According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :
- The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system:
memory allocation, process allocation, device input and output, etc.Security Fix(es):** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE:
third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.(CVE-2019-19046)A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.(CVE-2019-19066)A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3.(CVE-2019-19061)In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.(CVE-2019-19524)The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported.(CVE-2019-11191)In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.(CVE-2019-19527)In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95.
This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.(CVE-2019-19532)The acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.(CVE-2017-13694)The acpi_ds_create_operands() function in drivers/acpi/acpica/dsutils.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.(CVE-2017-13693)The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.(CVE-2019-18660)In the Linux kernel through 5.3.8, f->fmt.sdr.reserved is uninitialized in rcar_drif_g_fmt_sdr_cap in drivers/media/platform/rcar_drif.c, which could cause a memory disclosure problem.(CVE-2019-18786)An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.(CVE-2019-18683)A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.(CVE-2019-19054)A memory leak in the mlx5_fpga_conn_create_cq() function in drivers et/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.(CVE-2019-19045)A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers et/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.(CVE-2019-19051)A memory leak in the alloc_sgtable() function in drivers et/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.(CVE-2019-19058)Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers et/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering iwl_pcie_init_fw_sec() or dma_alloc_coherent() failures, aka CID-0f4f199443fa.(CVE-2019-19059)A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.(CVE-2019-19049)A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d. NOTE: third parties dispute the relevance of this because the system must have already been out of memory before the probe began.(CVE-2019-19070)A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e.(CVE-2019-19065)** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.(CVE-2019-19067)A memory leak in the rtl8xxxu_submit_int_urb() function in drivers et/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.(CVE-2019-19068)A memory leak in the rsi_send_beacon() function in drivers et/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.(CVE-2019-19071)A memory leak in the ca8210_probe() function in drivers et/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.(CVE-2019-19075)A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.(CVE-2019-19077)A memory leak in the ath10k_usb_hif_tx_sg() function in drivers et/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.(CVE-2019-19078)A memory leak in the qrtr_tun_write_iter() function in net/qrtr/tun.c in the Linux kernel before 5.3 allows attackers to cause a denial of service (memory consumption), aka CID-a21b7f0cff19.(CVE-2019-19079)Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers et/ethernet etronome fp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.(CVE-2019-19080)A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers et/ethernet etronome fp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.(CVE-2019-19081)Memory leaks in
*create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c , the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c , the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c , the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c , aka CID-104c307147ad.(CVE-2019-19082)Memory leaks in
*clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c , the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c , the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c , the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c , and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.(CVE-2019-19083)In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers et/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.(CVE-2019-19535)fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka CID-09ba3bc9dd15.(CVE-2019-18885)In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers et/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.(CVE-2019-19536)In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers et/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.(CVE-2019-19525)In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers fc/pn533/usb.c driver, aka CID-6af3aa57a098.(CVE-2019-19526)In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers et/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.(CVE-2019-19529)A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.(CVE-2019-19060)In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers et/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.(CVE-2019-19534)A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.(CVE-2019-18808)drivers et/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.(CVE-2019-16232)drivers et/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.(CVE-2019-16231)** DISPUTED ** drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: The security community disputes this issues as not being serious enough to be deserving a CVE id.(CVE-2019-16229)Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.(CVE-2019-10220)Memory leaks in drivers et/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.(CVE-2019-19073)Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers et/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.(CVE-2019-19057)A memory leak in the gs_can_open() function in drivers et/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.(CVE-2019-19052)A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers et/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.(CVE-2019-19056)A memory leak in the ath9k_wmi_cmd() function in drivers et/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.(CVE-2019-19074)Two memory leaks in the rtl_usb_probe() function in drivers et/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.(CVE-2019-19063)An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.(CVE-2019-18814)A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.(CVE-2019-19072)In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.(CVE-2019-19523)In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.(CVE-2019-19528)In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.(CVE-2019-19530)In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.(CVE-2019-19533)In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9.
This affects drivers/usb/core/file.c.(CVE-2019-19537)In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.(CVE-2019-19531)The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.(CVE-2019-18675)In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.(CVE-2019-19227)vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.(CVE-2019-19252)The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in
__ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.(CVE-2019-19767)A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system.
If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.(CVE-2019-14901)An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.(CVE-2019-15291)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
{"id": "EULEROS_SA-2020-1012.NASL", "vendorId": null, "type": "nessus", "bulletinFamily": "scanner", "title": "EulerOS 2.0 SP8 : kernel (EulerOS-SA-2020-1012)", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system:\n memory allocation, process allocation, device input and output, etc.Security Fix(es):** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE:\n third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.(CVE-2019-19046)A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.(CVE-2019-19066)A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3.(CVE-2019-19061)In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.(CVE-2019-19524)The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported.(CVE-2019-11191)In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.(CVE-2019-19527)In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95.\n This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.(CVE-2019-19532)The acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.(CVE-2017-13694)The acpi_ds_create_operands() function in drivers/acpi/acpica/dsutils.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.(CVE-2017-13693)The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.(CVE-2019-18660)In the Linux kernel through 5.3.8, f->fmt.sdr.reserved is uninitialized in rcar_drif_g_fmt_sdr_cap in drivers/media/platform/rcar_drif.c, which could cause a memory disclosure problem.(CVE-2019-18786)An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.(CVE-2019-18683)A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.(CVE-2019-19054)A memory leak in the mlx5_fpga_conn_create_cq() function in drivers et/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.(CVE-2019-19045)A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers et/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.(CVE-2019-19051)A memory leak in the alloc_sgtable() function in drivers et/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.(CVE-2019-19058)Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers et/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering iwl_pcie_init_fw_sec() or dma_alloc_coherent() failures, aka CID-0f4f199443fa.(CVE-2019-19059)A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.(CVE-2019-19049)A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d. NOTE: third parties dispute the relevance of this because the system must have already been out of memory before the probe began.(CVE-2019-19070)A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e.(CVE-2019-19065)** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.(CVE-2019-19067)A memory leak in the rtl8xxxu_submit_int_urb() function in drivers et/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.(CVE-2019-19068)A memory leak in the rsi_send_beacon() function in drivers et/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.(CVE-2019-19071)A memory leak in the ca8210_probe() function in drivers et/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.(CVE-2019-19075)A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.(CVE-2019-19077)A memory leak in the ath10k_usb_hif_tx_sg() function in drivers et/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.(CVE-2019-19078)A memory leak in the qrtr_tun_write_iter() function in net/qrtr/tun.c in the Linux kernel before 5.3 allows attackers to cause a denial of service (memory consumption), aka CID-a21b7f0cff19.(CVE-2019-19079)Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers et/ethernet etronome fp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.(CVE-2019-19080)A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers et/ethernet etronome fp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.(CVE-2019-19081)Memory leaks in\n *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c , the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c , the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c , the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c , aka CID-104c307147ad.(CVE-2019-19082)Memory leaks in\n *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c , the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c , the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c , the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c , and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.(CVE-2019-19083)In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers et/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.(CVE-2019-19535)fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka CID-09ba3bc9dd15.(CVE-2019-18885)In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers et/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.(CVE-2019-19536)In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers et/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.(CVE-2019-19525)In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers fc/pn533/usb.c driver, aka CID-6af3aa57a098.(CVE-2019-19526)In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers et/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.(CVE-2019-19529)A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.(CVE-2019-19060)In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers et/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.(CVE-2019-19534)A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.(CVE-2019-18808)drivers et/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.(CVE-2019-16232)drivers et/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.(CVE-2019-16231)** DISPUTED ** drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: The security community disputes this issues as not being serious enough to be deserving a CVE id.(CVE-2019-16229)Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.(CVE-2019-10220)Memory leaks in drivers et/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.(CVE-2019-19073)Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers et/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.(CVE-2019-19057)A memory leak in the gs_can_open() function in drivers et/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.(CVE-2019-19052)A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers et/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.(CVE-2019-19056)A memory leak in the ath9k_wmi_cmd() function in drivers et/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.(CVE-2019-19074)Two memory leaks in the rtl_usb_probe() function in drivers et/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.(CVE-2019-19063)An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.(CVE-2019-18814)A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.(CVE-2019-19072)In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.(CVE-2019-19523)In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.(CVE-2019-19528)In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.(CVE-2019-19530)In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.(CVE-2019-19533)In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9.\n This affects drivers/usb/core/file.c.(CVE-2019-19537)In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.(CVE-2019-19531)The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.(CVE-2019-18675)In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.(CVE-2019-19227)vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.(CVE-2019-19252)The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in\n __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.(CVE-2019-19767)A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system.\n If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.(CVE-2019-14901)An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.(CVE-2019-15291)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2020-01-02T00:00:00", "modified": "2021-01-06T00:00:00", "epss": [], "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.tenable.com/plugins/nessus/132605", "reporter": "This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19532", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10220", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19077", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18683", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19078", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19525", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19081", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19071", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18786", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13694", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19051", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19052", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19045", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19065", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19066", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19067", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19530", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19072", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19227", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19061", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19082", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19075", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046", "http://www.nessus.org/u?f83f4799", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19535", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18814", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19068", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19060", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19527", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18885", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19528", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19529", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19049", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14901", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19059", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19526", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19079", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19533", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19531", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19536", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19057", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19080", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19252", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15291", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19070", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18675"], "cvelist": ["CVE-2017-13693", "CVE-2017-13694", "CVE-2019-10220", "CVE-2019-11191", "CVE-2019-14901", "CVE-2019-15291", "CVE-2019-16229", "CVE-2019-16231", "CVE-2019-16232", "CVE-2019-18660", "CVE-2019-18675", "CVE-2019-18683", "CVE-2019-18786", "CVE-2019-18808", "CVE-2019-18814", "CVE-2019-18885", "CVE-2019-19045", "CVE-2019-19046", "CVE-2019-19049", "CVE-2019-19051", "CVE-2019-19052", "CVE-2019-19054", "CVE-2019-19056", "CVE-2019-19057", "CVE-2019-19058", "CVE-2019-19059", "CVE-2019-19060", "CVE-2019-19061", "CVE-2019-19063", "CVE-2019-19065", "CVE-2019-19066", "CVE-2019-19067", "CVE-2019-19068", "CVE-2019-19070", "CVE-2019-19071", "CVE-2019-19072", "CVE-2019-19073", "CVE-2019-19074", "CVE-2019-19075", "CVE-2019-19077", "CVE-2019-19078", "CVE-2019-19079", "CVE-2019-19080", "CVE-2019-19081", "CVE-2019-19082", "CVE-2019-19083", "CVE-2019-19227", "CVE-2019-19252", "CVE-2019-19523", "CVE-2019-19524", "CVE-2019-19525", "CVE-2019-19526", "CVE-2019-19527", "CVE-2019-19528", "CVE-2019-19529", "CVE-2019-19530", "CVE-2019-19531", "CVE-2019-19532", "CVE-2019-19533", "CVE-2019-19534", "CVE-2019-19535", "CVE-2019-19536", "CVE-2019-19537", "CVE-2019-19767"], "immutableFields": [], "lastseen": "2023-09-27T14:37:33", "viewCount": 17, "enchantments": {"dependencies": {"references": [{"type": "almalinux", "idList": ["ALSA-2020:4431", "ALSA-2021:1578"]}, {"type": "amazon", "idList": ["ALAS2-2020-1480", "ALAS2-2021-1627", "ALAS2-2021-1719"]}, {"type": "androidsecurity", "idList": ["ANDROID:2020-03-01", "ANDROID:2020-04-01", "ANDROID:2020-05-01"]}, {"type": "avleonov", "idList": ["AVLEONOV:317FBD7DA93C95993A9FFF38FB04A987"]}, {"type": "centos", "idList": ["CESA-2020:0374", "CESA-2020:0375", "CESA-2020:1016", "CESA-2020:3220", "CESA-2020:4060", "CESA-2021:0856"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:7D5F114602BB1B4781BFC57065F20675", "CFOUNDRY:7D6795462AFD47DE31FD5B40467B68C4", "CFOUNDRY:A6BB54E614972BC1F16419D7DB82331A", "CFOUNDRY:ABBF4BD74406CA92477E7CFB1AD01190", "CFOUNDRY:C4D1C1686A388941AD439B6E19ADC7F2", "CFOUNDRY:DCE4C624C0C4A79B360FF0BA8F545247"]}, {"type": "cloudlinux", "idList": ["CLSA-2021:1632261812", "CLSA-2021:1632261839"]}, {"type": "cve", "idList": ["CVE-2017-13693", "CVE-2017-13694", "CVE-2019-10220", "CVE-2019-11191", "CVE-2019-14901", "CVE-2019-15291", "CVE-2019-16229", "CVE-2019-16231", "CVE-2019-16232", "CVE-2019-18660", "CVE-2019-18675", "CVE-2019-18683", "CVE-2019-18786", "CVE-2019-18808", "CVE-2019-18814", "CVE-2019-18885", "CVE-2019-19045", "CVE-2019-19046", "CVE-2019-19049", "CVE-2019-19051", "CVE-2019-19052", "CVE-2019-19054", "CVE-2019-19056", "CVE-2019-19057", "CVE-2019-19058", "CVE-2019-19059", "CVE-2019-19060", "CVE-2019-19061", "CVE-2019-19063", "CVE-2019-19065", "CVE-2019-19066", "CVE-2019-19067", "CVE-2019-19068", "CVE-2019-19070", "CVE-2019-19071", "CVE-2019-19072", "CVE-2019-19073", "CVE-2019-19074", "CVE-2019-19075", "CVE-2019-19077", "CVE-2019-19078", "CVE-2019-19079", "CVE-2019-19080", "CVE-2019-19081", "CVE-2019-19082", "CVE-2019-19083", "CVE-2019-19227", "CVE-2019-19252", "CVE-2019-19523", "CVE-2019-19524", "CVE-2019-19525", "CVE-2019-19526", "CVE-2019-19527", "CVE-2019-19528", "CVE-2019-19529", "CVE-2019-19530", "CVE-2019-19531", "CVE-2019-19532", "CVE-2019-19533", "CVE-2019-19534", "CVE-2019-19535", "CVE-2019-19536", "CVE-2019-19537", "CVE-2019-19767", "CVE-2021-3744", "CVE-2021-3764"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2068-1:83234", "DEBIAN:DLA-2114-1:93D37", "DEBIAN:DLA-2323-1:C146F", "DEBIAN:DLA-2420-1:692E7", "DEBIAN:DLA-2420-2:175D1"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2017-13693", "DEBIANCVE:CVE-2017-13694", "DEBIANCVE:CVE-2019-10220", "DEBIANCVE:CVE-2019-11191", "DEBIANCVE:CVE-2019-14901", "DEBIANCVE:CVE-2019-15291", "DEBIANCVE:CVE-2019-16229", "DEBIANCVE:CVE-2019-16231", "DEBIANCVE:CVE-2019-16232", "DEBIANCVE:CVE-2019-18660", "DEBIANCVE:CVE-2019-18675", "DEBIANCVE:CVE-2019-18683", "DEBIANCVE:CVE-2019-18786", "DEBIANCVE:CVE-2019-18808", "DEBIANCVE:CVE-2019-18814", "DEBIANCVE:CVE-2019-18885", "DEBIANCVE:CVE-2019-19045", "DEBIANCVE:CVE-2019-19046", "DEBIANCVE:CVE-2019-19049", "DEBIANCVE:CVE-2019-19051", "DEBIANCVE:CVE-2019-19052", "DEBIANCVE:CVE-2019-19054", "DEBIANCVE:CVE-2019-19056", "DEBIANCVE:CVE-2019-19057", "DEBIANCVE:CVE-2019-19058", "DEBIANCVE:CVE-2019-19059", "DEBIANCVE:CVE-2019-19060", "DEBIANCVE:CVE-2019-19061", "DEBIANCVE:CVE-2019-19063", "DEBIANCVE:CVE-2019-19065", "DEBIANCVE:CVE-2019-19066", "DEBIANCVE:CVE-2019-19067", "DEBIANCVE:CVE-2019-19068", "DEBIANCVE:CVE-2019-19070", "DEBIANCVE:CVE-2019-19071", "DEBIANCVE:CVE-2019-19072", "DEBIANCVE:CVE-2019-19073", "DEBIANCVE:CVE-2019-19074", "DEBIANCVE:CVE-2019-19075", "DEBIANCVE:CVE-2019-19077", "DEBIANCVE:CVE-2019-19078", "DEBIANCVE:CVE-2019-19079", "DEBIANCVE:CVE-2019-19080", "DEBIANCVE:CVE-2019-19081", "DEBIANCVE:CVE-2019-19082", "DEBIANCVE:CVE-2019-19083", "DEBIANCVE:CVE-2019-19227", "DEBIANCVE:CVE-2019-19252", "DEBIANCVE:CVE-2019-19523", "DEBIANCVE:CVE-2019-19524", "DEBIANCVE:CVE-2019-19525", "DEBIANCVE:CVE-2019-19526", "DEBIANCVE:CVE-2019-19527", "DEBIANCVE:CVE-2019-19528", "DEBIANCVE:CVE-2019-19529", "DEBIANCVE:CVE-2019-19530", "DEBIANCVE:CVE-2019-19531", "DEBIANCVE:CVE-2019-19532", "DEBIANCVE:CVE-2019-19533", "DEBIANCVE:CVE-2019-19534", "DEBIANCVE:CVE-2019-19535", "DEBIANCVE:CVE-2019-19536", "DEBIANCVE:CVE-2019-19537", "DEBIANCVE:CVE-2019-19767", "DEBIANCVE:CVE-2021-3744", "DEBIANCVE:CVE-2021-3764"]}, {"type": "f5", "idList": ["F5:K00539290", "F5:K06554372", "F5:K14200143", "F5:K14981751", "F5:K15079139", "F5:K18129121", "F5:K21561554", "F5:K28135205", "F5:K29203191", "F5:K33535454", "F5:K42438635", "F5:K43378049", "F5:K48131150", "F5:K52125441", "F5:K52325031", "F5:K53634325", "F5:K53737506", "F5:K54811521", "F5:K55545288", "F5:K60001344", "F5:K62031468", "F5:K64944965", "F5:K70933496", "F5:K82131333", "F5:K88125023", "F5:K92969318"]}, {"type": "fedora", "idList": ["FEDORA:224AE608F491", "FEDORA:267796076024", "FEDORA:2C78160567CB", "FEDORA:371E06040B12", "FEDORA:4002B609954A", "FEDORA:44065605602A", "FEDORA:51B856067EB8", "FEDORA:59E3F606D998", "FEDORA:5BC786077CC2", "FEDORA:628EB603ECD0", "FEDORA:648496077DD1", "FEDORA:677BA601DEF1", "FEDORA:6F1BC604D0C1", "FEDORA:803AE30C6416", "FEDORA:8FEA960A4096", "FEDORA:94BC060A4ECF", "FEDORA:BA52A60A7ABE", "FEDORA:BF5EC607125E", "FEDORA:C63656040AE1", "FEDORA:CB0956087865", "FEDORA:E700D60A1070", "FEDORA:EC9F26076D31"]}, {"type": "githubexploit", "idList": ["A435389F-9C9F-5CEA-8255-C23422F533AB"]}, {"type": "ibm", "idList": ["1879325E67264056B58E8AD7F16855960BE3D80A459CF04AA2C576744065C438", "2FE97BC0DB8A3B1BCF85FF8F69828770D4396C7CC3ABD37202D8089D2CADF87B", "3D1FD9B5927004B8B7B1CB77FE467A67DED4E5A078A791448C81D1500BA2A09E", "65AC1B828E41A5505E1A8E4F6E7E2E7A2BE86DE58C539C97379A40C7ED8BBD9F", "7BEBE6C769A16D13746B813CF456C36F85AE1B1A1CBD26E71A53BD6E5B34E2F4", "8B24753FF8758BF51E7C6001AC39E0EF90B14323A9756CCEF8AC68E99EF03367", "9148A44BD9A1C1A13CCEBD8F0346557CF005830103920CDDC01519240525CB58", "9C5DF437CF62931EFEC03F0486D943184BF2DD6EABEC3C8E5309C6E15C55C4C1", "B599429672D35F0898136CCC25113D8FA5E242634C8CEB73C87851525F0DA4BB", "B68653AE8B3B701FAB183C54D344C9C2EE03602A2C7365EC7CF172320BA1AA2E", "D860B85F49895E0D8CF0AC6A066F6902558B044E03F0320678E24399C41C6135", "E83BF63685F2C90305069981C071D32B53876ACF7043D5AEB7C2319D670A7EB9", "ED8A3D1B7861E9FADE2E56F3710C2F426BD0F046968D24A2807B0DBC778A1AA1", "F0AFFAB5446BEF6A6B346CA7237A1583252E55B1EA002352E7DFDFFB5796363C", "FB8202C5465D3CF4466CC71228E4C2164D25F2BA4FF86BCC3A7FC654128E1D7C"]}, {"type": "kitploit", "idList": ["KITPLOIT:1463882138321251213"]}, {"type": "mageia", "idList": ["MGASA-2018-0192", "MGASA-2020-0333"]}, {"type": "nessus", "idList": ["AL2_ALAS-2020-1480.NASL", "AL2_ALAS-2021-1627.NASL", "AL2_ALAS-2021-1719.NASL", "AL2_ALASKERNEL-5_10-2022-007.NASL", "AL2_ALASKERNEL-5_4-2022-009.NASL", "AL2_ALASKERNEL-5_4-2022-014.NASL", "AL2_ALASKERNEL-5_4-2022-027.NASL", "AL2_ALASKERNEL-5_4-2022-029.NASL", "AL2_ALASKERNEL-5_4-2022-031.NASL", "ALMA_LINUX_ALSA-2020-4431.NASL", "ALMA_LINUX_ALSA-2021-1578.NASL", "ALMA_LINUX_ALSA-2022-1988.NASL", "CENTOS8_RHSA-2020-0339.NASL", "CENTOS8_RHSA-2020-1372.NASL", "CENTOS8_RHSA-2020-1769.NASL", "CENTOS8_RHSA-2020-4431.NASL", "CENTOS8_RHSA-2021-1578.NASL", "CENTOS_RHSA-2020-0374.NASL", "CENTOS_RHSA-2020-0375.NASL", "CENTOS_RHSA-2020-1016.NASL", "CENTOS_RHSA-2020-3220.NASL", "CENTOS_RHSA-2020-4060.NASL", "CENTOS_RHSA-2021-0856.NASL", "DEBIAN_DLA-2068.NASL", "DEBIAN_DLA-2114.NASL", "DEBIAN_DLA-2323.NASL", "DEBIAN_DLA-2420.NASL", "DEBIAN_DSA-5096.NASL", "EULEROS_SA-2017-1245.NASL", "EULEROS_SA-2019-1517.NASL", "EULEROS_SA-2019-1537.NASL", "EULEROS_SA-2019-1972.NASL", "EULEROS_SA-2019-2353.NASL", "EULEROS_SA-2019-2531.NASL", "EULEROS_SA-2019-2693.NASL", "EULEROS_SA-2020-1042.NASL", "EULEROS_SA-2020-1112.NASL", "EULEROS_SA-2020-1197.NASL", "EULEROS_SA-2020-1396.NASL", "EULEROS_SA-2020-1452.NASL", "EULEROS_SA-2020-1536.NASL", "EULEROS_SA-2020-1674.NASL", "EULEROS_SA-2020-1713.NASL", "EULEROS_SA-2020-2222.NASL", "EULEROS_SA-2021-1056.NASL", "EULEROS_SA-2021-2140.NASL", "EULEROS_SA-2022-1376.NASL", "EULEROS_SA-2022-1402.NASL", "EULEROS_SA-2022-2566.NASL", "EULEROS_SA-2023-2444.NASL", "FEDORA_2017-6764D16965.NASL", "FEDORA_2017-A3A8638A60.NASL", "FEDORA_2018-7C2E0A998D.NASL", "FEDORA_2018-8D90571CDF.NASL", "FEDORA_2019-021C968423.NASL", "FEDORA_2019-124A241044.NASL", "FEDORA_2019-34A75D7E61.NASL", "FEDORA_2019-8846A1A5A2.NASL", "FEDORA_2019-91F6E7BB71.NASL", "FEDORA_2019-B86A7BDBA0.NASL", "FEDORA_2021-79CBBEFEBE.NASL", "NEWSTART_CGSL_NS-SA-2020-0010_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0014_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2020-0030_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0108_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0008_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0025_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0078_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0104_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0126_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0140_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0169_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0026_KERNEL.NASL", "NUTANIX_NXSA-AOS-5_11_3.NASL", "NUTANIX_NXSA-AOS-5_15_3.NASL", "NUTANIX_NXSA-AOS-5_15_5.NASL", "NUTANIX_NXSA-AOS-5_15_5_5.NASL", "NUTANIX_NXSA-AOS-5_15_6.NASL", "NUTANIX_NXSA-AOS-5_15_7.NASL", "NUTANIX_NXSA-AOS-5_16_1_1.NASL", "NUTANIX_NXSA-AOS-5_17.NASL", "NUTANIX_NXSA-AOS-5_17_1.NASL", "NUTANIX_NXSA-AOS-5_18.NASL", "NUTANIX_NXSA-AOS-5_18_0_5.NASL", "NUTANIX_NXSA-AOS-5_18_1.NASL", "NUTANIX_NXSA-AOS-5_19_0_5.NASL", "NUTANIX_NXSA-AOS-5_19_1.NASL", "NUTANIX_NXSA-AOS-5_20.NASL", "NUTANIX_NXSA-AOS-6_0.NASL", "NUTANIX_NXSA-AOS-6_1.NASL", "OPENSUSE-2019-1570.NASL", "OPENSUSE-2019-2307.NASL", "OPENSUSE-2019-2308.NASL", "OPENSUSE-2019-2392.NASL", "OPENSUSE-2019-2444.NASL", "OPENSUSE-2019-2503.NASL", "OPENSUSE-2019-2507.NASL", "OPENSUSE-2019-2675.NASL", "OPENSUSE-2020-336.NASL", "OPENSUSE-2021-1357.NASL", "OPENSUSE-2021-1365.NASL", "OPENSUSE-2021-1975.NASL", "OPENSUSE-2021-1977.NASL", "OPENSUSE-2021-3338.NASL", "OPENSUSE-2021-3387.NASL", "OPENSUSE-2021-3447.NASL", "OPENSUSE-2021-532.NASL", "OPENSUSE-2021-758.NASL", "ORACLELINUX_ELSA-2020-0339.NASL", "ORACLELINUX_ELSA-2020-0374.NASL", "ORACLELINUX_ELSA-2020-1016.NASL", "ORACLELINUX_ELSA-2020-1372.NASL", "ORACLELINUX_ELSA-2020-1769.NASL", "ORACLELINUX_ELSA-2020-2933.NASL", "ORACLELINUX_ELSA-2020-3220.NASL", "ORACLELINUX_ELSA-2020-4060.NASL", "ORACLELINUX_ELSA-2020-4431.NASL", "ORACLELINUX_ELSA-2020-5533.NASL", "ORACLELINUX_ELSA-2020-5541.NASL", "ORACLELINUX_ELSA-2020-5559.NASL", "ORACLELINUX_ELSA-2020-5560.NASL", "ORACLELINUX_ELSA-2020-5569.NASL", "ORACLELINUX_ELSA-2020-5670.NASL", "ORACLELINUX_ELSA-2020-5671.NASL", "ORACLELINUX_ELSA-2020-5676.NASL", "ORACLELINUX_ELSA-2020-5706.NASL", "ORACLELINUX_ELSA-2020-5708.NASL", "ORACLELINUX_ELSA-2020-5709.NASL", "ORACLELINUX_ELSA-2020-5710.NASL", "ORACLELINUX_ELSA-2020-5715.NASL", "ORACLELINUX_ELSA-2020-5750.NASL", "ORACLELINUX_ELSA-2020-5753.NASL", "ORACLELINUX_ELSA-2020-5754.NASL", "ORACLELINUX_ELSA-2020-5755.NASL", "ORACLELINUX_ELSA-2020-5801.NASL", "ORACLELINUX_ELSA-2020-5802.NASL", "ORACLELINUX_ELSA-2020-5804.NASL", "ORACLELINUX_ELSA-2020-5805.NASL", "ORACLELINUX_ELSA-2020-5837.NASL", "ORACLELINUX_ELSA-2020-5844.NASL", "ORACLELINUX_ELSA-2020-5845.NASL", "ORACLELINUX_ELSA-2020-5866.NASL", "ORACLELINUX_ELSA-2020-5878.NASL", "ORACLELINUX_ELSA-2020-5879.NASL", "ORACLELINUX_ELSA-2020-5881.NASL", "ORACLELINUX_ELSA-2020-5885.NASL", "ORACLELINUX_ELSA-2020-5912.NASL", "ORACLELINUX_ELSA-2020-5956.NASL", "ORACLELINUX_ELSA-2021-0856.NASL", "ORACLELINUX_ELSA-2021-1578.NASL", "ORACLELINUX_ELSA-2021-9473.NASL", "ORACLELINUX_ELSA-2022-1988.NASL", "ORACLEVM_OVMSA-2020-0019.NASL", "ORACLEVM_OVMSA-2020-0020.NASL", "ORACLEVM_OVMSA-2020-0028.NASL", "ORACLEVM_OVMSA-2020-0032.NASL", "ORACLEVM_OVMSA-2020-0041.NASL", "ORACLEVM_OVMSA-2020-0044.NASL", "ORACLEVM_OVMSA-2021-0035.NASL", "PHOTONOS_PHSA-2019-1_0-0262_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0041_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0046_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0295_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0245_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0052_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0069_LINUX.NASL", "REDHAT-RHSA-2020-0174.NASL", "REDHAT-RHSA-2020-0204.NASL", "REDHAT-RHSA-2020-0328.NASL", "REDHAT-RHSA-2020-0339.NASL", "REDHAT-RHSA-2020-0374.NASL", "REDHAT-RHSA-2020-0375.NASL", "REDHAT-RHSA-2020-1016.NASL", "REDHAT-RHSA-2020-1372.NASL", "REDHAT-RHSA-2020-1378.NASL", "REDHAT-RHSA-2020-1493.NASL", "REDHAT-RHSA-2020-1567.NASL", "REDHAT-RHSA-2020-1769.NASL", "REDHAT-RHSA-2020-1984.NASL", "REDHAT-RHSA-2020-2104.NASL", "REDHAT-RHSA-2020-2429.NASL", "REDHAT-RHSA-2020-2851.NASL", "REDHAT-RHSA-2020-2854.NASL", "REDHAT-RHSA-2020-2933.NASL", "REDHAT-RHSA-2020-3220.NASL", "REDHAT-RHSA-2020-3221.NASL", "REDHAT-RHSA-2020-3545.NASL", "REDHAT-RHSA-2020-4060.NASL", "REDHAT-RHSA-2020-4062.NASL", "REDHAT-RHSA-2020-4236.NASL", "REDHAT-RHSA-2020-4431.NASL", "REDHAT-RHSA-2020-4609.NASL", "REDHAT-RHSA-2020-5206.NASL", "REDHAT-RHSA-2020-5656.NASL", "REDHAT-RHSA-2021-0856.NASL", "REDHAT-RHSA-2021-0857.NASL", "REDHAT-RHSA-2021-1531.NASL", "REDHAT-RHSA-2021-1578.NASL", "REDHAT-RHSA-2021-1739.NASL", "REDHAT-RHSA-2021-2164.NASL", "REDHAT-RHSA-2021-2355.NASL", "SLACKWARE_SSA_2020-008-01.NASL", "SLACKWARE_SSA_2020-086-01.NASL", "SLACKWARE_SSA_2020-295-01.NASL", "SLACKWARE_SSA_2021-202-01.NASL", "SL_20200205_KERNEL_ON_SL7_X.NASL", "SL_20200407_KERNEL_ON_SL7_X.NASL", "SL_20200715_KERNEL_ON_SL6_X.NASL", "SL_20201001_KERNEL_ON_SL7_X.NASL", "SUSE_SU-2019-14218-1.NASL", "SUSE_SU-2019-2648-1.NASL", "SUSE_SU-2019-2706-1.NASL", "SUSE_SU-2019-2710-1.NASL", "SUSE_SU-2019-2821-1.NASL", "SUSE_SU-2019-2829-1.NASL", "SUSE_SU-2019-2879-1.NASL", "SUSE_SU-2019-2946-1.NASL", "SUSE_SU-2019-2947-1.NASL", "SUSE_SU-2019-2948-1.NASL", "SUSE_SU-2019-2949-1.NASL", "SUSE_SU-2019-2950-1.NASL", "SUSE_SU-2019-2953-1.NASL", "SUSE_SU-2019-2984-1.NASL", "SUSE_SU-2019-3200-1.NASL", "SUSE_SU-2019-3228-1.NASL", "SUSE_SU-2019-3230-1.NASL", "SUSE_SU-2019-3232-1.NASL", "SUSE_SU-2019-3233-1.NASL", "SUSE_SU-2019-3258-1.NASL", "SUSE_SU-2019-3260-1.NASL", "SUSE_SU-2019-3261-1.NASL", "SUSE_SU-2019-3263-1.NASL", "SUSE_SU-2019-3295-1.NASL", "SUSE_SU-2019-3316-1.NASL", "SUSE_SU-2019-3317-1.NASL", "SUSE_SU-2019-3371-1.NASL", "SUSE_SU-2019-3379-1.NASL", "SUSE_SU-2019-3381-1.NASL", "SUSE_SU-2019-3389-1.NASL", "SUSE_SU-2020-0093-1.NASL", "SUSE_SU-2020-0558-1.NASL", "SUSE_SU-2020-0559-1.NASL", "SUSE_SU-2020-0560-1.NASL", "SUSE_SU-2020-0580-1.NASL", "SUSE_SU-2020-0584-1.NASL", "SUSE_SU-2020-0613-1.NASL", "SUSE_SU-2020-1255-1.NASL", "SUSE_SU-2020-1275-1.NASL", "SUSE_SU-2020-14354-1.NASL", "SUSE_SU-2020-1663-1.NASL", "SUSE_SU-2020-2491-1.NASL", "SUSE_SU-2020-2492-1.NASL", "SUSE_SU-2020-2497-1.NASL", "SUSE_SU-2020-3503-1.NASL", "SUSE_SU-2021-0437-1.NASL", "SUSE_SU-2021-1211-1.NASL", "SUSE_SU-2021-1238-1.NASL", "SUSE_SU-2021-1975-1.NASL", "SUSE_SU-2021-1977-1.NASL", "SUSE_SU-2021-3337-1.NASL", "SUSE_SU-2021-3338-1.NASL", "SUSE_SU-2021-3339-1.NASL", "SUSE_SU-2021-3386-1.NASL", "SUSE_SU-2021-3387-1.NASL", "SUSE_SU-2021-3388-1.NASL", "SUSE_SU-2021-3389-1.NASL", "SUSE_SU-2021-3415-1.NASL", "SUSE_SU-2021-3447-1.NASL", "SUSE_SU-2021-3876-1.NASL", "SUSE_SU-2021-3969-1.NASL", "SUSE_SU-2021-3972-1.NASL", "SUSE_SU-2023-0152-1.NASL", "UBUNTU_USN-4006-1.NASL", "UBUNTU_USN-4006-2.NASL", "UBUNTU_USN-4007-1.NASL", "UBUNTU_USN-4007-2.NASL", "UBUNTU_USN-4008-1.NASL", "UBUNTU_USN-4008-2.NASL", "UBUNTU_USN-4008-3.NASL", "UBUNTU_USN-4208-1.NASL", "UBUNTU_USN-4210-1.NASL", "UBUNTU_USN-4225-1.NASL", "UBUNTU_USN-4225-2.NASL", "UBUNTU_USN-4226-1.NASL", "UBUNTU_USN-4227-1.NASL", "UBUNTU_USN-4228-1.NASL", "UBUNTU_USN-4254-1.NASL", "UBUNTU_USN-4258-1.NASL", "UBUNTU_USN-4284-1.NASL", "UBUNTU_USN-4285-1.NASL", "UBUNTU_USN-4286-1.NASL", "UBUNTU_USN-4287-1.NASL", "UBUNTU_USN-4300-1.NASL", "UBUNTU_USN-4301-1.NASL", "UBUNTU_USN-4302-1.NASL", "UBUNTU_USN-4319-1.NASL", "UBUNTU_USN-4325-1.NASL", "UBUNTU_USN-4344-1.NASL", "UBUNTU_USN-4364-1.NASL", "UBUNTU_USN-4525-1.NASL", "UBUNTU_USN-4526-1.NASL", "UBUNTU_USN-4527-1.NASL", "UBUNTU_USN-4904-1.NASL", "UBUNTU_USN-5140-1.NASL", "UBUNTU_USN-5161-1.NASL", "UBUNTU_USN-5162-1.NASL", "UBUNTU_USN-5163-1.NASL", "UBUNTU_USN-5164-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310844033", "OPENVAS:1361412562310844034", "OPENVAS:1361412562310844036", "OPENVAS:1361412562310844037", "OPENVAS:1361412562310844038", "OPENVAS:1361412562310844041", "OPENVAS:1361412562310844257", "OPENVAS:1361412562310844258", "OPENVAS:1361412562310844281", "OPENVAS:1361412562310844282", "OPENVAS:1361412562310844283", "OPENVAS:1361412562310844284", "OPENVAS:1361412562310844298", "OPENVAS:1361412562310844314", "OPENVAS:1361412562310844316", "OPENVAS:1361412562310844341", "OPENVAS:1361412562310844342", "OPENVAS:1361412562310844343", "OPENVAS:1361412562310844347", "OPENVAS:1361412562310844362", "OPENVAS:1361412562310844364", "OPENVAS:1361412562310844365", "OPENVAS:1361412562310844384", "OPENVAS:1361412562310844387", "OPENVAS:1361412562310844409", "OPENVAS:1361412562310844433", "OPENVAS:1361412562310852568", "OPENVAS:1361412562310852737", "OPENVAS:1361412562310852750", "OPENVAS:1361412562310852772", "OPENVAS:1361412562310852891", "OPENVAS:1361412562310852953", "OPENVAS:1361412562310852970", "OPENVAS:1361412562310852971", "OPENVAS:1361412562310853070", "OPENVAS:1361412562310873359", "OPENVAS:1361412562310873365", "OPENVAS:1361412562310874315", "OPENVAS:1361412562310874365", "OPENVAS:1361412562310874427", "OPENVAS:1361412562310874619", "OPENVAS:1361412562310877052", "OPENVAS:1361412562310877058", "OPENVAS:1361412562310877070", "OPENVAS:1361412562310877113", "OPENVAS:1361412562310877132", "OPENVAS:1361412562310877136", "OPENVAS:1361412562310877209", "OPENVAS:1361412562310877358", "OPENVAS:1361412562310877370", "OPENVAS:1361412562310877476", "OPENVAS:1361412562310877479", "OPENVAS:1361412562310877533", "OPENVAS:1361412562310877540", "OPENVAS:1361412562310877541", "OPENVAS:1361412562310877952", "OPENVAS:1361412562310883179", "OPENVAS:1361412562310883191", "OPENVAS:1361412562310892068", "OPENVAS:1361412562310892114", "OPENVAS:1361412562311220171245", "OPENVAS:1361412562311220191517", "OPENVAS:1361412562311220191537", "OPENVAS:1361412562311220191972", "OPENVAS:1361412562311220192353", "OPENVAS:1361412562311220192531", "OPENVAS:1361412562311220192693", "OPENVAS:1361412562311220201012", "OPENVAS:1361412562311220201042", "OPENVAS:1361412562311220201112", "OPENVAS:1361412562311220201197", "OPENVAS:1361412562311220201396", "OPENVAS:1361412562311220201452", "OPENVAS:1361412562311220201536", "OPENVAS:1361412562311220201674", "OPENVAS:1361412562311220201713"]}, {"type": "oracle", "idList": ["ORACLE:CPUAPR2021"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-0339", "ELSA-2020-0374", "ELSA-2020-1016", "ELSA-2020-1372", "ELSA-2020-1769", "ELSA-2020-2933", "ELSA-2020-3220", "ELSA-2020-4060", "ELSA-2020-4431", "ELSA-2020-5533", "ELSA-2020-5541", "ELSA-2020-5559", "ELSA-2020-5560", "ELSA-2020-5569", "ELSA-2020-5670", "ELSA-2020-5671", "ELSA-2020-5676", "ELSA-2020-5706", "ELSA-2020-5708", "ELSA-2020-5709", "ELSA-2020-5710", "ELSA-2020-5715", "ELSA-2020-5750", "ELSA-2020-5753", "ELSA-2020-5754", "ELSA-2020-5755", "ELSA-2020-5801", "ELSA-2020-5802", "ELSA-2020-5804", "ELSA-2020-5805", "ELSA-2020-5837", "ELSA-2020-5844", "ELSA-2020-5845", "ELSA-2020-5866", "ELSA-2020-5878", "ELSA-2020-5879", "ELSA-2020-5881", "ELSA-2020-5885", "ELSA-2020-5912", "ELSA-2020-5956", "ELSA-2021-0856", "ELSA-2021-1578", "ELSA-2021-9473"]}, {"type": "osv", "idList": ["OSV:DLA-2068-1", "OSV:DLA-2114-1", "OSV:DLA-2323-1", "OSV:DLA-2420-1"]}, {"type": "photon", "idList": ["PHSA-2018-0062", "PHSA-2018-0150", "PHSA-2019-0028", "PHSA-2019-0036", "PHSA-2019-0039", "PHSA-2019-0041", "PHSA-2019-0046", "PHSA-2019-0161", "PHSA-2019-0189", "PHSA-2019-0194", "PHSA-2019-0251", "PHSA-2019-0255", "PHSA-2019-0262", "PHSA-2019-1.0-0251", "PHSA-2019-1.0-0255", "PHSA-2019-1.0-0262", "PHSA-2019-2.0-0161", "PHSA-2019-3.0-0028", "PHSA-2019-3.0-0036", "PHSA-2019-3.0-0039", "PHSA-2019-3.0-0041", "PHSA-2019-3.0-0046", "PHSA-2020-0052", "PHSA-2020-0069", "PHSA-2020-0093", "PHSA-2020-0212", "PHSA-2020-0219", "PHSA-2020-0244", "PHSA-2020-0245", "PHSA-2020-0274", "PHSA-2020-1.0-0274", "PHSA-2020-1.0-0279", "PHSA-2020-1.0-0295", "PHSA-2020-2.0-0244", "PHSA-2020-2.0-0245", "PHSA-2020-3.0-0052", "PHSA-2020-3.0-0069", "PHSA-2020-3.0-0093", "PHSA-2020-3.0-0127"]}, {"type": "prion", "idList": ["PRION:CVE-2021-3744", "PRION:CVE-2021-3764"]}, {"type": "ptsecurity", "idList": ["PT-2019-05"]}, {"type": "redhat", "idList": ["RHSA-2020:0174", "RHSA-2020:0204", "RHSA-2020:0328", "RHSA-2020:0339", "RHSA-2020:0374", "RHSA-2020:0375", "RHSA-2020:1016", "RHSA-2020:1372", "RHSA-2020:1378", "RHSA-2020:1475", "RHSA-2020:1493", "RHSA-2020:1567", "RHSA-2020:1769", "RHSA-2020:1984", "RHSA-2020:2104", "RHSA-2020:2429", "RHSA-2020:2851", "RHSA-2020:2854", "RHSA-2020:2933", "RHSA-2020:3220", "RHSA-2020:3221", "RHSA-2020:3545", "RHSA-2020:4060", "RHSA-2020:4062", "RHSA-2020:4236", "RHSA-2020:4431", "RHSA-2020:4609", "RHSA-2020:5206", "RHSA-2020:5633", "RHSA-2020:5635", "RHSA-2020:5656", "RHSA-2021:0856", "RHSA-2021:0857", "RHSA-2021:1129", "RHSA-2021:1531", "RHSA-2021:1578", "RHSA-2021:1739", "RHSA-2021:2121", "RHSA-2021:2136", "RHSA-2021:2164", "RHSA-2021:2355"]}, {"type": "redhatcve", "idList": ["RH:CVE-2017-13693", "RH:CVE-2017-13694", "RH:CVE-2019-10220", "RH:CVE-2019-11191", "RH:CVE-2019-14901", "RH:CVE-2019-15291", "RH:CVE-2019-16229", "RH:CVE-2019-16231", "RH:CVE-2019-16232", "RH:CVE-2019-18660", "RH:CVE-2019-18675", "RH:CVE-2019-18683", "RH:CVE-2019-18786", "RH:CVE-2019-18808", "RH:CVE-2019-18814", "RH:CVE-2019-18885", "RH:CVE-2019-19045", "RH:CVE-2019-19046", "RH:CVE-2019-19049", "RH:CVE-2019-19051", "RH:CVE-2019-19052", "RH:CVE-2019-19054", "RH:CVE-2019-19056", "RH:CVE-2019-19057", "RH:CVE-2019-19058", "RH:CVE-2019-19059", "RH:CVE-2019-19060", "RH:CVE-2019-19061", "RH:CVE-2019-19063", "RH:CVE-2019-19065", "RH:CVE-2019-19066", "RH:CVE-2019-19067", "RH:CVE-2019-19068", "RH:CVE-2019-19070", "RH:CVE-2019-19071", "RH:CVE-2019-19072", "RH:CVE-2019-19073", "RH:CVE-2019-19074", "RH:CVE-2019-19075", "RH:CVE-2019-19077", "RH:CVE-2019-19078", "RH:CVE-2019-19079", "RH:CVE-2019-19080", "RH:CVE-2019-19081", "RH:CVE-2019-19082", "RH:CVE-2019-19083", "RH:CVE-2019-19227", "RH:CVE-2019-19252", "RH:CVE-2019-19523", "RH:CVE-2019-19524", "RH:CVE-2019-19525", "RH:CVE-2019-19526", "RH:CVE-2019-19527", "RH:CVE-2019-19528", "RH:CVE-2019-19529", "RH:CVE-2019-19530", "RH:CVE-2019-19531", "RH:CVE-2019-19532", "RH:CVE-2019-19533", "RH:CVE-2019-19534", "RH:CVE-2019-19535", "RH:CVE-2019-19536", "RH:CVE-2019-19537", "RH:CVE-2019-19767", "RH:CVE-2021-3744", "RH:CVE-2021-3764"]}, {"type": "slackware", "idList": ["SSA-2020-008-01", "SSA-2020-086-01", "SSA-2020-295-01", "SSA-2021-202-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:1570-1", "OPENSUSE-SU-2019:2307-1", "OPENSUSE-SU-2019:2308-1", "OPENSUSE-SU-2019:2392-1", "OPENSUSE-SU-2019:2444-1", "OPENSUSE-SU-2019:2503-1", "OPENSUSE-SU-2019:2507-1", "OPENSUSE-SU-2019:2675-1", "OPENSUSE-SU-2020:0336-1", "OPENSUSE-SU-2021:0532-1", "OPENSUSE-SU-2021:0758-1", "OPENSUSE-SU-2021:1975-1", "OPENSUSE-SU-2021:1977-1"]}, {"type": "symantec", "idList": ["SMNTC-110883", "SMNTC-110893", "SMNTC-110894", "SMNTC-110895", "SMNTC-110902", "SMNTC-110961", "SMNTC-110977", "SMNTC-110996", "SMNTC-111080", "SMNTC-111082", "SMNTC-111083", "SMNTC-111292"]}, {"type": "ubuntu", "idList": ["USN-4006-1", "USN-4006-2", "USN-4007-1", "USN-4007-2", "USN-4008-1", "USN-4008-2", "USN-4008-3", "USN-4208-1", "USN-4210-1", "USN-4225-1", "USN-4225-2", "USN-4226-1", "USN-4227-1", "USN-4227-2", "USN-4228-1", "USN-4228-2", "USN-4254-1", "USN-4254-2", "USN-4258-1", "USN-4284-1", "USN-4285-1", "USN-4286-1", "USN-4286-2", "USN-4287-1", "USN-4287-2", "USN-4300-1", "USN-4301-1", "USN-4302-1", "USN-4319-1", "USN-4325-1", "USN-4344-1", "USN-4364-1", "USN-4525-1", "USN-4526-1", "USN-4527-1", "USN-4904-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2017-13693", "UB:CVE-2017-13694", "UB:CVE-2019-10220", "UB:CVE-2019-11191", "UB:CVE-2019-14901", "UB:CVE-2019-15291", "UB:CVE-2019-16229", "UB:CVE-2019-16230", "UB:CVE-2019-16231", "UB:CVE-2019-16232", "UB:CVE-2019-18660", "UB:CVE-2019-18675", "UB:CVE-2019-18683", "UB:CVE-2019-18786", "UB:CVE-2019-18808", "UB:CVE-2019-18814", "UB:CVE-2019-18885", "UB:CVE-2019-19045", "UB:CVE-2019-19046", "UB:CVE-2019-19049", "UB:CVE-2019-19051", "UB:CVE-2019-19052", "UB:CVE-2019-19054", "UB:CVE-2019-19056", "UB:CVE-2019-19057", "UB:CVE-2019-19058", "UB:CVE-2019-19059", "UB:CVE-2019-19060", "UB:CVE-2019-19061", "UB:CVE-2019-19063", "UB:CVE-2019-19065", "UB:CVE-2019-19066", "UB:CVE-2019-19067", "UB:CVE-2019-19068", "UB:CVE-2019-19070", "UB:CVE-2019-19071", "UB:CVE-2019-19072", "UB:CVE-2019-19073", "UB:CVE-2019-19074", "UB:CVE-2019-19075", "UB:CVE-2019-19077", "UB:CVE-2019-19078", "UB:CVE-2019-19079", "UB:CVE-2019-19080", "UB:CVE-2019-19081", "UB:CVE-2019-19082", "UB:CVE-2019-19083", "UB:CVE-2019-19227", "UB:CVE-2019-19252", "UB:CVE-2019-19523", "UB:CVE-2019-19524", "UB:CVE-2019-19525", "UB:CVE-2019-19526", "UB:CVE-2019-19527", "UB:CVE-2019-19528", "UB:CVE-2019-19529", "UB:CVE-2019-19530", "UB:CVE-2019-19531", "UB:CVE-2019-19532", "UB:CVE-2019-19533", "UB:CVE-2019-19534", "UB:CVE-2019-19535", "UB:CVE-2019-19536", "UB:CVE-2019-19537", "UB:CVE-2019-19767", "UB:CVE-2021-3744", "UB:CVE-2021-3764"]}, {"type": "veracode", "idList": ["VERACODE:25173", "VERACODE:25174", "VERACODE:25175", "VERACODE:25176", "VERACODE:25177", "VERACODE:25178", "VERACODE:25179", "VERACODE:25180", "VERACODE:25649", "VERACODE:25978", "VERACODE:26789", "VERACODE:26792", "VERACODE:26803", "VERACODE:26846", "VERACODE:26874", "VERACODE:26896", "VERACODE:26968", "VERACODE:26999", "VERACODE:27080", "VERACODE:27119", "VERACODE:27120", "VERACODE:27154", "VERACODE:27232", "VERACODE:27233", "VERACODE:27755", "VERACODE:27756", "VERACODE:27758", "VERACODE:27759", "VERACODE:27760", "VERACODE:27766", "VERACODE:27768", "VERACODE:29734"]}]}, "score": {"value": 