAID1 block group has exactly two stripes\n (bsc#1128451).\n - btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n - btrfs: fix corruption reading shared and compressed extents after hole\n punching (bsc#1126476).\n - btrfs: fix deadlock between clone/dedupe and rename (bsc#1130518).\n - btrfs: fix deadlock when allocating tree block during leaf/node split\n (bsc#1126806).\n - btrfs: fix deadlock when using free space tree due to block group\n creation (bsc#1126804).\n - btrfs: fix fsync after succession of renames and unlink/rmdir\n (bsc#1126488).\n - btrfs: fix fsync after succession of renames of different files\n (bsc#1126481).\n - btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n - btrfs: fix reading stale metadata blocks after degraded raid1 mounts\n (bsc#1126803).\n - btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n - btrfs: grab write lock directly if write_lock_level is the max level\n (bsc#1126802).\n - btrfs: Improve btrfs_search_slot description (bsc#1126802).\n - btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n - btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n - btrfs: qgroup: Do not trace subtree if we're dropping reloc tree\n (bsc#1063638).\n - btrfs: qgroup: Finish rescan when hit the last leaf of extent tree\n (bsc#1129327).\n - btrfs: qgroup: Introduce function to find all new tree blocks of reloc\n tree (bsc#1063638).\n - btrfs: qgroup: Introduce function to trace two swaped extents\n (bsc#1063638).\n - btrfs: qgroup: Introduce per-root swapped blocks infrastructure\n (bsc#1063638).\n - btrfs: qgroup: Introduce trace event to analyse the number of dirty\n extents accounted (bsc#1063638 dependency).\n - btrfs: qgroup: Make qgroup async transaction commit more aggressive\n (bsc#1113042).\n - btrfs: qgroup: Only trace data extents in leaves if we're relocating\n data block group (bsc#1063638).\n - btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n - btrfs: qgroup: Search commit root for rescan to avoid missing extent\n (bsc#1129326).\n - btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n - btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents\n (bsc#1063638).\n - btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf\n (bsc#1129327).\n - btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots\n (bsc#1063638).\n - btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root\n lifespan (bsc#1129497).\n - btrfs: remove always true check in unlock_up (bsc#1126802).\n - btrfs: remove superfluous free_extent_buffer in read_block_for_search\n (bsc#1126802).\n - btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n - btrfs: remove unused check of skip_locking (bsc#1126802).\n - btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n - btrfs: send, fix race with transaction commits that create snapshots\n (bsc#1126802).\n - btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n - btrfs: split btrfs_extent_same (bsc#1127493).\n - btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n - btrfs: use more straightforward extent_buffer_uptodate check\n (bsc#1126802).\n - cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n - ceph: avoid repeatedly adding inode to mdsc->snap_flush_list\n (bsc#1126790).\n - ceph: clear inode pointer when snap realm gets dropped by its inode\n (bsc#1125799).\n - cfg80211: extend range deviation for DMG (bsc#1051510).\n - ch: add missing mutex_lock()/mutex_unlock() in ch_release()\n (bsc#1124235).\n - ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n - cifs: allow guest mounts to work for smb3.11 (bsc#1051510).\n - cifs: Always resolve hostname before reconnecting (bsc#1051510).\n - cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n - cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n - cifs: invalidate cache when we truncate a file (bsc#1051510).\n - cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n - clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n - clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n - clk: clk-twl6040: Fix imprecise external abort for pdmclk (bsc#1051510).\n - clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n - clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n - clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n - clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n - clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n - clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n - clk: ingenic: Fix doc of ingenic_cgu_div_info (bsc#1051510).\n - clk: ingenic: Fix round_rate misbehaving with non-integer dividers\n (bsc#1051510).\n - clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n - clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init()\n (bsc#1051510).\n - clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n - clk: samsung: exynos4: fix refcount leak in exynos4_get_xom()\n (bsc#1051510).\n - clk: socfpga: fix refcount leak (bsc#1051510).\n - clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n - clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks\n (bsc#1051510).\n - clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it\n (bsc#1051510).\n - clk: sunxi-ng: v3s: Fix TCON reset de-assert bit (bsc#1051510).\n - clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n - clk: vc5: Abort clock configuration without upstream clock (bsc#1051510).\n - clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n - clocksource/drivers/exynos_mct: Clear timer interrupt when shutdown\n (bsc#1051510).\n - clocksource/drivers/exynos_mct: Fix error path in timer resources\n initialization (bsc#1051510).\n - clocksource/drivers/exynos_mct: Move one-shot check from tick clear to\n ISR (bsc#1051510).\n - clocksource/drivers/integrator-ap: Add missing of_node_put()\n (bsc#1051510).\n - clocksource/drivers/sun5i: Fail gracefully when clock rate is\n unavailable (bsc#1051510).\n - configfs: fix registered group removal (bsc#1051510).\n - copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n - cpcap-charger: generate events for userspace (bsc#1051510).\n - cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n - cpufreq: conservative: Take limits changes into account properly\n (bsc#1051510).\n - cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n - cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n - cpufreq: governor: Ensure sufficiently large sampling intervals\n (bsc#1127042).\n - cpufreq: pxa2xx: remove incorrect __init annotation (bsc#1051510).\n - cpufreq: tegra124: add missing of_node_put() (bsc#1051510).\n - cpufreq: Use transition_delay_us for legacy governors as well\n (bsc#1127042).\n - cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n - crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n - crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n - crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling\n (bsc#1051510).\n - crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n - crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n - crypto: caam - fixed handling of sg list (bsc#1051510).\n - crypto: cavium/zip - fix collision with generic cra_driver_name\n (bsc#1051510).\n - crypto: crypto4xx - add missing of_node_put after of_device_is_available\n (bsc#1051510).\n - crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove()\n arguments (bsc#1051510).\n - crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails (bsc#1051510).\n - crypto: testmgr - skip crc32c context test for ahash algorithms\n (bsc#1051510).\n - crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n - crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n - crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n - cw1200: drop useless LIST_HEAD (bsc#1051510).\n - cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan()\n (bsc#1051510).\n - cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n - dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n - debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n - device property: Fix the length used in PROPERTY_ENTRY_STRING()\n (bsc#1051510).\n - dlm: Do not swamp the CPU with callbacks queued during recovery\n (bsc#1051510).\n - dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n - dmaengine: at_xdmac: Fix wrongfull report of a channel as in use\n (bsc#1051510).\n - dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n - dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n - dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n - dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n - dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n - dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n - dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n - dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n - dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n - dmaengine: stm32-dma: fix incomplete configuration in cyclic mode\n (bsc#1051510).\n - dma: Introduce dma_max_mapping_size() (bsc#1120008).\n - doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n - Do not log confusing message on reconnect by default (bsc#1129664).\n - driver core: Do not resume suppliers under device_links_write_lock()\n (bsc#1051510).\n - drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389,\n bsc#1126579).\n - drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI\n (bsc#1126389, bsc#1126579).\n - drivers: hv: vmbus: Return -EINVAL for the sys files for unopened\n channels (bsc#1126389, bsc#1126579).\n - drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n - drm/ast: Fix connector leak during driver unload (bsc#1051510).\n - drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n - drm/atomic-helper: Complete fake_commit->flip_done potentially earlier\n (bsc#1051510).\n - drm: Block fb changes for async plane updates (bsc#1051510).\n - drm/bridge: tc358767: add defines for DP1_SRCCTRL & PHY_2LANE\n (bsc#1051510).\n - drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n - drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n - drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n - drm/bridge: tc358767: reject modes which require too much BW\n (bsc#1051510).\n - drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n - drm: Clear state->acquire_ctx before leaving\n drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n - drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n - drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n - drm/etnaviv: potential NULL dereference (bsc#1113722)\n - drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n - drm/i915/bios: assume eDP is present on port A when there is no VBT\n (bsc#1051510).\n - drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n - drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n - drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n - drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n - drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one\n workload (bsc#1051510).\n - drm/i915/opregion: fix version check (bsc#1113722)\n - drm/i915/opregion: rvda is relative from opregion base in opregion\n (bsc#1113722)\n - drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set\n (bsc#1113722)\n - drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n - drm/i915: Relax mmap VMA check (bsc#1051510).\n - drm/i915: Use the correct crtc when sanitizing plane mapping\n (bsc#1113722)\n - drm/imx: ignore plane updates on disabled crtcs (bsc#1051510).\n - drm/imx: imx-ldb: add missing of_node_puts (bsc#1051510).\n - drm/meson: add missing of_node_put (bsc#1051510).\n - drm/modes: Prevent division by zero htotal (bsc#1051510).\n - drm/msm: Fix error return checking (bsc#1051510).\n - drm/msm: Grab a vblank reference when waiting for commit_done\n (bsc#1051510).\n - drm/msm: Unblock writer if reader closes file (bsc#1051510).\n - drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON\n (bsc#1113722)\n - drm/nouveau/debugfs: Fix check of pm_runtime_get_sync failure\n (bsc#1051510).\n - drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n - drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n - drm/nouveau/falcon: avoid touching registers if engine is off\n (bsc#1051510).\n - drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n - drm/radeon/evergreen_cs: fix missing break in switch statement\n (bsc#1113722)\n - drm: Reorder set_property_atomic to avoid returning with an active\n ww_ctx (bsc#1051510).\n - drm/rockchip: fix for mailbox read size (bsc#1051510).\n - drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n - drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init\n (bsc#1051510).\n - drm/vmwgfx: Do not double-free the mode stored in par->set_mode\n (bsc#1103429)\n - earlycon: Initialize port->uartclk based on clock-frequency property\n (bsc#1051510).\n - earlycon: Remove hardcoded port->uartclk initialization in\n of_setup_earlycon (bsc#1051510).\n - Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n - Enable livepatch test drivers in lib/ Livepatch kselftests need those.\n - enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n - enic: fix checksum validation for IPv6 (bsc#1051510).\n - esp6: fix memleak on error path in esp6_input (bsc#1051510).\n - esp: Fix locking on page fragment allocation (bsc#1051510).\n - esp: Fix memleaks on error paths (bsc#1051510).\n - esp: Fix skb tailroom calculation (bsc#1051510).\n - ext4: avoid kernel warning when writing the superblock to a dead device\n (bsc#1124981).\n - ext4: Avoid panic during forced reboot (bsc#1126356).\n - ext4: check for shutdown and r/o file system in ext4_write_inode()\n (bsc#1124978).\n - ext4: fix a potential fiemap/page fault deadlock w/ inline_data\n (bsc#1124980).\n - ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n - ext4: include terminating u32 in size of xattr entries when expanding\n inodes (bsc#1124976).\n - ext4: make sure enough credits are reserved for dioread_nolock writes\n (bsc#1124979).\n - ext4: track writeback errors using the generic tracking infrastructure\n (bsc#1124982).\n - fbdev: chipsfb: remove set but not used variable 'size' (bsc#1113722)\n - firmware/efi: Add NULL pointer checks in efivars API functions\n (bsc#1051510).\n - floppy: check_events callback should not return a negative number\n (bsc#1051510).\n - fs/dax: deposit pagetable even when installing zero page (bsc#1126740).\n - fs/dcache: Fix incorrect nr_dentry_unused accounting in\n shrink_dcache_sb() (git-fixes).\n - fs/devpts: always delete dcache dentry-s in dput() (git-fixes).\n - fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n - fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS\n (bsc#1051510).\n - fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n - fuse: handle zero sized retrieve correctly (bsc#1051510).\n - futex: Fix (possible) missed wakeup (bsc#1050549).\n - gdrom: fix a memory leak bug (bsc#1051510).\n - geneve: cleanup hard coded value for Ethernet header length\n (bsc#1123456).\n - geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n - geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n - geneve, vxlan: Do not set exceptions if skb->len &lt; mtu (bsc#1123456).\n - genwqe: Fix size check (bsc#1051510).\n - gfs2: Revert "Fix loop in gfs2_rbm_find" (bsc#1120601).\n - gianfar: fix a flooded alignment reports because of padding issue\n (bsc#1051510).\n - gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n - gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n - gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n - gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n - gpu: ipu-v3: image-convert: Prevent race between run and unprepare\n (bsc#1051510).\n - gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n - hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n - hpet: Fix missing '=' character in the __setup() code of\n hpet_mmap_enable (git-fixes).\n - hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common()\n (bsc#1051510).\n - hv: reduce storvsc_ringbuffer_size from 1M to 128K to simplify booting\n with 1k vcpus ().\n - hv: v4.12 API for hyperv-iommu (bsc#1122822).\n - hwmon: (lm80) fix a missing check of bus read in lm80 probe\n (bsc#1051510).\n - hwmon: (lm80) fix a missing check of the status of SMBus read\n (bsc#1051510).\n - hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n - hwmon: (tmp421) Correct the misspelling of the tmp442 compatible\n attribute in OF device ID table (bsc#1051510).\n - HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n - i2c-axxia: check for error conditions first (bsc#1051510).\n - i2c: bcm2835: Clear current buffer pointers and counts after a transfer\n (bsc#1051510).\n - i2c: cadence: Fix the hold bit setting (bsc#1051510).\n - i2c: omap: Use noirq system sleep pm ops to idle device for suspend\n (bsc#1051510).\n - i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n - i2c: tegra: fix maximum transfer size (bsc#1051510).\n - ib/core: Destroy QP if XRC QP fails (bsc#1046306).\n - ib/core: Fix potential memory leak while creating MAD agents\n (bsc#1046306).\n - ib/core: Unregister notifier before freeing MAD security (bsc#1046306).\n - ib/hfi1: Close race condition on user context disable and close\n (bsc#1060463).\n - ib/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n - ibmvnic: Report actual backing device speed and duplex values\n (bsc#1129923).\n - ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n - ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton\n (bsc#1119019).\n - ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done\n (bsc#1051510).\n - igb: Fix an issue that PME is not enabled during runtime suspend\n (bsc#1051510).\n - iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).\n - iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n - iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius\n (bsc#1051510).\n - Input: bma150 - register input device after setting private data\n (bsc#1051510).\n - input: cap11xx - switch to using set_brightness_blocking() (bsc#1051510).\n - Input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK\n (bsc#1051510).\n - Input: elan_i2c - add id for touchpad found in Lenovo s21e-20\n (bsc#1051510).\n - Input: elantech - enable 3rd button support on Fujitsu CELSIUS H780\n (bsc#1051510).\n - input: matrix_keypad - use flush_delayed_work() (bsc#1051510).\n - Input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n - input: st-keyscan - fix potential zalloc NULL dereference (bsc#1051510).\n - input: uinput - fix undefined behavior in uinput_validate_absinfo()\n (bsc#1120902).\n - Input: wacom_serial4 - add support for Wacom ArtPad II tablet\n (bsc#1051510).\n - intel_th: Do not reference unassigned outputs (bsc#1051510).\n - intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n - iomap: fix integer truncation issues in the zeroing and dirtying helpers\n (bsc#1125947).\n - iomap: warn on zero-length mappings (bsc#1127062).\n - iommu/amd: Fix NULL dereference bug in match_hid_uid (bsc#1130336).\n - iommu/amd: fix sg->dma_address for sg->offset bigger than PAGE_SIZE\n (bsc#1130337).\n - iommu/amd: Reserve exclusion range in iova-domain (bsc#1130425).\n - iommu/dmar: Fix buffer overflow during PCI bus notification\n (bsc#1129181).\n - iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n - iommu: Do not print warning when IOMMU driver only supports unmanaged\n domains (bsc#1130130).\n - iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n - iommu/vt-d: Check capability before disabling protected memory\n (bsc#1130338).\n - iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n - iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm()\n (bsc#1129184).\n - ip6: fix PMTU discovery when using /127 subnets (git-fixes).\n - ip6mr: Do not call __IP6_INC_STATS() from preemptible context\n (git-fixes).\n - ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n - ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit\n (bsc#1123456).\n - ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n - ipv4/route: fail early when inet dev is missing (git-fixes).\n - ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n - ipv6: addrlabel: per netns list (bsc#1122982).\n - ipv6: Consider sk_bound_dev_if when binding a socket to an address\n (networking-stable-19_02_01).\n - ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped\n address (networking-stable-19_01_22).\n - ipv6: fix kernel-infoleak in ipv6_local_error()\n (networking-stable-19_01_20).\n - ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh\n patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch\n - ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses\n (networking-stable-19_01_22).\n - ipvlan, l3mdev: fix broken l3s mode wrt local routes\n (networking-stable-19_02_01).\n - irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size\n (bsc#1051510).\n - irqchip/gic-v3-its: Avoid parsing _indirect_ twice for Device table\n (bsc#1051510).\n - irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node\n (bsc#1051510).\n - irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n - irqchip/mmp: Only touch the PJ4 IRQ & FIQ bits on enable/disable\n (bsc#1051510).\n - iscsi_ibft: Fix missing break in switch statement (bsc#1051510).\n - isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n - isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in\n HFCPCI_l1hw() (bsc#1051510).\n - isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n - iser: set sector for ambiguous mr status errors (bsc#1051510).\n - iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n - iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n - iwlwifi: mvm: fix firmware statistics usage (bsc#1129770).\n - iwlwifi: mvm: fix RSS config command (bsc#1051510).\n - iwlwifi: pcie: fix emergency path (bsc#1051510).\n - iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n - ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n - ixgbe: check return value of napi_complete_done() (bsc#1051510).\n - ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n - kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n - kabi: handle addition of ip6addrlbl_table into struct netns_ipv6\n (bsc#1122982).\n - kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n - kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n - kabi: protect vhost_log_write (kabi).\n - kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n - kabi workaround for ath9k ath_node.ackto type change (bsc#1051510).\n - kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n - kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n - kasan: fix shadow_size calculation error in kasan_module_alloc\n (bsc#1051510).\n - kbuild: fix false positive warning/error about missing libelf\n (bsc#1051510).\n - kconfig: fix file name and line number of warn_ignored_character()\n (bsc#1051510).\n - kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n - kconfig: fix memory leak when EOF is encountered in quotation\n (bsc#1051510).\n - kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n - keys: allow reaching the keys quotas exactly (bsc#1051510).\n - keys: Timestamp new keys (bsc#1051510).\n - kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var()\n (bsc#1051510).\n - kgdboc: Fix restrict error (bsc#1051510).\n - kgdboc: Fix warning with module build (bsc#1051510).\n - kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n - kobject: copy env blob in one go (bsc#1122982).