9.5, "vector": "NONE"}, "backreferences": {"references": [{"type": "almalinux", "idList": ["ALSA-2020:4431"]}, {"type": "amazon", "idList": ["ALAS2-2020-1480"]}, {"type": "androidsecurity", "idList": ["ANDROID:2020-03-01", "ANDROID:2020-04-01", "ANDROID:2020-05-01"]}, {"type": "centos", "idList": ["CESA-2020:0375", "CESA-2020:1016"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:7D6795462AFD47DE31FD5B40467B68C4", "CFOUNDRY:DCE4C624C0C4A79B360FF0BA8F545247"]}, {"type": "cloudlinux", "idList": ["CLSA-2021:1632261812", "CLSA-2021:1632261839"]}, {"type": "cve", "idList": ["CVE-2017-13693", "CVE-2017-13694", "CVE-2019-18675", "CVE-2019-18808", "CVE-2019-18814", "CVE-2019-18885", "CVE-2019-19045", "CVE-2019-19046", "CVE-2019-19049", "CVE-2019-19051", "CVE-2019-19052", "CVE-2019-19054", "CVE-2019-19056", "CVE-2019-19057", "CVE-2019-19058", "CVE-2019-19059", "CVE-2019-19060", "CVE-2019-19061", "CVE-2019-19063", "CVE-2019-19065", "CVE-2019-19066", "CVE-2019-19067", "CVE-2019-19068", "CVE-2019-19070", "CVE-2019-19071", "CVE-2019-19072", "CVE-2019-19073", "CVE-2019-19074", "CVE-2019-19075", "CVE-2019-19077", "CVE-2019-19078", "CVE-2019-19079", "CVE-2019-19080", "CVE-2019-19081", "CVE-2019-19082", "CVE-2019-19083", "CVE-2019-19227", "CVE-2019-19252"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2068-1:83234"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2017-13693", "DEBIANCVE:CVE-2017-13694"]}, {"type": "f5", "idList": ["F5:K14200143", "F5:K21561554", "F5:K28135205", "F5:K43378049", "F5:K48131150", "F5:K52125441", "F5:K53634325", "F5:K53737506", "F5:K60001344", "F5:K62031468", "F5:K64944965", "F5:K70933496", "F5:K82131333", "F5:K92969318"]}, {"type": "fedora", "idList": ["FEDORA:2C78160567CB", "FEDORA:44065605602A", "FEDORA:648496077DD1", "FEDORA:677BA601DEF1", "FEDORA:6F1BC604D0C1", "FEDORA:BA52A60A7ABE", "FEDORA:E700D60A1070"]}, {"type": "githubexploit", "idList": ["A435389F-9C9F-5CEA-8255-C23422F533AB"]}, {"type": "ibm", "idList": ["7BEBE6C769A16D13746B813CF456C36F85AE1B1A1CBD26E71A53BD6E5B34E2F4"]}, {"type": "kitploit", "idList": ["KITPLOIT:1463882138321251213"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/HUAWEI-EULEROS-2_0_SP3-CVE-2019-18675/", "MSF:ILITIES/ORACLE_LINUX-CVE-2020-10742/"]}, {"type": "nessus", "idList": ["CENTOS8_RHSA-2021-1578.NASL", "CENTOS_RHSA-2020-0375.NASL", "CENTOS_RHSA-2020-1016.NASL", "DEBIAN_DLA-2068.NASL", "EULEROS_SA-2020-1042.NASL", "EULEROS_SA-2020-1452.NASL", "FEDORA_2017-6764D16965.NASL", "FEDORA_2017-A3A8638A60.NASL", "OPENSUSE-2019-2444.NASL", "OPENSUSE-2019-2503.NASL", "OPENSUSE-2019-2507.NASL", "OPENSUSE-2021-532.NASL", "OPENSUSE-2021-758.NASL", "ORACLELINUX_ELSA-2020-0339.NASL", "ORACLELINUX_ELSA-2020-0374.NASL", "ORACLELINUX_ELSA-2020-1372.NASL", "ORACLELINUX_ELSA-2020-5533.NASL", "ORACLELINUX_ELSA-2020-5706.NASL", "ORACLELINUX_ELSA-2020-5708.NASL", "ORACLELINUX_ELSA-2020-5709.NASL", "ORACLELINUX_ELSA-2020-5710.NASL", "ORACLELINUX_ELSA-2020-5715.NASL", "ORACLELINUX_ELSA-2021-1578.NASL", "ORACLEVM_OVMSA-2020-0019.NASL", "ORACLEVM_OVMSA-2020-0020.NASL", "PHOTONOS_PHSA-2019-1_0-0262_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0041_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0046_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0295_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0245_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0052_LINUX.NASL", "REDHAT-RHSA-2020-0174.NASL", "REDHAT-RHSA-2020-0204.NASL", "REDHAT-RHSA-2020-0328.NASL", "REDHAT-RHSA-2020-0339.NASL", "REDHAT-RHSA-2020-0374.NASL", "REDHAT-RHSA-2020-0375.NASL", "REDHAT-RHSA-2020-1016.NASL", "REDHAT-RHSA-2020-1378.NASL", "REDHAT-RHSA-2020-1493.NASL", "REDHAT-RHSA-2020-2429.NASL", "REDHAT-RHSA-2021-1578.NASL", "REDHAT-RHSA-2021-1739.NASL", "REDHAT-RHSA-2021-2164.NASL", "SLACKWARE_SSA_2020-008-01.NASL", "SL_20200205_KERNEL_ON_SL7_X.NASL", "SUSE_SU-2019-2946-1.NASL", "SUSE_SU-2019-2947-1.NASL", "SUSE_SU-2019-2948-1.NASL", "SUSE_SU-2019-2949-1.NASL", "SUSE_SU-2019-2950-1.NASL", "SUSE_SU-2019-2953-1.NASL", "SUSE_SU-2019-2984-1.NASL", "SUSE_SU-2020-0093-1.NASL", "SUSE_SU-2020-1255-1.NASL", "SUSE_SU-2020-1275-1.NASL", "SUSE_SU-2021-1211-1.NASL", "SUSE_SU-2021-1975-1.NASL", "SUSE_SU-2021-1977-1.NASL", "UBUNTU_USN-4225-1.NASL", "UBUNTU_USN-4225-2.NASL", "UBUNTU_USN-4226-1.NASL", "UBUNTU_USN-4227-1.NASL", "UBUNTU_USN-4228-1.NASL", "UBUNTU_USN-4254-1.NASL", "UBUNTU_USN-4258-1.NASL", "UBUNTU_USN-4319-1.NASL", "UBUNTU_USN-4325-1.NASL", "UBUNTU_USN-4364-1.NASL", "UBUNTU_USN-4904-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310844033", "OPENVAS:1361412562310844034", "OPENVAS:1361412562310844036", "OPENVAS:1361412562310844037", "OPENVAS:1361412562310844038", "OPENVAS:1361412562310844041", "OPENVAS:1361412562310844281", "OPENVAS:1361412562310844282", "OPENVAS:1361412562310844283", "OPENVAS:1361412562310844284", "OPENVAS:1361412562310844298", "OPENVAS:1361412562310844314", "OPENVAS:1361412562310844316", "OPENVAS:1361412562310844384", "OPENVAS:1361412562310844387", "OPENVAS:1361412562310844433", "OPENVAS:1361412562310852568", "OPENVAS:1361412562310852772", "OPENVAS:1361412562310852891", "OPENVAS:1361412562310852953", "OPENVAS:1361412562310852970", "OPENVAS:1361412562310852971", "OPENVAS:1361412562310873359", "OPENVAS:1361412562310873365", "OPENVAS:1361412562310877113", "OPENVAS:1361412562310877132", "OPENVAS:1361412562310877136", "OPENVAS:1361412562310877209", "OPENVAS:1361412562310877358", "OPENVAS:1361412562310877370", "OPENVAS:1361412562310883179", "OPENVAS:1361412562310892068", "OPENVAS:1361412562311220171245", "OPENVAS:1361412562311220201012", "OPENVAS:1361412562311220201042", "OPENVAS:1361412562311220201452"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-0339", "ELSA-2020-0374", "ELSA-2020-1016", "ELSA-2020-1372", "ELSA-2020-1769", "ELSA-2020-4431", "ELSA-2020-5708", "ELSA-2020-5709", "ELSA-2020-5710", "ELSA-2020-5715", "ELSA-2021-1578"]}, {"type": "photon", "idList": ["PHSA-2019-1.0-0251", "PHSA-2019-1.0-0262", "PHSA-2019-2.0-0161", "PHSA-2019-3.0-0041", "PHSA-2019-3.0-0043", "PHSA-2019-3.0-0046", "PHSA-2020-1.0-0274", "PHSA-2020-1.0-0279", "PHSA-2020-1.0-0295", "PHSA-2020-2.0-0244", "PHSA-2020-2.0-0245", "PHSA-2020-3.0-0052", "PHSA-2020-3.0-0069", "PHSA-2020-3.0-0093"]}, {"type": "ptsecurity", "idList": ["PT-2019-05"]}, {"type": "redhat", "idList": ["RHSA-2020:1372", "RHSA-2020:2429"]}, {"type": "redhatcve", "idList": ["RH:CVE-2019-10220", "RH:CVE-2019-15291", "RH:CVE-2019-16231", "RH:CVE-2019-16232", "RH:CVE-2019-18675", "RH:CVE-2019-18683", "RH:CVE-2019-18786", "RH:CVE-2019-18814", "RH:CVE-2019-18885", "RH:CVE-2019-19045", "RH:CVE-2019-19051", "RH:CVE-2019-19056", "RH:CVE-2019-19057", "RH:CVE-2019-19059", "RH:CVE-2019-19060", "RH:CVE-2019-19061", "RH:CVE-2019-19066", "RH:CVE-2019-19067", "RH:CVE-2019-19068", "RH:CVE-2019-19071", "RH:CVE-2019-19074", "RH:CVE-2019-19078", "RH:CVE-2019-19079", "RH:CVE-2019-19080", "RH:CVE-2019-19227", "RH:CVE-2019-19523", "RH:CVE-2019-19524", "RH:CVE-2019-19526", "RH:CVE-2019-19530", "RH:CVE-2019-19531", "RH:CVE-2019-19532", "RH:CVE-2019-19533", "RH:CVE-2019-19535", "RH:CVE-2019-19537", "RH:CVE-2019-19767"]}, {"type": "slackware", "idList": ["SSA-2020-008-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:1570-1", "OPENSUSE-SU-2019:2503-1", "OPENSUSE-SU-2019:2507-1"]}, {"type": "symantec", "idList": ["SMNTC-110895"]}, {"type": "ubuntu", "idList": ["USN-4006-1", "USN-4006-2", "USN-4007-1", "USN-4007-2", "USN-4008-1", "USN-4008-2", "USN-4008-3", "USN-4225-1", "USN-4225-2", "USN-4226-1", "USN-4227-1", "USN-4227-2", "USN-4228-1", "USN-4228-2", "USN-4254-1", "USN-4254-2", "USN-4258-1", "USN-4319-1", "USN-4325-1", "USN-4364-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2019-10220", "UB:CVE-2019-14901", "UB:CVE-2019-15291", "UB:CVE-2019-16229", "UB:CVE-2019-16231", "UB:CVE-2019-16232", "UB:CVE-2019-18660", "UB:CVE-2019-18675", "UB:CVE-2019-18683", "UB:CVE-2019-18786", "UB:CVE-2019-18808", "UB:CVE-2019-18814", "UB:CVE-2019-18885", "UB:CVE-2019-19045", "UB:CVE-2019-19046", "UB:CVE-2019-19049", "UB:CVE-2019-19051", "UB:CVE-2019-19052", "UB:CVE-2019-19054", "UB:CVE-2019-19056", "UB:CVE-2019-19057", "UB:CVE-2019-19058", "UB:CVE-2019-19059", "UB:CVE-2019-19060", "UB:CVE-2019-19061", "UB:CVE-2019-19063", "UB:CVE-2019-19065", "UB:CVE-2019-19066", "UB:CVE-2019-19067", "UB:CVE-2019-19068", "UB:CVE-2019-19070", "UB:CVE-2019-19071", "UB:CVE-2019-19072", "UB:CVE-2019-19073", "UB:CVE-2019-19074", "UB:CVE-2019-19075", "UB:CVE-2019-19077", "UB:CVE-2019-19078", "UB:CVE-2019-19079", "UB:CVE-2019-19080", "UB:CVE-2019-19081", "UB:CVE-2019-19082", "UB:CVE-2019-19083", "UB:CVE-2019-19227", "UB:CVE-2019-19252", "UB:CVE-2019-19523", "UB:CVE-2019-19524", "UB:CVE-2019-19525", "UB:CVE-2019-19526", "UB:CVE-2019-19527", "UB:CVE-2019-19528", "UB:CVE-2019-19529", "UB:CVE-2019-19531", "UB:CVE-2019-19533", "UB:CVE-2019-19534", "UB:CVE-2019-19535", "UB:CVE-2019-19536", "UB:CVE-2019-19767"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2017-13693", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-06"}, {"cve": "CVE-2017-13694", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-06"}, {"cve": "CVE-2019-10220", "epss": 0.0021, "percentile": 0.57447, "modified": "2023-05-06"}, {"cve": "CVE-2019-11191", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-06"}, {"cve": "CVE-2019-14901", "epss": 0.01321, "percentile": 0.83947, "modified": "2023-05-06"}, {"cve": "CVE-2019-15291", "epss": 0.00123, "percentile": 0.45307, "modified": "2023-05-06"}, {"cve": "CVE-2019-16229", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-16231", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-16232", "epss": 0.00063, "percentile": 0.2547, "modified": "2023-05-06"}, {"cve": "CVE-2019-18660", "epss": 0.00069, "percentile": 0.28131, "modified": "2023-05-06"}, {"cve": "CVE-2019-18675", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-06"}, {"cve": "CVE-2019-18683", "epss": 0.00044, "percentile": 0.08252, "modified": "2023-05-06"}, {"cve": "CVE-2019-18786", "epss": 0.00047, "percentile": 0.14454, "modified": "2023-05-06"}, {"cve": "CVE-2019-18808", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-18814", "epss": 0.00344, "percentile": 0.67299, "modified": "2023-05-06"}, {"cve": "CVE-2019-18885", "epss": 0.00098, "percentile": 0.39497, "modified": "2023-05-06"}, {"cve": "CVE-2019-19045", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19046", "epss": 0.00318, "percentile": 0.66011, "modified": "2023-05-06"}, {"cve": "CVE-2019-19049", "epss": 0.00241, "percentile": 0.60565, "modified": "2023-05-06"}, {"cve": "CVE-2019-19051", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19052", "epss": 0.00859, "percentile": 0.79914, "modified": "2023-05-06"}, {"cve": "CVE-2019-19054", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19056", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19057", "epss": 0.00049, "percentile": 0.15309, "modified": "2023-05-06"}, {"cve": "CVE-2019-19058", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19059", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19060", "epss": 0.00613, "percentile": 0.7561, "modified": "2023-05-06"}, {"cve": "CVE-2019-19061", "epss": 0.003, "percentile": 0.64953, "modified": "2023-05-06"}, {"cve": "CVE-2019-19063", "epss": 0.00138, "percentile": 0.47955, "modified": "2023-05-06"}, {"cve": "CVE-2019-19065", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19066", "epss": 0.00046, "percentile": 0.14019, "modified": "2023-05-06"}, {"cve": "CVE-2019-19067", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19068", "epss": 0.00218, "percentile": 0.58263, "modified": "2023-05-06"}, {"cve": "CVE-2019-19070", "epss": 0.0018, "percentile": 0.53743, "modified": "2023-05-06"}, {"cve": "CVE-2019-19071", "epss": 0.0066, "percentile": 0.76599, "modified": "2023-05-06"}, {"cve": "CVE-2019-19072", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19073", "epss": 0.00158, "percentile": 0.50905, "modified": "2023-05-06"}, {"cve": "CVE-2019-19074", "epss": 0.02751, "percentile": 0.89018, "modified": "2023-05-06"}, {"cve": "CVE-2019-19075", "epss": 0.00728, "percentile": 0.77968, "modified": "2023-05-06"}, {"cve": "CVE-2019-19077", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19078", "epss": 0.00721, "percentile": 0.77798, "modified": "2023-05-06"}, {"cve": "CVE-2019-19079", "epss": 0.00237, "percentile": 0.60293, "modified": "2023-05-06"}, {"cve": "CVE-2019-19080", "epss": 0.00221, "percentile": 0.58694, "modified": "2023-05-06"}, {"cve": "CVE-2019-19081", "epss": 0.00215, "percentile": 0.58082, "modified": "2023-05-06"}, {"cve": "CVE-2019-19082", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19083", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19227", "epss": 0.00046, "percentile": 0.14019, "modified": "2023-05-06"}, {"cve": "CVE-2019-19252", "epss": 0.00045, "percentile": 0.1211, "modified": "2023-05-06"}, {"cve": "CVE-2019-19523", "epss": 0.00122, "percentile": 0.45194, "modified": "2023-05-06"}, {"cve": "CVE-2019-19524", "epss": 0.00235, "percentile": 0.60128, "modified": "2023-05-06"}, {"cve": "CVE-2019-19525", "epss": 0.00085, "percentile": 0.34634, "modified": "2023-05-06"}, {"cve": "CVE-2019-19526", "epss": 0.00089, "percentile": 0.36456, "modified": "2023-05-06"}, {"cve": "CVE-2019-19527", "epss": 0.00144, "percentile": 0.48934, "modified": "2023-05-06"}, {"cve": "CVE-2019-19528", "epss": 0.00099, "percentile": 0.39786, "modified": "2023-05-06"}, {"cve": "CVE-2019-19529", "epss": 0.00047, "percentile": 0.14365, "modified": "2023-05-06"}, {"cve": "CVE-2019-19530", "epss": 0.00122, "percentile": 0.45194, "modified": "2023-05-06"}, {"cve": "CVE-2019-19531", "epss": 0.00141, "percentile": 0.48507, "modified": "2023-05-06"}, {"cve": "CVE-2019-19532", "epss": 0.00168, "percentile": 0.52354, "modified": "2023-05-06"}, {"cve": "CVE-2019-19533", "epss": 0.00118, "percentile": 0.44342, "modified": "2023-05-06"}, {"cve": "CVE-2019-19534", "epss": 0.0029, "percentile": 0.64356, "modified": "2023-05-06"}, {"cve": "CVE-2019-19535", "epss": 0.00087, "percentile": 0.35287, "modified": "2023-05-06"}, {"cve": "CVE-2019-19536", "epss": 0.00185, "percentile": 0.54314, "modified": "2023-05-06"}, {"cve": "CVE-2019-19537", "epss": 0.00137, "percentile": 0.47756, "modified": "2023-05-06"}, {"cve": "CVE-2019-19767", "epss": 0.00188, "percentile": 0.54776, "modified": "2023-05-06"}], "vulnersScore": 9.5}, "_state": {"dependencies": 1695827670, "score": 1698838580, "epss": 0}, "_internal": {"score_hash": "f0537f4b33dd6c410f534be03ad42c02"}, "pluginID": "132605", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(132605);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2017-13693\",\n \"CVE-2017-13694\",\n \"CVE-2019-10220\",\n \"CVE-2019-11191\",\n \"CVE-2019-14901\",\n \"CVE-2019-15291\",\n \"CVE-2019-16229\",\n \"CVE-2019-16231\",\n \"CVE-2019-16232\",\n \"CVE-2019-18660\",\n \"CVE-2019-18675\",\n \"CVE-2019-18683\",\n \"CVE-2019-18786\",\n \"CVE-2019-18808\",\n \"CVE-2019-18814\",\n \"CVE-2019-18885\",\n \"CVE-2019-19045\",\n \"CVE-2019-19046\",\n \"CVE-2019-19049\",\n \"CVE-2019-19051\",\n \"CVE-2019-19052\",\n \"CVE-2019-19054\",\n \"CVE-2019-19056\",\n \"CVE-2019-19057\",\n \"CVE-2019-19058\",\n \"CVE-2019-19059\",\n \"CVE-2019-19060\",\n \"CVE-2019-19061\",\n \"CVE-2019-19063\",\n \"CVE-2019-19065\",\n \"CVE-2019-19066\",\n \"CVE-2019-19067\",\n \"CVE-2019-19068\",\n \"CVE-2019-19070\",\n \"CVE-2019-19071\",\n \"CVE-2019-19072\",\n \"CVE-2019-19073\",\n \"CVE-2019-19074\",\n \"CVE-2019-19075\",\n \"CVE-2019-19077\",\n \"CVE-2019-19078\",\n \"CVE-2019-19079\",\n \"CVE-2019-19080\",\n \"CVE-2019-19081\",\n \"CVE-2019-19082\",\n \"CVE-2019-19083\",\n \"CVE-2019-19227\",\n \"CVE-2019-19252\",\n \"CVE-2019-19523\",\n \"CVE-2019-19524\",\n \"CVE-2019-19525\",\n \"CVE-2019-19526\",\n \"CVE-2019-19527\",\n \"CVE-2019-19528\",\n \"CVE-2019-19529\",\n \"CVE-2019-19530\",\n \"CVE-2019-19531\",\n \"CVE-2019-19532\",\n \"CVE-2019-19533\",\n \"CVE-2019-19534\",\n \"CVE-2019-19535\",\n \"CVE-2019-19536\",\n \"CVE-2019-19537\",\n \"CVE-2019-19767\"\n );\n\n script_name(english:\"EulerOS 2.0 SP8 : kernel (EulerOS-SA-2020-1012)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - The kernel package contains the Linux kernel (vmlinuz),\n the core of any Linux operating system. The kernel\n handles the basic functions of the operating system:\n memory allocation, process allocation, device input and\n output, etc.Security Fix(es):** DISPUTED ** A memory\n leak in the __ipmi_bmc_register() function in\n drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel\n through 5.3.11 allows attackers to cause a denial of\n service (memory consumption) by triggering\n ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE:\n third parties dispute the relevance of this because an\n attacker cannot realistically control this failure at\n probe time.(CVE-2019-19046)A memory leak in the\n bfad_im_get_stats() function in\n drivers/scsi/bfa/bfad_attr.c in the Linux kernel\n through 5.3.11 allows attackers to cause a denial of\n service (memory consumption) by triggering\n bfa_port_get_stats() failures, aka\n CID-0e62395da2bd.(CVE-2019-19066)A memory leak in the\n adis_update_scan_mode_burst() function in\n drivers/iio/imu/adis_buffer.c in the Linux kernel\n before 5.3.9 allows attackers to cause a denial of\n service (memory consumption), aka\n CID-9c0530e898f3.(CVE-2019-19061)In the Linux kernel\n before 5.3.12, there is a use-after-free bug that can\n be caused by a malicious USB device in the\n drivers/input/ff-memless.c driver, aka\n CID-fa3a5a1880c9.(CVE-2019-19524)The Linux kernel\n through 5.0.7, when CONFIG_IA32_AOUT is enabled and\n ia32_aout is loaded, allows local users to bypass ASLR\n on setuid a.out programs (if any exist) because\n install_exec_creds() is called too late in\n load_aout_binary() in fs/binfmt_aout.c, and thus the\n ptrace_may_access() check has a race condition when\n reading /proc/pid/stat. NOTE: the software maintainer\n disputes that this is a vulnerability because ASLR for\n a.out format executables has never been\n supported.(CVE-2019-11191)In the Linux kernel before\n 5.2.10, there is a use-after-free bug that can be\n caused by a malicious USB device in the\n drivers/hid/usbhid/hiddev.c driver, aka\n CID-9c09b214f30e.(CVE-2019-19527)In the Linux kernel\n before 5.3.9, there are multiple out-of-bounds write\n bugs that can be caused by a malicious USB device in\n the Linux kernel HID drivers, aka CID-d9d4b1e46d95.\n This affects drivers/hid/hid-axff.c,\n drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c,\n drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c,\n drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c,\n drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c,\n drivers/hid/hid-logitech-hidpp.c,\n drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c,\n drivers/hid/hid-tmff.c, and\n drivers/hid/hid-zpff.c.(CVE-2019-19532)The\n acpi_ps_complete_final_op() function in\n drivers/acpi/acpica/psobject.c in the Linux kernel\n through 4.12.9 does not flush the node and node_ext\n caches and causes a kernel stack dump, which allows\n local users to obtain sensitive information from kernel\n memory and bypass the KASLR protection mechanism (in\n the kernel through 4.9) via a crafted ACPI\n table.(CVE-2017-13694)The acpi_ds_create_operands()\n function in drivers/acpi/acpica/dsutils.c in the Linux\n kernel through 4.12.9 does not flush the operand cache\n and causes a kernel stack dump, which allows local\n users to obtain sensitive information from kernel\n memory and bypass the KASLR protection mechanism (in\n the kernel through 4.9) via a crafted ACPI\n table.(CVE-2017-13693)The Linux kernel before 5.4.1 on\n powerpc allows Information Exposure because the\n Spectre-RSB mitigation is not in place for all\n applicable CPUs, aka CID-39e72bf96f58. This is related\n to arch/powerpc/kernel/entry_64.S and\n arch/powerpc/kernel/security.c.(CVE-2019-18660)In the\n Linux kernel through 5.3.8, f->fmt.sdr.reserved is\n uninitialized in rcar_drif_g_fmt_sdr_cap in\n drivers/media/platform/rcar_drif.c, which could cause a\n memory disclosure problem.(CVE-2019-18786)An issue was\n discovered in drivers/media/platform/vivid in the Linux\n kernel through 5.3.8. It is exploitable for privilege\n escalation on some Linux distributions where local\n users have /dev/video0 access, but only if the driver\n happens to be loaded. There are multiple race\n conditions during streaming stopping in this driver\n (part of the V4L2 subsystem). These issues are caused\n by wrong mutex locking in\n vivid_stop_generating_vid_cap(),\n vivid_stop_generating_vid_out(),\n sdr_cap_stop_streaming(), and the corresponding\n kthreads. At least one of these race conditions leads\n to a use-after-free.(CVE-2019-18683)A memory leak in\n the cx23888_ir_probe() function in\n drivers/media/pci/cx23885/cx23888-ir.c in the Linux\n kernel through 5.3.11 allows attackers to cause a\n denial of service (memory consumption) by triggering\n kfifo_alloc() failures, aka\n CID-a7b2df76b42b.(CVE-2019-19054)A memory leak in the\n mlx5_fpga_conn_create_cq() function in drivers\n et/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux\n kernel before 5.3.11 allows attackers to cause a denial\n of service (memory consumption) by triggering\n mlx5_vector2eqn() failures, aka\n CID-c8c2a057fdc7.(CVE-2019-19045)A memory leak in the\n i2400m_op_rfkill_sw_toggle() function in drivers\n et/wimax/i2400m/op-rfkill.c in the Linux kernel before\n 5.3.11 allows attackers to cause a denial of service\n (memory consumption), aka\n CID-6f3ef5c25cc7.(CVE-2019-19051)A memory leak in the\n alloc_sgtable() function in drivers\n et/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel\n through 5.3.11 allows attackers to cause a denial of\n service (memory consumption) by triggering alloc_page()\n failures, aka CID-b4b814fec1a5.(CVE-2019-19058)Multiple\n memory leaks in the iwl_pcie_ctxt_info_gen3_init()\n function in drivers\n et/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c in the\n Linux kernel through 5.3.11 allow attackers to cause a\n denial of service (memory consumption) by triggering\n iwl_pcie_init_fw_sec() or dma_alloc_coherent()\n failures, aka CID-0f4f199443fa.(CVE-2019-19059)A memory\n leak in the unittest_data_add() function in\n drivers/of/unittest.c in the Linux kernel before 5.3.10\n allows attackers to cause a denial of service (memory\n consumption) by triggering of_fdt_unflatten_tree()\n failures, aka CID-e13de8fe0d6a. NOTE: third parties\n dispute the relevance of this because unittest.c can\n only be reached during boot.(CVE-2019-19049)A memory\n leak in the spi_gpio_probe() function in\n drivers/spi/spi-gpio.c in the Linux kernel through\n 5.3.11 allows attackers to cause a denial of service\n (memory consumption) by triggering\n devm_add_action_or_reset() failures, aka\n CID-d3b0ffa1d75d. NOTE: third parties dispute the\n relevance of this because the system must have already\n been out of memory before the probe\n began.(CVE-2019-19070)A memory leak in the sdma_init()\n function in drivers/infiniband/hw/hfi1/sdma.c in the\n Linux kernel before 5.3.9 allows attackers to cause a\n denial of service (memory consumption) by triggering\n rhashtable_init() failures, aka\n CID-34b3be18a04e.(CVE-2019-19065)** DISPUTED ** Four\n memory leaks in the acp_hw_init() function in\n drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux\n kernel before 5.3.8 allow attackers to cause a denial\n of service (memory consumption) by triggering\n mfd_add_hotplug_devices() or pm_genpd_add_device()\n failures, aka CID-57be09c6e874. NOTE: third parties\n dispute the relevance of this because the attacker must\n already have privileges for module\n loading.(CVE-2019-19067)A memory leak in the\n rtl8xxxu_submit_int_urb() function in drivers\n et/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the\n Linux kernel through 5.3.11 allows attackers to cause a\n denial of service (memory consumption) by triggering\n usb_submit_urb() failures, aka\n CID-a2cdd07488e6.(CVE-2019-19068)A memory leak in the\n rsi_send_beacon() function in drivers\n et/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel\n through 5.3.11 allows attackers to cause a denial of\n service (memory consumption) by triggering\n rsi_prepare_beacon() failures, aka\n CID-d563131ef23c.(CVE-2019-19071)A memory leak in the\n ca8210_probe() function in drivers\n et/ieee802154/ca8210.c in the Linux kernel before 5.3.8\n allows attackers to cause a denial of service (memory\n consumption) by triggering ca8210_get_platform_data()\n failures, aka CID-6402939ec86e.(CVE-2019-19075)A memory\n leak in the bnxt_re_create_srq() function in\n drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux\n kernel through 5.3.11 allows attackers to cause a\n denial of service (memory consumption) by triggering\n copy to udata failures, aka\n CID-4a9d46a9fe14.(CVE-2019-19077)A memory leak in the\n ath10k_usb_hif_tx_sg() function in drivers\n et/wireless/ath/ath10k/usb.c in the Linux kernel\n through 5.3.11 allows attackers to cause a denial of\n service (memory consumption) by triggering\n usb_submit_urb() failures, aka\n CID-b8d17e7d93d2.(CVE-2019-19078)A memory leak in the\n qrtr_tun_write_iter() function in net/qrtr/tun.c in the\n Linux kernel before 5.3 allows attackers to cause a\n denial of service (memory consumption), aka\n CID-a21b7f0cff19.(CVE-2019-19079)Four memory leaks in\n the nfp_flower_spawn_phy_reprs() function in drivers\n et/ethernet etronome fp/flower/main.c in the Linux\n kernel before 5.3.4 allow attackers to cause a denial\n of service (memory consumption), aka\n CID-8572cea1461a.(CVE-2019-19080)A memory leak in the\n nfp_flower_spawn_vnic_reprs() function in drivers\n et/ethernet etronome fp/flower/main.c in the Linux\n kernel before 5.3.4 allows attackers to cause a denial\n of service (memory consumption), aka\n CID-8ce39eb5a67a.(CVE-2019-19081)Memory leaks in\n *create_resource_pool() functions under\n drivers/gpu/drm/amd/display/dc in the Linux kernel\n through 5.3.11 allow attackers to cause a denial of\n service (memory consumption). This affects the\n dce120_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c\n , the dce110_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c\n , the dce100_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c\n , the dcn10_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c,\n and the dce112_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c\n , aka CID-104c307147ad.(CVE-2019-19082)Memory leaks in\n *clock_source_create() functions under\n drivers/gpu/drm/amd/display/dc in the Linux kernel\n before 5.3.8 allow attackers to cause a denial of\n service (memory consumption). This affects the\n dce112_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c\n , the dce100_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c\n , the dcn10_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c,\n the dcn20_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c,\n the dce120_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c\n , the dce110_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c\n , and the dce80_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c,\n aka CID-055e547478a1.(CVE-2019-19083)In the Linux\n kernel before 5.2.9, there is an info-leak bug that can\n be caused by a malicious USB device in the drivers\n et/can/usb/peak_usb/pcan_usb_fd.c driver, aka\n CID-30a8beeb3042.(CVE-2019-19535)fs/btrfs/volumes.c in\n the Linux kernel before 5.1 allows a\n btrfs_verify_dev_extents NULL pointer dereference via a\n crafted btrfs image because fs_devices->devices is\n mishandled within find_device, aka\n CID-09ba3bc9dd15.(CVE-2019-18885)In the Linux kernel\n before 5.2.9, there is an info-leak bug that can be\n caused by a malicious USB device in the drivers\n et/can/usb/peak_usb/pcan_usb_pro.c driver, aka\n CID-ead16e53c2f0.(CVE-2019-19536)In the Linux kernel\n before 5.3.6, there is a use-after-free bug that can be\n caused by a malicious USB device in the drivers\n et/ieee802154/atusb.c driver, aka\n CID-7fd25e6fc035.(CVE-2019-19525)In the Linux kernel\n before 5.3.9, there is a use-after-free bug that can be\n caused by a malicious USB device in the drivers\n fc/pn533/usb.c driver, aka\n CID-6af3aa57a098.(CVE-2019-19526)In the Linux kernel\n before 5.3.11, there is a use-after-free bug that can\n be caused by a malicious USB device in the drivers\n et/can/usb/mcba_usb.c driver, aka\n CID-4d6636498c41.(CVE-2019-19529)A memory leak in the\n adis_update_scan_mode() function in\n drivers/iio/imu/adis_buffer.c in the Linux kernel\n before 5.3.9 allows attackers to cause a denial of\n service (memory consumption), aka\n CID-ab612b1daf41.(CVE-2019-19060)In the Linux kernel\n before 5.3.11, there is an info-leak bug that can be\n caused by a malicious USB device in the drivers\n et/can/usb/peak_usb/pcan_usb_core.c driver, aka\n CID-f7a1337f0d29.(CVE-2019-19534)A memory leak in the\n ccp_run_sha_cmd() function in\n drivers/crypto/ccp/ccp-ops.c in the Linux kernel\n through 5.3.9 allows attackers to cause a denial of\n service (memory consumption), aka\n CID-128c66429247.(CVE-2019-18808)drivers\n et/wireless/marvell/libertas/if_sdio.c in the Linux\n kernel 5.2.14 does not check the alloc_workqueue return\n value, leading to a NULL pointer\n dereference.(CVE-2019-16232)drivers et/fjes/fjes_main.c\n in the Linux kernel 5.2.14 does not check the\n alloc_workqueue return value, leading to a NULL pointer\n dereference.(CVE-2019-16231)** DISPUTED **\n drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in the Linux\n kernel 5.2.14 does not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. NOTE: The\n security community disputes this issues as not being\n serious enough to be deserving a CVE\n id.(CVE-2019-16229)Linux kernel CIFS implementation,\n version 4.9.0 is vulnerable to a relative paths\n injection in directory entry\n lists.(CVE-2019-10220)Memory leaks in drivers\n et/wireless/ath/ath9k/htc_hst.c in the Linux kernel\n through 5.3.11 allow attackers to cause a denial of\n service (memory consumption) by triggering\n wait_for_completion_timeout() failures. This affects\n the htc_config_pipe_credits() function, the\n htc_setup_complete() function, and the\n htc_connect_service() function, aka\n CID-853acf7caf10.(CVE-2019-19073)Two memory leaks in\n the mwifiex_pcie_init_evt_ring() function in drivers\n et/wireless/marvell/mwifiex/pcie.c in the Linux kernel\n through 5.3.11 allow attackers to cause a denial of\n service (memory consumption) by triggering\n mwifiex_map_pci_memory() failures, aka\n CID-d10dcb615c8e.(CVE-2019-19057)A memory leak in the\n gs_can_open() function in drivers et/can/usb/gs_usb.c\n in the Linux kernel before 5.3.11 allows attackers to\n cause a denial of service (memory consumption) by\n triggering usb_submit_urb() failures, aka\n CID-fb5be6a7b486.(CVE-2019-19052)A memory leak in the\n mwifiex_pcie_alloc_cmdrsp_buf() function in drivers\n et/wireless/marvell/mwifiex/pcie.c in the Linux kernel\n through 5.3.11 allows attackers to cause a denial of\n service (memory consumption) by triggering\n mwifiex_map_pci_memory() failures, aka\n CID-db8fd2cde932.(CVE-2019-19056)A memory leak in the\n ath9k_wmi_cmd() function in drivers\n et/wireless/ath/ath9k/wmi.c in the Linux kernel through\n 5.3.11 allows attackers to cause a denial of service\n (memory consumption), aka\n CID-728c1e2a05e4.(CVE-2019-19074)Two memory leaks in\n the rtl_usb_probe() function in drivers\n et/wireless/realtek/rtlwifi/usb.c in the Linux kernel\n through 5.3.11 allow attackers to cause a denial of\n service (memory consumption), aka\n CID-3f9361695113.(CVE-2019-19063)An issue was\n discovered in the Linux kernel through 5.3.9. There is\n a use-after-free when aa_label_parse() fails in\n aa_audit_rule_init() in\n security/apparmor/audit.c.(CVE-2019-18814)A memory leak\n in the predicate_parse() function in\n kernel/trace/trace_events_filter.c in the Linux kernel\n through 5.3.11 allows attackers to cause a denial of\n service (memory consumption), aka\n CID-96c5c6e6a5b6.(CVE-2019-19072)In the Linux kernel\n before 5.3.7, there is a use-after-free bug that can be\n caused by a malicious USB device in the\n drivers/usb/misc/adutux.c driver, aka\n CID-44efc269db79.(CVE-2019-19523)In the Linux kernel\n before 5.3.7, there is a use-after-free bug that can be\n caused by a malicious USB device in the\n drivers/usb/misc/iowarrior.c driver, aka\n CID-edc4746f253d.(CVE-2019-19528)In the Linux kernel\n before 5.2.10, there is a use-after-free bug that can\n be caused by a malicious USB device in the\n drivers/usb/class/cdc-acm.c driver, aka\n CID-c52873e5a1ef.(CVE-2019-19530)In the Linux kernel\n before 5.3.4, there is an info-leak bug that can be\n caused by a malicious USB device in the\n drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka\n CID-a10feaf8c464.(CVE-2019-19533)In the Linux kernel\n before 5.2.10, there is a race condition bug that can\n be caused by a malicious USB device in the USB\n character device driver layer, aka CID-303911cfc5b9.\n This affects drivers/usb/core/file.c.(CVE-2019-19537)In\n the Linux kernel before 5.2.9, there is a\n use-after-free bug that can be caused by a malicious\n USB device in the drivers/usb/misc/yurex.c driver, aka\n CID-fc05481b2fca.(CVE-2019-19531)The Linux kernel\n through 5.3.13 has a start_offset+size Integer Overflow\n in cpia2_remap_buffer in\n drivers/media/usb/cpia2/cpia2_core.c because cpia2 has\n its own mmap implementation. This allows local users\n (with /dev/video0 access) to obtain read and write\n permissions on kernel physical pages, which can\n possibly result in a privilege\n escalation.(CVE-2019-18675)In the AppleTalk subsystem\n in the Linux kernel before 5.1, there is a potential\n NULL pointer dereference because register_snap_client\n may return NULL. This will lead to denial of service in\n net/appletalk/aarp.c and net/appletalk/ddp.c, as\n demonstrated by unregister_snap_client, aka\n CID-9804501fa122.(CVE-2019-19227)vcs_write in\n drivers/tty/vt/vc_screen.c in the Linux kernel through\n 5.3.13 does not prevent write access to vcsu devices,\n aka CID-0c9acb1af77a.(CVE-2019-19252)The Linux kernel\n before 5.4.2 mishandles ext4_expand_extra_isize, as\n demonstrated by use-after-free errors in\n __ext4_expand_extra_isize and ext4_xattr_set_entry,\n related to fs/ext4/inode.c and fs/ext4/super.c, aka\n CID-4ea99936a163.(CVE-2019-19767)A heap overflow flaw\n was found in the Linux kernel, all versions 3.x.x and\n 4.x.x before 4.18.0, in Marvell WiFi chip driver. The\n vulnerability allows a remote attacker to cause a\n system crash, resulting in a denial of service, or\n execute arbitrary code. The highest threat with this\n vulnerability is with the availability of the system.\n If code execution occurs, the code will run with the\n permissions of root. This will affect both\n confidentiality and integrity of files on the\n system.(CVE-2019-14901)An issue was discovered in the\n Linux kernel through 5.2.9. There is a NULL pointer\n dereference caused by a malicious USB device in the\n flexcop_usb_probe function in the\n drivers/media/usb/b2c2/flexcop-usb.c\n driver.(CVE-2019-15291)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1012\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f83f4799\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/01/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/01/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python3-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(8)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"bpftool-4.19.36-vhulk1907.1.0.h619.eulerosv2r8\",\n \"kernel-4.19.36-vhulk1907.1.0.h619.eulerosv2r8\",\n \"kernel-devel-4.19.36-vhulk1907.1.0.h619.eulerosv2r8\",\n \"kernel-headers-4.19.36-vhulk1907.1.0.h619.eulerosv2r8\",\n \"kernel-source-4.19.36-vhulk1907.1.0.h619.eulerosv2r8\",\n \"kernel-tools-4.19.36-vhulk1907.1.0.h619.eulerosv2r8\",\n \"kernel-tools-libs-4.19.36-vhulk1907.1.0.h619.eulerosv2r8\",\n \"perf-4.19.36-vhulk1907.1.0.h619.eulerosv2r8\",\n \"python-perf-4.19.36-vhulk1907.1.0.h619.eulerosv2r8\",\n \"python3-perf-4.19.36-vhulk1907.1.0.h619.eulerosv2r8\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"8\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "naslFamily": "Huawei Local Security Checks", "cpe": ["p-cpe:/a:huawei:euleros:bpftool", "p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-source", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "p-cpe:/a:huawei:euleros:python3-perf", "cpe:/o:huawei:euleros:2.0"], "solution": "Update the affected kernel packages.", "nessusSeverity": "Critical", "cvssScoreSource": "", "vendor_cvss2": {"score": 10, "vector": "CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "vendor_cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "vpr": {"risk factor": "High", "score": "7.4"}, "exploitAvailable": false, "exploitEase": "No known exploits are available", "patchPublicationDate": "2020-01-02T00:00:00", "vulnerabilityPublicationDate": null, "exploitableWith": []}
{"openvas": [{"lastseen": "2020-03-30T16:54:48", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-01-23T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1012)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19079", "CVE-2019-19527", "CVE-2019-18814", "CVE-2019-19054", "CVE-2019-19525", "CVE-2019-19045", "CVE-2019-19533", "CVE-2019-16229", "CVE-2019-19051", "CVE-2019-19767", "CVE-2017-13694", "CVE-2019-18683", "CVE-2019-19534", "CVE-2019-19057", "CVE-2019-11191", "CVE-2019-19075", "CVE-2019-19052", "CVE-2019-14901", "CVE-2017-13693", "CVE-2019-19524", "CVE-2019-19058", "CVE-2019-19252", "CVE-2019-19523", "CVE-2019-19065", "CVE-2019-19082", "CVE-2019-19526", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-19227", "CVE-2019-19535", "CVE-2019-19531", "CVE-2019-10220", "CVE-2019-19063", "CVE-2019-18808", "CVE-2019-19066", "CVE-2019-19528", "CVE-2019-18885", "CVE-2019-19083", "CVE-2019-19067", "CVE-2019-19068", "CVE-2019-19071", "CVE-2019-19081", "CVE-2019-16231", "CVE-2019-19529", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-19530", "CVE-2019-19080", "CVE-2019-16232", "CVE-2019-19532", "CVE-2019-18786", "CVE-2019-18660", "CVE-2019-19074", "CVE-2019-18675", "CVE-2019-19537", "CVE-2019-19060", "CVE-2019-19056", "CVE-2019-15291", "CVE-2019-19536", "CVE-2019-19072", "CVE-2019-19061", "CVE-2019-19049"], "modified": "2020-03-26T00:00:00", "id": "OPENVAS:1361412562311220201012", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201012", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1012\");\n script_version(\"2020-03-26T11:51:34+0000\");\n script_cve_id(\"CVE-2017-13693\", \"CVE-2017-13694\", \"CVE-2019-10220\", \"CVE-2019-11191\", \"CVE-2019-14901\", \"CVE-2019-15291\", \"CVE-2019-16229\", \"CVE-2019-16231\", \"CVE-2019-16232\", \"CVE-2019-18660\", \"CVE-2019-18675\", \"CVE-2019-18683\", \"CVE-2019-18786\", \"CVE-2019-18808\", \"CVE-2019-18814\", \"CVE-2019-18885\", \"CVE-2019-19045\", \"CVE-2019-19046\", \"CVE-2019-19049\", \"CVE-2019-19051\", \"CVE-2019-19052\", \"CVE-2019-19054\", \"CVE-2019-19056\", \"CVE-2019-19057\", \"CVE-2019-19058\", \"CVE-2019-19059\", \"CVE-2019-19060\", \"CVE-2019-19061\", \"CVE-2019-19063\", \"CVE-2019-19065\", \"CVE-2019-19066\", \"CVE-2019-19067\", \"CVE-2019-19068\", \"CVE-2019-19070\", \"CVE-2019-19071\", \"CVE-2019-19072\", \"CVE-2019-19073\", \"CVE-2019-19074\", \"CVE-2019-19075\", \"CVE-2019-19077\", \"CVE-2019-19078\", \"CVE-2019-19079\", \"CVE-2019-19080\", \"CVE-2019-19081\", \"CVE-2019-19082\", \"CVE-2019-19083\", \"CVE-2019-19227\", \"CVE-2019-19252\", \"CVE-2019-19523\", \"CVE-2019-19524\", \"CVE-2019-19525\", \"CVE-2019-19526\", \"CVE-2019-19527\", \"CVE-2019-19528\", \"CVE-2019-19529\", \"CVE-2019-19530\", \"CVE-2019-19531\", \"CVE-2019-19532\", \"CVE-2019-19533\", \"CVE-2019-19534\", \"CVE-2019-19535\", \"CVE-2019-19536\", \"CVE-2019-19537\", \"CVE-2019-19767\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-03-26 11:51:34 +0000 (Thu, 26 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 13:15:30 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1012)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP8\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1012\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1012\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2020-1012 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.(CVE-2019-19046)\n\nA memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.(CVE-2019-19066)\n\nA memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3.(CVE-2019-19061)\n\nIn the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.(CVE-2019-19524)\n\nThe Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported.(CVE-2019-11191)\n\nIn the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.(CVE-2019-19527)\n\nIn the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.(CVE-2019-19532)\n\nThe acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS V2.0SP8.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP8\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"bpftool\", rpm:\"bpftool~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python3-perf\", rpm:\"python3-perf~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-31T16:29:48", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-09T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for the Linux Kernel (openSUSE-SU-2019:2675-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19525", "CVE-2019-18683", "CVE-2019-19534", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-19075", "CVE-2019-19052", "CVE-2019-15211", "CVE-2019-14901", "CVE-2019-19524", "CVE-2019-19058", "CVE-2019-19062", "CVE-2019-19065", "CVE-2019-19082", "CVE-2019-19078", "CVE-2019-19227", "CVE-2019-19531", "CVE-2019-15213", "CVE-2019-19063", "CVE-2019-14895", "CVE-2019-19528", "CVE-2019-19083", "CVE-2019-19067", "CVE-2019-19068", "CVE-2019-19081", "CVE-2019-19529", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19046", "CVE-2019-19530", "CVE-2019-19080", "CVE-2019-19543", "CVE-2019-18660", "CVE-2019-19074", "CVE-2019-15916", "CVE-2019-19060", "CVE-2019-19056", "CVE-2019-19536", "CVE-2019-19049"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310852971", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852971", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852971\");\n script_version(\"2020-01-31T08:04:39+0000\");\n script_cve_id(\"CVE-2019-14895\", \"CVE-2019-14901\", \"CVE-2019-15213\", \"CVE-2019-15916\",\n \"CVE-2019-18660\", \"CVE-2019-18683\", \"CVE-2019-18809\", \"CVE-2019-19046\",\n \"CVE-2019-19049\", \"CVE-2019-19052\", \"CVE-2019-19056\", \"CVE-2019-19057\",\n \"CVE-2019-19058\", \"CVE-2019-19060\", \"CVE-2019-19062\", \"CVE-2019-19063\",\n \"CVE-2019-19065\", \"CVE-2019-19067\", \"CVE-2019-19068\", \"CVE-2019-19073\",\n \"CVE-2019-19074\", \"CVE-2019-19075\", \"CVE-2019-19077\", \"CVE-2019-19078\",\n \"CVE-2019-19080\", \"CVE-2019-19081\", \"CVE-2019-19082\", \"CVE-2019-19083\",\n \"CVE-2019-19227\", \"CVE-2019-19524\", \"CVE-2019-19525\", \"CVE-2019-19528\",\n \"CVE-2019-19529\", \"CVE-2019-19530\", \"CVE-2019-19531\", \"CVE-2019-19534\",\n \"CVE-2019-19536\", \"CVE-2019-19543\", \"CVE-2019-15211\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-09 09:50:05 +0000 (Thu, 09 Jan 2020)\");\n script_name(\"openSUSE: Security Advisory for the Linux Kernel (openSUSE-SU-2019:2675-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.1\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2019:2675-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Linux Kernel'\n package(s) announced via the openSUSE-SU-2019:2675-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2019-15211: There was a use-after-free caused by a malicious USB\n device in drivers/media/v4l2-core/v4l2-dev.c (bnc#1146519).\n\n - CVE-2019-15213: There was a use-after-free caused by a malicious USB\n device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver\n (bnc#1146544).\n\n - CVE-2019-19531: There was a use-after-free bug that can be caused by a\n malicious USB device in the drivers/usb/misc/yurex.c driver, aka\n CID-fc05481b2fca (bnc#1158427 1158445).\n\n - CVE-2019-19543: There is a use-after-free in serial_ir_init_module() in\n drivers/media/rc/serial_ir.c (bnc#1158427).\n\n - CVE-2019-19525: There is a use-after-free bug that can be caused by a\n malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka\n CID-7fd25e6fc035 (bnc#1158417).\n\n - CVE-2019-19530: There is a use-after-free bug that can be caused by a\n malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka\n CID-c52873e5a1ef (bnc#1158410).\n\n - CVE-2019-19536: There is an info-leak bug that can be caused by a\n malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c\n driver, aka CID-ead16e53c2f0 (bnc#1158394).\n\n - CVE-2019-19524: There is a use-after-free bug that can be caused by a\n malicious USB device in the drivers/input/ff-memless.c driver, aka\n CID-fa3a5a1880c9 (bnc#1158413).\n\n - CVE-2019-19528: There is a use-after-free bug that can be caused by a\n malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka\n CID-edc4746f253d (bnc#1158407).\n\n - CVE-2019-19534: There is an info-leak bug that can be caused by a\n malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c\n driver, aka CID-f7a1337f0d29 (bnc#1158398).\n\n - CVE-2019-19529: There is a use-after-free bug that can be caused by a\n malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka\n CID-4d6636498c41 (bnc#1158381).\n\n - CVE-2019-14901: A heap overflow flaw was found in the Marvell WiFi chip\n driver. The vulnerability allowed a remote attacker to cause a system\n crash, resulting in a denial of service, or execute arbitrary code. The\n highest threat with this vulnerability is with the availability of the\n system. If code execution occurs, the code will run with the permissions\n of root. This will affect both confidentiality and integrity of files on\n the system (bnc#1157042).\n\n - CVE-2019-14895: A heap-based buffer overflow was discovered in the\n Marvell WiFi chip driver. The flaw could occur when the station attempts\n a connection n ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'the' package(s) on openSUSE Leap 15.1.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.1\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs\", rpm:\"kernel-docs~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs-html\", rpm:\"kernel-docs-html~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-macros\", rpm:\"kernel-macros~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source-vanilla\", rpm:\"kernel-source-vanilla~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base\", rpm:\"kernel-debug-base~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base-debuginfo\", rpm:\"kernel-debug-base-debuginfo~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debugsource\", rpm:\"kernel-debug-debugsource~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel-debuginfo\", rpm:\"kernel-debug-devel-debuginfo~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base\", rpm:\"kernel-default-base~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base-debuginfo\", rpm:\"kernel-default-base-debuginfo~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debuginfo\", rpm:\"kernel-default-debuginfo~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debugsource\", rpm:\"kernel-default-debugsource~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel-debuginfo\", rpm:\"kernel-default-devel-debuginfo~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall\", rpm:\"kernel-kvmsmall~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base\", rpm:\"kernel-kvmsmall-base~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base-debuginfo\", rpm:\"kernel-kvmsmall-base-debuginfo~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debuginfo\", rpm:\"kernel-kvmsmall-debuginfo~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debugsource\", rpm:\"kernel-kvmsmall-debugsource~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel\", rpm:\"kernel-kvmsmall-devel~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel-debuginfo\", rpm:\"kernel-kvmsmall-devel-debuginfo~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build\", rpm:\"kernel-obs-build~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build-debugsource\", rpm:\"kernel-obs-build-debugsource~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-qa\", rpm:\"kernel-obs-qa~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla\", rpm:\"kernel-vanilla~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base\", rpm:\"kernel-vanilla-base~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base-debuginfo\", rpm:\"kernel-vanilla-base-debuginfo~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debuginfo\", rpm:\"kernel-vanilla-debuginfo~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debugsource\", rpm:\"kernel-vanilla-debugsource~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel\", rpm:\"kernel-vanilla-devel~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel-debuginfo\", rpm:\"kernel-vanilla-devel-debuginfo~4.12.14~lp151.28.36.