\n - kobject: factorize skb setup in kobject_uevent_net_broadcast()\n (bsc#1122982).\n - kprobes: Return error if we fail to reuse kprobe instead of BUG_ON()\n (bsc#1051510).\n - kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n - kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails\n (bsc#1129291).\n - kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from\n HLT (bsc#1129292).\n - kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page\n (bsc#1129293).\n - kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n - kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).\n - kvm: x86: Fix single-step debugging (bsc#1129295).\n - kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup\n (bsc#1129296).\n - l2tp: copy 4 more bytes to linear part if necessary\n (networking-stable-19_02_01).\n - l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n - l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n - leds: lp5523: fix a missing check of return value of lp55xx_read\n (bsc#1051510).\n - leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n - libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive()\n (bsc#1125800).\n - libceph: handle an empty authorize reply (bsc#1126789).\n - libceph: wait for latest osdmap in ceph_monc_blacklist_add()\n (bsc#1130427).\n - lib/div64.c: off by one in shift (bsc#1051510).\n - libertas_tf: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).\n - libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n - libnvdimm/label: Clear 'updating' flag after label-set update\n (bsc#1129543).\n - libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n - lightnvm: fail fast on passthrough commands (bsc#1125780).\n - livepatch: Change unsigned long old_addr -> void *old_func in struct\n klp_func (bsc#1071995).\n - livepatch: Consolidate klp_free functions (bsc#1071995 ).\n - livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n - livepatch: Define a macro for new API identification (bsc#1071995).\n - livepatch: Do not block the removal of patches loaded after a forced\n transition (bsc#1071995).\n - livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n - livepatch: Module coming and going callbacks can proceed with all listed\n patches (bsc#1071995).\n - livepatch: Proper error handling in the shadow variables selftest\n (bsc#1071995).\n - livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n - livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n - livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n - livepatch: Send a fake signal periodically (bsc#1071995 ).\n - livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code\n (bsc#1071995).\n - livepatch: Simplify API by removing registration step (bsc#1071995).\n - llc: do not use sk_eat_skb() (bsc#1051510).\n - locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n - loop: drop caches if offset or block_size are changed (bsc#1124975).\n - loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n - mac80211: Add attribute aligned(2) to struct 'action' (bsc#1051510).\n - mac80211: do not initiate TDLS connection if station is not associated\n to AP (bsc#1051510).\n - mac80211: ensure that mgmt tx skbs have tailroom for encryption\n (bsc#1051510).\n - mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n - mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n - mac80211: Fix Tx aggregation session tear down with ITXQs (bsc#1051510).\n - mac80211: Free mpath object when rhashtable insertion fails\n (bsc#1051510).\n - mac80211_hwsim: propagate genlmsg_reply return code (bsc#1051510).\n - mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n - macvlan: Only deliver one copy of the frame to the macvlan interface\n (bsc#1051510).\n - mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue\n (bsc#1051510).\n - mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n - media: adv*/tc358743/ths8200: fill in min width/height/pixelclock\n (bsc#1051510).\n - media: DaVinci-VPBE: fix error handling in vpbe_initialize()\n (bsc#1051510).\n - media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor\n (bsc#1051510).\n - media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm()\n (bsc#1051510).\n - media: rc: mce_kbd decoder: fix stuck keys (bsc#1100132).\n - media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n - media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration\n (bsc#1051510).\n - media: s5p-jpeg: Correct step and max values for\n V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n - media: s5p-mfc: fix incorrect bus assignment in virtual child device\n (bsc#1051510).\n - media: uvcvideo: Avoid NULL pointer dereference at the end of streaming\n (bsc#1051510).\n - media: uvcvideo: Fix 'type' check leading to overflow (bsc#1051510).\n - media: v4l2-ctrls.c/uvc: zero v4l2_event (bsc#1051510).\n - media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n - media: vb2: do not call __vb2_queue_cancel if vb2_start_streaming failed\n (bsc#1119086).\n - memremap: fix softlockup reports at teardown (bnc#1130154).\n - memstick: Prevent memstick host from getting runtime suspended during\n card detection (bsc#1051510).\n - mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n - mfd: mc13xxx: Fix a missing check of a register-read failure\n (bsc#1051510).\n - mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported\n (bsc#1051510).\n - mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n - mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd\n cells (bsc#1051510).\n - mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in\n probe() (bsc#1051510).\n - mfd: twl-core: Fix section annotations on {,un}protect_pm_master\n (bsc#1051510).\n - mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n - misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n - misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n - mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n - mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable\n (git-fixes).\n - mlxsw: spectrum: Disable lag port TX before removing it\n (networking-stable-19_01_22).\n - mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n - mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n - mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n - mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n - mmc: omap: fix the maximum timeout setting (bsc#1051510).\n - mmc: pxamci: fix enum type confusion (bsc#1051510).\n - mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe\n (bsc#1051510).\n - mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n - mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n - mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n - mmc: spi: Fix card detection during probe (bsc#1051510).\n - mm: do not drop unused pages when userfaultd is running (git fixes\n (mm/userfaultfd)).\n - mm: Fix modifying of page protection by insert_pfn() (bsc#1126740).\n - mm: Fix warning in insert_pfn() (bsc#1126740).\n - mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n - mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes\n (mm/hwpoison)).\n - mm/ksm.c: ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm()\n (git fixes (mm/ksm)).\n - mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n - mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages\n (bsc#1127731).\n - mm: migrate: do not rely on __PageMovable() of newpage after unlocking\n it (git fixes (mm/migrate)).\n - mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n - mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n - mm,vmscan: Make unregister_shrinker() no-op if register_shrinker()\n failed (git fixes (mm/vmscan)).\n - Move upstreamed ALSA and BT patches into sorted section\n - Move upstreamed libnvdimm patch into sorted section\n - mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking\n (bsc#1051510).\n - mtd: cfi_cmdset_0002: Change write buffer to check correct value\n (bsc#1051510).\n - mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n - mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary\n (bsc#1051510).\n - mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n - mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n - mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n - mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n - mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n - mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n - mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n - mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n - mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n - mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n - mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n - mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE\n (bsc#1051510).\n - mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]()\n (bsc#1051510).\n - mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n - mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n - mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n - mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM\n (bsc#1051510).\n - mtd: nand: ifc: update bufnum mask for ver >= 2.0.0 (bsc#1051510).\n - mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n - mtd: nand: omap2: Fix subpage write (bsc#1051510).\n - mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n - mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n - mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n - mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n - mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n - mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n - mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n - mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n - mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than\n 16MB (bsc#1051510).\n - mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code\n (bsc#1051510).\n - mv88e6060: disable hardware level MAC learning (bsc#1051510).\n - nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n - net: add uevent socket member (bsc#1122982).\n - net: aquantia: driver should correctly declare vlan_features bits\n (bsc#1051510).\n - net: aquantia: fixed instack structure overflow (git-fixes).\n - net: aquantia: Fix hardware DMA stream overload on large MRRS\n (bsc#1051510).\n - net: bcmgenet: abort suspend on error (bsc#1051510).\n - net: bcmgenet: code movement (bsc#1051510).\n - net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n - net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n - net: bcmgenet: return correct value 'ret' from bcmgenet_power_down\n (bsc#1051510).\n - net: bridge: fix a bug on using a neighbour cache entry without checking\n its state (networking-stable-19_01_20).\n - net: bridge: Fix ethernet header pointer before check skb forwardable\n (networking-stable-19_01_26).\n - net: do not call update_pmtu unconditionally (bsc#1123456).\n - net: Do not default Cavium PTP driver to 'y' (bsc#1110096).\n - net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n - net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in\n mv88e6xxx_port_set_duplex (git-fixes).\n - net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n - net: dsa: slave: Do not propagate flag changes on down slave interfaces\n (networking-stable-19_02_10).\n - net: ena: fix race between link up and device initalization\n (bsc#1083548).\n - net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129276\n bsc#1125342).\n - netfilter: check for seqadj ext existence before adding it in\n nf_nat_setup_info (git-fixes).\n - netfilter: nf_tables: check the result of dereferencing\n base_chain->stats (git-fixes).\n - net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n - net: ipv4: Fix memory leak in network namespace dismantle\n (networking-stable-19_01_26).\n - net/mlx4_core: Add masking for a few queries on HCA caps\n (networking-stable-19_02_01).\n - net/mlx4_core: Fix locking in SRIOV mode when switching between events\n and polling (git-fixes).\n - net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n - net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n - net/mlx5e: Allow MAC invalidation while spoofchk is ON\n (networking-stable-19_02_01).\n - net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n - net/mlx5e: RX, Fix wrong early return in receive queue poll\n (bsc#1046305).\n - net/mlx5: fix uaccess beyond "count" in debugfs read/write handlers\n (git-fixes).\n - net/mlx5: Release resource on error flow (git-fixes).\n - net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state\n (git-fixes).\n - net/mlx5: Use multi threaded workqueue for page fault handling\n (git-fixes).\n - net/ncsi: Fix AEN HNCDSC packet length (git-fixes).\n - net/ncsi: Stop monitor if channel times out or is inactive (git-fixes).\n - net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n - netns: restrict uevents (bsc#1122982).\n - net: phy: marvell: Errata for mv88e6390 internal PHYs\n (networking-stable-19_01_26).\n - net: phy: mdio_bus: add missing device_del() in mdiobus_register() error\n handling (networking-stable-19_01_26).\n - net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n - netrom: switch to sock timer API (bsc#1051510).\n - net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n - net/sched: act_tunnel_key: fix memory leak in case of action replace\n (networking-stable-19_01_26).\n - net_sched: refetch skb protocol for each filter\n (networking-stable-19_01_26).\n - net: set default network namespace in init_dummy_netdev()\n (networking-stable-19_02_01).\n - net: stmmac: Fix a race in EEE enable callback (git-fixes).\n - net: stmmac: fix broken dma_interrupt handling for multi-queues\n (git-fixes).\n - net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n - net: stmmac: Use mutex instead of spinlock (git-fixes).\n - net-sysfs: Fix mem leak in netdev_register_kobject (git-fixes).\n - net: systemport: Fix WoL with password after deep sleep\n (networking-stable-19_02_10).\n - net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n - nfit: acpi_nfit_ctl(): Check out_obj->type in the right place\n (bsc#1129547).\n - nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot\n (bsc#1051510).\n - nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n - nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n - nfsd: fix memory corruption caused by readdir (bsc#1127445).\n - niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n - ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n - nvme-fc: reject reconnect if io queue count is reduced to zero\n (bsc#1128351).\n - nvme: flush namespace scanning work just before removing namespaces\n (bsc#1108101).\n - nvme: kABI fix for scan_lock (bsc#1123882).\n - nvme: lock NS list changes while handling command effects (bsc#1123882).\n - nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n - nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n - nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n - nvme: schedule requeue whenever a LIVE state is entered (bsc#1123105).\n - of, numa: Validate some distance map rules (bsc#1051510).\n - of: unittest: Disable interrupt node tests for old world MAC systems\n (bsc#1051510).\n - openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n - openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n - openvswitch: Remove padding from packet before L3+ conntrack processing\n (bsc#1051510).\n - parport_pc: fix find_superio io compare code, should use equal test\n (bsc#1051510).\n - Partially revert "block: fail op_is_write() requests to (bsc#1125252).\n - pci: add USR vendor id and use it in r8169 and w6692 driver\n (networking-stable-19_01_22).\n - pci: designware-ep: dw_pcie_ep_set_msi() should only set MMC bits\n (bsc#1051510).\n - pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio()\n (bsc#1051510).\n - pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus\n (bsc#1122822).\n - pci/pme: Fix hotplug/sysfs remove deadlock in pcie_pme_remove()\n (bsc#1051510).\n - pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n - pcrypt: use format specifier in kobject_add (bsc#1051510).\n - perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n - perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu()\n (bsc#1121805).\n - perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n - perf/x86/intel: Fix memory corruption (bsc#1121805).\n - perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n - perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n - perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n - phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving\n VBUS (bsc#1051510).\n - phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n - phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n - phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n - phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n - phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n - phy: tegra: remove redundant self assignment of 'map' (bsc#1051510).\n - phy: work around 'phys' references to usb-nop-xceiv devices\n (bsc#1051510).\n - pinctrl: max77620: Use define directive for max77620_pinconf_param\n values (bsc#1051510).\n - pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n - pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins\n (bsc#1051510).\n - pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n - pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins\n (bsc#1051510).\n - pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n - pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n - pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group\n (bsc#1051510).\n - pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group\n (bsc#1051510).\n - pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n - pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n - pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b\n group (bsc#1051510).\n - pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group\n (bsc#1051510).\n - pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n - pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n - pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration\n (bsc#1051510).\n - pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n - pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group\n (bsc#1051510).\n - pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n - pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n - pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n - pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n - pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n - pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n - pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n - pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n - pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n - platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n - pm / wakeup: Rework wakeup source timer cancellation (bsc#1051510).\n - powercap: intel_rapl: add support for Jacobsville ().\n - powerpc/64s: Clear on-stack exception marker upon exception return\n (bsc#1071995).\n - powerpc/livepatch: relax reliable stack tracer checks for first-frame\n (bsc#1071995).\n - powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable()\n (bsc#1071995).\n - powerpc/pseries: export timebase register sample in lparcfg\n (bsc#1127750).\n - powerpc/pseries/mce: Fix misleading print for TLB mutlihit (bsc#1094244,\n git-fixes).\n - powerpc/pseries: Perform full re-add of CPU for topology update\n post-migration (bsc#1125728).\n - power: supply: charger-manager: Fix incorrect return value (bsc#1051510).\n - pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n - proc/sysctl: do not return ENOMEM on lookup when a table is\n unregistering (git-fixes).\n - pseries/energy: Use OF accessor function to read ibm,drc-indexes\n (bsc#1129080).\n - ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n - ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n - pwm-backlight: Enable/disable the PWM before/after LCD enable toggle\n (bsc#1051510).\n - qmi_wwan: add MTU default to qmap network interface\n (networking-stable-19_01_22).\n - qmi_wwan: apply SET_DTR quirk to Sierra WP7607 (bsc#1051510).\n - qmi_wwan: Fix qmap header retrieval in qmimux_rx_fixup (bsc#1051510).\n - r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n - r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n - rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set\n (bsc#1125797).\n - rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes\n (kernel/rcu)).\n - rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes\n (kernel/rcu)).\n - rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n - Refresh\n patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch\n (bsc#1119843)\n - regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting\n (bsc#1051510).\n - regulator: max77620: Initialize values for DT properties (bsc#1051510).\n - regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n - regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n - regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n - regulator: s2mpa01: Fix step values for some LDOs (bsc#1051510).\n - regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n - regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA\n (bsc#1051510).\n - Remove blacklist of virtio patch so we can install it (bsc#1114585)\n - Remove patches rejected upstream ().\n - Revert drm/i915 patches that caused regressions (bsc#1131062)\n - Revert "drm/rockchip: Allow driver to be shutdown on reboot/kexec"\n (bsc#1051510).\n - Revert "Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire\n F5-573G" (bsc#1051510).\n - Revert "ipv4: keep skb->dst around in presence of IP options"\n (git-fixes).\n - Revert "openvswitch: Fix template leak in error cases." (bsc#1051510).\n - Revert "scsi: qla2xxx: Fix NVMe Target discovery" (bsc#1125252).\n - Revert "sd: disable logical block provisioning if 'lbpme' is not set"\n This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not\n accepted upstream.\n - Revert the previous merge of drm fixes The branch was merged mistakenly\n and breaks the build. Revert it.\n - Revert "xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA\n issue" (bsc#1120854).\n - rhashtable: Still do rehash when we get EEXIST (bsc#1051510).\n - rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n - rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n - rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n - rtc: 88pm80x: fix unintended sign extension (bsc#1051510).\n - rtc: 88pm860x: fix unintended sign extension (bsc#1051510).\n - rtc: cmos: ignore bogus century byte (bsc#1051510).\n - rtc: ds1672: fix unintended sign extension (bsc#1051510).\n - rtc: Fix overflow when converting time64_t to rtc_time (bsc#1051510).\n - rtc: pm8xxx: fix unintended sign extension (bsc#1051510).\n - rtnetlink: bring NETDEV_CHANGE_TX_QUEUE_LEN event process back in\n rtnetlink_event (git-fixes).\n - rtnetlink: bring NETDEV_CHANGEUPPER event process back in\n rtnetlink_event (git-fixes).\n - rtnetlink: bring NETDEV_POST_TYPE_CHANGE event process back in\n rtnetlink_event (git-fixes).\n - rtnetlink: check DO_SETLINK_NOTIFY correctly in do_setlink (git-fixes).