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-27T18:40:59", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-01-23T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2019-2693)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19527", "CVE-2019-19533", "CVE-2019-19051", "CVE-2019-19057", "CVE-2019-19524", "CVE-2019-19058", "CVE-2019-9456", "CVE-2019-19523", "CVE-2019-19065", "CVE-2019-19531", "CVE-2019-10220", "CVE-2015-1350", "CVE-2019-19063", "CVE-2019-19528", "CVE-2019-17351", "CVE-2019-18885", "CVE-2019-19067", "CVE-2017-12134", "CVE-2019-2215", "CVE-2019-19073", "CVE-2019-19530", "CVE-2018-1129", "CVE-2019-19532", "CVE-2018-9465", "CVE-2019-19074", "CVE-2019-18675", "CVE-2019-19537", "CVE-2019-19056", "CVE-2019-15291"], "modified": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220192693", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192693", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2693\");\n script_version(\"2020-01-23T14:23:06+0000\");\n script_cve_id(\"CVE-2015-1350\", \"CVE-2017-12134\", \"CVE-2018-1129\", \"CVE-2018-9465\", \"CVE-2019-10220\", \"CVE-2019-15291\", \"CVE-2019-17351\", \"CVE-2019-18675\", \"CVE-2019-18885\", \"CVE-2019-19051\", \"CVE-2019-19056\", \"CVE-2019-19057\", \"CVE-2019-19058\", \"CVE-2019-19063\", \"CVE-2019-19065\", \"CVE-2019-19067\", \"CVE-2019-19073\", \"CVE-2019-19074\", \"CVE-2019-19523\", \"CVE-2019-19524\", \"CVE-2019-19527\", \"CVE-2019-19528\", \"CVE-2019-19530\", \"CVE-2019-19531\", \"CVE-2019-19532\", \"CVE-2019-19533\", \"CVE-2019-19537\", \"CVE-2019-2215\", \"CVE-2019-9456\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 14:23:06 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 13:14:14 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2019-2693)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP5\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2693\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2693\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2019-2693 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.(CVE-2019-10220)\n\nA memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.(CVE-2019-19051)\n\nA memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e.(CVE-2019-19065)\n\n** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.(CVE-2019-19067)\n\nAn issue was discovered in drivers/xen/balloon.c in the Linux kernel before 5.2.3, as used in Xen through 4.12.x, allowing guest OS users to cause a denial of service because of unrestricted resource consumption during the mapping of guest memory, aka CID-6ef36ab967c7.(CVE-2019-17351)\n\nThe xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.(CVE-2017-12134)\n\nIn the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.(CVE-2019-19523)\n\nIn the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.(CVE-2019-19528)\n\nIn the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.(CVE-2019-19530)\n\nIn the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.(CVE-2019-19533)\n\nIn the Linux kernel before 5.2.10, there is a race condition bug that can be caused ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS V2.0SP5.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP5\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~862.14.1.5.h359.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~862.14.1.5.h359.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~862.14.1.5.h359.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~862.14.1.5.h359.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~862.14.1.5.h359.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~862.14.1.5.h359.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~862.14.1.5.h359.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-30T16:43:32", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-29T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux-aws-5.0 (USN-4258-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19079", "CVE-2019-19767", "CVE-2019-18683", "CVE-2019-19332", "CVE-2019-19252", "CVE-2019-19062", "CVE-2019-19082", "CVE-2019-19078", "CVE-2019-15099", "CVE-2019-19227", "CVE-2019-18885", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-19077", "CVE-2019-15291"], "modified": "2020-01-30T00:00:00", "id": "OPENVAS:1361412562310844316", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844316", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844316\");\n script_version(\"2020-01-30T08:15:08+0000\");\n script_cve_id(\"CVE-2019-15099\", \"CVE-2019-18683\", \"CVE-2019-18885\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19071\", \"CVE-2019-19077\", \"CVE-2019-19078\", \"CVE-2019-19079\", \"CVE-2019-19082\", \"CVE-2019-19227\", \"CVE-2019-19252\", \"CVE-2019-19332\", \"CVE-2019-19767\", \"CVE-2019-15291\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-30 08:15:08 +0000 (Thu, 30 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-29 04:00:31 +0000 (Wed, 29 Jan 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux-aws-5.0 (USN-4258-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4258-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-January/005302.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-aws-5.0'\n package(s) announced via the USN-4258-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the Atheros 802.11ac wireless USB device driver in\nthe Linux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2019-15099)\n\nIt was discovered that a race condition existed in the Virtual Video Test\nDriver in the Linux kernel. An attacker with write access to /dev/video0 on\na system with the vivid module loaded could possibly use this to gain\nadministrative privileges. (CVE-2019-18683)\n\nIt was discovered that the btrfs file system in the Linux kernel did not\nproperly validate metadata, leading to a NULL pointer dereference. An\nattacker could use this to specially craft a file system image that, when\nmounted, could cause a denial of service (system crash). (CVE-2019-18885)\n\nIt was discovered that the crypto subsystem in the Linux kernel did not\nproperly deallocate memory in certain error conditions. A local attacker\ncould use this to cause a denial of service (kernel memory exhaustion).\n(CVE-2019-19050, CVE-2019-19062)\n\nIt was discovered that the RSI 91x WLAN device driver in the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattacker could use this to cause a denial of service (kernel memory\nexhaustion). (CVE-2019-19071)\n\nIt was discovered that the Broadcom Netxtreme HCA device driver in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-19077)\n\nIt was discovered that the Atheros 802.11ac wireless USB device driver in\nthe Linux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-19078)\n\nIt was discovered that the Qualcomm IPC Router TUN device driver in the\nLinux kernel did not properly deallocate memory in certain situations. A\nlocal attacker could possibly use this to cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19079)\n\nIt was discovered that the AMD GPU device drivers in the Linux kernel did\nnot properly deallocate memory in certain error conditions. A local\nattacker could use this to possibly cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19082)\n\nDan Carpenter discovered that the AppleTalk networking subsystem of the\nLinux kernel did not properly handle certain error conditions, leading to a\nNULL pointer dereference. A local attacker could use this to cause a denial\nof service (system crash). (CVE-2019-19227)\n\nOr Cohen discovered ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux-aws-5.0' package(s) on Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1010-oracle\", ver:\"5.0.0-1010.15~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1024-aws\", ver:\"5.0.0-1024.27~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1029-gcp\", ver:\"5.0.0-1029.30~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1029-gke\", ver:\"5.0.0-1029.30~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-edge\", ver:\"5.0.0.1024.38\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.0.0.1029.33\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.0\", ver:\"5.0.0.1029.17\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle-edge\", ver:\"5.0.0.1010.9\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-01-27T18:40:21", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-01-23T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1042)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19079", "CVE-2019-18814", "CVE-2019-19054", "CVE-2019-19045", "CVE-2019-0136", "CVE-2019-19051", "CVE-2019-17666", "CVE-2019-16233", "CVE-2019-18683", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-19075", "CVE-2019-19052", "CVE-2019-15504", "CVE-2019-17055", "CVE-2019-19058", "CVE-2019-17054", "CVE-2019-18806", "CVE-2019-18813", "CVE-2019-19065", "CVE-2019-19082", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-17075", "CVE-2019-16746", "CVE-2019-19063", "CVE-2019-18808", "CVE-2019-19066", "CVE-2019-19083", "CVE-2019-19067", "CVE-2019-19068", "CVE-2019-19071", "CVE-2019-19081", "CVE-2019-17052", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19080", "CVE-2019-16714", "CVE-2019-18786", "CVE-2019-19074", "CVE-2019-16089", "CVE-2019-19056", "CVE-2019-19072", "CVE-2019-17053", "CVE-2019-16234", "CVE-2019-17133", "CVE-2019-19049", "CVE-2019-17056"], "modified": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220201042", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201042", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1042\");\n script_version(\"2020-01-23T13:17:18+0000\");\n script_cve_id(\"CVE-2019-0136\", \"CVE-2019-15504\", \"CVE-2019-16089\", \"CVE-2019-16233\", \"CVE-2019-16234\", \"CVE-2019-16714\", \"CVE-2019-16746\", \"CVE-2019-17052\", \"CVE-2019-17053\", \"CVE-2019-17054\", \"CVE-2019-17055\", \"CVE-2019-17056\", \"CVE-2019-17075\", \"CVE-2019-17133\", \"CVE-2019-17666\", \"CVE-2019-18683\", \"CVE-2019-18786\", \"CVE-2019-18806\", \"CVE-2019-18808\", \"CVE-2019-18809\", \"CVE-2019-18813\", \"CVE-2019-18814\", \"CVE-2019-19045\", \"CVE-2019-19049\", \"CVE-2019-19051\", \"CVE-2019-19052\", \"CVE-2019-19054\", \"CVE-2019-19056\", \"CVE-2019-19057\", \"CVE-2019-19058\", \"CVE-2019-19059\", \"CVE-2019-19063\", \"CVE-2019-19065\", \"CVE-2019-19066\", \"CVE-2019-19067\", \"CVE-2019-19068\", \"CVE-2019-19070\", \"CVE-2019-19071\", \"CVE-2019-19072\", \"CVE-2019-19073\", \"CVE-2019-19074\", \"CVE-2019-19075\", \"CVE-2019-19077\", \"CVE-2019-19078\", \"CVE-2019-19079\", \"CVE-2019-19080\", \"CVE-2019-19081\", \"CVE-2019-19082\", \"CVE-2019-19083\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 13:17:18 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 13:17:18 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1042)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRTARM64-3\\.0\\.5\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1042\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1042\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2020-1042 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).CVE-2019-15504\n\nIn the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.CVE-2019-16714\n\ndrivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.CVE-2019-16233\n\nAn issue was discovered in the Linux kernel through 5.2.13. nbd_genl_status in drivers/block/nbd.c does not check the nla_nest_start_noflag return value.CVE-2019-16089\n\nllcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.CVE-2019-17056\n\nbase_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.CVE-2019-17055\n\natalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c.CVE-2019-17054\n\nieee802154_create in net/ieee802154/socket.c in the AF_IEEE802154 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-e69dbd4619e7.CVE-2019-17053\n\nax25_create in net/ax25/af_ax25.c in the AF_AX25 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-0614e2b73768.CVE-2019-17052\n\nAn issue was discovered in write_tpt_entry in drivers/infiniband/hw/cxgb4/mem.c in the Linux kernel through 5.3.2. The cxgb4 driver is directly calling dma_map_single (a DMA function) from a stack variable. This could allow an attacker to trigger a Denial of Service, exploitable if this driver is used on an architecture for which this stack/DMA interaction has security relevance.CVE-2019-17075\n\nrtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.CVE-2019-17666\n\nIn the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Ove ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.5.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRTARM64-3.0.5.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python3-perf\", rpm:\"python3-perf~4.19.36~vhulk1907.1.0.h619.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.5.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-23T16:32:41", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-19T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux-hwe USN-4225-2", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19045", "CVE-2019-19051", "CVE-2019-19534", "CVE-2019-19052", "CVE-2019-14901", "CVE-2019-19524", "CVE-2019-14896", "CVE-2019-18813", "CVE-2019-19055", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-16231", "CVE-2019-19529", "CVE-2019-18660", "CVE-2019-19072"], "modified": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562310844298", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844298", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844298\");\n script_version(\"2020-01-23T07:59:05+0000\");\n script_cve_id(\"CVE-2019-14895\", \"CVE-2019-14901\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-16231\", \"CVE-2019-18660\", \"CVE-2019-19045\", \"CVE-2019-19051\", \"CVE-2019-19052\", \"CVE-2019-19055\", \"CVE-2019-19072\", \"CVE-2019-19524\", \"CVE-2019-19529\", \"CVE-2019-19534\", \"CVE-2019-18813\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 07:59:05 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-19 04:00:59 +0000 (Sun, 19 Jan 2020)\");\n script_name(\"Ubuntu Update for linux-hwe USN-4225-2\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4225-2\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-January/005277.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-hwe'\n package(s) announced via the USN-4225-2 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"USN-4225-1 fixed vulnerabilities in the Linux kernel for Ubuntu 19.10.\nThis update provides the corresponding updates for the Linux Hardware\nEnablement (HWE) kernel from Ubuntu 19.10 for Ubuntu 18.04 LTS.\n\nIt was discovered that a heap-based buffer overflow existed in the Marvell\nWiFi-Ex Driver for the Linux kernel. A physically proximate attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-14895, CVE-2019-14901)\n\nIt was discovered that a heap-based buffer overflow existed in the Marvell\nLibertas WLAN Driver for the Linux kernel. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2019-14896, CVE-2019-14897)\n\nIt was discovered that the Fujitsu ES network device driver for the Linux\nkernel did not properly check for errors in some situations, leading to a\nNULL pointer dereference. A local attacker could use this to cause a denial\nof service. (CVE-2019-16231)\n\nAnthony Steinhauser discovered that the Linux kernel did not properly\nperform Spectre_RSB mitigations to all processors for PowerPC architecture\nsystems in some situations. A local attacker could use this to expose\nsensitive information. (CVE-2019-18660)\n\nIt was discovered that the Mellanox Technologies Innova driver in the Linux\nkernel did not properly deallocate memory in certain failure conditions. A\nlocal attacker could use this to cause a denial of service (kernel memory\nexhaustion). (CVE-2019-19045)\n\nIt was discovered that the Intel WiMAX 2400 driver in the Linux kernel did\nnot properly deallocate memory in certain situations. A local attacker\ncould use this to cause a denial of service (kernel memory exhaustion).\n(CVE-2019-19051)\n\nIt was discovered that Geschwister Schneider USB CAN interface driver in\nthe Linux kernel did not properly deallocate memory in certain failure\nconditions. A physically proximate attacker could use this to cause a\ndenial of service (kernel memory exhaustion). (CVE-2019-19052)\n\nIt was discovered that the netlink-based 802.11 configuration interface in\nthe Linux kernel did not deallocate memory in certain error conditions. A\nlocal attacker could possibly use this to cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19055)\n\nIt was discovered that the event tracing subsystem of the Linux kernel did\nnot properly deallocate memory in certain error conditions. A local\nattacker could use this to cause a denial of service (kernel memory\nexhaustion). (CVE-2019-19072)\n\nIt was discovered that the driver for memoryless force-feedback input\ndevices in the Linux ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux-hwe' package(s) on Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-26-generic\", ver:\"5.3.0-26.28~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-26-generic-lpae\", ver:\"5.3.0-26.28~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-26-lowlatency\", ver:\"5.3.0-26.28~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-18.04\", ver:\"5.3.0.26.95\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-18.04\", ver:\"5.3.0.26.95\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-18.04\", ver:\"5.3.0.26.95\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon-hwe-18.04\", ver:\"5.3.0.26.95\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-18.04\", ver:\"5.3.0.26.95\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-14T14:49:33", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-08T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux USN-4226-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19045", "CVE-2019-16233", "CVE-2019-19534", "CVE-2019-19075", "CVE-2019-19052", "CVE-2019-14901", "CVE-2019-19524", "CVE-2019-14896", "CVE-2019-19922", "CVE-2019-18813", "CVE-2019-19065", "CVE-2019-19526", "CVE-2019-19055", "CVE-2019-17075", "CVE-2019-10220", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19083", "CVE-2019-19067", "CVE-2019-16231", "CVE-2019-19529", "CVE-2019-19532", "CVE-2019-18660", "CVE-2019-19048", "CVE-2019-19060", "CVE-2019-19072", "CVE-2019-17133", "CVE-2019-2214"], "modified": "2020-01-13T00:00:00", "id": "OPENVAS:1361412562310844283", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844283", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844283\");\n script_version(\"2020-01-13T11:49:13+0000\");\n script_cve_id(\"CVE-2019-10220\", \"CVE-2019-14895\", \"CVE-2019-14901\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-16231\", \"CVE-2019-16233\", \"CVE-2019-17133\", \"CVE-2019-18660\", \"CVE-2019-19045\", \"CVE-2019-19048\", \"CVE-2019-19052\", \"CVE-2019-19055\", \"CVE-2019-19060\", \"CVE-2019-19065\", \"CVE-2019-19067\", \"CVE-2019-19072\", \"CVE-2019-19075\", \"CVE-2019-19083\", \"CVE-2019-19524\", \"CVE-2019-19526\", \"CVE-2019-19529\", \"CVE-2019-19532\", \"CVE-2019-19534\", \"CVE-2019-19922\", \"CVE-2019-2214\", \"CVE-2019-17075\", \"CVE-2019-18813\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-13 11:49:13 +0000 (Mon, 13 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-08 11:16:08 +0000 (Wed, 08 Jan 2020)\");\n script_name(\"Ubuntu Update for linux USN-4226-1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU18\\.04 LTS|UBUNTU19\\.04)\");\n\n script_xref(name:\"USN\", value:\"4226-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-January/005253.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4226-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Michael Hanselmann discovered that the CIFS implementation in the Linux\nkernel did not sanitize paths returned by an SMB server. An attacker\ncontrolling an SMB server could use this to overwrite arbitrary files.\n(CVE-2019-10220)\n\nIt was discovered that a heap-based buffer overflow existed in the Marvell\nWiFi-Ex Driver for the Linux kernel. A physically proximate attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-14895, CVE-2019-14901)\n\nIt was discovered that a heap-based buffer overflow existed in the Marvell\nLibertas WLAN Driver for the Linux kernel. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2019-14896, CVE-2019-14897)\n\nIt was discovered that the Fujitsu ES network device driver for the Linux\nkernel did not properly check for errors in some situations, leading to a\nNULL pointer dereference. A local attacker could use this to cause a denial\nof service. (CVE-2019-16231)\n\nIt was discovered that the QLogic Fibre Channel driver in the Linux kernel\ndid not properly check for error, leading to a NULL pointer dereference. A\nlocal attacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2019-16233)\n\nNicolas Waisman discovered that the WiFi driver stack in the Linux kernel\ndid not properly validate SSID lengths. A physically proximate attacker\ncould use this to cause a denial of service (system crash).\n(CVE-2019-17133)\n\nAnthony Steinhauser discovered that the Linux kernel did not properly\nperform Spectre_RSB mitigations to all processors for PowerPC architecture\nsystems in some situations. A local attacker could use this to expose\nsensitive information. (CVE-2019-18660)\n\nIt was discovered that the Mellanox Technologies Innova driver in the Linux\nkernel did not properly deallocate memory in certain failure conditions. A\nlocal attacker could use this to cause a denial of service (kernel memory\nexhaustion). (CVE-2019-19045)\n\nIt was discovered that the VirtualBox guest driver implementation in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could use this to cause a denial of service\n(memory exhaustion). (CVE-2019-19048)\n\nIt was discovered that Geschwister Schneider USB CAN interface driver in\nthe Linux kernel did not properly deallocate memory in certain failure\nconditions. A physically proximate attacker could use this to cause a\ndenial of service (kernel memory exhaustion). (CVE-2019-19052)\n\nIt was discovered that the netlink-based 802.11 configuration interface ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 19.04, Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1009-oracle\", ver:\"5.0.0-1009.14~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1023-aws\", ver:\"5.0.0-1023.26~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1027-gke\", ver:\"5.0.0-1027.28~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1028-azure\", ver:\"5.0.0-1028.30~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1033-oem-osp1\", ver:\"5.0.0-1033.38\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-edge\", ver:\"5.0.0.1023.37\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"5.0.0.1028.39\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.0\", ver:\"5.0.0.1027.16\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem-osp1\", ver:\"5.0.0.1033.37\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle-edge\", ver:\"5.0.0.1009.8\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU19.04\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1009-oracle\", ver:\"5.0.0-1009.14\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1023-aws\", ver:\"5.0.0-1023.26\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1024-kvm\", ver:\"5.0.0-1024.26\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1024-raspi2\", ver:\"5.0.0-1024.25\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1028-azure\", ver:\"5.0.0-1028.30\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1028-gcp\", ver:\"5.0.0-1028.29\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-38-generic\", ver:\"5.0.0-38.41\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-38-generic-lpae\", ver:\"5.0.0-38.41\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-38-lowlatency\", ver:\"5.0.0-38.41\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.0.0.1023.25\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"5.0.0.1028.28\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.0.0.1028.53\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.0.0.38.40\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.0.0.38.40\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.0.0.1028.53\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.0.0.1024.25\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.0.0.38.40\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.0.0.1009.35\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"5.0.0.1024.22\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.0.0.38.40\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-02-20T22:51:47", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-02-19T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4287-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-5108", "CVE-2019-16229", "CVE-2019-19767", "CVE-2019-18683", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-19332", "CVE-2019-19062", "CVE-2019-19082", "CVE-2019-19965", "CVE-2019-19078", "CVE-2019-15099", "CVE-2019-14615", "CVE-2019-19227", "CVE-2019-19063", "CVE-2019-18885", "CVE-2019-19071", "CVE-2020-7053", "CVE-2019-16232", "CVE-2019-18786", "CVE-2019-15291", "CVE-2019-20096"], "modified": "2020-02-20T00:00:00", "id": "OPENVAS:1361412562310844347", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844347", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844347\");\n script_version(\"2020-02-20T11:12:08+0000\");\n script_cve_id(\"CVE-2019-14615\", \"CVE-2019-15099\", \"CVE-2019-16229\", \"CVE-2019-16232\", \"CVE-2019-18683\", \"CVE-2019-18786\", \"CVE-2019-18809\", \"CVE-2019-18885\", \"CVE-2019-19057\", \"CVE-2019-19062\", \"CVE-2019-19063\", \"CVE-2019-19071\", \"CVE-2019-19078\", \"CVE-2019-19082\", \"CVE-2019-19227\", \"CVE-2019-19332\", \"CVE-2019-19767\", \"CVE-2019-19965\", \"CVE-2019-20096\", \"CVE-2019-5108\", \"CVE-2020-7053\", \"CVE-2019-15291\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-02-20 11:12:08 +0000 (Thu, 20 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-02-19 04:01:16 +0000 (Wed, 19 Feb 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4287-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU18\\.04 LTS|UBUNTU16\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4287-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-February/005337.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4287-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the Linux kernel did not properly clear data\nstructures on context switches for certain Intel graphics processors. A\nlocal attacker could use this to expose sensitive information.\n(CVE-2019-14615)\n\nIt was discovered that the Atheros 802.11ac wireless USB device driver in\nthe Linux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2019-15099)\n\nIt was discovered that the HSA Linux kernel driver for AMD GPU devices did\nnot properly check for errors in certain situations, leading to a NULL\npointer dereference. A local attacker could possibly use this to cause a\ndenial of service. (CVE-2019-16229)\n\nIt was discovered that the Marvell 8xxx Libertas WLAN device driver in the\nLinux kernel did not properly check for errors in certain situations,\nleading to a NULL pointer dereference. A local attacker could possibly use\nthis to cause a denial of service. (CVE-2019-16232)\n\nIt was discovered that a race condition existed in the Virtual Video Test\nDriver in the Linux kernel. An attacker with write access to /dev/video0 on\na system with the vivid module loaded could possibly use this to gain\nadministrative privileges. (CVE-2019-18683)\n\nIt was discovered that the Renesas Digital Radio Interface (DRIF) driver in\nthe Linux kernel did not properly initialize data. A local attacker could\npossibly use this to expose sensitive information (kernel memory).\n(CVE-2019-18786)\n\nIt was discovered that the Afatech AF9005 DVB-T USB device driver in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-18809)\n\nIt was discovered that the btrfs file system in the Linux kernel did not\nproperly validate metadata, leading to a NULL pointer dereference. An\nattacker could use this to specially craft a file system image that, when\nmounted, could cause a denial of service (system crash). (CVE-2019-18885)\n\nIt was discovered that multiple memory leaks existed in the Marvell WiFi-Ex\nDriver for the Linux kernel. A local attacker could possibly use this to\ncause a denial of service (kernel memory exhaustion). (CVE-2019-19057)\n\nIt was discovered that the crypto subsystem in the Linux kernel did not\nproperly deallocate memory in certain error conditions. A local attacker\ncould use this to cause a denial of service (kernel memory exhaustion).\n(CVE-2019-19062)\n\nIt was discovered that the Realtek rtlwifi USB device driver in the Linux\nkernel did not properly deallocate me ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 18.04 LTS, Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1033-oracle\", ver:\"4.15.0-1033.36\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1052-gke\", ver:\"4.15.0-1052.55\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1053-kvm\", ver:\"4.15.0-1053.53\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1055-raspi2\", ver:\"4.15.0-1055.59\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1060-aws\", ver:\"4.15.0-1060.62\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1072-snapdragon\", ver:\"4.15.0-1072.79\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-88-generic\", ver:\"4.15.0-88.88\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-88-generic-lpae\", ver:\"4.15.0-88.88\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-88-lowlatency\", ver:\"4.15.0-88.88\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.15.0.1060.61\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-lts-18.04\", ver:\"4.15.0.1060.61\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.15.0.88.80\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.15.0.88.80\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1052.56\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-4.15\", ver:\"4.15.0.1052.56\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.15.0.1053.53\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.15.0.88.80\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"4.15.0.1033.38\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle-lts-18.04\", ver:\"4.15.0.1033.38\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.15.0.88.80\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.15.0.88.80\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.15.0.88.80\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.15.0.88.80\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.15.0.1055.53\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.15.0.1072.75\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.15.0.88.80\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1033-oracle\", ver:\"4.15.0-1033.36~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1055-gcp\", ver:\"4.15.0-1055.59\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1060-aws\", ver:\"4.15.0-1060.62~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1071-azure\", ver:\"4.15.0-1071.76\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-88-generic\", ver:\"4.15.0-88.88~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-88-generic-lpae\", ver:\"4.15.0-88.88~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-88-lowlatency\", ver:\"4.15.0-88.88~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-hwe\", ver:\"4.15.0.1060.60\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"4.15.0.1071.74\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"4.15.0.1055.69\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-16.04\", ver:\"4.15.0.88.98\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-16.04\", ver:\"4.15.0.88.98\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1055.69\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-16.04\", ver:\"4.15.0.88.98\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.88.98\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"4.15.0.1033.26\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-16.04\", ver:\"4.15.0.88.98\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-01-14T14:48:04", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-09T00:00:00", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2019-b86a7bdba0", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19054", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-18811", "CVE-2019-14901", "CVE-2019-19058", "CVE-2019-0155", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-19053", "CVE-2019-19064", "CVE-2018-12207", "CVE-2019-19082", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-11135", "CVE-2019-18812", "CVE-2019-19055", "CVE-2019-19043", "CVE-2019-19063", "CVE-2019-18808", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19066", "CVE-2019-19068", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-0154", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-16232", "CVE-2019-18660", "CVE-2019-19074", "CVE-2019-19056", "CVE-2019-19072"], "modified": "2020-01-13T00:00:00", "id": "OPENVAS:1361412562310877136", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877136", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877136\");\n script_version(\"2020-01-13T11:49:13+0000\");\n script_cve_id(\"CVE-2019-18808\", \"CVE-2019-18809\", \"CVE-2019-18811\", \"CVE-2019-18812\", \"CVE-2019-16232\", \"CVE-2019-19082\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-19078\", \"CVE-2019-19077\", \"CVE-2019-19074\", \"CVE-2019-19073\", \"CVE-2019-19072\", \"CVE-2019-19071\", \"CVE-2019-19070\", \"CVE-2019-19068\", \"CVE-2019-19043\", \"CVE-2019-19066\", \"CVE-2019-19046\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19064\", \"CVE-2019-19063\", \"CVE-2019-19059\", \"CVE-2019-19058\", \"CVE-2019-19057\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19055\", \"CVE-2019-19054\", \"CVE-2019-11135\", \"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-0155\", \"CVE-2019-18660\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-13 11:49:13 +0000 (Mon, 13 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-09 07:27:45 +0000 (Thu, 09 Jan 2020)\");\n script_name(\"Fedora Update for kernel FEDORA-2019-b86a7bdba0\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2019-b86a7bdba0\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2019-b86a7bdba0 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.3.14~300.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-02-20T22:41:45", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-02-18T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-f884f9dd7d)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19054", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-18811", "CVE-2019-14901", "CVE-2019-19058", "CVE-2019-0155", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-19053", "CVE-2019-19064", "CVE-2018-12207", "CVE-2019-19082", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-11135", "CVE-2019-18812", "CVE-2019-19055", "CVE-2019-19043", "CVE-2019-19063", "CVE-2019-18808", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19066", "CVE-2019-19068", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-0154", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-16232", "CVE-2019-19074", "CVE-2019-19056", "CVE-2019-19072"], "modified": "2020-02-20T00:00:00", "id": "OPENVAS:1361412562310877479", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877479", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877479\");\n script_version(\"2020-02-20T11:12:08+0000\");\n script_cve_id(\"CVE-2019-18808\", \"CVE-2019-18809\", \"CVE-2019-18811\", \"CVE-2019-18812\", \"CVE-2019-16232\", \"CVE-2019-19082\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-19078\", \"CVE-2019-19077\", \"CVE-2019-19074\", \"CVE-2019-19073\", \"CVE-2019-19072\", \"CVE-2019-19071\", \"CVE-2019-19070\", \"CVE-2019-19068\", \"CVE-2019-19043\", \"CVE-2019-19066\", \"CVE-2019-19046\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19064\", \"CVE-2019-19063\", \"CVE-2019-19059\", \"CVE-2019-19058\", \"CVE-2019-19057\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19055\", \"CVE-2019-19054\", \"CVE-2019-11135\", \"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-0155\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-02-20 11:12:08 +0000 (Thu, 20 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-02-18 04:06:29 +0000 (Tue, 18 Feb 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-f884f9dd7d)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2020-f884f9dd7d\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWBRN5GS2Y5FPIGLIOZ4PQFXZ5YMASQO\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-f884f9dd7d advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.4.19~200.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-14T14:49:42", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-08T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux USN-4227-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19045", "CVE-2019-16233", "CVE-2019-19534", "CVE-2019-19052", "CVE-2019-14901", "CVE-2019-19524", "CVE-2019-14896", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19083", "CVE-2019-19807", "CVE-2019-16231", "CVE-2019-19529", "CVE-2019-18660"], "modified": "2020-01-13T00:00:00", "id": "OPENVAS:1361412562310844282", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844282", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844282\");\n script_version(\"2020-01-13T11:49:13+0000\");\n script_cve_id(\"CVE-2019-14895\", \"CVE-2019-14901\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-16231\", \"CVE-2019-16233\", \"CVE-2019-18660\", \"CVE-2019-19045\", \"CVE-2019-19052\", \"CVE-2019-19083\", \"CVE-2019-19524\", \"CVE-2019-19529\", \"CVE-2019-19534\", \"CVE-2019-19807\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-13 11:49:13 +0000 (Mon, 13 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-08 11:15:44 +0000 (Wed, 08 Jan 2020)\");\n script_name(\"Ubuntu Update for linux USN-4227-1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU18\\.04 LTS|UBUNTU16\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4227-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-January/005254.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4227-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that a heap-based buffer overflow existed in the Marvell\nWiFi-Ex Driver for the Linux kernel. A physically proximate attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-14895, CVE-2019-14901)\n\nIt was discovered that a heap-based buffer overflow existed in the Marvell\nLibertas WLAN Driver for the Linux kernel. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2019-14896, CVE-2019-14897)\n\nIt was discovered that the Fujitsu ES network device driver for the Linux\nkernel did not properly check for errors in some situations, leading to a\nNULL pointer dereference. A local attacker could use this to cause a denial\nof service. (CVE-2019-16231)\n\nIt was discovered that the QLogic Fibre Channel driver in the Linux kernel\ndid not properly check for error, leading to a NULL pointer dereference. A\nlocal attacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2019-16233)\n\nAnthony Steinhauser discovered that the Linux kernel did not properly\nperform Spectre_RSB mitigations to all processors for PowerPC architecture\nsystems in some situations. A local attacker could use this to expose\nsensitive information. (CVE-2019-18660)\n\nIt was discovered that the Mellanox Technologies Innova driver in the Linux\nkernel did not properly deallocate memory in certain failure conditions. A\nlocal attacker could use this to cause a denial of service (kernel memory\nexhaustion). (CVE-2019-19045)\n\nIt was discovered that Geschwister Schneider USB CAN interface driver in\nthe Linux kernel did not properly deallocate memory in certain failure\nconditions. A physically proximate attacker could use this to cause a\ndenial of service (kernel memory exhaustion). (CVE-2019-19052)\n\nIt was discovered that the AMD Display Engine Driver in the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattack could use this to cause a denial of service (memory exhaustion).\n(CVE-2019-19083)\n\nIt was discovered that the driver for memoryless force-feedback input\ndevices in the Linux kernel contained a use-after-free vulnerability. A\nphysically proximate attacker could possibly use this to cause a denial of\nservice (system crash) or execute arbitrary code. (CVE-2019-19524)\n\nIt was discovered that the Microchip CAN BUS Analyzer driver in the Linux\nkernel contained a use-after-free vulnerability on device disconnect. A\nphysically proximate attacker could use this to cause a denial of service\n(system crash) or possibly exec ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 18.04 LTS, Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1031-oracle\", ver:\"4.15.0-1031.34\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1050-gke\", ver:\"4.15.0-1050.53\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1052-kvm\", ver:\"4.15.0-1052.52\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1053-raspi2\", ver:\"4.15.0-1053.57\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1057-aws\", ver:\"4.15.0-1057.59\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1066-oem\", ver:\"4.15.0-1066.76\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1070-snapdragon\", ver:\"4.15.0-1070.77\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-74-generic\", ver:\"4.15.0-74.84\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-74-generic-lpae\", ver:\"4.15.0-74.84\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-74-lowlatency\", ver:\"4.15.0-74.84\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.15.0.1057.58\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-lts-18.04\", ver:\"4.15.0.1057.58\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.15.0.74.76\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.15.0.74.76\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1050.53\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-4.15\", ver:\"4.15.0.1050.53\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.15.0.1052.52\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.15.0.74.76\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.1066.70\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"4.15.0.1031.36\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle-lts-18.04\", ver:\"4.15.0.1031.36\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.15.0.74.76\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.15.0.74.76\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.15.0.74.76\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.15.0.74.76\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.15.0.1053.51\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.15.0.1070.73\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.15.0.74.76\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1031-oracle\", ver:\"4.15.0-1031.34~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1052-gcp\", ver:\"4.15.0-1052.56\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1057-aws\", ver:\"4.15.0-1057.59~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1066-azure\", ver:\"4.15.0-1066.71\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-74-generic\", ver:\"4.15.0-74.83~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-74-generic-lpae\", ver:\"4.15.0-74.83~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-74-lowlatency\", ver:\"4.15.0-74.83~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-hwe\", ver:\"4.15.0.1057.57\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"4.15.0.1066.69\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure-edge\", ver:\"4.15.0.1066.69\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"4.15.0.1052.66\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-16.04\", ver:\"4.15.0.74.94\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-16.04\", ver:\"4.15.0.74.94\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1052.66\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-16.04\", ver:\"4.15.0.74.94\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.74.94\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"4.15.0.1031.24\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-16.04\", ver:\"4.15.0.74.94\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-03-05T16:43:18", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-02-29T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-3cd64d683c)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19054", "CVE-2020-9391", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-18811", "CVE-2019-14901", "CVE-2019-19058", "CVE-2019-0155", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-19053", "CVE-2019-19064", "CVE-2018-12207", "CVE-2019-19082", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-11135", "CVE-2019-18812", "CVE-2019-19055", "CVE-2019-19043", "CVE-2019-19063", "CVE-2019-18808", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19066", "CVE-2019-19068", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-0154", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-16232", "CVE-2019-19074", "CVE-2019-19056", "CVE-2019-19072"], "modified": "2020-03-03T00:00:00", "id": "OPENVAS:1361412562310877533", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877533", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877533\");\n script_version(\"2020-03-03T12:05:12+0000\");\n script_cve_id(\"CVE-2019-18808\", \"CVE-2019-18809\", \"CVE-2019-18811\", \"CVE-2019-18812\", \"CVE-2019-16232\", \"CVE-2019-19082\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-19078\", \"CVE-2019-19077\", \"CVE-2019-19074\", \"CVE-2019-19073\", \"CVE-2019-19072\", \"CVE-2019-19071\", \"CVE-2019-19070\", \"CVE-2019-19068\", \"CVE-2019-19043\", \"CVE-2019-19066\", \"CVE-2019-19046\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19064\", \"CVE-2019-19063\", \"CVE-2019-19059\", \"CVE-2019-19058\", \"CVE-2019-19057\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19055\", \"CVE-2019-19054\", \"CVE-2019-11135\", \"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-0155\", \"CVE-2020-9391\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-03-03 12:05:12 +0000 (Tue, 03 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-02-29 04:03:28 +0000 (Sat, 29 Feb 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-3cd64d683c)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2020-3cd64d683c\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4LH35HOPBJIKYHYFXMBBM75DN75PZHZ\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-3cd64d683c advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.5.6~201.