\n - rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n - s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n - s390/cpum_cf: Reject request for sampling in event initialization\n (git-fixes).\n - s390/early: improve machine detection (git-fixes).\n - s390/mm: always force a load of the primary ASCE on context switch\n (git-fixes).\n - s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n - s390/qeth: cancel close_dev work before removing a card (LTC#175898,\n bsc#1127561).\n - s390/qeth: conclude all event processing before offlining a card\n (LTC#175901, bsc#1127567).\n - s390/qeth: fix use-after-free in error path (bsc#1127534).\n - s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n - s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n - s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n - s390/sthyi: Fix machine name validity indication (git-fixes).\n - sata_rcar: fix deferred probing (bsc#1051510).\n - sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n - sched: Do not re-read h_load_next during hierarchical load calculation\n (bnc#1120909).\n - sched/wake_q: Document wake_q_add() (bsc#1050549).\n - sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n - sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n - sch_multiq: fix double free on init failure (bsc#1051510).\n - scripts/git_sort/git_sort.py: add vfs "fixes" branch\n - scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n - scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n - scsi: fix queue cleanup race before queue initialization is done\n (bsc#1125252).\n - scsi: ibmvscsi: Fix empty event pool access during host removal\n (bsc#1119019).\n - scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton\n (bsc#1119019).\n - scsi: libiscsi: fix possible NULL pointer dereference in case of TMF\n (bsc#1127378).\n - scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task\n (bsc#1122192).\n - scsi: lpfc: Add log messages to aid in debugging fc4type discovery\n issues (bsc#1121317).\n - scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n - scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt\n is invalid (bsc#1121317).\n - scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n - scsi: lpfc: Fix link state reporting for trunking when adapter is\n offline (bsc#1121317).\n - scsi: lpfc: fix remoteport access (bsc#1125252).\n - scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n - scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n - scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n - scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).\n - scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n - scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to\n %s: (bsc#1117108).\n - scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging\n levels (bsc#1117108).\n - scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT\n (bsc#1117108).\n - scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to\n ioc_<level> (bsc#1117108).\n - scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler()\n (bsc#1117108).\n - scsi: mpt3sas: Fix indentation (bsc#1117108).\n - scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n - scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n - scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n - scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n - scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks\n (bsc#1117108).\n - scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n - scsi: mpt3sas: Split _base_reset_handler(),\n mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler()\n (bsc#1117108).\n - scsi: mpt3sas: Swap I/O memory read value back to cpu endianness\n (bsc#1117108).\n - scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n - scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n - scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n - scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n - scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n - scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n - scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n - scsi: qla2xxx: Initialize port speed to avoid setting lower speed\n (bsc#1094555).\n - scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n - scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n - scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n - scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n - scsi: storvsc: Fix a race in sub-channel creation that can cause panic\n ().\n - scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir()\n (bsc#1125315).\n - scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices\n (bsc#1114585).\n - sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n - sctp: improve the events for sctp stream adding\n (networking-stable-19_02_01).\n - sctp: improve the events for sctp stream reset\n (networking-stable-19_02_01).\n - sd: disable logical block provisioning if 'lbpme' is not set\n (bsc#1086095 bsc#1078355).\n - selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n - selftests/livepatch: introduce tests (bsc#1071995).\n - selinux: always allow mounting submounts (bsc#1051510).\n - seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n - serial: 8250_of: assume reg-shift of 2 for mrvl,mmp-uart (bsc#1051510).\n - serial: 8250_pci: Fix number of ports for ACCES serial cards\n (bsc#1051510).\n - serial: 8250_pci: Have ACCES cards that use the four port Pericom\n PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n - serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n - serial: fsl_lpuart: clear parity enable bit when disable parity\n (bsc#1051510).\n - serial: fsl_lpuart: fix maximum acceptable baud rate with over-sampling\n (bsc#1051510).\n - serial: imx: Update cached mctrl value when changing RTS (bsc#1051510).\n - serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO\n (bsc#1051510).\n - skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n - sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n - sky2: Increase D3 delay again (bsc#1051510).\n - smb311: Improve checking of negotiate security contexts (bsc#1051510).\n - smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n - smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon\n (bsc#1051510).\n - smb3: Fix SMB3.1.1 guest mounts to Samba (bsc#1051510).\n - smb3: remove noisy warning message on mount (bsc#1129664).\n - soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n - soc: fsl: qbman: avoid race in clearing QMan interrupt (bsc#1051510).\n - soc/tegra: Do not leak device tree node reference (bsc#1051510).\n - spi: pxa2xx: Setup maximum supported DMA transfer length (bsc#1051510).\n - spi: ti-qspi: Fix mmap read when more than one CS in use (bsc#1051510).\n - spi/topcliff_pch: Fix potential NULL dereference on allocation error\n (bsc#1051510).\n - splice: do not merge into linked buffers (git-fixes).\n - staging: comedi: ni_660x: fix missing break in switch statement\n (bsc#1051510).\n - staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n - staging: iio: ad7780: update voltage on read (bsc#1051510).\n - staging: iio: adc: ad7280a: handle error from __ad7280_read32()\n (bsc#1051510).\n - staging: iio: adt7316: allow adt751x to use internal vref for all dacs\n (bsc#1051510).\n - staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n - staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n - staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n - staging: rtl8723bs: Fix build error with Clang when inlining is disabled\n (bsc#1051510).\n - staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n - staging: wilc1000: fix to set correct value for 'vif_num' (bsc#1051510).\n - supported.conf\n - svm: Add mutex_lock to protect apic_access_page_done on AMD systems\n (bsc#1129285).\n - svm: Fix improper check when deactivate AVIC (bsc#1130335).\n - swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n - swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n - switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite\n (bsc#1051510).\n - switchtec: Remove immediate status check after submitting MRPC command\n (bsc#1051510).\n - sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n - tcp: batch tcp_net_metrics_exit (bsc#1122982).\n - tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n - tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n - team: avoid complex list operations in team_nl_cmd_options_set()\n (bsc#1051510).\n - team: Free BPF filter when unregistering netdev (bsc#1051510).\n - thermal: bcm2835: Fix crash in bcm2835_thermal_debugfs (bsc#1051510).\n - thermal: do not clear passive state during system sleep (bsc#1051510).\n - thermal/drivers/hisi: Encapsulate register writes into helpers\n (bsc#1051510).\n - thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n - thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n - thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set\n (bsc#1051510).\n - thermal/intel_powerclamp: fix truncated kthread name ().\n - thermal: mediatek: fix register index error (bsc#1051510).\n - timekeeping: Use proper seqcount initializer (bsc#1051510).\n - tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n - tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n - tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n - tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n - tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n - tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n - tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n - tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n - tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n - tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n - tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n - tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n - tpm: Fix some name collisions with drivers/char/tpm.h (bsc#1051510).\n - tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented\n (bsc#1051510).\n - tpm: Return the actual size when receiving an unsupported command\n (bsc#1051510).\n - tpm: suppress transmit cmd error logs when TPM 1.2 is\n disabled/deactivated (bsc#1051510).\n - tpm_tis_spi: Pass the SPI IRQ down to the driver (bsc#1051510).\n - tpm/tpm_crb: Avoid unaligned reads in crb_recv() (bsc#1051510).\n - tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)\n (bsc#1051510).\n - tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x\n (bsc#1051510).\n - tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n - tracing: Do not free iter->trace in fail path of tracing_open_pipe()\n (bsc#1129581).\n - tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n - tracing: Use strncpy instead of memcpy for string keys in hist triggers\n (bsc#1129625).\n - Tree connect for SMB3.1.1 must be signed for non-encrypted shares\n (bsc#1051510).\n - tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n - tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n - ucc_geth: Reset BQL queue when stopping device\n (networking-stable-19_02_01).\n - ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n - uevent: add alloc_uevent_skb() helper (bsc#1122982).\n - uio: Reduce return paths from uio_write() (bsc#1051510).\n - Update config files. Remove conditional support for SMB2 and SMB3:\n - Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch\n (LTC#174936, bsc#1123060, bsc#1123061).\n - Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch\n (bsc#1051510, bsc#1121789).\n - Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch\n (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n - uprobes: Fix handle_swbp() vs. unregister() + register() race once more\n (bsc#1051510).\n - usb: Add new USB LPM helpers (bsc#1120902).