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-29T18:31:20", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-27T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-e328697628)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19054", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-18811", "CVE-2019-14901", "CVE-2019-19058", "CVE-2019-0155", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-19053", "CVE-2019-19064", "CVE-2018-12207", "CVE-2019-19082", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-11135", "CVE-2019-18812", "CVE-2019-19055", "CVE-2019-19043", "CVE-2019-19063", "CVE-2019-18808", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19066", "CVE-2019-19068", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-0154", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-16232", "CVE-2019-19074", "CVE-2019-19056", "CVE-2019-19072"], "modified": "2020-01-28T00:00:00", "id": "OPENVAS:1361412562310877358", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877358", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877358\");\n script_version(\"2020-01-28T10:45:23+0000\");\n script_cve_id(\"CVE-2019-18808\", \"CVE-2019-18809\", \"CVE-2019-18811\", \"CVE-2019-18812\", \"CVE-2019-16232\", \"CVE-2019-19082\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-19078\", \"CVE-2019-19077\", \"CVE-2019-19074\", \"CVE-2019-19073\", \"CVE-2019-19072\", \"CVE-2019-19071\", \"CVE-2019-19070\", \"CVE-2019-19068\", \"CVE-2019-19043\", \"CVE-2019-19066\", \"CVE-2019-19046\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19064\", \"CVE-2019-19063\", \"CVE-2019-19059\", \"CVE-2019-19058\", \"CVE-2019-19057\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19055\", \"CVE-2019-19054\", \"CVE-2019-11135\", \"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-0155\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-28 10:45:23 +0000 (Tue, 28 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-27 09:23:01 +0000 (Mon, 27 Jan 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-e328697628)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2020-e328697628\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J5RQU3J2NECHS2VKGI2M6FJHY55JFO7S\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-e328697628 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.4.12~200.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-14T14:48:03", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-09T00:00:00", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2019-34a75d7e61", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19054", "CVE-2019-19057", "CVE-2019-19058", "CVE-2019-0155", "CVE-2019-19062", "CVE-2019-19053", "CVE-2019-19064", "CVE-2018-12207", "CVE-2019-19059", "CVE-2019-11135", "CVE-2019-19055", "CVE-2019-19043", "CVE-2019-19063", "CVE-2019-19066", "CVE-2019-19068", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-0154", "CVE-2019-19073", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-19074", "CVE-2019-19056", "CVE-2019-19072"], "modified": "2020-01-13T00:00:00", "id": "OPENVAS:1361412562310877113", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877113", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877113\");\n script_version(\"2020-01-13T11:49:13+0000\");\n script_cve_id(\"CVE-2019-19074\", \"CVE-2019-19073\", \"CVE-2019-19072\", \"CVE-2019-19071\", \"CVE-2019-19070\", \"CVE-2019-19068\", \"CVE-2019-19043\", \"CVE-2019-19066\", \"CVE-2019-19046\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19064\", \"CVE-2019-19063\", \"CVE-2019-19059\", \"CVE-2019-19058\", \"CVE-2019-19057\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19055\", \"CVE-2019-19054\", \"CVE-2019-11135\", \"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-0155\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-13 11:49:13 +0000 (Mon, 13 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-09 07:25:58 +0000 (Thu, 09 Jan 2020)\");\n script_name(\"Fedora Update for kernel FEDORA-2019-34a75d7e61\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2019-34a75d7e61\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2019-34a75d7e61 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.3.12~300.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-01-14T14:48:50", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-09T00:00:00", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2019-39e97683e8", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19054", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-18811", "CVE-2019-19332", "CVE-2019-14901", "CVE-2019-19058", "CVE-2019-0155", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-19053", "CVE-2019-19064", "CVE-2018-12207", "CVE-2019-19082", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-11135", "CVE-2019-18812", "CVE-2019-19055", "CVE-2019-19043", "CVE-2019-19063", "CVE-2019-18808", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19066", "CVE-2019-19068", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-0154", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-16232", "CVE-2019-19074", "CVE-2019-19056", "CVE-2019-19072"], "modified": "2020-01-13T00:00:00", "id": "OPENVAS:1361412562310877132", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877132", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877132\");\n script_version(\"2020-01-13T11:49:13+0000\");\n script_cve_id(\"CVE-2019-18808\", \"CVE-2019-18809\", \"CVE-2019-18811\", \"CVE-2019-18812\", \"CVE-2019-16232\", \"CVE-2019-19082\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-19078\", \"CVE-2019-19077\", \"CVE-2019-19074\", \"CVE-2019-19073\", \"CVE-2019-19072\", \"CVE-2019-19071\", \"CVE-2019-19070\", \"CVE-2019-19068\", \"CVE-2019-19043\", \"CVE-2019-19066\", \"CVE-2019-19046\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19064\", \"CVE-2019-19063\", \"CVE-2019-19059\", \"CVE-2019-19058\", \"CVE-2019-19057\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19055\", \"CVE-2019-19054\", \"CVE-2019-11135\", \"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-0155\", \"CVE-2019-19332\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-13 11:49:13 +0000 (Mon, 13 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-09 07:26:59 +0000 (Thu, 09 Jan 2020)\");\n script_name(\"Fedora Update for kernel FEDORA-2019-39e97683e8\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2019-39e97683e8\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7F44ID3ASD7NFTJVZNWV7GUS44G3EKL2\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2019-39e97683e8 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.3.16~300.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-14T14:48:55", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-09T00:00:00", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2019-91f6e7bb71", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19054", "CVE-2019-19057", "CVE-2019-14901", "CVE-2019-19058", "CVE-2019-0155", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-19053", "CVE-2019-19064", "CVE-2018-12207", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-11135", "CVE-2019-19055", "CVE-2019-19043", "CVE-2019-19063", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19066", "CVE-2019-19068", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-0154", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-19074", "CVE-2019-19056", "CVE-2019-19072"], "modified": "2020-01-13T00:00:00", "id": "OPENVAS:1361412562310877209", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877209", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877209\");\n script_version(\"2020-01-13T11:49:13+0000\");\n script_cve_id(\"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-19078\", \"CVE-2019-19077\", \"CVE-2019-19074\", \"CVE-2019-19073\", \"CVE-2019-19072\", \"CVE-2019-19071\", \"CVE-2019-19070\", \"CVE-2019-19068\", \"CVE-2019-19043\", \"CVE-2019-19066\", \"CVE-2019-19046\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19064\", \"CVE-2019-19063\", \"CVE-2019-19059\", \"CVE-2019-19058\", \"CVE-2019-19057\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19055\", \"CVE-2019-19054\", \"CVE-2019-11135\", \"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-0155\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-13 11:49:13 +0000 (Mon, 13 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-09 07:31:33 +0000 (Thu, 09 Jan 2020)\");\n script_name(\"Fedora Update for kernel FEDORA-2019-91f6e7bb71\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2019-91f6e7bb71\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2019-91f6e7bb71 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.3.13~300.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-03-05T16:44:18", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-03-03T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-227a4c0530)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19054", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-18811", "CVE-2019-14901", "CVE-2019-19058", "CVE-2019-0155", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-19053", "CVE-2019-19064", "CVE-2018-12207", "CVE-2019-19082", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-11135", "CVE-2019-18812", "CVE-2019-19055", "CVE-2019-19043", "CVE-2019-19063", "CVE-2019-18808", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19066", "CVE-2019-19068", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-0154", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-16232", "CVE-2019-19074", "CVE-2020-2732", "CVE-2019-19056", "CVE-2019-19072"], "modified": "2020-03-03T00:00:00", "id": "OPENVAS:1361412562310877541", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877541", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877541\");\n script_version(\"2020-03-03T12:05:12+0000\");\n script_cve_id(\"CVE-2020-2732\", \"CVE-2019-18808\", \"CVE-2019-18809\", \"CVE-2019-18811\", \"CVE-2019-18812\", \"CVE-2019-16232\", \"CVE-2019-19082\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-19078\", \"CVE-2019-19077\", \"CVE-2019-19074\", \"CVE-2019-19073\", \"CVE-2019-19072\", \"CVE-2019-19071\", \"CVE-2019-19070\", \"CVE-2019-19068\", \"CVE-2019-19043\", \"CVE-2019-19066\", \"CVE-2019-19046\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19064\", \"CVE-2019-19063\", \"CVE-2019-19059\", \"CVE-2019-19058\", \"CVE-2019-19057\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19055\", \"CVE-2019-19054\", \"CVE-2019-11135\", \"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-0155\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-03-03 12:05:12 +0000 (Tue, 03 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-03-03 04:06:45 +0000 (Tue, 03 Mar 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-227a4c0530)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2020-227a4c0530\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GH3MKV753MMUDPO72UDE26U7N3FNNGWA\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-227a4c0530 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.5.7~200.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-02-20T22:52:01", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-02-19T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4284-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19602", "CVE-2019-16229", "CVE-2019-19767", "CVE-2019-18683", "CVE-2019-19057", "CVE-2019-18811", "CVE-2019-19332", "CVE-2019-19252", "CVE-2019-19062", "CVE-2019-19082", "CVE-2019-19965", "CVE-2019-19078", "CVE-2019-15099", "CVE-2019-14615", "CVE-2019-19947", "CVE-2019-19063", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-19241", "CVE-2019-19077", "CVE-2019-16232", "CVE-2019-18786", "CVE-2019-15291"], "modified": "2020-02-20T00:00:00", "id": "OPENVAS:1361412562310844343", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844343", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844343\");\n script_version(\"2020-02-20T11:12:08+0000\");\n script_cve_id(\"CVE-2019-14615\", \"CVE-2019-15099\", \"CVE-2019-16229\", \"CVE-2019-16232\", \"CVE-2019-18683\", \"CVE-2019-18786\", \"CVE-2019-18811\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19057\", \"CVE-2019-19063\", \"CVE-2019-19071\", \"CVE-2019-19077\", \"CVE-2019-19078\", \"CVE-2019-19082\", \"CVE-2019-19241\", \"CVE-2019-19252\", \"CVE-2019-19332\", \"CVE-2019-19602\", \"CVE-2019-19767\", \"CVE-2019-19947\", \"CVE-2019-19965\", \"CVE-2019-15291\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-02-20 11:12:08 +0000 (Thu, 20 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-02-19 04:00:55 +0000 (Wed, 19 Feb 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4284-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU19\\.10|UBUNTU18\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4284-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-February/005334.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4284-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the Linux kernel did not properly clear data\nstructures on context switches for certain Intel graphics processors. A\nlocal attacker could use this to expose sensitive information.\n(CVE-2019-14615)\n\nIt was discovered that the Atheros 802.11ac wireless USB device driver in\nthe Linux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2019-15099)\n\nIt was discovered that the HSA Linux kernel driver for AMD GPU devices did\nnot properly check for errors in certain situations, leading to a NULL\npointer dereference. A local attacker could possibly use this to cause a\ndenial of service. (CVE-2019-16229)\n\nIt was discovered that the Marvell 8xxx Libertas WLAN device driver in the\nLinux kernel did not properly check for errors in certain situations,\nleading to a NULL pointer dereference. A local attacker could possibly use\nthis to cause a denial of service. (CVE-2019-16232)\n\nIt was discovered that a race condition existed in the Virtual Video Test\nDriver in the Linux kernel. An attacker with write access to /dev/video0 on\na system with the vivid module loaded could possibly use this to gain\nadministrative privileges. (CVE-2019-18683)\n\nIt was discovered that the Renesas Digital Radio Interface (DRIF) driver in\nthe Linux kernel did not properly initialize data. A local attacker could\npossibly use this to expose sensitive information (kernel memory).\n(CVE-2019-18786)\n\nIt was discovered that the Sound Open Firmware (SOF) driver in the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker could use this to cause a denial of service (kernel memory\nexhaustion). (CVE-2019-18811)\n\nIt was discovered that the crypto subsystem in the Linux kernel did not\nproperly deallocate memory in certain error conditions. A local attacker\ncould use this to cause a denial of service (kernel memory exhaustion).\n(CVE-2019-19050, CVE-2019-19062)\n\nIt was discovered that multiple memory leaks existed in the Marvell WiFi-Ex\nDriver for the Linux kernel. A local attacker could possibly use this to\ncause a denial of service (kernel memory exhaustion). (CVE-2019-19057)\n\nIt was discovered that the Realtek rtlwifi USB device driver in the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker could possibly use this to cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19063)\n\nIt was discovered that the RSI 91x WLAN device driver in the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 19.10, Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU19.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1009-oracle\", ver:\"5.3.0-1009.10\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1010-kvm\", ver:\"5.3.0-1010.11\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1011-aws\", ver:\"5.3.0-1011.12\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1012-gcp\", ver:\"5.3.0-1012.13\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1018-raspi2\", ver:\"5.3.0-1018.20\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-40-generic\", ver:\"5.3.0-40.32\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-40-generic-lpae\", ver:\"5.3.0-40.32\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-40-lowlatency\", ver:\"5.3.0-40.32\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-40-snapdragon\", ver:\"5.3.0-40.32\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.3.0.1011.13\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1012.13\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.3.0.40.34\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.3.0.40.34\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.3.0.1012.13\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.3.0.1010.12\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.3.0.40.34\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1009.10\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"5.3.0.1018.15\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"5.3.0.40.34\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.3.0.40.34\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1012-gcp\", ver:\"5.3.0-1012.13~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1013-azure\", ver:\"5.3.0-1013.14~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1018-raspi2\", ver:\"5.3.0-1018.20~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-40-generic\", ver:\"5.3.0-40.32~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-40-generic-lpae\", ver:\"5.3.0-40.32~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-40-lowlatency\", ver:\"5.3.0-40.32~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure-edge\", ver:\"5.3.0.1013.13\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp-edge\", ver:\"5.3.0.1012.11\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-18.04\", ver:\"5.3.0.40.97\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-18.04\", ver:\"5.3.0.40.97\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-18.04\", ver:\"5.3.0.40.97\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2-hwe-18.04\", ver:\"5.3.0.1018.7\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon-hwe-18.04\", ver:\"5.3.0.40.97\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-18.04\", ver:\"5.3.0.40.97\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-06-10T17:55:02", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-29T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4254-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-18683", "CVE-2019-19057", "CVE-2019-19332", "CVE-2019-19062", "CVE-2019-14615", "CVE-2019-19227", "CVE-2019-19063", "CVE-2019-18885", "CVE-2019-15291"], "modified": "2020-06-09T00:00:00", "id": "OPENVAS:1361412562310844314", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844314", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844314\");\n script_version(\"2020-06-09T06:40:15+0000\");\n script_cve_id(\"CVE-2019-14615\", \"CVE-2019-18683\", \"CVE-2019-18885\", \"CVE-2019-19057\", \"CVE-2019-19062\", \"CVE-2019-19063\", \"CVE-2019-19227\", \"CVE-2019-19332\", \"CVE-2019-15291\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 06:40:15 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-29 04:00:18 +0000 (Wed, 29 Jan 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4254-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU16\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4254-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-January/005296.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4254-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the Linux kernel did not properly clear data\nstructures on context switches for certain Intel graphics processors. A\nlocal attacker could use this to expose sensitive information.\n(CVE-2019-14615)\n\nIt was discovered that a race condition existed in the Virtual Video Test\nDriver in the Linux kernel. An attacker with write access to /dev/video0 on\na system with the vivid module loaded could possibly use this to gain\nadministrative privileges. (CVE-2019-18683)\n\nIt was discovered that the btrfs file system in the Linux kernel did not\nproperly validate metadata, leading to a NULL pointer dereference. An\nattacker could use this to specially craft a file system image that, when\nmounted, could cause a denial of service (system crash). (CVE-2019-18885)\n\nIt was discovered that multiple memory leaks existed in the Marvell WiFi-Ex\nDriver for the Linux kernel. A local attacker could possibly use this to\ncause a denial of service (kernel memory exhaustion). (CVE-2019-19057)\n\nIt was discovered that the crypto subsystem in the Linux kernel did not\nproperly deallocate memory in certain error conditions. A local attacker\ncould use this to cause a denial of service (kernel memory exhaustion).\n(CVE-2019-19062)\n\nIt was discovered that the Realtek rtlwifi USB device driver in the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker could possibly use this to cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19063)\n\nDan Carpenter discovered that the AppleTalk networking subsystem of the\nLinux kernel did not properly handle certain error conditions, leading to a\nNULL pointer dereference. A local attacker could use this to cause a denial\nof service (system crash). (CVE-2019-19227)\n\nIt was discovered that the KVM hypervisor implementation in the Linux\nkernel did not properly handle ioctl requests to get emulated CPUID\nfeatures. An attacker with access to /dev/kvm could use this to cause a\ndenial of service (system crash). (CVE-2019-19332)\n\nIt was discovered that the B2C2 FlexCop USB device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2019-15291)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1065-kvm\", ver:\"4.4.0-1065.72\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1101-aws\", ver:\"4.4.0-1101.112\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1128-raspi2\", ver:\"4.4.0-1128.137\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1132-snapdragon\", ver:\"4.4.0-1132.140\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-173-generic\", ver:\"4.4.0-173.203\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-173-generic-lpae\", ver:\"4.4.0-173.203\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-173-lowlatency\", ver:\"4.4.0-173.203\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-173-powerpc-e500mc\", ver:\"4.4.0-173.203\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-173-powerpc-smp\", ver:\"4.4.0-173.203\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-173-powerpc64-emb\", ver:\"4.4.0-173.203\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-173-powerpc64-smp\", ver:\"4.4.0-173.203\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.4.0.1101.105\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.4.0.173.181\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.4.0.173.181\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.4.0.1065.65\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.4.0.173.181\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.4.0.173.181\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.4.0.173.181\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.4.0.173.181\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.4.0.173.181\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.4.0.1128.128\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.4.0.1132.124\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.4.0.173.181\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-14T14:49:25", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-08T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux USN-4225-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19045", "CVE-2019-19051", "CVE-2019-19534", "CVE-2019-19052", "CVE-2019-14901", "CVE-2019-19524", "CVE-2019-14896", "CVE-2019-18813", "CVE-2019-19055", "CVE-2019-19044", "CVE-2019-19047", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19807", "CVE-2019-16231", "CVE-2019-19529", "CVE-2019-18660", "CVE-2019-19072"], "modified": "2020-01-13T00:00:00", "id": "OPENVAS:1361412562310844284", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844284", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844284\");\n script_version(\"2020-01-13T11:49:13+0000\");\n script_cve_id(\"CVE-2019-14895\", \"CVE-2019-14901\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-16231\", \"CVE-2019-18660\", \"CVE-2019-19044\", \"CVE-2019-19045\", \"CVE-2019-19047\", \"CVE-2019-19051\", \"CVE-2019-19052\", \"CVE-2019-19055\", \"CVE-2019-19072\", \"CVE-2019-19524\", \"CVE-2019-19529\", \"CVE-2019-19534\", \"CVE-2019-19807\", \"CVE-2019-18813\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-13 11:49:13 +0000 (Mon, 13 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-08 11:16:46 +0000 (Wed, 08 Jan 2020)\");\n script_name(\"Ubuntu Update for linux USN-4225-1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU19\\.10|UBUNTU18\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4225-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-January/005252.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4225-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that a heap-based buffer overflow existed in the Marvell\nWiFi-Ex Driver for the Linux kernel. A physically proximate attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-14895, CVE-2019-14901)\n\nIt was discovered that a heap-based buffer overflow existed in the Marvell\nLibertas WLAN Driver for the Linux kernel. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2019-14896, CVE-2019-14897)\n\nIt was discovered that the Fujitsu ES network device driver for the Linux\nkernel did not properly check for errors in some situations, leading to a\nNULL pointer dereference. A local attacker could use this to cause a denial\nof service. (CVE-2019-16231)\n\nAnthony Steinhauser discovered that the Linux kernel did not properly\nperform Spectre_RSB mitigations to all processors for PowerPC architecture\nsystems in some situations. A local attacker could use this to expose\nsensitive information. (CVE-2019-18660)\n\nIt was discovered that the Broadcom V3D DRI driver in the Linux kernel did\nnot properly deallocate memory in certain error conditions. A local\nattacker could possibly use this to cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19044)\n\nIt was discovered that the Mellanox Technologies Innova driver in the Linux\nkernel did not properly deallocate memory in certain failure conditions. A\nlocal attacker could use this to cause a denial of service (kernel memory\nexhaustion). (CVE-2019-19045)\n\nIt was discovered that the Mellanox Technologies ConnectX driver in the\nLinux kernel did not properly deallocate memory in certain failure\nconditions. A local attacker could use this to cause a denial of service\n(kernel memory exhaustion). (CVE-2019-19047)\n\nIt was discovered that the Intel WiMAX 2400 driver in the Linux kernel did\nnot properly deallocate memory in certain situations. A local attacker\ncould use this to cause a denial of service (kernel memory exhaustion).\n(CVE-2019-19051)\n\nIt was discovered that Geschwister Schneider USB CAN interface driver in\nthe Linux kernel did not properly deallocate memory in certain failure\nconditions. A physically proximate attacker could use this to cause a\ndenial of service (kernel memory exhaustion). (CVE-2019-19052)\n\nIt was discovered that the netlink-based 802.11 configuration interface in\nthe Linux kernel did not deallocate memory in certain error conditions. A\nlocal attacker could possibly use this to cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19055)\n\nIt was discovered t ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 19.10, Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU19.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1008-oracle\", ver:\"5.3.0-1008.9\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1009-aws\", ver:\"5.3.0-1009.10\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1009-azure\", ver:\"5.3.0-1009.10\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1009-kvm\", ver:\"5.3.0-1009.10\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1011-gcp\", ver:\"5.3.0-1011.12\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1015-raspi2\", ver:\"5.3.0-1015.17\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-26-generic\", ver:\"5.3.0-26.28\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-26-generic-lpae\", ver:\"5.3.0-26.28\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-26-lowlatency\", ver:\"5.3.0-26.28\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-26-snapdragon\", ver:\"5.3.0-26.28\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.3.0.1009.11\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"5.3.0.1009.27\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1011.12\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.3.0.26.30\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.3.0.26.30\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.3.0.1011.12\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.3.0.1009.11\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.3.0.26.30\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1008.9\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"5.3.0.1015.12\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"5.3.0.26.30\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.3.0.26.30\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1009-azure\", ver:\"5.3.0-1009.10~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1010-gcp\", ver:\"5.3.0-1010.11~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure-edge\", ver:\"5.3.0.1009.9\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp-edge\", ver:\"5.3.0.1010.10\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-11T15:55:34", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-19T00:00:00", "type": "openvas", "title": "Debian LTS: Security Advisory for linux (DLA-2068-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19527", "CVE-2019-15098", "CVE-2019-19533", "CVE-2019-15217", "CVE-2019-19051", "CVE-2019-17666", "CVE-2019-19767", "CVE-2019-19534", "CVE-2019-19057", "CVE-2019-15505", "CVE-2019-19332", "CVE-2019-19052", "CVE-2019-14901", "CVE-2019-19524", "CVE-2019-17055", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-19922", "CVE-2019-17054", "CVE-2019-19523", "CVE-2019-19965", "CVE-2019-19227", "CVE-2019-16746", "CVE-2019-19531", "CVE-2019-10220", "CVE-2019-19947", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19066", "CVE-2019-17052", "CVE-2019-2215", "CVE-2019-19530", "CVE-2019-19532", "CVE-2019-19537", "CVE-2019-19966", "CVE-2019-19056", "CVE-2019-15291", "CVE-2019-19536", "CVE-2019-17053", "CVE-2019-17133", "CVE-2019-17056"], "modified": "2020-06-09T00:00:00", "id": "OPENVAS:1361412562310892068", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310892068", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.892068\");\n script_version(\"2020-06-09T14:44:58+0000\");\n script_cve_id(\"CVE-2019-10220\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-15098\", \"CVE-2019-15217\", \"CVE-2019-15291\", \"CVE-2019-15505\", \"CVE-2019-16746\", \"CVE-2019-17052\", \"CVE-2019-17053\", \"CVE-2019-17054\", \"CVE-2019-17055\", \"CVE-2019-17056\", \"CVE-2019-17133\", \"CVE-2019-17666\", \"CVE-2019-19051\", \"CVE-2019-19052\", \"CVE-2019-19056\", \"CVE-2019-19057\", \"CVE-2019-19062\", \"CVE-2019-19066\", \"CVE-2019-19227\", \"CVE-2019-19332\", \"CVE-2019-19523\", \"CVE-2019-19524\", \"CVE-2019-19527\", \"CVE-2019-19530\", \"CVE-2019-19531\", \"CVE-2019-19532\", \"CVE-2019-19533\", \"CVE-2019-19534\", \"CVE-2019-19536\", \"CVE-2019-19537\", \"CVE-2019-19767\", \"CVE-2019-19922\", \"CVE-2019-19947\", \"CVE-2019-19965\", \"CVE-2019-19966\", \"CVE-2019-2215\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 14:44:58 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-19 04:00:44 +0000 (Sun, 19 Jan 2020)\");\n script_name(\"Debian LTS: Security Advisory for linux (DLA-2068-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DLA-2068-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the DLA-2068-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service, or information\nleak.\n\nCVE-2019-2215\n\nThe syzkaller tool discovered a use-after-free vulnerability in\nthe Android binder driver. A local user on a system with this\ndriver enabled could use this to cause a denial of service (memory\ncorruption or crash) or possibly for privilege escalation.\nHowever, this driver is not enabled on Debian packaged kernels.\n\nCVE-2019-10220\n\nVarious developers and researchers found that if a crafted file-\nsystem or malicious file server presented a directory with\nfilenames including a '/' character, this could confuse and\npossibly defeat security checks in applications that read the\ndirectory.\n\nThe kernel will now return an error when reading such a directory,\nrather than passing the invalid filenames on to user-space.\n\nCVE-2019-14895, CVE-2019-14901\n\nADLab of Venustech discovered potential heap buffer overflows in\nthe mwifiex wifi driver. On systems using this driver, a\nmalicious Wireless Access Point or adhoc/P2P peer could use these\nto cause a denial of service (memory corruption or crash) or\npossibly for remote code execution.\n\nCVE-2019-14896, CVE-2019-14897\n\nADLab of Venustech discovered potential heap and stack buffer\noverflows in the libertas wifi driver. On systems using this\ndriver, a malicious Wireless Access Point or adhoc/P2P peer could\nuse these to cause a denial of service (memory corruption or\ncrash) or possibly for remote code execution.\n\nCVE-2019-15098\n\nHui Peng and Mathias Payer reported that the ath6kl wifi driver\ndid not properly validate USB descriptors, which could lead to a\nnull pointer dereference. An attacker able to add USB devices\ncould use this to cause a denial of service (BUG/oops).\n\nCVE-2019-15217\n\nThe syzkaller tool discovered that the zr364xx mdia driver did not\ncorrectly handle devices without a product name string, which\ncould lead to a null pointer dereference. An attacker able to add\nUSB devices could use this to cause a denial of service\n(BUG/oops).\n\nCVE-2019-15291\n\nThe syzkaller tool discovered that the b2c2-flexcop-usb media\ndriver did not properly validate USB descriptors, which could lead\nto a null pointer dereference. An attacker able to add USB\ndevices could use this to cause a denial of service (BUG/oops).\n\nCVE-2019-15505\n\nThe syzkaller tool discovered that the technisat-usb2 media driver\ndid not properly validate incoming IR packets, which could lead to\na heap buffer over-read. An attacker able to add USB devices\ncould use this to cause a denial of service (BUG/oops) or to read\nsensitive information from kernel memory.\n\n ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n3.16.81-1.\n\nWe recommend that you upgrade your linux packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-4.8-arm\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-4.9-x86\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-doc-3.16\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-586\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-686-pae\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-all\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-all-amd64\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-all-armel\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-all-armhf\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-all-i386\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-amd64\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-armmp\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-armmp-lpae\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-common\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-ixp4xx\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-kirkwood\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-orion5x\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-versatile\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-586\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-686-pae\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-686-pae-dbg\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-amd64\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-amd64-dbg\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-armmp\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-armmp-lpae\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-ixp4xx\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-kirkwood\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-orion5x\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-versatile\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-manual-3.16\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-source-3.16\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-3.16.0-10\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"xen-linux-system-3.16.0-10-amd64\", ver:\"3.16.81-1\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-15T15:40:25", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-12T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-203ffedeb5)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19054", "CVE-2020-10711", "CVE-2020-12888", "CVE-2020-11884", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-18811", "CVE-2019-14901", "CVE-2019-19058", "CVE-2019-0155", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-19053", "CVE-2019-19064", "CVE-2018-12207", "CVE-2019-19082", "CVE-2020-8835", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-11135", "CVE-2019-18812", "CVE-2019-19055", "CVE-2019-19043", "CVE-2019-19769", "CVE-2019-19063", "CVE-2019-18808", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19066", "CVE-2019-19068", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-0154", "CVE-2020-10757", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-16232", "CVE-2019-19074", "CVE-2020-2732", "CVE-2020-12655", "CVE-2019-19056", "CVE-2019-19072"], "modified": "2020-06-12T00:00:00", "id": "OPENVAS:1361412562310877952", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877952", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877952\");\n script_version(\"2020-06-12T07:11:22+0000\");\n script_cve_id(\"CVE-2020-10757\", \"CVE-2020-12888\", \"CVE-2020-12655\", \"CVE-2020-10711\", \"CVE-2020-11884\", \"CVE-2020-8835\", \"CVE-2019-19769\", \"CVE-2020-2732\", \"CVE-2019-18808\", \"CVE-2019-18809\", \"CVE-2019-18811\", \"CVE-2019-18812\", \"CVE-2019-16232\", \"CVE-2019-19082\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-19078\", \"CVE-2019-19077\", \"CVE-2019-19074\", \"CVE-2019-19073\", \"CVE-2019-19072\", \"CVE-2019-19071\", \"CVE-2019-19070\", \"CVE-2019-19068\", \"CVE-2019-19043\", \"CVE-2019-19066\", \"CVE-2019-19046\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19064\", \"CVE-2019-19063\", \"CVE-2019-19059\", \"CVE-2019-19058\", \"CVE-2019-19057\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19055\", \"CVE-2019-19054\", \"CVE-2019-11135\", \"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-0155\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-12 07:11:22 +0000 (Fri, 12 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-12 03:09:59 +0000 (Fri, 12 Jun 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-203ffedeb5)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2020-203ffedeb5\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-203ffedeb5 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.6.16~200.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-05-08T17:12:21", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-03-17T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4302-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-8832", "CVE-2019-15217", "CVE-2019-19051", "CVE-2019-19058", "CVE-2019-14615", "CVE-2019-19066", "CVE-2019-19068", "CVE-2019-19046", "CVE-2020-2732", "CVE-2019-19056"], "modified": "2020-05-07T00:00:00", "id": "OPENVAS:1361412562310844364", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844364", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844364\");\n script_version(\"2020-05-07T08:41:48+0000\");\n script_cve_id(\"CVE-2020-2732\", \"CVE-2019-14615\", \"CVE-2020-8832\", \"CVE-2019-19046\", \"CVE-2019-19051\", \"CVE-2019-19056\", \"CVE-2019-19058\", \"CVE-2019-19066\", \"CVE-2019-19068\", \"CVE-2019-15217\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-05-07 08:41:48 +0000 (Thu, 07 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-03-17 04:00:29 +0000 (Tue, 17 Mar 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4302-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU18\\.04 LTS|UBUNTU16\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4302-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-March/005358.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4302-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Paulo Bonzini discovered that the KVM hypervisor implementation in the\nLinux kernel could improperly let a nested (level 2) guest access the\nresources of a parent (level 1) guest in certain situations. An attacker\ncould use this to expose sensitive information. (CVE-2020-2732)\n\nGregory Herrero discovered that the fix for CVE-2019-14615 to address the\nLinux kernel not properly clearing data structures on context switches for\ncertain Intel graphics processors was incomplete. A local attacker could\nuse this to expose sensitive information. (CVE-2020-8832)\n\nIt was discovered that the IPMI message handler implementation in the Linux\nkernel did not properly deallocate memory in certain situations. A local\nattacker could use this to cause a denial of service (kernel memory\nexhaustion). (CVE-2019-19046)\n\nIt was discovered that the Intel WiMAX 2400 driver in the Linux kernel did\nnot properly deallocate memory in certain situations. A local attacker\ncould use this to cause a denial of service (kernel memory exhaustion).\n(CVE-2019-19051)\n\nIt was discovered that the Marvell Wi-Fi device driver in the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattacker could use this to possibly cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19056)\n\nIt was discovered that the Intel(R) Wi-Fi device driver in the Linux kernel\ndevice driver in the Linux kernel did not properly deallocate memory in\ncertain error conditions. A local attacker could possibly use this to cause\na denial of service (kernel memory exhaustion). (CVE-2019-19058)\n\nIt was discovered that the Brocade BFA Fibre Channel device driver in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-19066)\n\nIt was discovered that the Realtek RTL8xxx USB Wi-Fi device driver in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-19068)\n\nIt was discovered that ZR364XX Camera USB device driver for the Linux\nkernel did not properly initialize memory. A physically proximate attacker\ncould use this to cause a denial of service (system crash).\n(CVE-2019-15217)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 18.04 LTS, Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1055-gke\", ver:\"4.15.0-1055.58\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1056-kvm\", ver:\"4.15.0-1056.57\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1057-raspi2\", ver:\"4.15.0-1057.61\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1063-aws\", ver:\"4.15.0-1063.67\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1074-snapdragon\", ver:\"4.15.0-1074.81\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-91-generic\", ver:\"4.15.0-91.92\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-91-generic-lpae\", ver:\"4.15.0-91.92\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-91-lowlatency\", ver:\"4.15.0-91.92\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.15.0.1063.64\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-lts-18.04\", ver:\"4.15.0.1063.64\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.15.0.91.83\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.15.0.91.83\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1055.59\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-4.15\", ver:\"4.15.0.1055.59\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.15.0.1056.56\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.15.0.91.83\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.15.0.91.83\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.15.0.91.83\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.15.0.91.83\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.15.0.91.83\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.15.0.1057.55\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.15.0.1074.77\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.15.0.91.83\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1058-gcp\", ver:\"4.15.0-1058.62\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1063-aws\", ver:\"4.15.0-1063.67~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-91-generic\", ver:\"4.15.0-91.92~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-91-generic-lpae\", ver:\"4.15.0-91.92~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-91-lowlatency\", ver:\"4.15.0-91.92~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-hwe\", ver:\"4.15.0.1063.63\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"4.15.0.1058.72\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-16.04\", ver:\"4.15.0.91.101\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-16.04\", ver:\"4.15.0.91.101\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1058.72\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-16.04\", ver:\"4.15.0.91.101\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.91.101\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-16.04\", ver:\"4.15.0.91.101\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2020-03-23T15:01:47", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-03-17T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux-aws-5.0 (USN-4301-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19058", "CVE-2019-19053", "CVE-2019-3016", "CVE-2019-19059", "CVE-2019-19066", "CVE-2019-19068", "CVE-2020-2732", "CVE-2019-19056"], "modified": "2020-03-20T00:00:00", "id": "OPENVAS:1361412562310844365", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844365", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844365\");\n script_version(\"2020-03-20T06:19:59+0000\");\n script_cve_id(\"CVE-2019-3016\", \"CVE-2020-2732\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19058\", \"CVE-2019-19059\", \"CVE-2019-19066\", \"CVE-2019-19068\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-03-20 06:19:59 +0000 (Fri, 20 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-03-17 04:00:44 +0000 (Tue, 17 Mar 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux-aws-5.0 (USN-4301-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4301-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-March/005357.