\n - usb: cdc-acm: fix race during wakeup blocking TX traffic (bsc#1129770).\n - usb: common: Consider only available nodes for dr_mode (bsc#1129770).\n - usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n - usb: core: only clean up what we allocated (bsc#1051510).\n - usb: dwc3: Correct the logic for checking TRB full in\n __dwc3_prepare_one_trb() (bsc#1051510).\n - usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n - usb: dwc3: gadget: Fix the uninitialized link_state when udc starts\n (bsc#1051510).\n - usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n - usb: dwc3: gadget: synchronize_irq dwc irq in suspend (bsc#1051510).\n - usb: gadget: f_hid: fix deadlock in f_hidg_write() (bsc#1129770).\n - usb: gadget: musb: fix short isoc packets with inventra dma\n (bsc#1051510).\n - usb: gadget: Potential NULL dereference on allocation error\n (bsc#1051510).\n - usb: gadget: udc: net2272: Fix bitwise and boolean operations\n (bsc#1051510).\n - usb: hub: delay hub autosuspend if USB3 port is still link training\n (bsc#1051510).\n - usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n - usb: musb: dsps: fix otg state machine (bsc#1051510).\n - usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n - usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n - usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n - usb: phy: fix link errors (bsc#1051510).\n - usb: phy: twl6030-usb: fix possible use-after-free on remove\n (bsc#1051510).\n - usb: serial: cp210x: add ID for Ingenico 3070 (bsc#1129770).\n - usb: serial: ftdi_sio: add ID for Hjelmslund Electronics USB485\n (bsc#1129770).\n - usb: serial: mos7720: fix mos_parport refcount imbalance on error path\n (bsc#1129770).\n - usb: serial: option: add Telit ME910 ECM composition (bsc#1129770).\n - usb: serial: option: set driver_info for SIM5218 and compatibles\n (bsc#1129770).\n - usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n - usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n - veth: set peer GSO values (bsc#1051510).\n - vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n - vfio: ccw: process ssch with interrupts disabled (git-fixes).\n - vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n - vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n - vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets\n (bsc#1070995).\n - vhost: correctly check the return value of translate_desc() in\n log_used() (bsc#1051510).\n - vhost: log dirty page correctly (networking-stable-19_01_26).\n - vhost/vsock: fix uninitialized vhost_vsock->guest_cid (bsc#1051510).\n - video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n - virtio-blk: Consider virtio_max_dma_size() for maximum segment size\n (bsc#1120008).\n - virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n - virtio_net: Do not call free_old_xmit_skbs for xdp_frames\n (networking-stable-19_02_01).\n - virtio/s390: avoid race on vcdev->config (git-fixes).\n - virtio/s390: fix race in ccw_io_helper() (git-fixes).\n - vmci: Support upto 64-bit PPNs (bsc#1127286).\n - vsock: cope with memory allocation failure at socket creation time\n (bsc#1051510).\n - vxge: ensure data0 is initialized in when fetching firmware version\n information (bsc#1051510).\n - vxlan: Fix GRO cells race condition between receive and link delete\n (git-fixes).\n - vxlan: test dev->flags & IFF_UP before calling gro_cells_receive()\n (git-fixes).\n - vxlan: update skb dst pmtu on tx path (bsc#1123456).\n - w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n - watchdog: docs: kernel-api: do not reference removed functions\n (bsc#1051510).\n - x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n - x86/a.out: Clear the dump structure initially (bsc#1114279).\n - x86/apic: Provide apic_ack_irq() (bsc#1122822).\n - x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n - x86/boot/e820: Introduce the bootloader provided e820_table_firmware[]\n table (bsc#1127154).\n - x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec\n (bsc#1127154).\n - x86/cpu: Add Atom Tremont (Jacobsville) ().\n - x86/CPU/AMD: Set the CPB bit unconditionally on F17h (bsc#1114279).\n - x86/efi: Allocate e820 buffer before calling efi_exit_boot_service\n (bsc#1127307).\n - x86/Hyper-V: Set x2apic destination mode to physical when x2apic is\n available (bsc#1122822).\n - x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n - x86/mce: Improve error message when kernel cannot recover, p2\n (bsc#1114279).\n - x86/mtrr: Do not copy uninitialized gentry fields back to userspace\n (bsc#1114279).\n - x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n - x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls\n (bsc#1125614).\n - x86: respect memory size limiting via mem= parameter (bsc#1117645).\n - x86/vdso: Remove obsolete "fake section table" reservation (bsc#1114279).\n - x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n - xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n - xen: fix dom0 boot on huge systems (bsc#1127836).\n - xen/manage: do not complain about an empty value in control/sysrq node\n (bsc#1065600).\n - xen: remove pre-xen3 fallback handlers (bsc#1065600).\n - xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n - xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n - xfs: remove filestream item xfs_inode reference (bsc#1127961).\n - xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent\n (bsc#1070995).\n - xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n - yama: Check for pid death before checking ancestry (bsc#1051510).\n - yam: fix a missing-check bug (bsc#1051510).\n - zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n - x86/uaccess: Do not leak the AC flag into __put_user() value evaluation\n (bsc#1114279).\n\n", "edition": 1, "modified": "2019-04-12T12:12:52", "published": "2019-04-12T12:12:52", "id": "OPENSUSE-SU-2019:1193-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html", "title": "Security update for the Linux Kernel (important)", "type": "suse", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:36:14", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7222", "CVE-2019-8980", "CVE-2019-8912", "CVE-2019-7221", "CVE-2019-3701", "CVE-2019-6974", "CVE-2019-9213"], "description": "[4.14.35-1844.4.5]\n- x86/apic/x2apic: set back affinity of a single interrupt to one cpu (Mridula Shastry) [Orabug: 29510342]\n[4.14.35-1844.4.4]\n- ext4: fix data corruption caused by unaligned direct AIO (Lukas Czerner) [Orabug: 29598590] \n- swiotlb: checking whether swiotlb buffer is full with io_tlb_used (Dongli Zhang) [Orabug: 29587097] \n- swiotlb: add debugfs to track swiotlb buffer usage (Dongli Zhang) [Orabug: 29587097] \n- swiotlb: fix comment on swiotlb_bounce() (Dongli Zhang) [Orabug: 29587097] \n- scsi: target: add device product id and revision configfs attributes (Alan Adamson) [Orabug: 29344881] \n- scsi: target: remove hardcoded T10 Vendor ID in INQUIRY response (David Disseldorp) [Orabug: 29344881] \n- scsi: target: add device vendor_id configfs attribute (David Disseldorp) [Orabug: 29344881] \n- scsi: target: consistently null-terminate t10_wwn strings (David Disseldorp) [Orabug: 29344881] \n- scsi: target: use consistent left-aligned ASCII INQUIRY data (David Disseldorp) [Orabug: 29344881] \n- x86/speculation: Keep enhanced IBRS on when prctl is used for SSBD control (Alejandro Jimenez) [Orabug: 29526400] \n- drm/amdkfd: fix amdkfd use-after-free GP fault (Randy Dunlap) [Orabug: 29534199]\n[4.14.35-1844.4.3]\n- can: gw: ensure DLC boundaries after CAN frame modification (Oliver Hartkopp) [Orabug: 29215297] {CVE-2019-3701} {CVE-2019-3701}\n[4.14.35-1844.4.2]\n- x86/speculation: Clean up enhanced IBRS checks in bugs.c (Alejandro Jimenez) [Orabug: 29423796] \n- x86/speculation: Keep enhanced IBRS on when spec_store_bypass_disable=on is used (Alejandro Jimenez) [Orabug: 29423796] \n- kvm/speculation: Allow KVM guests to use SSBD even if host does not (Alejandro Jimenez) [Orabug: 29423796] \n- exec: Fix mem leak in kernel_read_file (YueHaibing) [Orabug: 29454858] {CVE-2019-8980}\n- net: crypto set sk to NULL when af_alg_release. (Mao Wenan) [Orabug: 29454874] {CVE-2019-8912}\n- {net, IB}/mlx5: Raise fatal IB event when sys error occurs (Daniel Jurgens) [Orabug: 29479744] \n- net/mlx5e: Avoid query PPCNT register if not supported by the device (Eyal Davidovich) [Orabug: 29479795] \n- mm: enforce min addr even if capable() in expand_downwards() (Jann Horn) [Orabug: 29501977] {CVE-2019-9213}\n- [UEK-5] IB/mlx5_core: Use kzalloc when allocating PD (Erez Alfasi) [Orabug: 29479806] \n- IB/mlx5: Change debugfs to have per port contents (Parav Pandit) [Orabug: 29486784] \n- Revert 'IB/mlx5: Change debugfs to have per port contents' (Qing Huang) [Orabug: 29486784] \n- scsi: scsi_transport_iscsi: modify detected conn err to KERN_ERR (Fred Herard) [Orabug: 29487789] \n- xen/blkfront: avoid NULL blkfront_info dereference on device removal (Vasilis Liaskovitis) [Orabug: 29489795] \n- qlcnic: fix Tx descriptor corruption on 82xx devices (Shahed Shaikh) [Orabug: 29495427]\n[4.14.35-1844.4.1]\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (Anoob Soman) [Orabug: 29024514] \n- scsi: scsi_transport_iscsi: redirect conn error to console (Fred Herard) [Orabug: 29469713] \n- Revert x86/apic/x2apic: set affinity of a single interrupt to one cpu (Mridula Shastry) [Orabug: 29469651] \n- net/mlx5: Fix error handling in load one (Maor Gottlieb) [Orabug: 29019396] \n- net/mlx5: Fix mlx5_get_uars_page to return error code (Eran Ben Elisha) [Orabug: 29019396] \n- net/mlx5: Fix memory leak in bad flow of mlx5_alloc_irq_vectors (Alaa Hleihel) [Orabug: 29019396] \n- net/mlx4_core: Fix wrong calculation of free counters (Eran Ben Elisha) [Orabug: 29019396] \n- net/mlx5: Free IRQs in shutdown path (Daniel Jurgens) [Orabug: 29019427] \n- net/mlx5e: DCBNL fix min inline header size for dscp (Huy Nguyen) [Orabug: 29019427] \n- IB/mlx4: Fix integer overflow when calculating optimal MTT size (Jack Morgenstein) [Orabug: 29019427] \n- net/mlx5: Fix mlx5_get_vector_affinity function (Israel Rukshin) [Orabug: 29019427] \n- net/mlx5e: Fixed sleeping inside atomic context (Aviad Yehezkel) [Orabug: 29019427] \n- IB/core: Generate GID change event regardless of RoCE GID table property (Parav Pandit) [Orabug: 29019427] \n- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (Christophe JAILLET) [Orabug: 29019430] \n- IB/mlx4: Use 4K pages for kernel QP's WQE buffer (Jack Morgenstein) [Orabug: 29019795] \n- net/mlx5: Add missing SET_DRIVER_VERSION command translation (Noa Osherovich) [Orabug: 29447325] \n- net/mlx5: E-Switch, Fix memory leak when creating switchdev mode FDB tables (Raed Salem) [Orabug: 29447325] \n- net/mlx5: Fix debugfs cleanup in the device init/remove flow (Jack Morgenstein) [Orabug: 29447325] \n- net/mlx5: Check for error in mlx5_attach_interface (Huy Nguyen) [Orabug: 29447325] \n- net/mlx5: Fix use-after-free in self-healing flow (Jack Morgenstein) [Orabug: 29447325] \n- uek-rpm: update list of removed files, generated by depmod on install stage (Alexander Burmashev) [Orabug: 29460369]\n[4.14.35-1844.4.0]\n- fs/dcache.c: add cond_resched() in shrink_dentry_list() (Nikolay Borisov) [Orabug: 29450975] \n- net_failover: delay taking over primary device to accommodate udevd renaming (Si-Wei Liu) \n- hugetlbfs: fix races and page leaks during migration (Mike Kravetz) [Orabug: 29443877] \n- rds: update correct congestion map for loopback transport (Mukesh Kacker) [Orabug: 29431289] \n- KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221) (Peter Shier) [Orabug: 29408638] {CVE-2019-7221}\n- KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222) (Paolo Bonzini) [Orabug: 29408618] {CVE-2019-7222}\n- kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974) (Jann Horn) [Orabug: 29408541] {CVE-2019-6974}\n- ib_core: initialize shpd field when allocating 'struct ib_pd' (Mukesh Kacker) [Orabug: 29384900] \n- bnxt_en: Return linux standard errors in bnxt_ethtool.c (Vasundhara Volam) [Orabug: 29261957] \n- bnxt_en: Don't set ETS on unused TCs. (Michael Chan) [Orabug: 29261957] \n- bnxt_en: get the reduced max_irqs by the ones used by RDMA (Vasundhara Volam) [Orabug: 29261957] \n- bnxt_en: free hwrm resources, if driver probe fails. (Venkat Duvvuru) [Orabug: 29261957] \n- bnxt_en: Fix enables field in HWRM_QUEUE_COS2BW_CFG request (Vasundhara Volam) [Orabug: 29261957] \n- bnxt_en: Fix VNIC reservations on the PF. (Michael Chan) [Orabug: 29261957]", "edition": 3, "modified": "2019-04-12T00:00:00", "published": "2019-04-12T00:00:00", "id": "ELSA-2019-4612", "href": "http://linux.oracle.com/errata/ELSA-2019-4612.