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-aws-5.0'\n package(s) announced via the USN-4301-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the KVM implementation in the Linux kernel, when\nparavirtual TLB flushes are enabled in guests, the hypervisor in some\nsituations could miss deferred TLB flushes or otherwise mishandle them. An\nattacker in a guest VM could use this to expose sensitive information (read\nmemory from another guest VM). (CVE-2019-3016)\n\nPaulo Bonzini discovered that the KVM hypervisor implementation in the\nLinux kernel could improperly let a nested (level 2) guest access the\nresources of a parent (level 1) guest in certain situations. An attacker\ncould use this to expose sensitive information. (CVE-2020-2732)\n\nIt was discovered that the RPMSG character device interface in the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker could possibly use this to cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19053)\n\nIt was discovered that the Marvell Wi-Fi device driver in the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattacker could use this to possibly cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19056)\n\nIt was discovered that the Intel(R) Wi-Fi device driver in the Linux kernel\ndevice driver in the Linux kernel did not properly deallocate memory in\ncertain error conditions. A local attacker could possibly use this to cause\na denial of service (kernel memory exhaustion). (CVE-2019-19058,\nCVE-2019-19059)\n\nIt was discovered that the Brocade BFA Fibre Channel device driver in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-19066)\n\nIt was discovered that the Realtek RTL8xxx USB Wi-Fi device driver in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-19068)\");\n\n script_tag(name:\"affected\", value:\"'linux-aws-5.0' package(s) on Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1013-oracle\", ver:\"5.0.0-1013.18\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1027-aws\", ver:\"5.0.0-1027.30\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1032-gke\", ver:\"5.0.0-1032.33\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1033-gcp\", ver:\"5.0.0-1033.34\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-edge\", ver:\"5.0.0.1027.41\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.0.0.1033.37\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.0\", ver:\"5.0.0.1032.20\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.0.0.1013.13\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-01-14T14:49:22", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-08T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux USN-4228-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19534", "CVE-2019-19052", "CVE-2019-14901", "CVE-2019-19524", "CVE-2019-14896", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-18660"], "modified": "2020-01-13T00:00:00", "id": "OPENVAS:1361412562310844281", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844281", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844281\");\n script_version(\"2020-01-13T11:49:13+0000\");\n script_cve_id(\"CVE-2019-14895\", \"CVE-2019-14901\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-18660\", \"CVE-2019-19052\", \"CVE-2019-19524\", \"CVE-2019-19534\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-13 11:49:13 +0000 (Mon, 13 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-08 11:15:27 +0000 (Wed, 08 Jan 2020)\");\n script_name(\"Ubuntu Update for linux USN-4228-1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU16\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4228-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-January/005255.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4228-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that a heap-based buffer overflow existed in the Marvell\nWiFi-Ex Driver for the Linux kernel. A physically proximate attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-14895, CVE-2019-14901)\n\nIt was discovered that a heap-based buffer overflow existed in the Marvell\nLibertas WLAN Driver for the Linux kernel. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2019-14896, CVE-2019-14897)\n\nAnthony Steinhauser discovered that the Linux kernel did not properly\nperform Spectre_RSB mitigations to all processors for PowerPC architecture\nsystems in some situations. A local attacker could use this to expose\nsensitive information. (CVE-2019-18660)\n\nIt was discovered that Geschwister Schneider USB CAN interface driver in\nthe Linux kernel did not properly deallocate memory in certain failure\nconditions. A physically proximate attacker could use this to cause a\ndenial of service (kernel memory exhaustion). (CVE-2019-19052)\n\nIt was discovered that the driver for memoryless force-feedback input\ndevices in the Linux kernel contained a use-after-free vulnerability. A\nphysically proximate attacker could possibly use this to cause a denial of\nservice (system crash) or execute arbitrary code. (CVE-2019-19524)\n\nIt was discovered that the PEAK-System Technique USB driver in the Linux\nkernel did not properly sanitize memory before sending it to the device. A\nphysically proximate attacker could use this to expose sensitive\ninformation (kernel memory). (CVE-2019-19534)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1064-kvm\", ver:\"4.4.0-1064.71\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1100-aws\", ver:\"4.4.0-1100.111\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1127-raspi2\", ver:\"4.4.0-1127.136\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1131-snapdragon\", ver:\"4.4.0-1131.139\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-171-generic\", ver:\"4.4.0-171.200\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-171-generic-lpae\", ver:\"4.4.0-171.200\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-171-lowlatency\", ver:\"4.4.0-171.200\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-171-powerpc-e500mc\", ver:\"4.4.0-171.200\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-171-powerpc-smp\", ver:\"4.4.0-171.200\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-171-powerpc64-emb\", ver:\"4.4.0-171.200\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-171-powerpc64-smp\", ver:\"4.4.0-171.200\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.4.0.1100.104\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.4.0.171.179\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.4.0.171.179\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.4.0.1064.64\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.4.0.171.179\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.4.0.171.179\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.4.0.171.179\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.4.0.171.179\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.4.0.171.179\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.4.0.1127.127\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.4.0.1131.123\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.4.0.171.179\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-05-08T09:47:09", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2019-12-04T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux USN-4208-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-18810", "CVE-2019-19075", "CVE-2019-19065", "CVE-2019-17075", "CVE-2019-15794", "CVE-2019-19083", "CVE-2019-19067", "CVE-2019-19069", "CVE-2019-19048", "CVE-2019-19060", "CVE-2019-17133", "CVE-2019-19061"], "modified": "2020-05-05T00:00:00", "id": "OPENVAS:1361412562310844257", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844257", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844257\");\n script_version(\"2020-05-05T07:00:07+0000\");\n script_cve_id(\"CVE-2019-15794\", \"CVE-2019-17133\", \"CVE-2019-18810\", \"CVE-2019-19048\", \"CVE-2019-19060\", \"CVE-2019-19061\", \"CVE-2019-19065\", \"CVE-2019-19067\", \"CVE-2019-19069\", \"CVE-2019-19075\", \"CVE-2019-19083\", \"CVE-2019-17075\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-05-05 07:00:07 +0000 (Tue, 05 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-12-04 03:01:45 +0000 (Wed, 04 Dec 2019)\");\n script_name(\"Ubuntu Update for linux USN-4208-1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU19\\.10|UBUNTU18\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4208-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-December/005226.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4208-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Jann Horn discovered that the OverlayFS and ShiftFS Drivers in the Linux\nkernel did not properly handle reference counting during memory mapping\noperations when used in conjunction with AUFS. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-15794)\n\nNicolas Waisman discovered that the WiFi driver stack in the Linux kernel\ndid not properly validate SSID lengths. A physically proximate attacker\ncould use this to cause a denial of service (system crash).\n(CVE-2019-17133)\n\nIt was discovered that the ARM Komeda display driver for the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattacker could use this to cause a denial of service (memory exhaustion).\n(CVE-2019-18810)\n\nIt was discovered that the VirtualBox guest driver implementation in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could use this to cause a denial of service\n(memory exhaustion). (CVE-2019-19048)\n\nIt was discovered that the ADIS16400 IIO IMU Driver for the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattacker could use this to cause a denial of service (memory exhaustion).\n(CVE-2019-19060, CVE-2019-19061)\n\nIt was discovered that the Intel OPA Gen1 Infiniband Driver for the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker could use this to cause a denial of service (memory\nexhaustion). (CVE-2019-19065)\n\nIt was discovered that the AMD Audio CoProcessor Driver for the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker with the ability to load modules could use this to cause a\ndenial of service (memory exhaustion). (CVE-2019-19067)\n\nIt was discovered in the Qualcomm FastRPC Driver for the Linux kernel did\nnot properly deallocate memory in certain error conditions. A local\nattacker could use this to cause a denial of service (memory exhaustion).\n(CVE-2019-19069)\n\nIt was discovered that the Cascoda CA8210 SPI 802.15.4 wireless controller\ndriver for the Linux kernel did not properly deallocate memory in certain\nerror conditions. A local attacker could use this to cause a denial of\nservice (memory exhaustion). (CVE-2019-19075)\n\nIt was discovered that the AMD Display Engine Driver in the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattack could use this to cause a denial of service (memory exhaustion).\n(CVE-2019-19083)\n\nNicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the Linux\nkernel performed DMA from a kernel stack. A local attacker could use this\nto cause a denial of service (system crash). (CVE-2019-17075)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 19.10, Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU19.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1007-oracle\", ver:\"5.3.0-1007.8\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1008-aws\", ver:\"5.3.0-1008.9\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1008-kvm\", ver:\"5.3.0-1008.9\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1009-gcp\", ver:\"5.3.0-1009.10\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-24-generic\", ver:\"5.3.0-24.26\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-24-generic-lpae\", ver:\"5.3.0-24.26\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-24-lowlatency\", ver:\"5.3.0-24.26\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-24-snapdragon\", ver:\"5.3.0-24.26\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.3.0.1008.10\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1009.10\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.3.0.24.28\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.3.0.24.28\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.3.0.1009.10\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.3.0.1008.10\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.3.0.24.28\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1007.8\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"5.3.0.24.28\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.3.0.24.28\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1009-gcp\", ver:\"5.3.0-1009.10~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp-edge\", ver:\"5.3.0.1009.9\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-04-17T17:00:33", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-04-16T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1396)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19527", "CVE-2019-5108", "CVE-2019-19054", "CVE-2020-8992", "CVE-2020-8648", "CVE-2020-9383", "CVE-2017-8068", "CVE-2019-19533", "CVE-2017-13216", "CVE-2019-19534", "CVE-2019-19057", "CVE-2017-7346", "CVE-2014-3180", "CVE-2019-19332", "CVE-2019-14901", "CVE-2017-13693", "CVE-2019-19524", "CVE-2019-0155", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-19922", "CVE-2019-19523", "CVE-2019-19768", "CVE-2019-18806", "CVE-2018-12207", "CVE-2019-19965", "CVE-2019-11135", "CVE-2017-8069", "CVE-2019-19227", "CVE-2019-19531", "CVE-2019-10220", "CVE-2019-19063", "CVE-2019-18805", "CVE-2019-14895", "CVE-2019-14897", "CVE-2014-9888", "CVE-2019-19066", "CVE-2019-19528", "CVE-2017-12134", "CVE-2019-16230", "CVE-2019-0154", "CVE-2020-8649", "CVE-2019-16231", "CVE-2019-2215", "CVE-2019-19073", "CVE-2018-14633", "CVE-2020-8647", "CVE-2019-19530", "CVE-2019-16232", "CVE-2019-19532", "CVE-2019-19074", "CVE-2019-18675", "CVE-2019-19537", "CVE-2020-2732", "CVE-2019-19966", "CVE-2019-19060", "CVE-2019-19056", "CVE-2019-10126", "CVE-2019-15291", "CVE-2019-19536", "CVE-2019-20054", "CVE-2017-8070", "CVE-2019-20096"], "modified": "2020-04-16T00:00:00", "id": "OPENVAS:1361412562311220201396", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201396", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from the referenced\n# advisories, and are Copyright (C) by the respective right holder(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1396\");\n script_version(\"2020-04-16T05:48:56+0000\");\n script_cve_id(\"CVE-2014-3180\", \"CVE-2014-9888\", \"CVE-2017-12134\", \"CVE-2017-13216\", \"CVE-2017-13693\", \"CVE-2017-7346\", \"CVE-2017-8068\", \"CVE-2017-8069\", \"CVE-2017-8070\", \"CVE-2018-12207\", \"CVE-2018-14633\", \"CVE-2019-0154\", \"CVE-2019-0155\", \"CVE-2019-10126\", \"CVE-2019-10220\", \"CVE-2019-11135\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-15291\", \"CVE-2019-16230\", \"CVE-2019-16231\", \"CVE-2019-16232\", \"CVE-2019-18675\", \"CVE-2019-18805\", \"CVE-2019-18806\", \"CVE-2019-19054\", \"CVE-2019-19056\", \"CVE-2019-19057\", \"CVE-2019-19060\", \"CVE-2019-19062\", \"CVE-2019-19063\", \"CVE-2019-19066\", \"CVE-2019-19073\", \"CVE-2019-19074\", \"CVE-2019-19227\", \"CVE-2019-19332\", \"CVE-2019-19523\", \"CVE-2019-19524\", \"CVE-2019-19527\", \"CVE-2019-19528\", \"CVE-2019-19530\", \"CVE-2019-19531\", \"CVE-2019-19532\", \"CVE-2019-19533\", \"CVE-2019-19534\", \"CVE-2019-19536\", \"CVE-2019-19537\", \"CVE-2019-19768\", \"CVE-2019-19922\", \"CVE-2019-19965\", \"CVE-2019-19966\", \"CVE-2019-20054\", \"CVE-2019-20096\", \"CVE-2019-2215\", \"CVE-2019-5108\", \"CVE-2020-2732\", \"CVE-2020-8647\", \"CVE-2020-8648\", \"CVE-2020-8649\", \"CVE-2020-8992\", \"CVE-2020-9383\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-16 05:48:56 +0000 (Thu, 16 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-04-16 05:48:56 +0000 (Thu, 16 Apr 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1396)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP3\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1396\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1396\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2020-1396 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"drivers/gpu/drm/radeon/radeon_display.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: A third-party software maintainer states that the work queue allocation is happening during device initialization, which for a graphics card occurs during boot. It is not attacker controllable and OOM at that time is highly unlikely.(CVE-2019-16230)\n\nIn the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).(CVE-2019-19768)\n\nA flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.(CVE-2020-2732)\n\nThere is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.(CVE-2020-8647)\n\nThere is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.(CVE-2020-8648)\n\nThere is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.(CVE-2020-8649)\n\next4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.(CVE-2020-8992)\n\nAn issue was discovered in the Linux kernel through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.(CVE-2020-9383)\n\nIn kernel/compat.c in the Linux kernel before 3.17, as used in Google Chrome OS and other products, there is a possible out-of-bounds read. restart_syscall uses uninitialized data when restarting compat_sys_nanosleep. NOTE: this is disputed because the code path is unreachable.(CVE-2014-3180)\n\nA heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.(CVE-2019-14896)\n\nA stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system c ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS V2.0SP3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP3\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~514.44.5.10.h254\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~3.10.0~514.44.5.10.h254\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debuginfo-common-x86_64\", rpm:\"kernel-debuginfo-common-x86_64~3.10.0~514.44.5.10.h254\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~514.44.5.10.h254\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~514.44.5.10.h254\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~514.44.5.10.h254\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~514.44.5.10.h254\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~514.44.5.10.h254\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~514.44.5.10.h254\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-03-04T16:55:33", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-03-03T00:00:00", "type": "openvas", "title": "Debian LTS: Security Advisory for linux-4.9 (DLA-2114-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19527", "CVE-2019-14815", "CVE-2019-15098", "CVE-2019-19525", "CVE-2019-14816", "CVE-2019-19533", "CVE-2019-15217", "CVE-2019-0136", "CVE-2019-19051", "CVE-2019-17666", "CVE-2019-19767", "CVE-2019-18282", "CVE-2019-18683", "CVE-2019-19534", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-15505", "CVE-2019-19332", "CVE-2019-19052", "CVE-2019-14901", "CVE-2019-19524", "CVE-2019-17055", "CVE-2019-14896", "CVE-2019-19062", "CVE-2018-13093", "CVE-2019-17054", "CVE-2019-19523", "CVE-2019-19965", "CVE-2019-14615", "CVE-2019-19227", "CVE-2019-17075", "CVE-2019-16746", "CVE-2019-19535", "CVE-2019-19531", "CVE-2019-10220", "CVE-2019-19947", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19066", "CVE-2018-21008", "CVE-2019-19068", "CVE-2019-19037", "CVE-2019-19447", "CVE-2019-17052", "CVE-2019-2215", "CVE-2018-20976", "CVE-2019-19530", "CVE-2019-19532", "CVE-2019-19537", "CVE-2019-14814", "CVE-2019-19056", "CVE-2019-15291", "CVE-2019-19536", "CVE-2019-17053", "CVE-2019-17133", "CVE-2018-13094", "CVE-2019-15917", "CVE-2019-17056", "CVE-2019-20096"], "modified": "2020-03-03T00:00:00", "id": "OPENVAS:1361412562310892114", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310892114", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.892114\");\n script_version(\"2020-03-03T04:00:55+0000\");\n script_cve_id(\"CVE-2018-13093\", \"CVE-2018-13094\", \"CVE-2018-20976\", \"CVE-2018-21008\", \"CVE-2019-0136\", \"CVE-2019-10220\", \"CVE-2019-14615\", \"CVE-2019-14814\", \"CVE-2019-14815\", \"CVE-2019-14816\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-15098\", \"CVE-2019-15217\", \"CVE-2019-15291\", \"CVE-2019-15505\", \"CVE-2019-15917\", \"CVE-2019-16746\", \"CVE-2019-17052\", \"CVE-2019-17053\", \"CVE-2019-17054\", \"CVE-2019-17055\", \"CVE-2019-17056\", \"CVE-2019-17075\", \"CVE-2019-17133\", \"CVE-2019-17666\", \"CVE-2019-18282\", \"CVE-2019-18683\", \"CVE-2019-18809\", \"CVE-2019-19037\", \"CVE-2019-19051\", \"CVE-2019-19052\", \"CVE-2019-19056\", \"CVE-2019-19057\", \"CVE-2019-19062\", \"CVE-2019-19066\", \"CVE-2019-19068\", \"CVE-2019-19227\", \"CVE-2019-19332\", \"CVE-2019-19447\", \"CVE-2019-19523\", \"CVE-2019-19524\", \"CVE-2019-19525\", \"CVE-2019-19527\", \"CVE-2019-19530\", \"CVE-2019-19531\", \"CVE-2019-19532\", \"CVE-2019-19533\", \"CVE-2019-19534\", \"CVE-2019-19535\", \"CVE-2019-19536\", \"CVE-2019-19537\", \"CVE-2019-19767\", \"CVE-2019-19947\", \"CVE-2019-19965\", \"CVE-2019-20096\", \"CVE-2019-2215\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-03-03 04:00:55 +0000 (Tue, 03 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-03-03 04:00:55 +0000 (Tue, 03 Mar 2020)\");\n script_name(\"Debian LTS: Security Advisory for linux-4.9 (DLA-2114-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DLA-2114-1\");\n script_xref(name:\"URL\", value:\"https://bugs.debian.org/869511\");\n script_xref(name:\"URL\", value:\"https://bugs.debian.org/945023\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-4.9'\n package(s) announced via the DLA-2114-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks.\n\nCVE-2018-13093, CVE-2018-13094\n\nWen Xu from SSLab at Gatech reported several NULL pointer\ndereference flaws that may be triggered when mounting and\noperating a crafted XFS volume. An attacker able to mount\narbitrary XFS volumes could use this to cause a denial of service\n(crash).\n\nCVE-2018-20976\n\nIt was discovered that the XFS file-system implementation did not\ncorrectly handle some mount failure conditions, which could lead\nto a use-after-free. The security impact of this is unclear.\n\nCVE-2018-21008\n\nIt was discovered that the rsi wifi driver did not correctly\nhandle some failure conditions, which could lead to a use-after-\nfree. The security impact of this is unclear.\n\nCVE-2019-0136\n\nIt was discovered that the wifi soft-MAC implementation (mac80211)\ndid not properly authenticate Tunneled Direct Link Setup (TDLS)\nmessages. A nearby attacker could use this for denial of service\n(loss of wifi connectivity).\n\nCVE-2019-2215\n\nThe syzkaller tool discovered a use-after-free vulnerability in\nthe Android binder driver. A local user on a system with this\ndriver enabled could use this to cause a denial of service (memory\ncorruption or crash) or possibly for privilege escalation.\nHowever, this driver is not enabled on Debian packaged kernels.\n\nCVE-2019-10220\n\nVarious developers and researchers found that if a crafted file-\nsystem or malicious file server presented a directory with\nfilenames including a '/' character, this could confuse and\npossibly defeat security checks in applications that read the\ndirectory.\n\nThe kernel will now return an error when reading such a directory,\nrather than passing the invalid filenames on to user-space.\n\nCVE-2019-14615\n\nIt was discovered that Intel 9th and 10th generation GPUs did not\nclear user-visible state during a context switch, which resulted\nin information leaks between GPU tasks. This has been mitigated\nin the i915 driver.\n\nThe affected chips (gen9 and gen10) are listed at\n<\n\nCVE-2019-14814, CVE-2019-14815, CVE-2019-14816\n\nMultiple bugs were discovered in the mwifiex wifi driver, which\ncould lead to heap buffer overflows. A local user permitted to\nconfigure a device handled by this driver could probably use this\nfor privilege escalation.\n\nCVE-2019-14895, CVE-2019-14901\n\nADLab of Venustech discovered potential heap buffer overflows in\nthe mwifiex wifi driver. On systems using this driver, a\nmalicious Wireless Access Point or adhoc/P2P peer could use these\nto cause a denial of service (memory corruption or crash) or\npossibly for remote code ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux-4.9' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n4.9.210-1~deb8u1. This update additionally fixes Debian bugs\n#869511 and 945023, and includes many more bug fixes from stable\nupdates 4.9.190-4.9.210 inclusive.\n\nWe recommend that you upgrade your linux-4.9 packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-4.9-arm\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-doc-4.9\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-686\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-686-pae\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-all\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-all-amd64\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-all-armel\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-all-armhf\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-all-i386\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-amd64\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-armmp\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-armmp-lpae\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-common\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-common-rt\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-marvell\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-rt-686-pae\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-rt-amd64\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-686\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-686-pae\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-all\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-all-amd64\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-all-armel\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-all-armhf\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-all-i386\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-amd64\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-armmp\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-armmp-lpae\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-common\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-common-rt\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-marvell\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-rt-686-pae\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-rt-amd64\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-686\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-686-pae\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-686-pae-dbg\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-amd64\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-amd64-dbg\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-armmp\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-armmp-lpae\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-marvell\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-rt-686-pae\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-rt-686-pae-dbg\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-rt-amd64\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-rt-amd64-dbg\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-686\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-686-pae\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-686-pae-dbg\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-amd64\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-amd64-dbg\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-armmp\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-armmp-lpae\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-marvell\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-rt-686-pae\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-rt-686-pae-dbg\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-rt-amd64\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-rt-amd64-dbg\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-kbuild-4.9\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-manual-4.9\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-perf-4.9\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-source-4.9\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-0.bpo.11\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-0.bpo.12\", ver:\"4.9.210-1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-03-18T20:38:33", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-03-15T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for the (openSUSE-SU-2020:0336-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19527", "CVE-2019-19054", "CVE-2020-8992", "CVE-2020-8648", "CVE-2019-19045", "CVE-2019-19533", "CVE-2019-20095", "CVE-2019-19051", "CVE-2019-19767", "CVE-2019-19318", "CVE-2019-19332", "CVE-2019-14896", "CVE-2019-19523", "CVE-2019-19526", "CVE-2019-19965", "CVE-2019-14615", "CVE-2019-16746", "CVE-2019-19319", "CVE-2019-19535", "CVE-2019-19338", "CVE-2019-19927", "CVE-2019-18808", "CVE-2019-14897", "CVE-2019-19036", "CVE-2019-19066", "CVE-2020-8428", "CVE-2019-19447", "CVE-2020-7053", "CVE-2019-19532", "CVE-2019-19537", "CVE-2019-16994", "CVE-2020-2732", "CVE-2019-19966", "CVE-2019-20054", "CVE-2019-20096"], "modified": "2020-03-16T00:00:00", "id": "OPENVAS:1361412562310853070", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310853070", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.853070\");\n script_version(\"2020-03-16T11:42:10+0000\");\n script_cve_id(\"CVE-2019-14615\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-16746\", \"CVE-2019-16994\", \"CVE-2019-18808\", \"CVE-2019-19036\", \"CVE-2019-19045\", \"CVE-2019-19051\", \"CVE-2019-19054\", \"CVE-2019-19066\", \"CVE-2019-19318\", \"CVE-2019-19319\", \"CVE-2019-19332\", \"CVE-2019-19338\", \"CVE-2019-19447\", \"CVE-2019-19523\", \"CVE-2019-19526\", \"CVE-2019-19527\", \"CVE-2019-19532\", \"CVE-2019-19533\", \"CVE-2019-19535\", \"CVE-2019-19537\", \"CVE-2019-19767\", \"CVE-2019-19927\", \"CVE-2019-19965\", \"CVE-2019-19966\", \"CVE-2019-20054\", \"CVE-2019-20095\", \"CVE-2019-20096\", \"CVE-2020-2732\", \"CVE-2020-7053\", \"CVE-2020-8428\", \"CVE-2020-8648\", \"CVE-2020-8992\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-03-16 11:42:10 +0000 (Mon, 16 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-03-15 04:00:31 +0000 (Sun, 15 Mar 2020)\");\n script_name(\"openSUSE: Security Advisory for the (openSUSE-SU-2020:0336-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.1\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2020:0336-1\");\n script_xref(name:\"URL\", value:\"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'the'\n package(s) announced via the openSUSE-SU-2020:0336-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2019-14615: Insufficient control flow in certain data structures for\n some Intel(R) Processors with Intel(R) Processor Graphics may have\n allowed an unauthenticated user to potentially enable information\n disclosure via local access (bnc#1160195 bnc#1165881).\n\n - CVE-2019-14896: A heap-based buffer overflow vulnerability was found in\n the Marvell WiFi chip driver. A remote attacker could cause a denial of\n service (system crash) or, possibly execute arbitrary code, when the\n lbs_ibss_join_existing function is called after a STA connects to an AP\n (bnc#1157157).\n\n - CVE-2019-14897: A stack-based buffer overflow was found in the Marvell\n WiFi chip driver. An attacker is able to cause a denial of service\n (system crash) or, possibly execute arbitrary code, when a STA works in\n IBSS mode (allows connecting stations together without the use of an AP)\n and connects to another STA (bnc#1157155).\n\n - CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c. It\n did not check the length of variable elements in a beacon head, leading\n to a buffer overflow (bnc#1152107).\n\n - CVE-2019-16994: In the Linux kernel before 5.0, a memory leak exists in\n sit_init_net() in net/ipv6/sit.c when register_netdev() fails to\n register sitn->fb_tunnel_dev, which may cause denial of service, aka\n CID-07f12b26e21a (bnc#1161523).\n\n - CVE-2019-18808: A memory leak in the ccp_run_sha_cmd() function in\n drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of\n service (memory consumption), aka CID-128c66429247 (bnc#1156259).\n\n - CVE-2019-19036: btrfs_root_node in fs/btrfs/ctree.c allowed a NULL\n pointer dereference because rcu_dereference(root->node) can be zero\n (bnc#1157692).\n\n - CVE-2019-19045: A memory leak in the mlx5_fpga_conn_create_cq() function\n in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers\n to cause a denial of service (memory consumption) by triggering\n mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7 (bnc#1161522).\n\n - CVE-2019-19051: A memory leak in the i2400m_op_rfkill_sw_toggle()\n function in drivers/net/wimax/i2400m/op-rfkill.c allowed attackers to\n cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7\n (bnc#1159024).\n\n - CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in\n drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a\n denial of service (memory consumption) by triggering kfifo_alloc()\n failures, aka CID-a7b2df76b42b (bnc#1161518).\n\n - CVE-2019 ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'the' package(s) on openSUSE Leap 15.1.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.1\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs\", rpm:\"kernel-docs~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs-html\", rpm:\"kernel-docs-html~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-macros\", rpm:\"kernel-macros~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source-vanilla\", rpm:\"kernel-source-vanilla~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base\", rpm:\"kernel-debug-base~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base-debuginfo\", rpm:\"kernel-debug-base-debuginfo~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debugsource\", rpm:\"kernel-debug-debugsource~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel-debuginfo\", rpm:\"kernel-debug-devel-debuginfo~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base\", rpm:\"kernel-default-base~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base-debuginfo\", rpm:\"kernel-default-base-debuginfo~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debuginfo\", rpm:\"kernel-default-debuginfo~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debugsource\", rpm:\"kernel-default-debugsource~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel-debuginfo\", rpm:\"kernel-default-devel-debuginfo~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall\", rpm:\"kernel-kvmsmall~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base\", rpm:\"kernel-kvmsmall-base~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base-debuginfo\", rpm:\"kernel-kvmsmall-base-debuginfo~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debuginfo\", rpm:\"kernel-kvmsmall-debuginfo~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debugsource\", rpm:\"kernel-kvmsmall-debugsource~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel\", rpm:\"kernel-kvmsmall-devel~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel-debuginfo\", rpm:\"kernel-kvmsmall-devel-debuginfo~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build\", rpm:\"kernel-obs-build~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build-debugsource\", rpm:\"kernel-obs-build-debugsource~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-qa\", rpm:\"kernel-obs-qa~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla\", rpm:\"kernel-vanilla~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base\", rpm:\"kernel-vanilla-base~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base-debuginfo\", rpm:\"kernel-vanilla-base-debuginfo~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debuginfo\", rpm:\"kernel-vanilla-debuginfo~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debugsource\", rpm:\"kernel-vanilla-debugsource~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel\", rpm:\"kernel-vanilla-devel~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel-debuginfo\", rpm:\"kernel-vanilla-devel-debuginfo~4.12.14~lp151.28.40.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-05-06T01:12:17", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-04-30T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1536)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19527", "CVE-2020-11494", "CVE-2019-5108", "CVE-2020-8648", "CVE-2020-9383", "CVE-2019-19525", "CVE-2019-16229", "CVE-2019-20095", "CVE-2019-19770", "CVE-2019-19767", "CVE-2019-19534", "CVE-2019-11191", "CVE-2019-19332", "CVE-2019-14901", "CVE-2019-19524", "CVE-2019-19252", "CVE-2019-14896", "CVE-2019-19922", "CVE-2019-19039", "CVE-2020-11609", "CVE-2019-3016", "CVE-2019-20636", "CVE-2019-19768", "CVE-2019-19526", "CVE-2019-11135", "CVE-2019-19227", "CVE-2019-19535", "CVE-2019-19815", "CVE-2019-10220", "CVE-2019-19947", "CVE-2019-19338", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19036", "CVE-2020-1749", "CVE-2020-8428", "CVE-2020-11608", "CVE-2020-11668", "CVE-2019-19807", "CVE-2019-19037", "CVE-2020-11565", "CVE-2020-11669", "CVE-2020-8649", "CVE-2019-16231", "CVE-2019-19529", "CVE-2019-19447", "CVE-2020-0067", "CVE-2020-8647", "CVE-2019-16232", "CVE-2019-19532", "CVE-2020-2732", "CVE-2019-19060", "CVE-2019-19536", "CVE-2019-20096"], "modified": "2020-04-30T00:00:00", "id": "OPENVAS:1361412562311220201536", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201536", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1536\");\n script_version(\"2020-04-30T12:12:04+0000\");\n script_cve_id(\"CVE-2019-10220\", \"CVE-2019-11135\", \"CVE-2019-11191\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-16229\", \"CVE-2019-16231\", \"CVE-2019-16232\", \"CVE-2019-19036\", \"CVE-2019-19037\", \"CVE-2019-19039\", \"CVE-2019-19060\", \"CVE-2019-19227\", \"CVE-2019-19252\", \"CVE-2019-19332\", \"CVE-2019-19338\", \"CVE-2019-19447\", \"CVE-2019-19524\", \"CVE-2019-19525\", \"CVE-2019-19526\", \"CVE-2019-19527\", \"CVE-2019-19529\", \"CVE-2019-19532\", \"CVE-2019-19534\", \"CVE-2019-19535\", \"CVE-2019-19536\", \"CVE-2019-19767\", \"CVE-2019-19768\", \"CVE-2019-19770\", \"CVE-2019-19807\", \"CVE-2019-19815\", \"CVE-2019-19922\", \"CVE-2019-19947\", \"CVE-2019-20095\", \"CVE-2019-20096\", \"CVE-2019-20636\", \"CVE-2019-3016\", \"CVE-2019-5108\", \"CVE-2020-0067\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-11669\", \"CVE-2020-1749\", \"CVE-2020-2732\", \"CVE-2020-8428\", \"CVE-2020-8647\", \"CVE-2020-8648\", \"CVE-2020-8649\", \"CVE-2020-9383\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-30 12:12:04 +0000 (Thu, 30 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-04-30 12:12:04 +0000 (Thu, 30 Apr 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1536)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRTARM64-3\\.0\\.2\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1536\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1536\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2020-1536 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.(CVE-2019-19536)\n\nIn the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.(CVE-2019-19535)\n\nvcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.(CVE-2019-19252)\n\nIn the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.(CVE-2019-19227)\n\nA memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.(CVE-2019-19060)\n\nIn the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.(CVE-2019-19534)\n\nIn the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.(CVE-2019-19529)\n\nIn the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.(CVE-2019-19526)\n\nIn the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.(CVE-2019-19525)\n\nIn the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.(CVE-2019-19532)\n\nIn the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c drive ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.2.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRTARM64-3.0.2.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.19.36~vhulk1907.1.0.h729\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.19.36~vhulk1907.1.0.h729\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~4.19.36~vhulk1907.1.0.h729\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~4.19.36~vhulk1907.1.0.h729\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~4.19.36~vhulk1907.1.0.h729\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~4.19.36~vhulk1907.1.0.h729\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~4.19.36~vhulk1907.1.0.h729\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~4.19.36~vhulk1907.1.0.h729\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-03-23T15:01:43", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-03-17T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4300-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-18809", "CVE-2019-19058", "CVE-2019-19053", "CVE-2019-3016", "CVE-2019-19064", "CVE-2019-19059", "CVE-2019-19043", "CVE-2019-19066", "CVE-2019-19068", "CVE-2020-2732", "CVE-2019-19056"], "modified": "2020-03-20T00:00:00", "id": "OPENVAS:1361412562310844362", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844362", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844362\");\n script_version(\"2020-03-20T06:19:59+0000\");\n script_cve_id(\"CVE-2019-3016\", \"CVE-2020-2732\", \"CVE-2019-18809\", \"CVE-2019-19043\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19058\", \"CVE-2019-19059\", \"CVE-2019-19064\", \"CVE-2019-19066\", \"CVE-2019-19068\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-03-20 06:19:59 +0000 (Fri, 20 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-03-17 04:00:20 +0000 (Tue, 17 Mar 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4300-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU19\\.10|UBUNTU18\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4300-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-March/005356.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4300-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the KVM implementation in the Linux kernel, when\nparavirtual TLB flushes are enabled in guests, the hypervisor in some\nsituations could miss deferred TLB flushes or otherwise mishandle them. An\nattacker in a guest VM could use this to expose sensitive information (read\nmemory from another guest VM). (CVE-2019-3016)\n\nPaulo Bonzini discovered that the KVM hypervisor implementation in the\nLinux kernel could improperly let a nested (level 2) guest access the\nresources of a parent (level 1) guest in certain situations. An attacker\ncould use this to expose sensitive information. (CVE-2020-2732)\n\nIt was discovered that the Afatech AF9005 DVB-T USB device driver in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-18809)\n\nIt was discovered that the Intel(R) XL710 Ethernet Controller device driver\nin the Linux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-19043)\n\nIt was discovered that the RPMSG character device interface in the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker could possibly use this to cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19053)\n\nIt was discovered that the Marvell Wi-Fi device driver in the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattacker could use this to possibly cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19056)\n\nIt was discovered that the Intel(R) Wi-Fi device driver in the Linux kernel\ndevice driver in the Linux kernel did not properly deallocate memory in\ncertain error conditions. A local attacker could possibly use this to cause\na denial of service (kernel memory exhaustion). (CVE-2019-19058,\nCVE-2019-19059)\n\nIt was discovered that the Serial Peripheral Interface (SPI) driver in the\nLinux kernel device driver in the Linux kernel did not properly deallocate\nmemory in certain error conditions. A local attacker could possibly use\nthis to cause a denial of service (kernel memory exhaustion).\n(CVE-2019-19064)\n\nIt was discovered that the Brocade BFA Fibre Channel device driver in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-19066)\n\nIt was discovered that the Realtek RTL8xxx USB Wi-Fi device driver in t ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 19.10, Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU19.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1011-oracle\", ver:\"5.3.0-1011.12\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1012-kvm\", ver:\"5.3.0-1012.13\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1013-aws\", ver:\"5.3.0-1013.14\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1014-gcp\", ver:\"5.3.0-1014.15\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1019-raspi2\", ver:\"5.3.0-1019.21\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-42-generic\", ver:\"5.3.0-42.34\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-42-generic-lpae\", ver:\"5.3.0-42.34\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-42-lowlatency\", ver:\"5.3.0-42.34\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-42-snapdragon\", ver:\"5.3.0-42.34\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.3.0.1013.15\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1014.15\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.3.0.42.36\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.3.0.42.36\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.3.0.1014.15\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.3.0.1012.14\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.3.0.42.36\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1011.12\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"5.3.0.1019.16\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"5.3.0.42.36\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.3.0.42.36\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1014-gcp\", ver:\"5.3.0-1014.15~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1014-gke\", ver:\"5.3.0-1014.15~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1019-raspi2\", ver:\"5.3.0-1019.21~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-42-generic\", ver:\"5.3.0-42.34~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-42-generic-lpae\", ver:\"5.3.0-42.34~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-42-lowlatency\", ver:\"5.3.0-42.34~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp-edge\", ver:\"5.3.0.1014.13\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-18.04\", ver:\"5.3.0.42.99\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-18.04\", ver:\"5.3.0.42.99\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.3\", ver:\"5.3.0.1014.4\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-18.04\", ver:\"5.3.0.42.99\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2-hwe-18.04\", ver:\"5.3.0.1019.8\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon-hwe-18.04\", ver:\"5.3.0.42.99\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-18.04\", ver:\"5.3.0.42.99\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-11T14:42:56", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2019-12-04T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux USN-4210-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19075", "CVE-2019-19065", "CVE-2019-17075", "CVE-2019-16746", "CVE-2019-19060", "CVE-2019-17133"], "modified": "2019-12-10T00:00:00", "id": "OPENVAS:1361412562310844258", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844258", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844258\");\n script_version(\"2019-12-10T07:34:00+0000\");\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-17133\", \"CVE-2019-19060\", \"CVE-2019-19065\", \"CVE-2019-19075\", \"CVE-2019-17075\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-12-10 07:34:00 +0000 (Tue, 10 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-12-04 03:01:57 +0000 (Wed, 04 Dec 2019)\");\n script_name(\"Ubuntu Update for linux USN-4210-1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU18\\.04 LTS|UBUNTU16\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4210-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-December/005228.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4210-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that a buffer overflow existed in the 802.11 Wi-Fi\nconfiguration interface for the Linux kernel when handling beacon settings.\nA local attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2019-16746)\n\nNicolas Waisman discovered that the WiFi driver stack in the Linux kernel\ndid not properly validate SSID lengths. A physically proximate attacker\ncould use this to cause a denial of service (system crash).\n(CVE-2019-17133)\n\nIt was discovered that the ADIS16400 IIO IMU Driver for the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattacker could use this to cause a denial of service (memory exhaustion).\n(CVE-2019-19060)\n\nIt was discovered that the Intel OPA Gen1 Infiniband Driver for the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker could use this to cause a denial of service (memory\nexhaustion). (CVE-2019-19065)\n\nIt was discovered that the Cascoda CA8210 SPI 802.15.4 wireless controller\ndriver for the Linux kernel did not properly deallocate memory in certain\nerror conditions. A local attacker could use this to cause a denial of\nservice (memory exhaustion). (CVE-2019-19075)\n\nNicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the Linux\nkernel performed DMA from a kernel stack. A local attacker could use this\nto cause a denial of service (system crash). (CVE-2019-17075)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 18.04 LTS, Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1030-oracle\", ver:\"4.15.0-1030.33\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1049-gke\", ver:\"4.15.0-1049.52\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1051-kvm\", ver:\"4.15.0-1051.51\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1052-raspi2\", ver:\"4.15.0-1052.56\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1056-aws\", ver:\"4.15.0-1056.58\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1065-oem\", ver:\"4.15.0-1065.75\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1069-snapdragon\", ver:\"4.15.0-1069.76\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-72-generic\", ver:\"4.15.0-72.81\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-72-generic-lpae\", ver:\"4.15.0-72.81\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-72-lowlatency\", ver:\"4.15.0-72.81\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.15.0.1056.57\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-lts-18.04\", ver:\"4.15.0.1056.57\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.15.0.72.74\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.15.0.72.74\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1049.52\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-4.15\", ver:\"4.15.0.1049.52\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.15.0.1051.51\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.15.0.72.74\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.1065.69\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"4.15.0.1030.35\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle-lts-18.04\", ver:\"4.15.0.1030.35\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.15.0.72.74\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.15.0.72.74\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.15.0.72.74\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.15.0.72.74\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.15.0.1052.50\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.15.0.1069.72\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.15.0.72.74\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1030-oracle\", ver:\"4.15.0-1030.33~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1050-gcp\", ver:\"4.15.0-1050.53\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1056-aws\", ver:\"4.15.0-1056.58~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-72-generic\", ver:\"4.15.0-72.81~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-72-generic-lpae\", ver:\"4.15.0-72.81~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-72-lowlatency\", ver:\"4.15.0-72.81~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-hwe\", ver:\"4.15.0.1056.56\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"4.15.0.1050.64\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-16.04\", ver:\"4.15.0.72.92\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-16.04\", ver:\"4.15.0.72.92\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1050.64\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-16.04\", ver:\"4.15.0.72.92\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.72.92\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"4.15.0.1030.23\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-16.04\", ver:\"4.15.0.72.92\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-06-10T17:55:35", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-02-19T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux-aws-5.0 (USN-4285-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-5108", "CVE-2019-16229", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-19965", "CVE-2019-14615", "CVE-2019-19947", "CVE-2019-19063", "CVE-2020-7053", "CVE-2019-16232", "CVE-2019-18786", "CVE-2019-20096"], "modified": "2020-06-09T00:00:00", "id": "OPENVAS:1361412562310844341", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844341", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844341\");\n script_version(\"2020-06-09T06:40:15+0000\");\n script_cve_id(\"CVE-2019-14615\", \"CVE-2019-16229\", \"CVE-2019-16232\", \"CVE-2019-18786\", \"CVE-2019-18809\", \"CVE-2019-19057\", \"CVE-2019-19063\", \"CVE-2019-19947\", \"CVE-2019-19965\", \"CVE-2019-20096\", \"CVE-2019-5108\", \"CVE-2020-7053\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 06:40:15 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-02-19 04:00:35 +0000 (Wed, 19 Feb 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux-aws-5.0 (USN-4285-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4285-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-February/005335.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-aws-5.0'\n package(s) announced via the USN-4285-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the Linux kernel did not properly clear data\nstructures on context switches for certain Intel graphics processors. A\nlocal attacker could use this to expose sensitive information.\n(CVE-2019-14615)\n\nIt was discovered that the HSA Linux kernel driver for AMD GPU devices did\nnot properly check for errors in certain situations, leading to a NULL\npointer dereference. A local attacker could possibly use this to cause a\ndenial of service. (CVE-2019-16229)\n\nIt was discovered that the Marvell 8xxx Libertas WLAN device driver in the\nLinux kernel did not properly check for errors in certain situations,\nleading to a NULL pointer dereference. A local attacker could possibly use\nthis to cause a denial of service. (CVE-2019-16232)\n\nIt was discovered that the Renesas Digital Radio Interface (DRIF) driver in\nthe Linux kernel did not properly initialize data. A local attacker could\npossibly use this to expose sensitive information (kernel memory)\n(CVE-2019-18786).\n\nIt was discovered that the Afatech AF9005 DVB-T USB device driver in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-18809)\n\nIt was discovered that multiple memory leaks existed in the Marvell WiFi-Ex\nDriver for the Linux kernel. A local attacker could possibly use this to\ncause a denial of service (kernel memory exhaustion). (CVE-2019-19057)\n\nIt was discovered that the Realtek rtlwifi USB device driver in the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker could possibly use this to cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19063)\n\nIt was discovered that the Kvaser CAN/USB driver in the Linux kernel did\nnot properly initialize memory in certain situations. A local attacker\ncould possibly use this to expose sensitive information (kernel memory).\n(CVE-2019-19947)\n\nGao Chuan discovered that the SAS Class driver in the Linux kernel\ncontained a race condition that could lead to a NULL pointer dereference. A\nlocal attacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2019-19965)\n\nIt was discovered that the Datagram Congestion Control Protocol (DCCP)\nimplementation in the Linux kernel did not properly deallocate memory in\ncertain error conditions. An attacker could possibly use this to cause a\ndenial of service (kernel memory exhaustion). (CVE-2019-20096)\n\nMitchell Frank discovered that the Wi-Fi implementation in the Linux kernel\nwhen used as an access point would send IAPP location update ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux-aws-5.0' package(s) on Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1011-oracle\", ver:\"5.0.0-1011.16\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1025-aws\", ver:\"5.0.0-1025.28\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1030-gke\", ver:\"5.0.0-1030.31\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1031-gcp\", ver:\"5.0.0-1031.32\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1032-azure\", ver:\"5.0.0-1032.34\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"5.0.0.1032.43\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.0.0.1031.35\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.0\", ver:\"5.0.0.1030.18\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:33:11", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2018-04-03T00:00:00", "type": "openvas", "title": "Fedora Update for acpica-tools FEDORA-2018-7c2e0a998d", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-13695", "CVE-2017-13694", "CVE-2017-13693"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310874315", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874315", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_7c2e0a998d_acpica-tools_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for acpica-tools FEDORA-2018-7c2e0a998d\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874315\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-04-03 09:00:20 +0200 (Tue, 03 Apr 2018)\");\n script_cve_id(\"CVE-2017-13693\", \"CVE-2017-13694\", \"CVE-2017-13695\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for acpica-tools FEDORA-2018-7c2e0a998d\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'acpica-tools'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"acpica-tools on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2018-7c2e0a998d\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHCUUPXENU2U52POEXXQTTE6FHH5Z5RV\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"acpica-tools\", rpm:\"acpica-tools~20180209~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-06-17T15:49:19", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-06-16T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1674)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19527", "CVE-2020-11494", "CVE-2019-5108", "CVE-2019-19054", "CVE-2020-8992", "CVE-2020-8648", "CVE-2020-12770", "CVE-2020-9383", "CVE-2017-8068", "CVE-2019-19533", "CVE-2017-13080", "CVE-2019-19534", "CVE-2019-19057", "CVE-2014-3180", "CVE-2019-19332", "CVE-2019-14901", "CVE-2017-13693", "CVE-2020-12826", "CVE-2014-4508", "CVE-2019-19524", "CVE-2020-10942", "CVE-2019-14896", "CVE-2019-19062", "CVE-2018-13093", "CVE-2019-19922", "CVE-2020-11609", "CVE-2020-10720", "CVE-2019-20636", "CVE-2019-19523", "CVE-2019-19768", "CVE-2020-12464", "CVE-2014-5206", "CVE-2019-19965", "CVE-2020-12654", "CVE-2018-9389", "CVE-2019-19227", "CVE-2019-19319", "CVE-2019-19531", "CVE-2016-3951", "CVE-2019-10220", "CVE-2019-19063", "CVE-2018-1000204", "CVE-2018-9383", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-19066", "CVE-2020-12653", "CVE-2019-19528", "CVE-2014-4608", "CVE-2020-11608", "CVE-2020-11668", "CVE-2016-9756", "CVE-2019-16230", "CVE-2020-13143", "CVE-2019-9458", "CVE-2017-12153", "CVE-2020-11565", "CVE-2020-8649", "CVE-2019-14898", "CVE-2020-12652", "CVE-2019-2215", "CVE-2019-19073", "CVE-2014-5207", "CVE-2020-8647", "CVE-2019-19530", "CVE-2019-19532", "CVE-2019-19074", "CVE-2019-18675", "CVE-2019-19537", "CVE-2020-2732", "CVE-2019-19966", "CVE-2019-19060", "CVE-2020-12655", "CVE-2019-19056", "CVE-2019-19536", "CVE-2019-20054", "CVE-2014-7970", "CVE-2019-20096"], "modified": "2020-06-16T00:00:00", "id": "OPENVAS:1361412562311220201674", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201674", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1674\");\n script_version(\"2020-06-16T05:49:04+0000\");\n script_cve_id(\"CVE-2014-3180\", \"CVE-2014-4508\", \"CVE-2014-4608\", \"CVE-2014-5206\", \"CVE-2014-5207\", \"CVE-2014-7970\", \"CVE-2016-3951\", \"CVE-2016-9756\", \"CVE-2017-12153\", \"CVE-2017-13080\", \"CVE-2017-13693\", \"CVE-2017-8068\", \"CVE-2018-1000204\", \"CVE-2018-13093\", \"CVE-2018-9383\", \"CVE-2018-9389\", \"CVE-2019-10220\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14898\", \"CVE-2019-14901\", \"CVE-2019-16230\", \"CVE-2019-18675\", \"CVE-2019-19054\", \"CVE-2019-19056\", \"CVE-2019-19057\", \"CVE-2019-19060\", \"CVE-2019-19062\", \"CVE-2019-19063\", \"CVE-2019-19066\", \"CVE-2019-19073\", \"CVE-2019-19074\", \"CVE-2019-19227\", \"CVE-2019-19319\", \"CVE-2019-19332\", \"CVE-2019-19523\", \"CVE-2019-19524\", \"CVE-2019-19527\", \"CVE-2019-19528\", \"CVE-2019-19530\", \"CVE-2019-19531\", \"CVE-2019-19532\", \"CVE-2019-19533\", \"CVE-2019-19534\", \"CVE-2019-19536\", \"CVE-2019-19537\", \"CVE-2019-19768\", \"CVE-2019-19922\", \"CVE-2019-19965\", \"CVE-2019-19966\", \"CVE-2019-20054\", \"CVE-2019-20096\", \"CVE-2019-20636\", \"CVE-2019-2215\", \"CVE-2019-5108\", \"CVE-2019-9458\", \"CVE-2020-10720\", \"CVE-2020-10942\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12655\", \"CVE-2020-12770\", \"CVE-2020-12826\", \"CVE-2020-13143\", \"CVE-2020-2732\", \"CVE-2020-8647\", \"CVE-2020-8648\", \"CVE-2020-8649\", \"CVE-2020-8992\", \"CVE-2020-9383\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-16 05:49:04 +0000 (Tue, 16 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-16 05:49:04 +0000 (Tue, 16 Jun 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1674)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP2\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1674\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1674\");\n script_xref(name:\"URL\", value:\"https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2020-1674 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/ net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.(CVE-2020-10942)\n\nIn the Linux kernel 5.0.21, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call.(CVE-2019-19319)\n\nIn kernel/compat.c in the Linux kernel before 3.17, as used in Google Chrome OS and other products, there is a possible out-of-bounds read. restart_syscall uses uninitialized data when restarting compat_sys_nanosleep. NOTE: this is disputed because the code path is unreachable.(CVE-2014-3180)\n\nIn the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).(CVE-2019-19768)\n\nThere is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.(CVE-2020-8647)\n\nThere is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.(CVE-2020-8649)\n\ndrivers/gpu/drm/radeon/radeon_display.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: A third-party software maintainer states that the work queue allocation is happening during device initialization, which for a graphics card occurs during boot. It is not attacker controllable and OOM at that time is highly unlikely.(CVE-2019-16230)\n\nThere is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/ n_tty.c.(CVE-2020-8648)\n\nA flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.(CVE-2020-2732)\n\nAn issue was discovered in the Linux kernel through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.(CVE-2020-9383)\n\next4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.(CVE-2020-8992)\n\nWi-Fi ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS V2.0SP2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~327.62.59.83.h230\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~3.10.0~327.62.59.83.h230\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~3.10.0~327.62.59.83.h230\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~3.10.0~327.62.59.83.h230\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debuginfo-common-x86_64\", rpm:\"kernel-debuginfo-common-x86_64~3.10.0~327.62.59.83.h230\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~327.62.59.83.h230\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~327.62.59.83.h230\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~327.62.59.83.h230\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~327.62.59.83.h230\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~327.62.59.83.h230\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~327.62.59.83.h230\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-19T14:46:56", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2019-12-08T00:00:00", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2019-124a241044", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-14815", "CVE-2019-19054", "CVE-2019-14816", "CVE-2018-12126", "CVE-2019-3900", "CVE-2019-15538", "CVE-2019-17666", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-18811", "CVE-2019-11478", "CVE-2019-15505", "CVE-2019-15504", "CVE-2019-14901", "CVE-2019-12378", "CVE-2019-17055", "CVE-2019-19058", "CVE-2019-0155", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-12380", "CVE-2019-19053", "CVE-2019-17054", "CVE-2019-19064", "CVE-2018-12207", "CVE-2019-19082", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-12455", "CVE-2018-12127", "CVE-2019-11135", "CVE-2019-13631", "CVE-2019-11884", "CVE-2019-10207", "CVE-2019-18812", "CVE-2019-19055", "CVE-2019-19043", "CVE-2019-12381", "CVE-2019-12379", "CVE-2019-12456", "CVE-2019-11477", "CVE-2019-19063", "CVE-2019-18808", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-12817", "CVE-2019-19066", "CVE-2019-12614", "CVE-2019-19068", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-0154", "CVE-2019-17052", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-12454", "CVE-2019-16232", "CVE-2019-12382", "CVE-2019-14821", "CVE-2019-18660", "CVE-2019-3846", "CVE-2019-19074", "CVE-2019-14814", "CVE-2019-19056", "CVE-2019-10126", "CVE-2019-11479", "CVE-2019-11091", "CVE-2019-19072", "CVE-2019-17053", "CVE-2018-12130", "CVE-2019-17056"], "modified": "2019-12-18T00:00:00", "id": "OPENVAS:1361412562310877070", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877070", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877070\");\n script_version(\"2019-12-18T09:57:42+0000\");\n script_cve_id(\"CVE-2019-18808\", \"CVE-2019-18809\", \"CVE-2019-18811\", \"CVE-2019-18812\", \"CVE-2019-16232\", \"CVE-2019-19082\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-19078\", \"CVE-2019-19077\", \"CVE-2019-19074\", \"CVE-2019-19073\", \"CVE-2019-19072\", \"CVE-2019-19071\", \"CVE-2019-19070\", \"CVE-2019-19068\", \"CVE-2019-19043\", \"CVE-2019-19066\", \"CVE-2019-19046\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19064\", \"CVE-2019-19063\", \"CVE-2019-19059\", \"CVE-2019-19058\", \"CVE-2019-19057\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19055\", \"CVE-2019-19054\", \"CVE-2019-11135\", \"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-0155\", \"CVE-2019-17666\", \"CVE-2019-17052\", \"CVE-2019-17053\", \"CVE-2019-17054\", \"CVE-2019-17055\", \"CVE-2019-17056\", \"CVE-2019-14821\", \"CVE-2019-15504\", \"CVE-2019-15505\", \"CVE-2019-15538\", \"CVE-2019-14814\", \"CVE-2019-14815\", \"CVE-2019-14816\", \"CVE-2019-10207\", \"CVE-2019-13631\", \"CVE-2019-12817\", \"CVE-2019-11477\", \"CVE-2019-11479\", \"CVE-2019-11478\", \"CVE-2019-10126\", \"CVE-2019-12614\", \"CVE-2019-12456\", \"CVE-2019-12455\", \"CVE-2019-12454\", \"CVE-2019-12378\", \"CVE-2019-3846\", \"CVE-2019-12380\", \"CVE-2019-12381\", \"CVE-2019-12382\", \"CVE-2019-12379\", \"CVE-2018-12126\", \"CVE-2018-12127\", \"CVE-2018-12130\", \"CVE-2019-11091\", \"CVE-2019-11884\", \"CVE-2019-3900\", \"CVE-2019-18660\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-12-18 09:57:42 +0000 (Wed, 18 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-12-08 03:30:53 +0000 (Sun, 08 Dec 2019)\");\n script_name(\"Fedora Update for kernel FEDORA-2019-124a241044\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC30\");\n\n script_xref(name:\"FEDORA\", value:\"2019-124a241044\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2019-124a241044 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 30.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC30\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.3.14~200.fc30\", rls:\"FC30\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-03-05T16:42:04", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-03-03T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-fe00e12580)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-14815", "CVE-2019-19054", "CVE-2019-14816", "CVE-2018-12126", "CVE-2019-3900", "CVE-2019-15538", "CVE-2019-17666", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-18811", "CVE-2019-11478", "CVE-2019-15505", "CVE-2019-15504", "CVE-2019-14901", "CVE-2019-12378", "CVE-2019-17055", "CVE-2019-19058", "CVE-2019-0155", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-12380", "CVE-2019-19053", "CVE-2019-17054", "CVE-2019-19064", "CVE-2018-12207", "CVE-2019-19082", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-12455", "CVE-2018-12127", "CVE-2019-11135", "CVE-2019-13631", "CVE-2019-11884", "CVE-2019-10207", "CVE-2019-18812", "CVE-2019-19055", "CVE-2019-19043", "CVE-2019-12381", "CVE-2019-12379", "CVE-2019-12456", "CVE-2019-11477", "CVE-2019-19063", "CVE-2019-18808", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-12817", "CVE-2019-19066", "CVE-2019-12614", "CVE-2019-19068", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-0154", "CVE-2019-17052", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-12454", "CVE-2019-16232", "CVE-2019-12382", "CVE-2019-14821", "CVE-2019-3846", "CVE-2019-19074", "CVE-2020-2732", "CVE-2019-14814", "CVE-2019-19056", "CVE-2019-10126", "CVE-2019-11479", "CVE-2019-11091", "CVE-2019-19072", "CVE-2019-17053", "CVE-2018-12130", "CVE-2019-17056"], "modified": "2020-03-03T00:00:00", "id": "OPENVAS:1361412562310877540", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877540", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877540\");\n script_version(\"2020-03-03T12:05:12+0000\");\n script_cve_id(\"CVE-2020-2732\", \"CVE-2019-18808\", \"CVE-2019-18809\", \"CVE-2019-18811\", \"CVE-2019-18812\", \"CVE-2019-16232\", \"CVE-2019-19082\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-19078\", \"CVE-2019-19077\", \"CVE-2019-19074\", \"CVE-2019-19073\", \"CVE-2019-19072\", \"CVE-2019-19071\", \"CVE-2019-19070\", \"CVE-2019-19068\", \"CVE-2019-19043\", \"CVE-2019-19066\", \"CVE-2019-19046\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19064\", \"CVE-2019-19063\", \"CVE-2019-19059\", \"CVE-2019-19058\", \"CVE-2019-19057\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19055\", \"CVE-2019-19054\", \"CVE-2019-11135\", \"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-0155\", \"CVE-2019-17666\", \"CVE-2019-17052\", \"CVE-2019-17053\", \"CVE-2019-17054\", \"CVE-2019-17055\", \"CVE-2019-17056\", \"CVE-2019-14821\", \"CVE-2019-15504\", \"CVE-2019-15505\", \"CVE-2019-15538\", \"CVE-2019-14814\", \"CVE-2019-14815\", \"CVE-2019-14816\", \"CVE-2019-10207\", \"CVE-2019-13631\", \"CVE-2019-12817\", \"CVE-2019-11477\", \"CVE-2019-11479\", \"CVE-2019-11478\", \"CVE-2019-10126\", \"CVE-2019-12614\", \"CVE-2019-12456\", \"CVE-2019-12455\", \"CVE-2019-12454\", \"CVE-2019-12378\", \"CVE-2019-3846\", \"CVE-2019-12380\", \"CVE-2019-12381\", \"CVE-2019-12382\", \"CVE-2019-12379\", \"CVE-2018-12126\", \"CVE-2018-12127\", \"CVE-2018-12130\", \"CVE-2019-11091\", \"CVE-2019-11884\", \"CVE-2019-3900\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-03-03 12:05:12 +0000 (Tue, 03 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-03-03 04:05:37 +0000 (Tue, 03 Mar 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-fe00e12580)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC30\");\n\n script_xref(name:\"FEDORA\", value:\"2020-fe00e12580\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7ZOFTJGUZTTN5MTRD22BHK5V4KHH5GD5\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-fe00e12580 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 30.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC30\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.5.7~100.fc30\", rls:\"FC30\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:03", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2017-09-12T00:00:00", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2017-6764d16965", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-14051", "CVE-2017-13695", "CVE-2017-13694", "CVE-2017-13693"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310873359", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873359", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_6764d16965_kernel_fc26.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for kernel FEDORA-2017-6764d16965\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873359\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-09-12 07:38:06 +0200 (Tue, 12 Sep 2017)\");\n script_cve_id(\"CVE-2017-13695\", \"CVE-2017-13694\", \"CVE-2017-13693\", \"CVE-2017-14051\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for kernel FEDORA-2017-6764d16965\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"kernel on Fedora 26\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-6764d16965\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YUAXUDD23KDVTDQU37MM36Q46KSMJN3T\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC26\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC26\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.12.11~300.fc26\", rls:\"FC26\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:34:30", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2017-09-14T00:00:00", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2017-a3a8638a60", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-14051", "CVE-2017-13695", "CVE-2017-13694", "CVE-2017-13693"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310873365", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873365", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_a3a8638a60_kernel_fc25.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for kernel FEDORA-2017-a3a8638a60\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873365\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-09-14 07:41:33 +0200 (Thu, 14 Sep 2017)\");\n script_cve_id(\"CVE-2017-13695\", \"CVE-2017-13694\", \"CVE-2017-13693\", \"CVE-2017-14051\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for kernel FEDORA-2017-a3a8638a60\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"kernel on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-a3a8638a60\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KP5OP7OQT62HIWFMLPABSHQSBL4KXULV\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.12.11~200.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-01-29T18:33:22", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-27T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-c2d89d14d0)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-14815", "CVE-2019-19054", "CVE-2019-14816", "CVE-2018-12126", "CVE-2019-3900", "CVE-2019-15538", "CVE-2019-17666", "CVE-2019-18809", "CVE-2019-19057", "CVE-2019-18811", "CVE-2019-11478", "CVE-2019-15505", "CVE-2019-15504", "CVE-2019-14901", "CVE-2019-12378", "CVE-2019-17055", "CVE-2019-19058", "CVE-2019-0155", "CVE-2019-14896", "CVE-2019-19062", "CVE-2019-12380", "CVE-2019-19053", "CVE-2019-17054", "CVE-2019-19064", "CVE-2018-12207", "CVE-2019-19082", "CVE-2019-19059", "CVE-2019-19078", "CVE-2019-12455", "CVE-2018-12127", "CVE-2019-11135", "CVE-2019-13631", "CVE-2019-11884", "CVE-2019-10207", "CVE-2019-18812", "CVE-2019-19055", "CVE-2019-19043", "CVE-2019-12381", "CVE-2019-12379", "CVE-2019-12456", "CVE-2019-11477", "CVE-2019-19063", "CVE-2019-18808", "CVE-2019-14895", "CVE-2019-14897", "CVE-2019-12817", "CVE-2019-19066", "CVE-2019-12614", "CVE-2019-19068", "CVE-2019-19050", "CVE-2019-19071", "CVE-2019-0154", "CVE-2019-17052", "CVE-2019-19073", "CVE-2019-19077", "CVE-2019-19070", "CVE-2019-19046", "CVE-2019-12454", "CVE-2019-16232", "CVE-2019-12382", "CVE-2019-14821", "CVE-2019-3846", "CVE-2019-19074", "CVE-2019-14814", "CVE-2019-19056", "CVE-2019-10126", "CVE-2019-11479", "CVE-2019-11091", "CVE-2019-19072", "CVE-2019-17053", "CVE-2018-12130", "CVE-2019-17056"], "modified": "2020-01-28T00:00:00", "id": "OPENVAS:1361412562310877370", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877370", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877370\");\n script_version(\"2020-01-28T10:45:23+0000\");\n script_cve_id(\"CVE-2019-18808\", \"CVE-2019-18809\", \"CVE-2019-18811\", \"CVE-2019-18812\", \"CVE-2019-16232\", \"CVE-2019-19082\", \"CVE-2019-14895\", \"CVE-2019-14896\", \"CVE-2019-14897\", \"CVE-2019-14901\", \"CVE-2019-19078\", \"CVE-2019-19077\", \"CVE-2019-19074\", \"CVE-2019-19073\", \"CVE-2019-19072\", \"CVE-2019-19071\", \"CVE-2019-19070\", \"CVE-2019-19068\", \"CVE-2019-19043\", \"CVE-2019-19066\", \"CVE-2019-19046\", \"CVE-2019-19050\", \"CVE-2019-19062\", \"CVE-2019-19064\", \"CVE-2019-19063\", \"CVE-2019-19059\", \"CVE-2019-19058\", \"CVE-2019-19057\", \"CVE-2019-19053\", \"CVE-2019-19056\", \"CVE-2019-19055\", \"CVE-2019-19054\", \"CVE-2019-11135\", \"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-0155\", \"CVE-2019-17666\", \"CVE-2019-17052\", \"CVE-2019-17053\", \"CVE-2019-17054\", \"CVE-2019-17055\", \"CVE-2019-17056\", \"CVE-2019-14821\", \"CVE-2019-15504\", \"CVE-2019-15505\", \"CVE-2019-15538\", \"CVE-2019-14814\", \"CVE-2019-14815\", \"CVE-2019-14816\", \"CVE-2019-10207\", \"CVE-2019-13631\", \"CVE-2019-12817\", \"CVE-2019-11477\", \"CVE-2019-11479\", \"CVE-2019-11478\", \"CVE-2019-10126\", \"CVE-2019-12614\", \"CVE-2019-12456\", \"CVE-2019-12455\", \"CVE-2019-12454\", \"CVE-2019-12378\", \"CVE-2019-3846\", \"CVE-2019-12380\", \"CVE-2019-12381\", \"CVE-2019-12382\", \"CVE-2019-12379\", \"CVE-2018-12126\", \"CVE-2018-12127\", \"CVE-2018-12130\", \"CVE-2019-11091\", \"CVE-2019-11884\", \"CVE-2019-3900\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-28 10:45:23 +0000 (Tue, 28 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-27 09:24:03 +0000 (Mon, 27 Jan 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-c2d89d14d0)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC30\");\n\n script_xref(name:\"FEDORA\", value:\"2020-c2d89d14d0\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XEWDXG77JFOCPGII7TF26YRUQQH7SVPP\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-c2d89d14d0 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 30.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC30\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.4.12~100.fc30\", rls:\"FC30\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2022-04-18T12:41:34", "description": "An update that solves 38 vulnerabilities and has 92 fixes\n is now available.\n\nDescription:\n\n\n\n The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2019-15211: There was a use-after-free caused by a malicious USB\n device in drivers/media/v4l2-core/v4l2-dev.c (bnc#1146519).\n - CVE-2019-15213: There was a use-after-free caused by a malicious USB\n device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver\n (bnc#1146544).\n - CVE-2019-19531: There was a use-after-free bug that can be caused by a\n malicious USB device in the drivers/usb/misc/yurex.c driver, aka\n CID-fc05481b2fca (bnc#1158427 1158445).\n - CVE-2019-19543: There is a use-after-free in serial_ir_init_module() in\n drivers/media/rc/serial_ir.c (bnc#1158427).\n - CVE-2019-19525: There is a use-after-free bug that can be caused by a\n malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka\n CID-7fd25e6fc035 (bnc#1158417).\n - CVE-2019-19530: There is a use-after-free bug that can be caused by a\n malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka\n CID-c52873e5a1ef (bnc#1158410).\n - CVE-2019-19536: There is an info-leak bug that can be caused by a\n malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c\n driver, aka CID-ead16e53c2f0 (bnc#1158394).\n - CVE-2019-19524: There is a use-after-free bug that can be caused by a\n malicious USB device in the drivers/input/ff-memless.c driver, aka\n CID-fa3a5a1880c9 (bnc#1158413).\n - CVE-2019-19528: There is a use-after-free bug that can be caused by a\n malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka\n CID-edc4746f253d (bnc#1158407).\n - CVE-2019-19534: There is an info-leak bug that can be caused by a\n malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c\n driver, aka CID-f7a1337f0d29 (bnc#1158398).\n - CVE-2019-19529: There is a use-after-free bug that can be caused by a\n malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka\n CID-4d6636498c41 (bnc#1158381).\n - CVE-2019-14901: A heap overflow flaw was found in the Marvell WiFi chip\n driver. The vulnerability allowed a remote attacker to cause a system\n crash, resulting in a denial of service, or execute arbitrary code. The\n highest threat with this vulnerability is with the availability of the\n system. If code execution occurs, the code will run with the permissions\n of root. This will affect both confidentiality and integrity of files on\n the system (bnc#1157042).\n - CVE-2019-14895: A heap-based buffer overflow was discovered in the\n Marvell WiFi chip driver. The flaw could occur when the station attempts\n a connection negotiation during the handling of the remote devices\n country settings. This could allowed the remote device to cause a denial\n of service (system crash) or possibly execute arbitrary code\n (bnc#1157158).\n - CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure\n because the Spectre-RSB mitigation is not in place for all applicable\n CPUs, aka CID-39e72bf96f58. This is related to\n arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c\n (bnc#1157038).\n - CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid,\n which was exploitable for privilege escalation on some Linux\n distributions where local users have /dev/video0 access, but only if the\n driver happens to be loaded. There are multiple race conditions during\n streaming stopping in this driver (part of the V4L2 subsystem). These\n issues are caused by wrong mutex locking in\n vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(),\n sdr_cap_stop_streaming(), and the corresponding kthreads. At least one\n of these race conditions leads to a use-after-free (bnc#1155897).\n - CVE-2019-18809: A memory leak in the af9005_identify_state() function in\n drivers/media/usb/dvb-usb/af9005.c allowed attackers to cause a denial\n of service (memory consumption), aka CID-2289adbfa559 (bnc#1156258).\n - CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in\n drivers/char/ipmi/ipmi_msghandler.c was fixed (bnc#1157304).\n - CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in\n drivers/net/wireless/ath/ath10k/usb.c allowed attackers to cause a\n denial of service (memory consumption) by triggering usb_submit_urb()\n failures, aka CID-b8d17e7d93d2 (bnc#1157032).\n - CVE-2019-19062: A memory leak in the crypto_report() function in\n crypto/crypto_user_base.c allowed attackers to cause a denial of service\n (memory consumption) by triggering crypto_report_alg() failures, aka\n CID-ffdde5932042 (bnc#1157333).\n - CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring()\n function in drivers/net/wireless/marvell/mwifiex/pcie.c allowed\n attackers to cause a denial of service (memory consumption) by\n triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e\n (bnc#1157193).\n - CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf()\n function in drivers/net/wireless/marvell/mwifiex/pcie.c allowed\n attackers to cause a denial of service (memory consumption) by\n triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932\n (bnc#1157197).\n - CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function\n in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allowed\n attackers to cause a denial of service (memory consumption) by\n triggering usb_submit_urb() failures, aka CID-a2cdd07488e6 (bnc#1157307).\n - CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in\n drivers/net/wireless/realtek/rtlwifi/usb.c allowed attackers to cause a\n denial of service (memory consumption), aka CID-3f9361695113\n (bnc#1157298).\n - CVE-2019-19227: In the AppleTalk subsystem there was a potential NULL\n pointer dereference because register_snap_client may return NULL. This\n will lead to denial of service in net/appletalk/aarp.c and\n net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka\n CID-9804501fa122 (bnc#1157678).\n - CVE-2019-19081: A memory leak in the nfp_flower_spawn_vnic_reprs()\n function in drivers/net/ethernet/netronome/nfp/flower/main.c allowed\n attackers to cause a denial of service (memory consumption), aka\n CID-8ce39eb5a67a (bnc#1157045).\n - CVE-2019-19080: Four memory leaks in the nfp_flower_spawn_phy_reprs()\n function in drivers/net/ethernet/netronome/nfp/flower/main.c allowed\n attackers to cause a denial of service (memory consumption), aka\n CID-8572cea1461a (bnc#1157044).\n - CVE-2019-19065: A memory leak in the sdma_init() function in\n drivers/infiniband/hw/hfi1/sdma.c allowed attackers to cause a denial of\n service (memory consumption) by triggering rhashtable_init() failures,\n aka CID-34b3be18a04e (bnc#1157191).\n - CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in\n drivers/infiniband/hw/bnxt_re/ib_verbs.c allowed attackers to cause a\n denial of service (memory consumption) by triggering copy to udata\n failures, aka CID-4a9d46a9fe14 (bnc#1157171).\n - CVE-2019-19052: A memory leak in the gs_can_open() function in\n drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of\n service (memory consumption) by triggering usb_submit_urb() failures,\n aka CID-fb5be6a7b486 (bnc#1157324).\n - CVE-2019-19067: Four memory leaks in the acp_hw_init() function in\n drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c were fixed. (bnc#1157180).\n - CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in\n drivers/iio/imu/adis_buffer.c allowed attackers to cause a denial of\n service (memory consumption), aka CID-ab612b1daf41 (bnc#1157178).\n - CVE-2019-19049: A memory leak in the unittest_data_add() function in\n drivers/of/unittest.c was fixed. (bnc#1157173).\n - CVE-2019-19075: A memory leak in the ca8210_probe() function in\n drivers/net/ieee802154/ca8210.c allowed attackers to cause a denial of\n service (memory consumption) by triggering ca8210_get_platform_data()\n failures, aka CID-6402939ec86e (bnc#1157162).\n - CVE-2019-19058: A memory leak in the alloc_sgtable() function in\n drivers/net/wireless/intel/iwlwifi/fw/dbg.c allowed attackers to cause a\n denial of service (memory consumption) by triggering alloc_page()\n failures, aka CID-b4b814fec1a5 (bnc#1157145).\n - CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in\n drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial\n of service (memory consumption), aka CID-728c1e2a05e4 (bnc#1157143).\n - CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c\n allowed attackers to cause a denial of service (memory consumption) by\n triggering wait_for_completion_timeout() failures. This affects the\n htc_config_pipe_credits() function, the htc_setup_complete() function,\n and the htc_connect_service() function, aka CID-853acf7caf10\n (bnc#1157070).\n - CVE-2019-19083: Memory leaks in *clock_source_create() functions under\n drivers/gpu/drm/amd/display/dc allowed attackers to cause a denial of\n service (memory consumption). This affects the\n dce112_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the\n dce100_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the\n dcn10_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the\n dcn20_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the\n dce120_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the\n dce110_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the\n dce80_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka\n CID-055e547478a1 (bnc#1157049).\n - CVE-2019-19082: Memory leaks in *create_resource_pool() functions under\n drivers/gpu/drm/amd/display/dc allowed attackers to cause a denial of\n service (memory consumption). This affects the\n dce120_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the\n dce110_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the\n dce100_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the\n dcn10_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the\n dce112_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka\n CID-104c307147ad (bnc#1157046).\n - CVE-2019-15916: There was a memory leak in register_queue_kobjects() in\n net/core/net-sysfs.c, which will cause denial of service (bnc#1149448).\n\n The following non-security bugs were fixed:\n\n - ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n - ACPICA: Use %d for signed int print formatting instead of %u\n (bsc#1051510).\n - ACPI / hotplug / PCI: Allocate resources directly under the non-hotplug\n bridge (bsc#1111666).\n - ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask\n (bsc#1051510).\n - acpi/nfit, device-dax: Identify differentiated memory with a unique\n numa-node (bsc#1158071).\n - ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n - ALSA: 6fire: Drop the dead code (git-fixes).\n - ALSA: cs4236: fix error return comparison of an unsigned integer\n (git-fixes).\n - ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n - ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n - ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n - ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n - ALSA: hda: Fix racy display power access (bsc#1156928).\n - ALSA: hda/hdmi - Clear codec->relaxed_resume flag at unbinding\n (git-fixes).\n - ALSA: hda: hdmi - fix port numbering for ICL and TGL platforms\n (git-fixes).\n - ALSA: hda: hdmi - remove redundant code comments (git-fixes).\n - ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n - ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC (git-fixes).\n - ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop\n (git-fixes).\n - ALSA: hda/realtek - Move some alc236 pintbls to fallback table\n (git-fixes).\n - ALSA: hda/realtek - Move some alc256 pintbls to fallback table\n (git-fixes).\n - ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n - ALSA: intel8x0m: Register irq handler after register initializations\n (bsc#1051510).\n - ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n - ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n - ALSA: pcm: Yet another missing check of non-cached buffer type\n (bsc#1111666).\n - ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n - ALSA: usb-audio: Add skip_validation option (git-fixes).\n - ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling\n (git-fixes).\n - ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk()\n (git-fixes).\n - ALSA: usb-audio: Fix incorrect size check for processing/extension units\n (git-fixes).\n - ALSA: usb-audio: Fix missing error check at mixer resolution test\n (git-fixes).\n - ALSA: usb-audio: Fix NULL dereference at parsing BADD (git-fixes).\n - ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n - ALSA: usb-audio: sound: usb: usb true/false for bool return type\n (git-fixes).\n - appledisplay: fix error handling in the scheduled work (git-fixes).\n - arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver\n and mark driver omap-rng as supported.\n - ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n - ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable\n 4.14.y).\n - ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n - ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation\n (bsc#1051510).\n - ASoC: kirkwood: fix external clock probe defer (git-fixes).\n - ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n - ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n - ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n - ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable\n 4.14.y).\n - ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n - ata: ep93xx: Use proper enums for directions (bsc#1051510).\n - ath10k: allocate small size dma memory in ath10k_pci_diag_write_mem\n (bsc#1111666).\n - ath10k: avoid possible memory access violation (bsc#1111666).\n - ath10k: Correct error handling of dma_map_single() (bsc#1111666).\n - ath10k: fix kernel panic by moving pci flush after napi_disable\n (bsc#1051510).\n - ath10k: fix vdev-start timeout on error (bsc#1051510).\n - ath10k: limit available channels via DT ieee80211-freq-limit\n (bsc#1051510).\n - ath10k: skip resetting rx filter for WCN3990 (bsc#1111666).\n - ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n - ath9k: add back support for using active monitor interfaces for tx99\n (bsc#1051510).\n - ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n - ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n - ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n - ath9k_hw: fix uninitialized variable data (bsc#1051510).\n - ax88172a: fix information leak on short answers (bsc#1051510).\n - backlight: lm3639: Unconditionally call led_classdev_unregister\n (bsc#1051510).\n - Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n - Bluetooth: delete a stray unlock (bsc#1051510).\n - Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n - Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n - Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n - Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS\n (bsc#1051510).\n - bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands\n (bsc#1104745).\n - bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands\n (bsc#1104745 FATE#325918).\n - bnxt_en: Update firmware interface spec. to 1.10.0.47 (bsc#1157115)\n - bnxt_en: Update firmware interface spec. to 1.10.0.89 (bsc#1157115)\n - bnxt_en: Update firmware interface to 1.10.0.69 (bsc#1157115)\n - bpf: fix BTF limits (bsc#1109837).\n - bpf: fix BTF verification of enums (bsc#1109837).\n - bpf: Fix use after free in subprog's jited symbol removal (bsc#1109837).\n - brcmfmac: fix full timeout waiting for action frame on-channel tx\n (bsc#1051510).\n - brcmfmac: fix wrong strnchr usage (bsc#1111666).\n - brcmfmac: increase buffer for obtaining firmware capabilities\n (bsc#1111666).\n - brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n - brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n - brcmsmac: never log \"tid x is not agg'able\" by default (bsc#1051510).\n - brcmsmac: Use kvmalloc() for ucode allocations (bsc#1111666).\n - btrfs: fix log context list corruption after rename exchange operation\n (bsc#1156494).\n - can: c_can: c_can_poll(): only read status register after status IRQ\n (git-fixes).\n - can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n - can: peak_usb: fix a potential out-of-sync while decoding packets\n (git-fixes).\n - can: peak_usb: fix slab info leak (git-fixes).\n - can: rx-offload: can_rx_offload_offload_one(): do not increase the\n skb_queue beyond skb_queue_len_max (git-fixes).\n - can: rx-offload: can_rx_offload_queue_sorted(): fix error handling,\n avoid skb mem leak (git-fixes).\n - can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid\n skb mem leak (git-fixes).\n - can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n - ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n - ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open\n (bsc#1157184).\n - ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n - ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n - cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set\n (bsc#1051510).\n - cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n - cfg80211: Prevent regulatory restore during STA disconnect in concurrent\n interfaces (bsc#1051510).