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "redhat": [{"lastseen": "2020-01-21T18:03:50", "bulletinFamily": "unix", "cvelist": ["CVE-2018-18559", "CVE-2018-3693", "CVE-2019-10126", "CVE-2019-11487", "CVE-2019-14814", "CVE-2019-14815", "CVE-2019-14816", "CVE-2019-17133", "CVE-2019-18660", "CVE-2019-3846", "CVE-2019-8912"], "description": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* Kernel: speculative bounds check bypass store (CVE-2018-3693)\n\n* kernel: Use-after-free due to race condition in AF_PACKET implementation (CVE-2018-18559)\n\n* kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c (CVE-2019-3846)\n\n* kernel: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (CVE-2019-8912)\n\n* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)\n\n* kernel: Count overflow in FUSE request leading to use-after-free issues. (CVE-2019-11487)\n\n* kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816)\n\n* kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c (CVE-2019-17133)\n\n* kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS (CVE-2019-14814)\n\n* kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS (CVE-2019-14815)\n\n* kernel: (powerpc) incomplete Spectre-RSB mitigation leads to information exposure (CVE-2019-18660)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Kernel panic on job cleanup, related to SyS_getdents64 (BZ#1702057)\n\n* Kernel modules generated incorrectly when system is localized to non-English language (BZ#1705285)\n\n* RHEL-Alt-7.6 - Fixup tlbie vs store ordering issue on POWER9 (BZ#1756270)", "modified": "2020-01-21T20:32:47", "published": "2020-01-21T20:15:25", "id": "RHSA-2020:0174", "href": "https://access.redhat.com/errata/RHSA-2020:0174", "type": "redhat", "title": "(RHSA-2020:0174) Important: kernel-alt security and bug fix update", "cvss": {"score": 8.3, "vector": "AV:A/AC:L/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2020-07-02T11:37:07", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7222", "CVE-2019-3460", "CVE-2018-19824", "CVE-2019-8980", "CVE-2019-8912", "CVE-2018-18021", "CVE-2019-7221", "CVE-2019-6974", "CVE-2019-3459", "CVE-2019-9213", "CVE-2018-14678", "CVE-2019-7308"], "description": "USN-3931-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04 \nLTS. This update provides the corresponding updates for the Linux \nHardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu \n16.04 LTS and for the Linux Azure kernel for Ubuntu 14.04 LTS.\n\nM. Vefa Bicakci and Andy Lutomirski discovered that the kernel did not \nproperly set up all arguments to an error handler callback used when \nrunning as a paravirtualized guest. An unprivileged attacker in a \nparavirtualized guest VM could use this to cause a denial of service (guest \nVM crash). (CVE-2018-14678)\n\nIt was discovered that the KVM implementation in the Linux kernel on ARM \n64bit processors did not properly handle some ioctls. An attacker with the \nprivilege to create KVM-based virtual machines could use this to cause a \ndenial of service (host system crash) or execute arbitrary code in the \nhost. (CVE-2018-18021)\n\nMathias Payer and Hui Peng discovered a use-after-free vulnerability in the \nAdvanced Linux Sound Architecture (ALSA) subsystem. A physically proximate \nattacker could use this to cause a denial of service (system crash). \n(CVE-2018-19824)\n\nShlomi Oberman, Yuli Shapiro, and Ran Menscher discovered an information \nleak in the Bluetooth implementation of the Linux kernel. An attacker \nwithin Bluetooth range could use this to expose sensitive information \n(kernel memory). (CVE-2019-3459, CVE-2019-3460)\n\nJann Horn discovered that the KVM implementation in the Linux kernel \ncontained a use-after-free vulnerability. An attacker in a guest VM with \naccess to /dev/kvm could use this to cause a denial of service (guest VM \ncrash). (CVE-2019-6974)\n\nJim Mattson and Felix Wilhelm discovered a use-after-free vulnerability in \nthe KVM subsystem of the Linux kernel, when using nested virtual machines. \nA local attacker in a guest VM could use this to cause a denial of service \n(system crash) or possibly execute arbitrary code in the host system. \n(CVE-2019-7221)\n\nFelix Wilhelm discovered that an information leak vulnerability existed in \nthe KVM subsystem of the Linux kernel, when nested virtualization is used. \nA local attacker could use this to expose sensitive information (host \nsystem memory to a guest VM). (CVE-2019-7222)\n\nJann Horn discovered that the eBPF implementation in the Linux kernel was \ninsufficiently hardened against Spectre V1 attacks. A local attacker could \nuse this to expose sensitive information. (CVE-2019-7308)\n\nIt was discovered that a use-after-free vulnerability existed in the user- \nspace API for crypto (af_alg) implementation in the Linux kernel. A local \nattacker could use this to cause a denial of service (system crash) or \npossibly execute arbitrary code. (CVE-2019-8912)\n\nIt was discovered that the Linux kernel did not properly deallocate memory \nwhen handling certain errors while reading files. A local attacker could \nuse this to cause a denial of service (excessive memory consumption). \n(CVE-2019-8980)\n\nJann Horn discovered that the mmap implementation in the Linux kernel did \nnot properly check for the mmap minimum address in some situations. A local \nattacker could use this to assist exploiting a kernel NULL pointer \ndereference vulnerability. (CVE-2019-9213)", "edition": 3, "modified": "2019-04-02T00:00:00", "published": "2019-04-02T00:00:00", "id": "USN-3931-2", "href": "https://ubuntu.com/security/notices/USN-3931-2", "title": "Linux kernel (HWE) vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-02T11:43:54", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7222", "CVE-2019-3460", "CVE-2018-19824", "CVE-2019-8980", "CVE-2019-8912", "CVE-2018-18021", "CVE-2019-7221", "CVE-2019-6974", "CVE-2019-3459", "CVE-2019-9213", "CVE-2018-14678", "CVE-2019-7308"], "description": "M. Vefa Bicakci and Andy Lutomirski discovered that the kernel did not \nproperly set up all arguments to an error handler callback used when \nrunning as a paravirtualized guest. An unprivileged attacker in a \nparavirtualized guest VM could use this to cause a denial of service (guest \nVM crash). (CVE-2018-14678)\n\nIt was discovered that the KVM implementation in the Linux kernel on ARM \n64bit processors did not properly handle some ioctls. An attacker with the \nprivilege to create KVM-based virtual machines could use this to cause a \ndenial of service (host system crash) or execute arbitrary code in the \nhost. (CVE-2018-18021)\n\nMathias Payer and Hui Peng discovered a use-after-free vulnerability in the \nAdvanced Linux Sound Architecture (ALSA) subsystem. A physically proximate \nattacker could use this to cause a denial of service (system crash). \n(CVE-2018-19824)\n\nShlomi Oberman, Yuli Shapiro, and Ran Menscher discovered an information \nleak in the Bluetooth implementation of the Linux kernel. An attacker \nwithin Bluetooth range could use this to expose sensitive information \n(kernel memory). (CVE-2019-3459, CVE-2019-3460)\n\nJann Horn discovered that the KVM implementation in the Linux kernel \ncontained a use-after-free vulnerability. An attacker in a guest VM with \naccess to /dev/kvm could use this to cause a denial of service (guest VM \ncrash). (CVE-2019-6974)\n\nJim Mattson and Felix Wilhelm discovered a use-after-free vulnerability in \nthe KVM subsystem of the Linux kernel, when using nested virtual machines. \nA local attacker in a guest VM could use this to cause a denial of service \n(system crash) or possibly execute arbitrary code in the host system. \n(CVE-2019-7221)\n\nFelix Wilhelm discovered that an information leak vulnerability existed in \nthe KVM subsystem of the Linux kernel, when nested virtualization is used. \nA local attacker could use this to expose sensitive information (host \nsystem memory to a guest VM). (CVE-2019-7222)\n\nJann Horn discovered that the eBPF implementation in the Linux kernel was \ninsufficiently hardened against Spectre V1 attacks. A local attacker could \nuse this to expose sensitive information. (CVE-2019-7308)\n\nIt was discovered that a use-after-free vulnerability existed in the user- \nspace API for crypto (af_alg) implementation in the Linux kernel. A local \nattacker could use this to cause a denial of service (system crash) or \npossibly execute arbitrary code. (CVE-2019-8912)\n\nIt was discovered that the Linux kernel did not properly deallocate memory \nwhen handling certain errors while reading files. A local attacker could \nuse this to cause a denial of service (excessive memory consumption). \n(CVE-2019-8980)\n\nJann Horn discovered that the mmap implementation in the Linux kernel did \nnot properly check for the mmap minimum address in some situations. A local \nattacker could use this to assist exploiting a kernel NULL pointer \ndereference vulnerability. (CVE-2019-9213)", "edition": 3, "modified": "2019-04-02T00:00:00", "published": "2019-04-02T00:00:00", "id": "USN-3931-1", "href": "https://ubuntu.com/security/notices/USN-3931-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-02T11:35:59", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7222", "CVE-2019-3460", "CVE-2018-19824", "CVE-2019-9003", "CVE-2019-8980", "CVE-2019-8912", "CVE-2019-9162", "CVE-2019-8956", "CVE-2019-7221", "CVE-2019-6974", "CVE-2019-3459", "CVE-2019-9213", "CVE-2019-7308"], "description": "USN-3930-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.10. \nThis update provides the corresponding updates for the Linux Hardware \nEnablement (HWE) kernel from Ubuntu 18.10 for Ubuntu 18.04 LTS.