\n - cfg80211: validate wmm rule when setting (bsc#1111666).\n - cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg\n is dead (bsc#1158645).\n - cifs: add a helper to find an existing readable handle to a file\n (bsc#1144333, bsc#1154355).\n - cifs: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n - cifs: create a helper to find a writeable handle by path name\n (bsc#1144333, bsc#1154355).\n - cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs\n (bsc#1144333, bsc#1154355).\n - cifs: fix max ea value size (bsc#1144333, bsc#1154355).\n - cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n - cifs: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333,\n bsc#1154355).\n - cifs: Fix retry mid list corruption on reconnects (bsc#1144333,\n bsc#1154355).\n - cifs: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n - cifs: Fix use after free of file info structures (bsc#1144333,\n bsc#1154355).\n - cifs: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333,\n bsc#1154355).\n - cifs: Force revalidate inode when dentry is stale (bsc#1144333,\n bsc#1154355).\n - cifs: Gracefully handle QueryInfo errors during open (bsc#1144333,\n bsc#1154355).\n - cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333,\n bsc#1154355).\n - cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333,\n bsc#1154355).\n - cifs: set domainName when a domain-key is used in multiuser\n (bsc#1144333, bsc#1154355).\n - cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic\n (bsc#1144333, bsc#1154355).\n - cifs: use existing handle for compound_op(OP_SET_INFO) when possible\n (bsc#1144333, bsc#1154355).\n - cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n - clk: at91: avoid sleeping early (git-fixes).\n - clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n - clk: samsung: exynos5420: Preserve CPU clocks configuration during\n suspend/resume (bsc#1051510).\n - clk: samsung: exynos5420: Preserve PLL configuration during\n suspend/resume (git-fixes).\n - clk: samsung: Use clk_hw API for calling clk framework from clk\n notifiers (bsc#1051510).\n - clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n - clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines\n (bsc#1051510).\n - clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n - compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n - component: fix loop condition to call unbind() if bind() fails\n (bsc#1051510).\n - cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n - cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init()\n (bsc#1051510).\n - cpufreq: powernv: fix stack bloat and hard limit on number of CPUs\n (bsc#1051510).\n - cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).\n - cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n - cpupower: Fix coredump on VMWare (bsc#1051510).\n - cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n - cpupower : frequency-set -r option misses the last cpu in related cpu\n list (bsc#1051510).\n - crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n - crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr\n (bsc#1051510).\n - crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n - crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n - crypto: geode-aes - switch to skcipher for cbc(aes) fallback\n (bsc#1051510).\n - crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n - crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n - crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash'\n static (bsc#1051510).\n - crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n - crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n - cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n - cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n - cxgb4: request the TX CIDX updates to status page (bsc#1127354\n bsc#1127371).\n - dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n - dlm: do not leak kernel pointer to userspace (bsc#1051510).\n - dlm: fix invalid free (bsc#1051510).\n - dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n - dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n - dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction\n (bsc#1051510).\n - dmaengine: imx-sdma: fix use-after-free on probe error path\n (bsc#1051510).\n - dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n - dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n - docs: move protection-keys.rst to the core-api book (bsc#1078248).\n - docs: move protection-keys.rst to the core-api book (FATE#322447,\n bsc#1078248).\n - Documentation: debugfs: Document debugfs helper for unsigned long values\n (git-fixes).\n - Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n - Documentation: x86: convert protection-keys.txt to reST (FATE#322447,\n bsc#1078248).\n - drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1111666).\n - drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported\n (bsc#1113956)\n - drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n - drm: fix module name in edid_firmware log message (bsc#1113956)\n - drm/i915: Do not dereference request if it may have been retired when\n (bsc#1142635)\n - drm/i915: Fix and improve MCR selection logic (bsc#1112178)\n - drm/i915/gvt: fix dropping obj reference twice (bsc#1111666).\n - drm/i915: Lock the engine while dumping the active request (bsc#1142635)\n - drm/i915/pmu: \"Frequency\" is reported as accumulated cycles (bsc#1112178)\n - drm/i915: Reacquire priolist cache after dropping the engine lock\n (bsc#1129770)\n - drm/i915: Skip modeset for cdclk changes if possible (bsc#1156928).\n - drm/msm: fix memleak on release (bsc#1111666).\n - drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n - drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n - drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n - Drop scsi-qla2xxx-Fix-memory-leak-when-sending-I-O-fails.patch This\n patch has introduces an double free. Upstream has dropped it from the\n scsi-queue before it hit mainline. So let's drop it as well.\n - e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n - e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n - e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm\n (bsc#1158049).\n - ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable\n (bsc#1158646).\n - ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either\n (bsc#1158647).\n - EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279).\n EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n - EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n - ext4: fix punch hole for inline_data file systems (bsc#1158640).\n - ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n - extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n - fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n - fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n - ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n - gpiolib: acpi: Add Terra Pad 1061 to the\n run_edge_events_on_boot_blacklist (bsc#1051510).\n - gpio: mpc8xxx: Do not overwrite default irq_set_type callback\n (bsc#1051510).\n - gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n - gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n - HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n - HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n - HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping\n (bsc#1051510).\n - HID: Fix assumption that devices have inputs (git-fixes).\n - HID: wacom: generic: Treat serial number and related fields as unsigned\n (git-fixes).\n - hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n - hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n - hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not\n idled (bsc#1051510).\n - hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n - hypfs: Fix error number left in struct pointer member (bsc#1051510).\n - i2c: of: Try to find an I2C adapter matching the parent (bsc#1129770)\n - i40e: enable X710 support (bsc#1151067).\n - IB/mlx5: Free mpi in mp_slave mode (bsc#1103991).\n - IB/mlx5: Free mpi in mp_slave mode (bsc#1103991 FATE#326007).\n - IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command\n (bsc#1103991).\n - IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command\n (bsc#1103991 FATE#326007).\n - ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n - ibmvnic: Fix completion structure initialization (bsc#1155689\n ltc#182047).\n - ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n - ibmvnic: Terminate waiting device threads after loss of service\n (bsc#1155689 ltc#182047).\n - ice: fix potential infinite loop because loop counter being too small\n (bsc#1118661).\n - ice: fix potential infinite loop because loop counter being too small\n (bsc#1118661 FATE#325277).\n - iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n - iio: adc: stm32-adc: fix stopping dma (git-fixes).\n - iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n - iio: imu: adis16480: assign bias value only if operation succeeded\n (git-fixes).\n - iio: imu: adis16480: make sure provided frequency is positive\n (git-fixes).\n - iio: imu: adis: assign read val in debugfs hook only if op successful\n (git-fixes).\n - iio: imu: adis: assign value only if return code zero in read funcs\n (git-fixes).\n - include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n - inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n - Input: ff-memless - kill timer in destroy() (bsc#1051510).\n - Input: silead - try firmware reload after unsuccessful resume\n (bsc#1051510).\n - Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n - Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n - Input: synaptics-rmi4 - destroy F54 poller workqueue when removing\n (bsc#1051510).\n - Input: synaptics-rmi4 - disable the relative position IRQ in the F12\n driver (bsc#1051510).\n - Input: synaptics-rmi4 - do not consume more data than we have (F11, F12)\n (bsc#1051510).\n - Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n - intel_th: Fix a double put_device() in error path (git-fixes).\n - iomap: Fix pipe page leakage during splicing (bsc#1158651).\n - iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros\n (bsc#1158063).\n - ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address\n (bsc#1051510).\n - ipv4: Return -ENETUNREACH if we can't create route but saddr is valid\n (networking-stable-19_10_24).\n - irqdomain: Add the missing assignment of domain->fwnode for named fwnode\n (bsc#1111666).\n - iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n - iwlwifi: check kasprintf() return value (bsc#1051510).\n - iwlwifi: drop packets with bad status in CD (bsc#1111666).\n - iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n - iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n - iwlwifi: mvm: use correct FIFO length (bsc#1111666).\n - iwlwifi: pcie: fit reclaim msg to MAX_MSG_LEN (bsc#1111666).\n - iwlwifi: pcie: read correct prph address for newer devices (bsc#1111666).\n - ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 ).\n - ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994\n FATE#326315 FATE#326317).\n - ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 ).\n - ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994\n FATE#326315 FATE#326317).\n - kABI: Fix for \"KVM: x86: Introduce vcpu->arch.xsaves_enabled\"\n (bsc#1158066).\n - kABI fixup alloc_dax_region (bsc#1158071).\n - kabi: s390: struct subchannel (git-fixes).\n - kABI workaround for ath10k hw_filter_reset_required field (bsc#1111666).\n - kABI workaround for ath10k last_wmi_vdev_start_status field\n (bsc#1051510).\n - kABI workaround for iwlwifi iwl_rx_cmd_buffer change (bsc#1111666).\n - kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n - KVM: s390: fix __insn32_query() inline assembly (git-fixes).\n - KVM: s390: vsie: Do not shadow CRYCB when no AP and no keys (git-fixes).\n - KVM: s390: vsie: Return correct values for Invalid CRYCB format\n (git-fixes).\n - KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH\n (bsc#1114279).\n - KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n - KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts\n (bsc#1158064).\n - KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n - KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).\n - KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast()\n (bsc#1158067).\n - libnvdimm: Export the target_node attribute for regions and namespaces\n (bsc#1158071).\n - lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n - lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n - liquidio: fix race condition in instruction completion processing\n (bsc#1051510).\n - livepatch: Allow to distinguish different version of system state\n changes (bsc#1071995).\n - livepatch: Allow to distinguish different version of system state\n changes (bsc#1071995 fate#323487).\n - livepatch: Basic API to track system state changes (bsc#1071995 ).\n - livepatch: Basic API to track system state changes (bsc#1071995\n fate#323487).\n - livepatch: Keep replaced patches until post_patch callback is called\n (bsc#1071995).\n - livepatch: Keep replaced patches until post_patch callback is called\n (bsc#1071995 fate#323487).\n - livepatch: Selftests of the API for tracking system state changes\n (bsc#1071995).\n - livepatch: Selftests of the API for tracking system state changes\n (bsc#1071995 fate#323487).\n - loop: add ioctl for changing logical block size (bsc#1108043).\n - loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n - lpfc: size cpu map by last cpu id set (bsc#1157160).\n - mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n - mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n - mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode\n (bsc#1051510).\n - macvlan: schedule bc_work even if error (bsc#1051510).\n - mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone\n (git-fixes).\n - media: au0828: Fix incorrect error messages (bsc#1051510).\n - media: bdisp: fix memleak on release (git-fixes).\n - media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n - media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n - media: exynos4-is: Fix recursive locking in isp_video_release()\n (git-fixes).\n - media: fix: media: pci: meye: validate offset to avoid arbitrary access\n (bsc#1051510).\n - media: flexcop-usb: ensure -EIO is returned on error condition\n (git-fixes).\n - media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n - media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n - media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init()\n (bsc#1051510).\n - media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).\n - media: radio: wl1273: fix interrupt masking on release (git-fixes).\n - media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n - media: usbvision: Fix races among open, close, and disconnect\n (bsc#1051510).\n - media: vim2m: Fix abort issue (git-fixes).\n - media: vivid: Set vid_cap_streaming and vid_out_streaming to true\n (bsc#1051510).\n - mei: fix modalias documentation (git-fixes).\n - mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n - mfd: intel-lpss: Add default I2C device properties for Gemini Lake\n (bsc#1051510).\n - mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n - mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values\n (bsc#1051510).\n - mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n - mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable\n (bsc#1051510).\n - mISDN: Fix type of switch control variable in ctrl_teimanager\n (bsc#1051510).\n - mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n - mlx5: add parameter to disable enhanced IPoIB (bsc#1142095) Fix badly\n backported patch\n - mlxsw: spectrum_flower: Fail in case user specifies multiple mirror\n actions (bsc#1112374).\n - mmc: core: fix wl1251 sdio quirks (git-fixes).\n - mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of\n pandora_wl1251_init_card (git-fixes).\n - mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready\n fail (bsc#1051510).\n - mm/compaction.c: clear total_{migrate,free}_scanned before scanning a\n new zone (git fixes (mm/compaction)).\n - mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n - mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n - mmc: sdio: fix wl1251 vendor id (git-fixes).\n - mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes\n (mm/debug)).\n - mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()\n (git fixes (mm/gup)).\n - mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n - mt76x0: init hw capabilities.\n - mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n - mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n - mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n - mwifex: free rx_cmd skb in suspended state (bsc#1111666).\n - mwifiex: do no submit URB in suspended state (bsc#1111666).\n - mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n - nbd: prevent memory leak (bsc#1158638).\n - net: add READ_ONCE() annotation in __skb_wait_for_more_packets()\n (networking-stable-19_11_05).\n - net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n - net: annotate accesses to sk->sk_incoming_cpu\n (networking-stable-19_11_05).\n - net: annotate lockless accesses to sk->sk_napi_id\n (networking-stable-19_11_05).\n - net: avoid potential infinite loop in tc_ctl_action()\n (networking-stable-19_10_24).\n - net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3\n (networking-stable-19_10_24).\n - net: bcmgenet: reset 40nm EPHY on energy detect\n (networking-stable-19_11_05).\n - net: bcmgenet: Set phydev->dev_flags only for internal PHYs\n (networking-stable-19_10_24).\n - net: dsa: b53: Do not clear existing mirrored port mask\n (networking-stable-19_11_05).\n - net: dsa: bcm_sf2: Fix IMP setup for port different than 8\n (networking-stable-19_11_05).\n - net: dsa: fix switch tree list (networking-stable-19_11_05).\n - net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum\n (networking-stable-19_11_05).\n - net: fix sk_page_frag() recursion from memory reclaim\n (networking-stable-19_11_05).\n - net: hisilicon: Fix ping latency when deal with high throughput\n (networking-stable-19_11_05).\n - net: hns3: change GFP flag during lock period (bsc#1104353 ).\n - net: hns3: change GFP flag during lock period (bsc#1104353 FATE#326415).\n - net: hns3: do not query unsupported commands in debugfs (bsc#1104353).\n - net: hns3: do not query unsupported commands in debugfs (bsc#1104353\n FATE#326415).\n - net: hns3: fix GFP flag error in hclge_mac_update_stats() (bsc#1126390).\n - net: hns3: fix some reset handshake issue (bsc#1104353 ).\n - net: hns3: fix some reset handshake issue (bsc#1104353 FATE#326415).\n - net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353\n bsc#1134983).\n - net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353\n FATE#326415 bsc#1134983).\n - net: hns: Fix the stray netpoll locks causing deadlock in NAPI path\n (bsc#1104353).\n - net: hns: Fix the stray netpoll locks causing deadlock in NAPI path\n (bsc#1104353 FATE#326415).\n - net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode\n (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n - net/mlx4_core: Dynamically set guaranteed amount of counters per VF\n (networking-stable-19_11_05).\n - net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 ).\n - net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990\n FATE#326006).\n - net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 ).\n - net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 FATE#326006).\n - net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget\n (networking-stable-19_11_05).\n - net/mlx5e: Print a warning when LRO feature is dropped or not allowed\n (bsc#1103990).\n - net/mlx5e: Print a warning when LRO feature is dropped or not allowed\n (bsc#1103990 FATE#326006).\n - net/mlx5: FWTrace, Reduce stack usage (bsc#1103990).\n - net/mlx5: FWTrace, Reduce stack usage (bsc#1103990 FATE#326006).\n - netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n - net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 ).\n - net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113\n FATE#326472).\n - net: phylink: Fix flow control resolution (bsc#1119113 ).\n - net: phylink: Fix flow control resolution (bsc#1119113 FATE#326472).\n - net: sched: cbs: Avoid division by zero when calculating the port rate\n (bsc#1109837).\n - net/sched: cbs: Fix not adding cbs instance to list (bsc#1109837).\n - net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate\n (bsc#1109837).\n - net: sched: fix possible crash in tcf_action_destroy() (bsc#1109837).\n - net: sched: fix reordering issues (bsc#1109837).\n - net/smc: avoid fallback in case of non-blocking connect (git-fixes).\n - net/smc: do not schedule tx_work in SMC_CLOSED state (git-fixes).\n - net/smc: fix closing of fallback SMC sockets (git-fixes).\n - net/smc: Fix error path in smc_init (git-fixes).\n - net/smc: fix ethernet interface refcounting (git-fixes).\n - net/smc: fix fastopen for non-blocking connect() (git-fixes).\n - net/smc: fix refcounting for non-blocking connect() (git-fixes).\n - net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).\n - net/smc: fix SMCD link group creation with VLAN id (git-fixes).\n - net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).\n - net/smc: original socket family in inet_sock_diag (git-fixes).\n - net: sock_map, fix missing ulp check in sock hash case (bsc#1109837).\n - net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow\n (networking-stable-19_10_24).\n - net: use skb_queue_empty_lockless() in busy poll contexts\n (networking-stable-19_11_05).\n - net: use skb_queue_empty_lockless() in poll() handlers\n (networking-stable-19_11_05).\n - net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions\n (git-fixes).\n - net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition\n (git-fixes).\n - net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()\n (networking-stable-19_11_05).\n - nfc: netlink: fix double device reference drop (git-fixes).\n - NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error\n (git-fixes).\n - nfc: port100: handle command failure cleanly (git-fixes).\n - nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs\n (bsc#1109837).\n - nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs\n (bsc#1109837).\n - nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n - nvme-tcp: support C2HData with SUCCESS flag (bsc#1157386).\n - ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n - ocfs2: fix passing zero to 'PTR_ERR' warning (bsc#1158649).\n - openvswitch: fix flow command message size (git-fixes).\n - padata: use smp_mb in padata_reorder to avoid orphaned padata jobs\n (git-fixes).\n - PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n - PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n - PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n - PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n - PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n - PCI: pciehp: Do not disable interrupt twice on suspend (bsc#1111666).\n - PCI/PM: Clear PCIe PME Status even for legacy power management\n (bsc#1111666).\n - PCI/PME: Fix possible use-after-free on remove (git-fixes).\n - PCI/PTM: Remove spurious \"d\" from granularity message (bsc#1051510).\n - PCI: rcar: Fix missing MACCTLR register setting in initialization\n sequence (bsc#1051510).\n - PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n - PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30\n (git-fixes).\n - perf/x86/amd: Change/fix NMI latency mitigation to use a timestamp\n (bsc#1142924).\n - phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n - pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args\n call (git-fixes).\n - pinctrl: at91: do not use the same irqchip with multiple gpiochips\n (git-fixes).\n - pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n - pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n - pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT\n (bsc#1051510).\n - pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n - pinctrl: samsung: Fix device node refcount leaks in init code\n (bsc#1051510).\n - pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup\n controller init (bsc#1051510).\n - pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup\n controller init (bsc#1051510).\n - pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()'\n (bsc#1051510).\n - pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD\n (bsc#1051510).\n - PM / devfreq: Check NULL governor in available_governors_show\n (git-fixes).\n - PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n - PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n - PM / devfreq: passive: fix compiler warning (bsc#1051510).\n - PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n - PM / hibernate: Check the success of generating md5 digest before\n hibernation (bsc#1051510).\n - powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n - powerpc/book3s64/hash: Use secondary hash for bolted mapping if the\n primary is full (bsc#1157778 ltc#182520).\n - powerpc/bpf: Fix tail call implementation (bsc#1157698).\n - powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu\n (bsc#1156700 ltc#182459).\n - powerpc/pseries: Do not fail hash page table insert for bolted mapping\n (bsc#1157778 ltc#182520).\n - powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n - powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700\n ltc#182459).\n - powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n - powerpc/security: Fix wrong message when RFI Flush is disable\n (bsc#1131107).\n - powerpc/xive: Prevent page fault issues in the machine crash handler\n (bsc#1156882 ltc#182435).\n - power: reset: at91-poweroff: do not procede if at91_shdwc is allocated\n (bsc#1051510).\n - power: supply: ab8500_fg: silence uninitialized variable warnings\n (bsc#1051510).\n - power: supply: twl4030_charger: disable eoc interrupt on linear charge\n (bsc#1051510).\n - power: supply: twl4030_charger: fix charging current out-of-bounds\n (bsc#1051510).\n - ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n - printk: Export console_printk (bsc#1071995).\n - printk: Export console_printk (bsc#1071995 fate#323487).\n - pwm: bcm-iproc: Prevent unloading the driver module while in use\n (git-fixes).\n - pwm: lpss: Only set update bit if we are actually changing the settings\n (bsc#1051510).\n - qxl: fix null-pointer crash during suspend (bsc#1111666).\n - r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2\n (networking-stable-19_11_05).\n - RDMA/bnxt_re: Fix stat push into dma buffer on gen p5 devices\n (bsc#1157115)\n - RDMA/efa: Clear the admin command buffer prior to its submission\n (git-fixes) Patch was already picked through Amazon driver repo but was\n not marked with a Git-commit tag\n - RDMA/hns: Fix comparison of unsigned long variable 'end' with less than\n zero (bsc#1104427 bsc#1137236).\n - RDMA/hns: Fix comparison of unsigned long variable 'end' with less than\n zero (bsc#1104427 FATE#326416 bsc#1137236).\n - RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 ).\n - RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427\n FATE#326416).\n - regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n - regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id\n (bsc#1051510).\n - remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n - Remove patches that reportedly cause regression (bsc#1155689 ltc#182047).\n - reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n - reset: Fix potential use-after-free in __of_reset_control_get()\n (bsc#1051510).\n - reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n - Revert \"drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\" This reverts\n commit 71e3a1b8d8cf73f711f3e4100aa51f68e631f94f. ATM the backported\n patch does not build on x86.\n - rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let\n COMPRESS_VMLINUX determine the compression used for vmlinux. By default\n (historically), it is gz.\n - rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n - rt2800: remove errornous duplicate condition (git-fixes).\n - rtl8187: Fix warning generated when strncpy() destination length matches\n the sixe argument (bsc#1051510).\n - rtlwifi: btcoex: Use proper enumerated types for Wi-Fi only interface\n (bsc#1111666).\n - rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n - rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n - rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address\n (bsc#1051510).\n - rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n - s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n - s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n - s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n - s390/cio: exclude subchannels with no parent from pseudo check\n (bsc#1051510).\n - s390/cio: fix virtio-ccw DMA without PV (git-fixes).\n - s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n - s390: fix stfle zero padding (bsc#1051510).\n - s390/idle: fix cpu idle time calculation (bsc#1051510).\n - s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported\n (bsc#1051510).\n - s390/process: avoid potential reading of freed stack (bsc#1051510).\n - s390/qdio: do not touch the dsci in tiqdio_add_input_queues()\n (bsc#1051510).\n - s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n - s390/qeth: return proper errno on IO error (bsc#1051510).\n - s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510\n bsc#1140948).\n - s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n - s390/topology: avoid firing events before kobjs are created\n (bsc#1051510).\n - s390: vsie: Use effective CRYCBD.31 to check CRYCBD validity (git-fixes).\n - s390/zcrypt: fix memleak at release (git-fixes).\n - scsi: lpfc: Add enablement of multiple adapter dumps (bsc#1154601).\n - scsi: lpfc: Add registration for CPU Offline/Online events (bsc#1154601).\n - scsi: lpfc: Change default IRQ model on AMD architectures (bsc#1154601).\n - scsi: lpfc: Clarify FAWNN error message (bsc#1154601).\n - scsi: lpfc: Fix a kernel warning triggered by lpfc_get_sgl_per_hdwq()\n (bsc#1154601).\n - scsi: lpfc: Fix a kernel warning triggered by lpfc_sli4_enable_intr()\n (bsc#1154601).\n - scsi: lpfc: fix build error of lpfc_debugfs.c for vfree/vmalloc\n (bsc#1154601).\n - scsi: lpfc: Fix configuration of BB credit recovery in service\n parameters (bsc#1154601).\n - scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer\n dereferences (bsc#1154601).\n - scsi: lpfc: fix: Coverity: lpfc_get_scsi_buf_s3(): Null pointer\n dereferences (bsc#1154601).\n - scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow\n (bsc#1154601).\n - scsi: lpfc: Fix dynamic fw log enablement check (bsc#1154601).\n - scsi: lpfc: fix inlining of lpfc_sli4_cleanup_poll_list() (bsc#1154601).\n - scsi: lpfc: Fix kernel crash at lpfc_nvme_info_show during remote port\n bounce (bsc#1154601).\n - scsi: lpfc: Fix lpfc_cpumask_of_node_init() (bsc#1154601).\n - scsi: lpfc: Fix NULL check before mempool_destroy is not needed\n (bsc#1154601).\n - scsi: lpfc: Fix Oops in nvme_register with target logout/login\n (bsc#1151900).\n - scsi: lpfc: fix spelling error in MAGIC_NUMER_xxx (bsc#1154601).\n - scsi: lpfc: Fix unexpected error messages during RSCN handling\n (bsc#1154601).\n - scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n - scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1154601).\n - scsi: lpfc: Initialize cpu_map for not present cpus (bsc#1154601).\n - scsi: lpfc: lpfc_attr: Fix Use plain integer as NULL pointer\n (bsc#1154601).\n - scsi: lpfc: lpfc_nvmet: Fix Use plain integer as NULL pointer\n (bsc#1154601).\n - scsi: lpfc: Make lpfc_debugfs_ras_log_data static (bsc#1154601).\n - scsi: lpfc: Mitigate high memory pre-allocation by SCSI-MQ (bsc#1154601).\n - scsi: lpfc: Raise config max for lpfc_fcp_mq_threshold variable\n (bsc#1154601).\n - scsi: lpfc: revise nvme max queues to be hdwq count (bsc#1154601).\n - scsi: lpfc: Sync with FC-NVMe-2 SLER change to require Conf with SLER\n (bsc#1154601).\n - scsi: lpfc: Update lpfc version to 12.6.0.1 (bsc#1154601).\n - scsi: lpfc: Update lpfc version to 12.6.0.2 (bsc#1154601).\n - scsi: lpfc: use hdwq assigned cpu for allocation (bsc#1157160).\n - scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424,\n bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908.\n bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424,\n bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424,\n bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424,\n bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424,\n bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424,\n bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424,\n bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424,\n bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan\n (bsc#1138039).\n - scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd\n (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424,\n bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424,\n bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424,\n bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n - scsi: qla2xxx: Use correct number of vectors for online CPUs\n (bsc#1137223).\n - scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424,\n bsc#1157908. bsc#1117169, bsc#1151548).\n - scsi: zfcp: fix request object use-after-free in send path causing wrong\n traces (bsc#1051510).\n - sctp: change sctp_prot .no_autobind with true\n (networking-stable-19_10_24).\n - sctp: fix SCTP regression (bsc#1158082) (networking-stable-19_10_24\n bsc#1158082).\n - selftests: net: reuseport_dualstack: fix uninitalized parameter\n (networking-stable-19_11_05).\n - serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n - serial: samsung: Enable baud clock for UART reset procedure in resume\n (bsc#1051510).\n - serial: uartps: Fix suspend functionality (bsc#1051510).\n - signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal\n (bsc#1157463).\n - slcan: Fix memory leak in error path (bsc#1051510).\n - slip: Fix memory leak in slip_open error path (bsc#1051510).\n - slip: Fix use-after-free Read in slip_open (bsc#1051510).\n - smb3: fix leak in \"open on server\" perf counter (bsc#1144333,\n bsc#1154355).\n - smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n - smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n - smb3: improve handling of share deleted (and share recreated)\n (bsc#1144333, bsc#1154355).\n - smb3: Incorrect size for netname negotiate context (bsc#1144333,\n bsc#1154355).\n - soc: imx: gpc: fix PDN delay (bsc#1051510).\n - soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n - Sort series.conf.\n - spi: atmel: Fix CS high support (bsc#1051510).\n - spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n - spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n - spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n - spi: mediatek: use correct mata->xfer_len when in fifo transfer\n (bsc#1051510).\n - spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n - spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n - spi: spidev: Fix OF tree warning logic (bsc#1051510).\n - supported.conf:\n - synclink_gt(): fix compat_ioctl() (bsc#1051510).\n - tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n - thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n - tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n - tipc: check bearer name with right length in\n tipc_nl_compat_bearer_enable (bsc#1051510).\n - tipc: check link name with right length in tipc_nl_compat_link_set\n (bsc#1051510).\n - tipc: check msg->req data len in tipc_nl_compat_bearer_disable\n (bsc#1051510).\n - tipc: compat: allow tipc commands without arguments (bsc#1051510).\n - tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path\n (bsc#1051510).\n - tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n - tipc: handle the err returned from cmd header function (bsc#1051510).\n - tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n - tipc: tipc clang warning (bsc#1051510).\n - tools: bpftool: fix arguments for p_err() in do_event_pipe()\n (bsc#1109837).\n - tools/power/x86/intel-speed-select: Fix a read overflow in\n isst_set_tdp_level_msr() (bsc#1111666).\n - tpm: add check after commands attribs tab allocation (bsc#1051510).\n - tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n - tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n - tty: serial: msm_serial: Fix flow control (bsc#1051510).\n - tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n - tun: fix data-race in gro_normal_list() (bsc#1111666).\n - UAS: Revert commit 3ae62a42090f (\"UAS: fix alignment of scatter/gather\n segments\").\n - ubifs: Correctly initialize c->min_log_bytes (bsc#1158641).\n - ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n - udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n - Update\n patches.suse/ipv6-defrag-drop-non-last-frags-smaller-than-min-mtu.patch\n (add bsc#1141054).\n - Update\n patches.suse/RDMA-Fix-goto-target-to-release-the-allocated-memory.patch\n (bsc#1050244 FATE#322915 bsc#1157171 CVE-2019-19077).\n - USB: chaoskey: fix error case of a timeout (git-fixes).\n - usb: chipidea: Fix otg event handler (bsc#1051510).\n - usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is\n already started (bsc#1051510).\n - usb: dwc3: gadget: Check ENBLSLPM before sending ep command\n (bsc#1051510).\n - usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in\n fotg210_get_status() (bsc#1051510).\n - usb: gadget: uvc: configfs: Drop leaked references to config items\n (bsc#1051510).\n - usb: gadget: uvc: configfs: Prevent format changes after linking header\n (bsc#1051510).\n - usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n - usb: gadget: uvc: Only halt video streaming endpoint in bulk mode\n (bsc#1051510).\n - USBIP: add config dependency for SGL_ALLOC (git-fixes).\n - usbip: Fix free of unallocated memory in vhci tx (git-fixes).\n - usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path\n (git-fixes).\n - usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n - usbip: tools: fix fd leakage in the function of read_attr_usbip_status\n (git-fixes).\n - USB: misc: appledisplay: fix backlight update_status return code\n (bsc#1051510).\n - usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n - USB: serial: mos7720: fix remote wakeup (git-fixes).\n - USB: serial: mos7840: add USB ID to support Moxa UPort 2210\n (bsc#1051510).\n - USB: serial: mos7840: fix remote wakeup (git-fixes).\n - USB: serial: option: add support for DW5821e with eSIM support\n (bsc#1051510).\n - USB: serial: option: add support for Foxconn T77W968 LTE modules\n (bsc#1051510).\n - usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n - vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n - vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n - vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn\n (bsc#1051510).\n - video/hdmi: Fix AVI bar unpack (git-fixes).\n - virtio_console: allocate inbufs in add_port() only if it is needed\n (git-fixes).\n - virtio_ring: fix return code on DMA mapping fails (git-fixes).\n - virtio/s390: fix race on airq_areas (bsc#1051510).\n - vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n - vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n - watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n - wil6210: drop Rx multicast packets that are looped-back to STA\n (bsc#1111666).\n - wil6210: fix debugfs memory access alignment (bsc#1111666).\n - wil6210: fix invalid memory access for rx_buff_mgmt debugfs\n (bsc#1111666).\n - wil6210: fix L2 RX status handling (bsc#1111666).\n - wil6210: fix locking in wmi_call (bsc#1111666).\n - wil6210: fix RGF_CAF_ICR address for Talyn-MB (bsc#1111666).\n - wil6210: prevent usage of tx ring 0 for eDMA (bsc#1111666).\n - wil6210: set edma variables only for Talyn-MB devices (bsc#1111666).\n - x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n - x86/alternatives: Fix int3_emulate_call() selftest stack corruption\n (bsc#1153811).\n - x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt\n (bsc#1078248).\n - x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt\n (FATE#322447, bsc#1078248).\n - x86/pkeys: Update documentation about availability (bsc#1078248).\n - x86/pkeys: Update documentation about availability (FATE#322447,\n bsc#1078248).\n - x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n - x86/resctrl: Prevent NULL pointer dereference when reading mondata\n (bsc#1114279).\n - x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs\n (bsc#1158068).\n - xfrm: fix sa selector validation (bsc#1156609).\n - xfrm: Fix xfrm sel prefix length validation (git-fixes).\n - xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n - xsk: Fix registration of Rx-only sockets (bsc#1109837).\n - xsk: relax UMEM headroom alignment (bsc#1109837).\n\n\nSpecial Instructions and Notes:\n\n Please reboot the system after installing this update.\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.1:\n\n zypper in -t patch openSUSE-2019-2675=1", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-12-12T00:00:00", "type": "suse", "title": "Security update for the Linux Kernel (important)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-14895", "CVE-2019-14901", "CVE-2019-15211", "CVE-2019-15213", "CVE-2019-15916", "CVE-2019-18660", "CVE-2019-18683", "CVE-2019-18809", "CVE-2019-19046", "CVE-2019-19049", "CVE-2019-19052", "CVE-2019-19056", "CVE-2019-19057", "CVE-2019-19058", "CVE-2019-19060", "CVE-2019-19062", "CVE-2019-19063", "CVE-2019-19065", "CVE-2019-19067", "CVE-2019-19068", "CVE-2019-19073", "CVE-2019-19074", "CVE-2019-19075", "CVE-2019-19077", "CVE-2019-19078", "CVE-2019-19080", "CVE-2019-19081", "CVE-2019-19082", "CVE-2019-19083", "CVE-2019-19227", "CVE-2019-19524", "CVE-2019-19525", "CVE-2019-19528", "CVE-2019-19529", "CVE-2019-19530", "CVE-2019-19531", "CVE-2019-19534", "CVE-2019-19536", "CVE-2019-19543"], "modified": "2019-12-12T00:00:00", "id": "OPENSUSE-SU-2019:2675-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-04-18T12:41:26", "description": "An update that solves 35 vulnerabilities and has 194 fixes\n is now available.\n\nDescription:\n\n\n\n The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2019-14615: Insufficient control flow in certain data structures for\n some Intel(R) Processors with Intel(R) Processor Graphics may have\n allowed an unauthenticated user to potentially enable information\n disclosure via local access (bnc#1160195 bnc#1165881).\n - CVE-2019-14896: A heap-based buffer overflow vulnerability was found in\n the Marvell WiFi chip driver. A remote attacker could cause a denial of\n service (system crash) or, possibly execute arbitrary code, when the\n lbs_ibss_join_existing function is called after a STA connects to an AP\n (bnc#1157157).\n - CVE-2019-14897: A stack-based buffer overflow was found in the Marvell\n WiFi chip driver. An attacker is able to cause a denial of service\n (system crash) or, possibly execute arbitrary code, when a STA works in\n IBSS mode (allows connecting stations together without the use of an AP)\n and connects to another STA (bnc#1157155).\n - CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c. It\n did not check the length of variable elements in a beacon head, leading\n to a buffer overflow (bnc#1152107).\n - CVE-2019-16994: In the Linux kernel before 5.0, a memory leak exists in\n sit_init_net() in net/ipv6/sit.c when register_netdev() fails to\n register sitn->fb_tunnel_dev, which may cause denial of service, aka\n CID-07f12b26e21a (bnc#1161523).\n - CVE-2019-18808: A memory leak in the ccp_run_sha_cmd() function in\n drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of\n service (memory consumption), aka CID-128c66429247 (bnc#1156259).\n - CVE-2019-19036: btrfs_root_node in fs/btrfs/ctree.c allowed a NULL\n pointer dereference because rcu_dereference(root->node) can be zero\n (bnc#1157692).\n - CVE-2019-19045: A memory leak in the mlx5_fpga_conn_create_cq() function\n in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers\n to cause a denial of service (memory consumption) by triggering\n mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7 (bnc#1161522).\n - CVE-2019-19051: A memory leak in the i2400m_op_rfkill_sw_toggle()\n function in drivers/net/wimax/i2400m/op-rfkill.c allowed attackers to\n cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7\n (bnc#1159024).\n - CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in\n drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a\n denial of service (memory consumption) by triggering kfifo_alloc()\n failures, aka CID-a7b2df76b42b (bnc#1161518).\n - CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in\n drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of\n service (memory consumption) by triggering bfa_port_get_stats()\n failures, aka CID-0e62395da2bd (bnc#1157303).\n - CVE-2019-19318: Mounting a crafted btrfs image twice can cause an\n rwsem_down_write_slowpath use-after-free because (in\n rwsem_can_spin_on_owner in kernel/locking/rwsem (bnc#1158026).\n - CVE-2019-19319: A setxattr operation, after a mount of a crafted ext4\n image, can cause a slab-out-of-bounds write access because of an\n ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large\n old_size value is used in a memset call (bnc#1158021).\n - CVE-2019-19332: An out-of-bounds memory write issue was found in the way\n the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID'\n ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A\n user or process able to access the '/dev/kvm' device could use this flaw\n to crash the system, resulting in a denial of service (bnc#1158827).\n - CVE-2019-19338: There was an incomplete fix for Transaction Asynchronous\n Abort (TAA) (bnc#1158954).\n - CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing\n some operations, and unmounting can lead to a use-after-free in\n ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in\n fs/ext4/super.c (bnc#1158819).\n - CVE-2019-19526: There was a use-after-free bug that can be caused by a\n malicious USB device in the drivers/nfc/pn533/usb.c driver, aka\n CID-6af3aa57a098 (bnc#1158893).\n - CVE-2019-19527: There was a use-after-free bug that can be caused by a\n malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka\n CID-9c09b214f30e (bnc#1158900).\n - CVE-2019-19532: There were multiple out-of-bounds write bugs that can be\n caused by a malicious USB device in the Linux kernel HID drivers, aka\n CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c,\n drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c,\n drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c,\n drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c,\n drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c,\n drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c,\n drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c (bnc#1158824).\n - CVE-2019-19533: There was an info-leak bug that can be caused by a\n malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c\n driver, aka CID-a10feaf8c464 (bnc#1158834).\n - CVE-2019-19535: There was an info-leak bug that can be caused by a\n malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c\n driver, aka CID-30a8beeb3042 (bnc#1158903).