\n\nMathias Payer and Hui Peng discovered a use-after-free vulnerability in the \nAdvanced Linux Sound Architecture (ALSA) subsystem. A physically proximate \nattacker could use this to cause a denial of service (system crash). \n(CVE-2018-19824)\n\nShlomi Oberman, Yuli Shapiro, and Ran Menscher discovered an information \nleak in the Bluetooth implementation of the Linux kernel. An attacker \nwithin Bluetooth range could use this to expose sensitive information \n(kernel memory). (CVE-2019-3459, CVE-2019-3460)\n\nJann Horn discovered that the KVM implementation in the Linux kernel \ncontained a use-after-free vulnerability. An attacker in a guest VM with \naccess to /dev/kvm could use this to cause a denial of service (guest VM \ncrash). (CVE-2019-6974)\n\nJim Mattson and Felix Wilhelm discovered a use-after-free vulnerability in \nthe KVM subsystem of the Linux kernel, when using nested virtual machines. \nA local attacker in a guest VM could use this to cause a denial of service \n(system crash) or possibly execute arbitrary code in the host system. \n(CVE-2019-7221)\n\nFelix Wilhelm discovered that an information leak vulnerability existed in \nthe KVM subsystem of the Linux kernel, when nested virtualization is used. \nA local attacker could use this to expose sensitive information (host \nsystem memory to a guest VM). (CVE-2019-7222)\n\nJann Horn discovered that the eBPF implementation in the Linux kernel was \ninsufficiently hardened against Spectre V1 attacks. A local attacker could \nuse this to expose sensitive information. (CVE-2019-7308)\n\nIt was discovered that a use-after-free vulnerability existed in the user- \nspace API for crypto (af_alg) implementation in the Linux kernel. A local \nattacker could use this to cause a denial of service (system crash) or \npossibly execute arbitrary code. (CVE-2019-8912)\n\nJakub Jirasek discovered a use-after-free vulnerability in the SCTP \nimplementation in the Linux kernel. A local attacker could use this to \ncause a denial of service (system crash) or possibly execute arbitrary \ncode. (CVE-2019-8956)\n\nIt was discovered that the Linux kernel did not properly deallocate memory \nwhen handling certain errors while reading files. A local attacker could \nuse this to cause a denial of service (excessive memory consumption). \n(CVE-2019-8980)\n\nIt was discovered that a use-after-free vulnerability existed in the IPMI \nimplementation in the Linux kernel. A local attacker with access to the \nIPMI character device files could use this to cause a denial of service \n(system crash). (CVE-2019-9003)\n\nJann Horn discovered that the SNMP NAT implementation in the Linux kernel \nperformed insufficient ASN.1 length checks. An attacker could use this to \ncause a denial of service (system crash) or possibly execute arbitrary \ncode. (CVE-2019-9162)\n\nJann Horn discovered that the mmap implementation in the Linux kernel did \nnot properly check for the mmap minimum address in some situations. A local \nattacker could use this to assist exploiting a kernel NULL pointer \ndereference vulnerability. (CVE-2019-9213)", "edition": 3, "modified": "2019-04-02T00:00:00", "published": "2019-04-02T00:00:00", "id": "USN-3930-2", "href": "https://ubuntu.com/security/notices/USN-3930-2", "title": "Linux kernel (HWE) vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-08T23:38:10", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7222", "CVE-2019-3460", "CVE-2018-19824", "CVE-2019-9003", "CVE-2019-8980", "CVE-2019-8912", "CVE-2019-9162", "CVE-2019-8956", "CVE-2019-7221", "CVE-2019-6974", "CVE-2019-3459", "CVE-2019-9213", "CVE-2019-7308"], "description": "Mathias Payer and Hui Peng discovered a use-after-free vulnerability in the \nAdvanced Linux Sound Architecture (ALSA) subsystem. A physically proximate \nattacker could use this to cause a denial of service (system crash). \n(CVE-2018-19824)\n\nShlomi Oberman, Yuli Shapiro, and Ran Menscher discovered an information \nleak in the Bluetooth implementation of the Linux kernel. An attacker \nwithin Bluetooth range could use this to expose sensitive information \n(kernel memory). (CVE-2019-3459, CVE-2019-3460)\n\nJann Horn discovered that the KVM implementation in the Linux kernel \ncontained a use-after-free vulnerability. An attacker in a guest VM with \naccess to /dev/kvm could use this to cause a denial of service (guest VM \ncrash). (CVE-2019-6974)\n\nJim Mattson and Felix Wilhelm discovered a use-after-free vulnerability in \nthe KVM subsystem of the Linux kernel, when using nested virtual machines. \nA local attacker in a guest VM could use this to cause a denial of service \n(system crash) or possibly execute arbitrary code in the host system. \n(CVE-2019-7221)\n\nFelix Wilhelm discovered that an information leak vulnerability existed in \nthe KVM subsystem of the Linux kernel, when nested virtualization is used. \nA local attacker could use this to expose sensitive information (host \nsystem memory to a guest VM). (CVE-2019-7222)\n\nJann Horn discovered that the eBPF implementation in the Linux kernel was \ninsufficiently hardened against Spectre V1 attacks. A local attacker could \nuse this to expose sensitive information. (CVE-2019-7308)\n\nIt was discovered that a use-after-free vulnerability existed in the user- \nspace API for crypto (af_alg) implementation in the Linux kernel. A local \nattacker could use this to cause a denial of service (system crash) or \npossibly execute arbitrary code. (CVE-2019-8912)\n\nJakub Jirasek discovered a use-after-free vulnerability in the SCTP \nimplementation in the Linux kernel. A local attacker could use this to \ncause a denial of service (system crash) or possibly execute arbitrary \ncode. (CVE-2019-8956)\n\nIt was discovered that the Linux kernel did not properly deallocate memory \nwhen handling certain errors while reading files. A local attacker could \nuse this to cause a denial of service (excessive memory consumption). \n(CVE-2019-8980)\n\nIt was discovered that a use-after-free vulnerability existed in the IPMI \nimplementation in the Linux kernel. A local attacker with access to the \nIPMI character device files could use this to cause a denial of service \n(system crash). (CVE-2019-9003)\n\nJann Horn discovered that the SNMP NAT implementation in the Linux kernel \nperformed insufficient ASN.1 length checks. An attacker could use this to \ncause a denial of service (system crash) or possibly execute arbitrary \ncode. (CVE-2019-9162)\n\nJann Horn discovered that the mmap implementation in the Linux kernel did \nnot properly check for the mmap minimum address in some situations. A local \nattacker could use this to assist exploiting a kernel NULL pointer \ndereference vulnerability. (CVE-2019-9213)", "edition": 3, "modified": "2019-04-02T00:00:00", "published": "2019-04-02T00:00:00", "id": "USN-3930-1", "href": "https://ubuntu.com/security/notices/USN-3930-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "cloudfoundry": [{"lastseen": "2019-05-29T18:32:52", "bulletinFamily": "software", "cvelist": ["CVE-2019-7222", "CVE-2019-3460", "CVE-2018-19824", "CVE-2019-8980", "CVE-2019-8912", "CVE-2018-18021", "CVE-2019-7221", "CVE-2019-6974", "CVE-2019-3459", "CVE-2019-9213", "CVE-2018-14678", "CVE-2019-7308"], "description": "# \n\n# Severity\n\nMedium\n\n# Vendor\n\nCanonical Ubuntu\n\n# Versions Affected\n\n * Canonical Ubuntu 16.04\n\n# Description\n\nUSN-3931-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu 16.04 LTS and for the Linux Azure kernel for Ubuntu 14.04 LTS.\n\nM. Vefa Bicakci and Andy Lutomirski discovered that the kernel did not properly set up all arguments to an error handler callback used when running as a paravirtualized guest. An unprivileged attacker in a paravirtualized guest VM could use this to cause a denial of service (guest VM crash). (CVE-2018-14678)\n\nIt was discovered that the KVM implementation in the Linux kernel on ARM 64bit processors did not properly handle some ioctls. An attacker with the privilege to create KVM-based virtual machines could use this to cause a denial of service (host system crash) or execute arbitrary code in the host. (CVE-2018-18021)\n\nMathias Payer and Hui Peng discovered a use-after-free vulnerability in the Advanced Linux Sound Architecture (ALSA) subsystem. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2018-19824)\n\nShlomi Oberman, Yuli Shapiro, and Ran Menscher discovered an information leak in the Bluetooth implementation of the Linux kernel. An attacker within Bluetooth range could use this to expose sensitive information (kernel memory). (CVE-2019-3459, CVE-2019-3460)\n\nJann Horn discovered that the KVM implementation in the Linux kernel contained a use-after-free vulnerability. An attacker in a guest VM with access to /dev/kvm could use this to cause a denial of service (guest VM crash). (CVE-2019-6974)\n\nJim Mattson and Felix Wilhelm discovered a use-after-free vulnerability in the KVM subsystem of the Linux kernel, when using nested virtual machines. A local attacker in a guest VM could use this to cause a denial of service (system crash) or possibly execute arbitrary code in the host system. (CVE-2019-7221)\n\nFelix Wilhelm discovered that an information leak vulnerability existed in the KVM subsystem of the Linux kernel, when nested virtualization is used. A local attacker could use this to expose sensitive information (host system memory to a guest VM). (CVE-2019-7222)\n\nJann Horn discovered that the eBPF implementation in the Linux kernel was insufficiently hardened against Spectre V1 attacks. A local attacker could use this to expose sensitive information. (CVE-2019-7308)\n\nIt was discovered that a use-after-free vulnerability existed in the user- space API for crypto (af_alg) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-8912)\n\nIt was discovered that the Linux kernel did not properly deallocate memory when handling certain errors while reading files. A local attacker could use this to cause a denial of service (excessive memory consumption). (CVE-2019-8980)\n\nJann Horn discovered that the mmap implementation in the Linux kernel did not properly check for the mmap minimum address in some situations. A local attacker could use this to assist exploiting a kernel NULL pointer dereference vulnerability. (CVE-2019-9213)\n\nCVEs contained in this USN include: CVE-2018-18021, CVE-2018-19824, CVE-2019-3459, CVE-2019-3460, CVE-2019-6974, CVE-2019-7222, CVE-2019-9213, CVE-2019-7221, CVE-2018-14678, CVE-2019-7308, CVE-2019-8912, CVE-2019-8980\n\n# Affected Cloud Foundry Products and Versions\n\n_Severity is medium unless otherwise noted._\n\n * Cloud Foundry BOSH xenial-stemcells are vulnerable, including: \n * 250.x versions prior to 250.29\n * 170.x versions prior to 170.48\n * 97.x versions prior to 97.74\n * All other stemcells not listed.\n\n# Mitigation\n\nUsers of affected products are strongly encouraged to follow one of the mitigations below:\n\n * The Cloud Foundry project recommends upgrading the following BOSH xenial-stemcells: \n * Upgrade 250.x versions to 250.29\n * Upgrade 170.x versions to 170.48\n * Upgrade 97.x versions to 97.74\n * All other stemcells should be upgraded to the latest version available on [bosh.io](<https://bosh.io/stemcells/#ubuntu-xenial>).\n\n# References\n\n * [USN-3931-2](<https://usn.ubuntu.com/3931-2>)\n * [CVE-2018-18021](<https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18021>)\n * [CVE-2018-19824](<https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19824>)\n * [CVE-2019-3459](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-3459>)\n * [CVE-2019-3460](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-3460>)\n * [CVE-2019-6974](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-6974>)\n * [CVE-2019-7222](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7222>)\n * [CVE-2019-9213](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9213>)\n * [CVE-2019-7221](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7221>)\n * [CVE-2018-14678](<https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14678>)\n * [CVE-2019-7308](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7308>)\n * [CVE-2019-8912](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-8912>)\n * [CVE-2019-8980](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-8980>)\n", "edition": 2, "modified": "2019-04-12T00:00:00", "published": "2019-04-12T00:00:00", "id": "CFOUNDRY:DAEEFC1E9FDBBF02A1D3ACCD6434010C", "href": "https://www.cloudfoundry.org/blog/usn-3931-2/", "title": "USN-3931-2: Linux kernel (HWE) vulnerabilities | Cloud Foundry", "type": "cloudfoundry", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}]}