\n - CVE-2019-19537: There was a race condition bug that can be caused by a\n malicious USB device in the USB character device driver layer, aka\n CID-303911cfc5b9. This affects drivers/usb/core/file.c (bnc#1158904).\n - CVE-2019-19767: The Linux kernel mishandled ext4_expand_extra_isize, as\n demonstrated by use-after-free errors in __ext4_expand_extra_isize and\n ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c,\n aka CID-4ea99936a163 (bnc#1159297).\n - CVE-2019-19927: Mounting a crafted f2fs filesystem image and performing\n some operations can lead to slab-out-of-bounds read access in\n ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related\n to the vmwgfx or ttm module (bnc#1160147).\n - CVE-2019-19965: There was a NULL pointer dereference in\n drivers/scsi/libsas/sas_discover.c because of mishandling of port\n disconnection during discovery, related to a PHY down race condition,\n aka CID-f70267f379b5 (bnc#1159911).\n - CVE-2019-19966: There was a use-after-free in cpia2_exit() in\n drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service,\n aka CID-dea37a972655 (bnc#1159841).\n - CVE-2019-20054: There was a NULL pointer dereference in\n drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka\n CID-23da9588037e (bnc#1159910).\n - CVE-2019-20095: mwifiex_tm_cmd in\n drivers/net/wireless/marvell/mwifiex/cfg80211.c had some error-handling\n cases that did not free allocated hostcmd memory, aka CID-003b686ace82.\n This will cause a memory leak and denial of service (bnc#1159909).\n - CVE-2019-20096: There was a memory leak in __feat_register_sp() in\n net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b\n (bnc#1159908).\n - CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may\n trick the L0 hypervisor into accessing sensitive L1 resources\n (bsc#1163971).\n - CVE-2020-7053: There was a use-after-free (write) in the\n i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka\n CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in\n drivers/gpu/drm/i915/i915_gem_context.c (bnc#1160966).\n - CVE-2020-8428: fs/namei.c has a may_create_in_sticky use-after-free,\n which allowed local users to cause a denial of service (OOPS) or\n possibly obtain sensitive information from kernel memory, aka\n CID-d0cb50185ae9. One attack vector may be an open system call for a\n UNIX domain socket, if the socket is being moved to a new parent\n directory and its old parent directory is being removed (bnc#1162109).\n - CVE-2020-8648: There was a use-after-free vulnerability in the\n n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).\n - CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c\n allowed attackers to cause a denial of service (soft lockup) via a\n crafted journal size (bnc#1164069).\n - CVE-2019-19523: There was a use-after-free bug that can be caused by a\n malicious USB device in the drivers/usb/misc/adutux.c driver, aka\n CID-44efc269db79 (bnc#1158823).\n\n The following non-security bugs were fixed:\n\n - smb3: print warning once if posix context returned on open\n (bsc#1144333).\n - 6pack,mkiss: fix possible deadlock (bsc#1051510).\n - ACPI / APEI: Do not wait to serialise with oops messages when panic()ing\n (bsc#1051510).\n - ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n - ACPI / LPSS: Ignore acpi_device_fix_up_power() return value\n (bsc#1051510).\n - ACPI / video: Add force_none quirk for Dell OptiPlex 9020M (bsc#1051510).\n - ACPI / watchdog: Fix init failure with overlapping register regions\n (bsc#1162557).\n - ACPI / watchdog: Set default timeout in probe (bsc#1162557).\n - ACPI: OSL: only free map once in osl.c (bsc#1051510).\n - ACPI: PM: Avoid attaching ACPI PM domain to certain devices\n (bsc#1051510).\n - ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data()\n (bsc#1051510).\n - ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion()\n (bsc#1051510).\n - ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).\n - ACPI: video: Do not export a non working backlight interface on MSI\n MS-7721 boards (bsc#1051510).\n - ACPI: watchdog: Allow disabling WDAT at boot (bsc#1162557).\n - ALSA: control: remove useless assignment in .info callback of PCM chmap\n element (git-fixes).\n - ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n - ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).\n - ALSA: fireface: fix return value in error path of isochronous resources\n reservation (bsc#1051510).\n - ALSA: hda - Add docking station support for Lenovo Thinkpad T420s\n (git-fixes).\n - ALSA: hda - Apply sync-write workaround to old Intel platforms, too\n (bsc#1111666).\n - ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n - ALSA: hda - constify and cleanup static NodeID tables (bsc#1111666).\n - ALSA: hda - fixup for the bass speaker on Lenovo Carbon X1 7th gen\n (git-fixes).\n - ALSA: hda/analog - Minor optimization for SPDIF mux connections\n (git-fixes).\n - ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n - ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n - ALSA: hda/ca0132 - Keep power on during processing DSP response\n (git-fixes).\n - ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).\n - ALSA: hda/hdmi - Clean up Intel platform-specific fixup checks\n (bsc#1111666).\n - ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).\n - ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n - ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n - ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).\n - ALSA: hda/realtek - Add Bass Speaker and fixed dac for bass speaker\n (bsc#1111666).\n - ALSA: hda/realtek - Add Headset Mic supported for HP cPC (bsc#1111666).\n - ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n - ALSA: hda/realtek - Add new codec supported for ALCS1200A (bsc#1111666).\n - ALSA: hda/realtek - Add quirk for the bass speaker on Lenovo Yoga X1 7th\n gen (bsc#1111666).\n - ALSA: hda/realtek - Apply mic mute LED quirk for Dell E7xx laptops, too\n (bsc#1111666).\n - ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236\n (git-fixes).\n - ALSA: hda/realtek - Enable the bass speaker of ASUS UX431FLC\n (bsc#1111666).\n - ALSA: hda/realtek - Fix inverted bass GPIO pin on Acer 8951G (git-fixes).\n - ALSA: hda/realtek - Fix silent output on MSI-GL73 (git-fixes).\n - ALSA: hda/realtek - Fixed one of HP ALC671 platform Headset Mic\n supported (bsc#1111666).\n - ALSA: hda/realtek - Line-out jack does not work on a Dell AIO\n (bsc#1051510).\n - ALSA: hda/realtek - More constifications (bsc#1111666).\n - ALSA: hda/realtek - Set EAPD control to default for ALC222 (bsc#1111666).\n - ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n - ALSA: hda: Add JasperLake PCI ID and codec vid (bsc#1111666).\n - ALSA: hda: Clear RIRB status before reading WP (bsc#1111666).\n - ALSA: hda: Constify snd_kcontrol_new items (bsc#1111666).\n - ALSA: hda: Constify snd_pci_quirk tables (bsc#1111666).\n - ALSA: hda: More constifications (bsc#1111666).\n - ALSA: hda: Reset stream if DMA RUN bit not cleared (bsc#1111666).\n - ALSA: hda: Use scnprintf() for printing texts for sysfs/procfs\n (git-fixes).\n - ALSA: hda: constify copied structure (bsc#1111666).\n - ALSA: hda: correct kernel-doc parameter descriptions (bsc#1111666).\n - ALSA: hda: hdmi - add Tigerlake support (bsc#1111666).\n - ALSA: hda: hdmi - fix pin setup on Tigerlake (bsc#1111666).\n - ALSA: hda: patch_hdmi: remove warnings with empty body (bsc#1111666).\n - ALSA: hda: patch_realtek: fix empty macro usage in if block\n (bsc#1111666).\n - ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code\n (bsc#1051510).\n - ALSA: oxfw: fix return value in error path of isochronous resources\n reservation (bsc#1051510).\n - ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n - ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).\n - ALSA: seq: Avoid concurrent access to queue flags (git-fixes).\n - ALSA: seq: Fix concurrent access to queue current tick/time (git-fixes).\n - ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n - ALSA: sh: Fix compile warning wrt const (git-fixes).\n - ALSA: sh: Fix unused variable warnings (bsc#1111666).\n - ALSA: usb-audio: Apply sample rate quirk for Audioengine D1 (git-fixes).\n - ALSA: usb-audio: Apply the sample rate quirk for Bose Companion 5\n (bsc#1111666).\n - ALSA: usb-audio: Fix endianess in descriptor validation (bsc#1111666).\n - ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n - ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n - ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report\n (bsc#1051510).\n - ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n - ASoC: compress: fix unsigned integer overflow check (bsc#1051510).\n - ASoC: cs4349: Use PM ops 'cs4349_runtime_pm' (bsc#1051510).\n - ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1\n (bsc#1051510).\n - ASoC: samsung: i2s: Fix prescaler setting for the secondary DAI\n (bsc#1111666).\n - ASoC: sun8i-codec: Fix setting DAI data format (git-fixes).\n - ASoC: wm8962: fix lambda value (git-fixes).\n - Bluetooth: Fix race condition in hci_release_sock() (bsc#1051510).\n - Bluetooth: hci_bcm: Handle specific unknown packets after firmware\n loading (bsc#1051510).\n - btrfs: add missing extents release on file extent cluster relocation\n error (bsc#1159483).\n - btrfs: avoid fallback to transaction commit during fsync of files with\n holes (bsc#1159569).\n - btrfs: fix block group remaining RO forever after error during device\n replace (bsc#1160442).\n - btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n - btrfs: fix infinite loop during fsync after rename operations\n (bsc#1163383).\n - btrfs: fix infinite loop during nocow writeback due to race\n (bsc#1160804).\n - btrfs: fix missing data checksums after replaying a log tree\n (bsc#1161931).\n - btrfs: fix negative subv_writers counter and data space leak after\n buffered write (bsc#1160802).\n - btrfs: fix race between adding and putting tree mod seq elements and\n nodes (bsc#1163384).\n - btrfs: fix removal logic of the tree mod log that leads to\n use-after-free issues (bsc#1160803).\n - btrfs: fix selftests failure due to uninitialized i_mode in test inodes\n (Fix for dependency of bsc#1157692).\n - btrfs: make tree checker detect checksum items with overlapping ranges\n (bsc#1161931).\n - btrfs: send, skip backreference walking for extents with many references\n (bsc#1162139).\n - CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n - CIFS: Add support for setting owner info, dos attributes, and create\n time (bsc#1144333).\n - CIFS: Close cached root handle only if it had a lease (bsc#1144333).\n - CIFS: Close open handle after interrupted close (bsc#1144333).\n - CIFS: Do not miss cancelled OPEN responses (bsc#1144333).\n - CIFS: Fix NULL pointer dereference in mid callback (bsc#1144333).\n - CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks\n (bsc#1144333).\n - CIFS: Fix task struct use-after-free on reconnect (bsc#1144333).\n - CIFS: Properly process SMB3 lease breaks (bsc#1144333).\n - CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n - CIFS: Return directly after a failed build_path_from_dentry() in\n cifs_do_create() (bsc#1144333).\n - CIFS: Use common error handling code in smb2_ioctl_query_info()\n (bsc#1144333).\n - CIFS: Use memdup_user() rather than duplicating its implementation\n (bsc#1144333).\n - CIFS: fix a white space issue in cifs_get_inode_info() (bsc#1144333).\n - CIFS: refactor cifs_get_inode_info() (bsc#1144333).\n - CIFS: remove set but not used variables 'cinode' and 'netfid'\n (bsc#1144333).\n - Cover up kABI breakage due to DH key verification (bsc#1155331).\n - Delete patches which cause regression (bsc#1165527 ltc#184149).\n - Documentation: Document arm64 kpti control (bsc#1162623).\n - Enable CONFIG_BLK_DEV_SR_VENDOR (boo#1164632).\n - Fix the locking in dcache_readdir() and friends (bsc#1123328).\n - HID: doc: fix wrong data structure reference for UHID_OUTPUT\n (bsc#1051510).\n - HID: hiddev: Fix race in in hiddev_disconnect() (git-fixes).\n - HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n - HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n - HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).\n - HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n - IB/hfi1: Close window for pq and request coliding (bsc#1060463 ).\n - IB/hfi1: Do not cancel unused work item (bsc#1114685 ).\n - IB/mlx5: Fix steering rule of drop and count (bsc#1103991 ).\n - IB/mlx5: Remove dead code (bsc#1103991).\n - Input: aiptek - fix endpoint sanity check (bsc#1051510).\n - Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n - Input: goodix - add upside-down quirk for Teclast X89 tablet\n (bsc#1051510).\n - Input: gtco - fix endpoint sanity check (bsc#1051510).\n - Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n - Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n - Input: pm8xxx-vib - fix handling of separate enable register\n (bsc#1051510).\n - Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n - Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register\n (bsc#1051510).\n - Input: sur40 - fix interface sanity checks (bsc#1051510).\n - Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n - Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers\n (bsc#1051510).\n - Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n - KVM: Clean up __kvm_gfn_to_hva_cache_init() and its callers\n (bsc#1133021).\n - KVM: PPC: Book3S HV: Uninit vCPU if vcore creation fails (bsc#1061840).\n - KVM: PPC: Book3S PR: Fix -Werror=return-type build failure (bsc#1061840).\n - KVM: PPC: Book3S PR: Free shared page if mmu initialization fails\n (bsc#1061840).\n - KVM: SVM: Override default MMIO mask if memory encryption is enabled\n (bsc#1162618).\n - KVM: arm64: Store vcpu on the stack during __guest_enter() (bsc#1133021).\n - KVM: fix spectrev1 gadgets (bsc#1164705).\n - KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl\n (git-fixes).\n - KVM: s390: ENOTSUPP -> EOPNOTSUPP fixups (bsc#1133021).\n - KVM: s390: Test for bad access register and size at the start of\n S390_MEM_OP (git-fixes).\n - KVM: s390: do not clobber registers during guest reset/store status\n (bsc#1133021).\n - KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF\n attacks (bsc#1164734).\n - KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF\n attacks in x86.c (bsc#1164733).\n - KVM: x86: Protect MSR-based index computations in\n fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).\n - KVM: x86: Protect MSR-based index computations in pmu.h from\n Spectre-v1/L1TF attacks (bsc#1164732).\n - KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks\n (bsc#1164728).\n - KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks\n (bsc#1164729).\n - KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF\n attacks (bsc#1164712).\n - KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks\n (bsc#1164730).\n - KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).\n - KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks\n (bsc#1164705).\n - KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks\n (bsc#1164727).\n - KVM: x86: Remove a spurious export of a static function (bsc#1158954).\n - NFC: fdp: fix incorrect free object (networking-stable-19_11_10).\n - NFC: pn533: fix bulk-message timeout (bsc#1051510).\n - NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n - NFC: st21nfca: fix double free (networking-stable-19_11_10).\n - PCI/IOV: Fix memory leak in pci_iov_add_virtfn() (git-fixes).\n - PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity()\n (bsc#1051510).\n - PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n - PCI: Add DMA alias quirk for Intel VCA NTB (bsc#1051510).\n - PCI: Do not disable bridge BARs when assigning bus resources\n (bsc#1051510).\n - PCI: pciehp: Avoid returning prematurely from sysfs requests (git-fixes).\n - PCI: rpaphp: Add drc-info support for hotplug slot registration\n (bsc#1157480 ltc#181028).\n - PCI: rpaphp: Annotate and correctly byte swap DRC properties\n (bsc#1157480 ltc#181028).\n - PCI: rpaphp: Avoid a sometimes-uninitialized warning (bsc#1157480\n ltc#181028).\n - PCI: rpaphp: Correctly match ibm, my-drc-index to drc-name when using\n drc-info (bsc#1157480 ltc#181028).\n - PCI: rpaphp: Do not rely on firmware feature to imply drc-info support\n (bsc#1157480 ltc#181028).\n - PCI: rpaphp: Fix up pointer to first drc-info entry (bsc#1157480\n ltc#181028).\n - PM / AVS: SmartReflex: NULL check before some freeing functions is not\n needed (bsc#1051510).\n - PM / Domains: Deal with multiple states but no governor in genpd\n (bsc#1051510).\n - RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n - RDMA/bnxt_re: Enable SRIOV VF support on Broadcom's 57500 adapter series\n (bsc#1154916).\n - RDMA/bnxt_re: Fix chip number validation Broadcom's Gen P5 series\n (bsc#1157895).\n - RDMA/bnxt_re: Fix missing le16_to_cpu (bsc#1157895).\n - RDMA/cma: Fix unbalanced cm_id reference count during address resolve\n (bsc#1103992).\n - RDMA/hfi1: Fix memory leak in _dev_comp_vect_mappings_create\n (bsc#1114685).\n - RDMA/hns: Bugfix for qpc/cqc timer configuration (bsc#1104427\n bsc#1126206).\n - RDMA/hns: Correct the value of srq_desc_size (bsc#1104427 ).\n - RDMA/hns: Fix to support 64K page for srq (bsc#1104427 ).\n - RDMA/hns: Prevent memory leaks of eq->buf_list (bsc#1104427 ).\n - RDMA/uverbs: Verify MR access flags (bsc#1103992).\n - crypto/dh: Adjust for change of DH_KPP_SECRET_MIN_SIZE in\n 35f7d5225ffcbf1b759f641aec1735e3a89b1914\n - crypto/dh: Remove the fips=1 check in dh.c dh.c is not fips-specific and\n should perform the same regardless of this setting.\n - Revert \"HID: add NOGET quirk for Eaton Ellipse MAX UPS\" (git-fixes).\n - Revert \"Input: synaptics-rmi4 - do not increment rmiaddr for SMBus\n transfers\" (bsc#1051510).\n - Revert \"ath10k: fix DMA related firmware crashes on multiple devices\"\n (git-fixes).\n - Revert \"locking/pvqspinlock: Do not wait if vCPU is preempted\"\n (bsc#1050549).\n - Revert \"mmc: sdhci: Fix incorrect switch to HS mode\" (bsc#1051510).\n - Revert patches.suse/samples-bpf-add-a-test-for-bpf_override_return.patch\n (bsc#1159500)\n - SMB3: Backup intent flag missing from some more ops (bsc#1144333).\n - SMB3: Fix crash in SMB2_open_init due to uninitialized field in\n compounding path (bsc#1144333).\n - SMB3: Fix persistent handles reconnect (bsc#1144333).\n - SUNRPC: Fix svcauth_gss_proxy_init() (bsc#1103992).\n - Staging: iio: adt7316: Fix i2c data reading, set the data field\n (bsc#1051510).\n - USB: EHCI: Do not return -EPIPE when hub is disconnected (git-fixes).\n - USB: adutux: fix interface sanity check (bsc#1051510).\n - USB: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n - USB: core: add endpoint-blacklist quirk (git-fixes).\n - USB: core: fix check for duplicate endpoints (git-fixes).\n - USB: documentation: flags on usb-storage versus UAS (bsc#1051510).\n - USB: idmouse: fix interface sanity checks (bsc#1051510).\n - USB: quirks: blacklist duplicate ep on Sound Devices USBPre2 (git-fixes).\n - USB: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n - USB: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).\n - USB: serial: io_edgeport: add missing active-port sanity check\n (bsc#1051510).\n - USB: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n - USB: serial: io_edgeport: handle unbound ports on URB completion\n (bsc#1051510).\n - USB: serial: io_edgeport: use irqsave() in USB's complete callback\n (bsc#1051510).\n - USB: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n - USB: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n - USB: serial: ir-usb: fix link-speed handling (bsc#1051510).\n - USB: serial: keyspan: handle unbound ports (bsc#1051510).\n - USB: serial: opticon: fix control-message timeouts (bsc#1051510).\n - USB: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n - USB: serial: option: add Telit ME910G1 0x110a composition (git-fixes).\n - USB: serial: option: add ZLP support for 0x1bc7/0x9010 (git-fixes).\n - USB: serial: option: add support for Quectel RM500Q in QDL mode\n (git-fixes).\n - USB: serial: quatech2: handle unbound ports (bsc#1051510).\n - USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx\n (bsc#1051510).\n - USB: serial: suppress driver bind attributes (bsc#1051510).\n - USB: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n - USB: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n - Update\n patches.suse/powerpc-xive-Implement-get_irqchip_state-method-for-.patch\n (bsc#1085030).\n - af_packet: set defaule value for tmo (bsc#1051510).\n - apparmor: fix unsigned len comparison with less than zero (git-fixes).\n - ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n - arm64: Revert support for execute-only user mappings (bsc#1160218).\n - ata: ahci: Add shutdown to freeze hardware resources of ahci\n (bsc#1164388).\n - ath10k: Correct the DMA direction for management tx buffers\n (bsc#1111666).\n - ath10k: fix fw crash by moving chip reset after napi disabled\n (bsc#1051510).\n - ath10k: pci: Fix comment on ath10k_pci_dump_memory_sram (bsc#1111666).\n - ath10k: pci: Only dump ATH10K_MEM_REGION_TYPE_IOREG when safe\n (bsc#1111666).\n - ath6kl: Fix off by one error in scan completion (bsc#1051510).\n - ath9k: fix storage endpoint lookup (git-fixes).\n - atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).\n - audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).\n - batman-adv: Fix DAT candidate selection on little endian systems\n (bsc#1051510).\n - bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n - bcache: Revert \"bcache: shrink btree node cache after bch_btree_check()\"\n (bsc#1163762, bsc#1112504).\n - bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front()\n (bsc#1163762).\n - bcache: add code comments for state->pool in __btree_sort()\n (bsc#1163762).\n - bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n - bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n - bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n - bcache: add more accurate error messages in read_super() (bsc#1163762).\n - bcache: add readahead cache policy options via sysfs interface\n (bsc#1163762).\n - bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n - bcache: avoid unnecessary btree nodes flushing in btree_flush_write()\n (bsc#1163762).\n - bcache: check return value of prio_read() (bsc#1163762).\n - bcache: deleted code comments for dead code in bch_data_insert_keys()\n (bsc#1163762).\n - bcache: do not export symbols (bsc#1163762).\n - bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n - bcache: fix a lost wake-up problem caused by mca_cannibalize_lock\n (bsc#1163762).\n - bcache: fix deadlock in bcache_allocator (bsc#1163762).\n - bcache: fix incorrect data type usage in btree_flush_write()\n (bsc#1163762).\n - bcache: fix memory corruption in bch_cache_accounting_clear()\n (bsc#1163762).\n - bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n - bcache: ignore pending signals when creating gc and allocator thread\n (bsc#1163762, bsc#1112504).\n - bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n - bcache: reap c->btree_cache_freeable from the tail in bch_mca_scan()\n (bsc#1163762).\n - bcache: reap from tail of c->btree_cache in bch_mca_scan() (bsc#1163762).\n - bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n - bcache: remove member accessed from struct btree (bsc#1163762).\n - bcache: remove the extra cflags for request.o (bsc#1163762).\n - bcma: remove set but not used variable 'sizel' (git-fixes).\n - blk-mq: avoid sysfs buffer overflow with too many CPU cores\n (bsc#1159377).\n - blk-mq: avoid sysfs buffer overflow with too many CPU cores\n (bsc#1163840).\n - blk-mq: make sure that line break can be printed (bsc#1159377).\n - blk-mq: make sure that line break can be printed (bsc#1164098).\n - bnxt: apply computed clamp value for coalece parameter (bsc#1104745).\n - bnxt_en: Fix MSIX request logic for RDMA driver (bsc#1104745 ).\n - bnxt_en: Fix NTUPLE firmware command failures (bsc#1104745 ).\n - bnxt_en: Fix TC queue mapping (networking-stable-20_02_05).\n - bnxt_en: Improve device shutdown method (bsc#1104745 ).\n - bnxt_en: Issue PCIe FLR in kdump kernel to cleanup pending DMAs\n (bsc#1134090 jsc#SLE-5954).\n - bnxt_en: Return error if FW returns more data than dump length\n (bsc#1104745).\n - bonding: fix active-backup transition after link failure (git-fixes).\n - bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n - bonding: fix slave stuck in BOND_LINK_FAIL state\n (networking-stable-19_11_10).\n - bonding: fix state transition issue in link monitoring\n (networking-stable-19_11_10).\n - bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n - bpf, offload: Replace bitwise AND by logical AND in\n bpf_prog_offload_info_fill (bsc#1109837).\n - bpf, offload: Unlock on error in bpf_offload_dev_create() (bsc#1109837).\n - bpf/sockmap: Read psock ingress_msg before sk_receive_queue\n (bsc#1083647).\n - bpf/stackmap: Fix deadlock with rq_lock in bpf_get_stack() (bsc#1083647).\n - bpf: Fix incorrect verifier simulation of ARSH under ALU32 (bsc#1083647).\n - bpf: Make use of probe_user_write in probe write helper (bsc#1083647).\n - bpf: Reject indirect var_off stack access in raw mode (bsc#1160618).\n - bpf: Reject indirect var_off stack access in unpriv mode (bco#1160618).\n - bpf: Sanity check max value for var_off stack access (bco#1160618).\n - bpf: Support variable offset stack access from helpers (bco#1160618).\n - bpf: add self-check logic to liveness analysis (bsc#1160618).\n - bpf: add verifier stats and log_level bit 2 (bsc#1160618).\n - bpf: improve stacksafe state comparison (bco#1160618).\n - bpf: improve verification speed by droping states (bsc#1160618).\n - bpf: improve verification speed by not remarking live_read (bsc#1160618).\n - bpf: improve verifier branch analysis (bsc#1160618).\n - bpf: increase complexity limit and maximum program size (bsc#1160618).\n - bpf: increase verifier log limit (bsc#1160618).\n - bpf: skmsg, fix potential psock NULL pointer dereference (bsc#1109837).\n - bpf: speed up stacksafe check (bco#1160618).\n - bpf: verifier: teach the verifier to reason about the BPF_JSET\n instruction (bco#1160618).\n - brcmfmac: Fix memory leak in brcmf_p2p_create_p2pdev() (bsc#1111666).\n - brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n - brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n - brcmfmac: fix interface sanity check (git-fixes).\n - brcmfmac: sdio: Fix OOB interrupt initialization on brcm43362\n (bsc#1111666).\n - brcmfmac: set F2 watermark to 256 for 4373 (bsc#1111666).\n - brcmfmac: set SDIO F1 MesBusyCtrl for CYW4373 (bsc#1111666).\n - btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n - btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it\n (dependency for bsc#1157692).\n - btrfs: abort transaction after failed inode updates in create_subvol\n (bsc#1161936).\n - btrfs: dev-replace: remove warning for unknown return codes when\n finished (dependency for bsc#1162067).\n - btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n - btrfs: do not double lock the subvol_sem for rename exchange\n (bsc#1162943).\n - btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n - btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n - btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n - btrfs: inode: Verify inode mode to avoid NULL pointer dereference\n (dependency for bsc#1157692).\n - btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n - btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n - btrfs: scrub: Require mandatory block group RO for dev-replace\n (bsc#1162067).\n - btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n - btrfs: skip log replay on orphaned roots (bsc#1161935).\n - btrfs: tree-checker: Check chunk item at tree block read time\n (dependency for bsc#1157692).\n - btrfs: tree-checker: Check level for leaves and nodes (dependency for\n bsc#1157692).\n - btrfs: tree-checker: Enhance chunk checker to validate chunk profile\n (dependency for bsc#1157692).\n - btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency\n of bsc#1157692).\n - btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN\n instead of EIO (dependency for bsc#1157692).\n - btrfs: tree-checker: Make chunk item checker messages more readable\n (dependency for bsc#1157692).\n - btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n - btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in block_group_err (dependency\n for bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in check_block_group_item\n (dependency for bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency\n for bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency\n for bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency\n for bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in check_extent_data_item\n (dependency for bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency\n for bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency\n for bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for\n bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for\n bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency\n for bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for\n bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for\n bsc#1157692).\n - btrfs: tree-checker: get fs_info from eb in generic_err (dependency for\n bsc#1157692).\n - btrfs: volumes: Use more straightforward way to calculate map length\n (bsc#1151910).\n - can, slip: Protect tty->disc_data in write_wakeup and close with RCU\n (bsc#1051510).\n - can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open\n (bsc#1051510).\n - can: can_dropped_invalid_skb(): ensure an initialized headroom in\n outgoing CAN sk_buffs (bsc#1051510).\n - can: gs_usb: gs_usb_probe(): use descriptors of current altsetting\n (bsc#1051510).\n - can: mscan: mscan_rx_poll(): fix rx path lockup when returning from\n polling to irq mode (bsc#1051510).\n - can: peak_usb: report bus recovery as well (bsc#1051510).\n - can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error\n (bsc#1051510).\n - can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on\n error (bsc#1051510).\n - can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors\n on queue overflow or OOM (bsc#1051510).\n - can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to\n propagate error value in case of errors (bsc#1051510).\n - can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n - cdrom: respect device capabilities during opening action (boo#1164632).\n - cfg80211/mac80211: make ieee80211_send_layer2_update a public function\n (bsc#1051510).\n - cfg80211: check for set_wiphy_params (bsc#1051510).\n - cfg80211: fix deadlocks in autodisconnect work (bsc#1111666).\n - cfg80211: fix memory leak in cfg80211_cqm_rssi_update (bsc#1111666).\n - cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n - cgroup: pids: use atomic64_t for pids->limit (bsc#1161514).\n - chardev: Avoid potential use-after-free in 'chrdev_open()' (bsc#1163849).\n - cifs: Add tracepoints for errors on flush or fsync (bsc#1144333).\n - cifs: Adjust indentation in smb2_open_file (bsc#1144333).\n - cifs: Avoid doing network I/O while holding cache lock (bsc#1144333).\n - cifs: Clean up DFS referral cache (bsc#1144333).\n - cifs: Do not display RDMA transport on reconnect (bsc#1144333).\n - cifs: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n - cifs: Fix memory allocation in __smb2_handle_cancelled_cmd()\n (bsc#1144333).\n - cifs: Fix memory allocation in __smb2_handle_cancelled_cmd()\n (bsc#1144333).\n - cifs: Fix mode output in debugging statements (bsc#1144333).\n - cifs: Fix mount options set in automount (bsc#1144333).\n - cifs: Fix mount options set in automount (bsc#1144333).\n - cifs: Fix potential deadlock when updating vol in cifs_reconnect()\n (bsc#1144333).\n - cifs: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n - cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n - cifs: Fix return value in __update_cache_entry (bsc#1144333).\n - cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n - cifs: Get rid of kstrdup_const()'d paths (bsc#1144333).\n - cifs: Introduce helpers for finding TCP connection (bsc#1144333).\n - cifs: Merge is_path_valid() into get_normalized_path() (bsc#1144333).\n - cifs: Optimize readdir on reparse points (bsc#1144333).\n - cifs: Use #define in cifs_dbg (bsc#1144333).\n - cifs: add SMB2_open() arg to return POSIX data (bsc#1144333).\n - cifs: add SMB3 change notification support (bsc#1144333).\n - cifs: add a debug macro that prints \\\\server\\share for errors\n (bsc#1144333).\n - cifs: add missing mount option to /proc/mounts (bsc#1144333).\n - cifs: add new debugging macro cifs_server_dbg (bsc#1144333).\n - cifs: add passthrough for smb2 setinfo (bsc#1144333).\n - cifs: add smb2 POSIX info level (bsc#1144333).\n - cifs: add support for fallocate mode 0 for non-sparse files\n (bsc#1144333).\n - cifs: add support for flock (bsc#1144333).\n - cifs: allow chmod to set mode bits using special sid (bsc#1144333).\n - cifs: call wake_up(&server->response_q) inside of cifs_reconnect()\n (bsc#1144333).\n - cifs: close the shared root handle on tree disconnect (bsc#1144333).\n - cifs: create a helper function to parse the query-directory response\n buffer (bsc#1144333).\n - cifs: do d_move in rename (bsc#1144333).\n - cifs: do not ignore the SYNC flags in getattr (bsc#1144333).\n - cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1144333).\n - cifs: do not use 'pre:' for MODULE_SOFTDEP (bsc#1144333).\n - cifs: enable change notification for SMB2.1 dialect (bsc#1144333).\n - cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1144333).\n - cifs: fix NULL dereference in match_prepath (bsc#1144333).\n - cifs: fix a comment for the timeouts when sending echos (bsc#1144333).\n - cifs: fix dereference on ses before it is null checked (bsc#1144333).\n - cifs: fix mode bits from dir listing when mounted with modefromsid\n (bsc#1144333).\n - cifs: fix mount option display for sec=krb5i (bsc#1161907).\n - cifs: fix potential mismatch of UNC paths (bsc#1144333).\n - cifs: fix rename() by ensuring source handle opened with DELETE bit\n (bsc#1144333).\n - cifs: fix soft mounts hanging in the reconnect code (bsc#1144333).\n - cifs: fix soft mounts hanging in the reconnect code (bsc#1144333).\n - cifs: fix unitialized variable poential problem with network I/O cache\n lock patch (bsc#1144333).\n - cifs: get mode bits from special sid on stat (bsc#1144333).\n - cifs: handle prefix paths in reconnect (bsc#1144333).\n - cifs: log warning message (once) if out of disk space (bsc#1144333).\n - cifs: make sure we do not overflow the max EA buffer size (bsc#1144333).\n - cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1144333).\n - cifs: modefromsid: make room for 4 ACE (bsc#1144333).\n - cifs: modefromsid: write mode ACE first (bsc#1144333).\n - cifs: plumb smb2 POSIX dir enumeration (bsc#1144333).\n - cifs: potential unintitliazed error code in cifs_getattr() (bsc#1144333).\n - cifs: prepare SMB2_query_directory to be used with compounding\n (bsc#1144333).\n - cifs: print warning once if mounting with vers=1.0 (bsc#1144333).\n - cifs: remove redundant assignment to pointer pneg_ctxt (bsc#1144333).\n - cifs: remove redundant assignment to variable rc (bsc#1144333).\n - cifs: remove set but not used variable 'server' (bsc#1144333).\n - cifs: remove set but not used variables (bsc#1144333).\n - cifs: remove unused variable 'sid_user' (bsc#1144333).\n - cifs: remove unused variable (bsc#1144333).\n - cifs: rename a variable in SendReceive() (bsc#1144333).\n - cifs: rename posix create rsp (bsc#1144333).\n - cifs: replace various strncpy with strscpy and similar (bsc#1144333).\n - cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1144333).\n - cifs: smbd: Add messages on RDMA session destroy and reconnection\n (bsc#1144333).\n - cifs: smbd: Invalidate and deregister memory registration on re-send for\n direct I/O (bsc#1144333).\n - cifs: smbd: Only queue work for error recovery on memory registration\n (bsc#1144333).\n - cifs: smbd: Return -EAGAIN when transport is reconnecting (bsc#1144333).\n - cifs: smbd: Return -ECONNABORTED when trasnport is not in connected\n state (bsc#1144333).\n - cifs: smbd: Return -EINVAL when the number of iovs exceeds\n SMBDIRECT_MAX_SGE (bsc#1144333).\n - cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1144333).\n - cifs: use compounding for open and first query-dir for readdir()\n (bsc#1144333).\n - cifs: use mod_delayed_work() for &server->reconnect if already queued\n (bsc#1144333).\n - clk: Do not try to enable critical clocks if prepare failed\n (bsc#1051510).\n - clk: imx: clk-composite-8m: add lock to gate/mux (git-fixes).\n - clk: mmp2: Fix the order of timer mux parents (bsc#1051510).\n - clk: qcom: rcg2: Do not crash if our parent can't be found; return an\n error (bsc#1051510).\n - clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n - clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n - clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering\n (bsc#1051510).\n - clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n - clk: sunxi-ng: add mux and pll notifiers for A64 CPU clock (bsc#1051510).\n - clk: sunxi: sun9i-mmc: Implement reset callback for reset controls\n (bsc#1051510).\n - clk: tegra: Mark fuse clock as critical (bsc#1051510).\n - clocksource/drivers/bcm2835_timer: Fix memory leak of timer\n (bsc#1051510).\n - clocksource: Prevent double add_timer_on() for watchdog_timer\n (bsc#1051510).\n - closures: fix a race on wakeup from closure_sync (bsc#1163762).\n - cls_rsvp: fix rsvp_policy (networking-stable-20_02_05).\n - configfs_register_group() shouldn't be (and isn't) called in rmdirable\n parts (bsc#1051510).\n - copy/pasted \"Recommends:\" instead of \"Provides:\", \"Obsoletes:\" and\n \"Conflicts:\n - core: Do not skip generic XDP program execution for cloned SKBs\n (bsc#1109837).\n - crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n - crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n - crypto: api - Check spawn->alg under lock in crypto_drop_spawn\n (bsc#1051510).\n - crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n - crypto: atmel-sha - fix error handling when setting hmac key\n (bsc#1051510).\n - crypto: caam/qi2 - fix typo in algorithm's driver name (bsc#1111666).\n - crypto: ccp - fix uninitialized list head (bsc#1051510).\n - crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n - crypto: dh - add public key verification test (bsc#1155331).\n - crypto: dh - fix calculating encoded key size (bsc#1155331).\n - crypto: dh - fix memory leak (bsc#1155331).\n - crypto: dh - update test for public key verification (bsc#1155331).\n - crypto: ecdh - add public key verification test (bsc#1155331).\n - crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n - crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).\n - crypto: pcrypt - Do not clear MAY_SLEEP flag in original request\n (bsc#1051510).\n - crypto: picoxcell - adjust the position of tasklet_init and fix missed\n tasklet_kill (bsc#1051510).\n - crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n - cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n - devlink: report 0 after hitting end in region read (bsc#1109837).\n - dma-buf: Fix memory leak in sync_file_merge() (git-fixes).\n - dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n - dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n - dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n - dmaengine: coh901318: Remove unused variable (bsc#1051510).\n - drivers/base/memory.c: cache blocks in radix tree to accelerate lookup\n (bsc#1159955 ltc#182993).\n - drivers/base/memory.c: do not access uninitialized memmaps in\n soft_offline_page_store() (bsc#1051510).\n - drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).\n - drivers/regulator: fix a missing check of return value (bsc#1051510).\n - drm/amd/display: Retrain dongles when SINK_COUNT becomes non-zero\n (bsc#1111666).\n - drm/amd/powerplay: remove set but not used variable 'us_mvdd'\n (bsc#1111666).\n - drm/amdgpu/{uvd,vcn}: fetch ring's read_ptr after alloc (bsc#1111666).\n - drm/amdgpu: add function parameter description in\n 'amdgpu_device_set_cg_state' (bsc#1111666).\n - drm/amdgpu: add function parameter description in 'amdgpu_gart_bind'\n (bsc#1051510).\n - drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)\n - drm/amdgpu: fix ring test failure issue during s3 in vce 3.0 (V2)\n (bsc#1111666).\n - drm/amdgpu: remove 4 set but not used variable in\n amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n - drm/amdgpu: remove always false comparison in\n 'amdgpu_atombios_i2c_process_i2c_ch' (bsc#1051510).\n - drm/amdgpu: remove set but not used variable 'amdgpu_connector'\n (bsc#1051510).\n - drm/amdgpu: remove set but not used variable 'dig' (bsc#1051510).\n - drm/amdgpu: remove set but not used variable 'dig_connector'\n (bsc#1051510).\n - drm/amdgpu: remove set but not used variable 'invalid' (bsc#1111666).\n - drm/amdgpu: remove set but not used variable 'mc_shared_chmap'\n (bsc#1051510).\n - drm/amdgpu: remove set but not used variable 'mc_shared_chmap' from\n 'gfx_v6_0.c' and 'gfx_v7_0.c' (bsc#1051510).\n - drm/amdkfd: fix a use after free race with mmu_notifer unregister\n (bsc#1114279)\n - drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n - drm/etnaviv: fix dumping of iommuv2 (bsc#1114279)\n - drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n - drm/i810: Prevent underflow in ioctl (bsc#1114279)\n - drm/i915/gvt: Pin vgpu dma address before using (bsc#1112178)\n - drm/i915/gvt: Separate display reset from ALL_ENGINES reset (bsc#1114279)\n - drm/i915/gvt: set guest display buffer as readonly (bsc#1112178)\n - drm/i915/gvt: use vgpu lock for active state setting (bsc#1112178)\n - drm/i915/perf: add missing delay for OA muxes configuration\n (bsc#1111666).\n - drm/i915/userptr: Try to acquire the page lock around (bsc#1114279)\n - drm/i915/userptr: fix size calculation (bsc#1114279)\n - drm/i915: Add missing include file <linux/math64.h> (bsc#1051510).\n - drm/i915: Call dma_set_max_seg_size() in i915_driver_hw_probe()\n (bsc#1111666).\n - drm/i915: Fix pid leak with banned clients (bsc#1114279)\n - drm/i915: Handle vm_mmap error during I915_GEM_MMAP ioctl with WC set\n (bsc#1111666).\n - drm/i915: Make sure cdclk is high enough for DP audio on VLV/CHV\n (bsc#1111666).\n - drm/i915: Reacquire priolist cache after dropping the engine lock\n (bsc#1129770) Fixes a const function argument in the patch.\n - drm/i915: Sanity check mmap length against object size (bsc#1111666).\n - drm/i915: Wean off drm_pci_alloc/drm_pci_free (bsc#1114279)\n - drm/mediatek: Add gamma property according to hardware capability\n (bsc#1114279)\n - drm/mediatek: disable all the planes in atomic_disable (bsc#1114279)\n - drm/mipi_dbi: Fix off-by-one bugs in mipi_dbi_blank() (bsc#1114279)\n - drm/msm: include linux/sched/task.h (bsc#1112178)\n - drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n - drm/nouveau/bar/gf100: ensure BAR is mapped (bsc#1111666).\n - drm/nouveau/bar/nv50: check bar1 vmm return value (bsc#1111666).\n - drm/nouveau/mmu: qualify vmm during dtor (bsc#1111666).\n - drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new()\n (bsc#1051510).\n - drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler\n (bsc#1051510).\n - drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n - drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n - drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n - drm/rect: Avoid division by zero (bsc#1111666).\n - drm/rect: update kerneldoc for drm_rect_clip_scaled() (bsc#1111666).\n - drm/rockchip: Round up _before_ giving to the clock framework\n (bsc#1114279)\n - drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n - drm/sun4i: hdmi: Remove duplicate cleanup calls (bsc#1113956)\n - drm/sun4i: tcon: Set RGB DCLK min. divider based on hardware model\n (bsc#1111666).\n - drm/sun4i: tcon: Set min division of TCON0_DCLK to 1 (bsc#1111666).\n - drm/ttm: ttm_tt_init_fields() can be static (bsc#1111666).\n - drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n - drm: atmel-hlcdc: enable clock before configuring timing engine\n (bsc#1114279)\n - drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n - drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n - drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n - drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable\n (bsc#1111666).\n - drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable\n (bsc#1114279)\n - drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)\n - drm: rcar-du: Recognize \"renesas,vsps\" in addition to \"vsps\"\n (bsc#1114279)\n - e1000e: Add support for Comet Lake (bsc#1158533).\n - e1000e: Add support for Tiger Lake (bsc#1158533).\n - e1000e: Increase pause and refresh time (bsc#1158533).\n - e100: Fix passing zero to 'PTR_ERR' warning in e100_load_ucode_wait\n (bsc#1051510).\n - enic: prevent waking up stopped tx queues over watchdog reset\n (bsc#1133147).\n - ethtool: Factored out similar ethtool link settings for virtual devices\n to core (bsc#1136157 ltc#177197).\n - exit: panic before exit_mm() on global init exit (bsc#1161549).\n - ext2: check err when partial != NULL (bsc#1163859).\n - ext4, jbd2: ensure panic when aborting with zero errno (bsc#1163853).\n - ext4: Fix mount failure with quota configured as module (bsc#1164471).\n - ext4: check for directory entries too close to block end (bsc#1163861).\n - ext4: fix a bug in ext4_wait_for_tail_page_commit (bsc#1163841).\n - ext4: fix checksum errors with indexed dirs (bsc#1160979).\n - ext4: fix deadlock allocating crypto bounce page from mempool\n (bsc#1163842).\n - ext4: fix mount failure with quota configured as module (bsc#1164471).\n - ext4: improve explanation of a mount failure caused by a misconfigured\n kernel (bsc#1163843).\n - extcon: max8997: Fix lack of path setting in USB device mode\n (bsc#1051510).\n - firestream: fix memory leaks (bsc#1051510).\n - fix autofs regression caused by follow_managed() changes (bsc#1159271).\n - fix dget_parent() fastpath race (bsc#1159271).\n - fix memory leak in large read decrypt offload (bsc#1144333).\n - fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n - fs/cifs/cifssmb.c: use true,false for bool variable (bsc#1144333).\n - fs/cifs/sess.c: Remove set but not used variable 'capabilities'\n (bsc#1144333).\n - fs/cifs/smb2ops.c: use true,false for bool variable (bsc#1144333).\n - fs/cifs/smb2pdu.c: Make SMB2_notify_init static (bsc#1144333).\n - fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n - fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n - fs/open.c: allow opening only regular files during execve()\n (bsc#1163845).\n - fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n - fs: cifs: Initialize filesystem timestamp ranges (bsc#1144333).\n - fs: cifs: cifsssmb: remove redundant assignment to variable ret\n (bsc#1144333).\n - fs: cifs: mute -Wunused-const-variable message (bsc#1144333).\n - fscrypt: do not set policy for a dead directory (bsc#1163846).\n - ftrace: Add comment to why rcu_dereference_sched() is open coded\n (git-fixes).\n - ftrace: Avoid potential division by zero in function profiler\n (bsc#1160784).\n - ftrace: Protect ftrace_graph_hash with ftrace_sync (git-fixes).\n - genirq/proc: Return proper error code when irq_set_affinity() fails\n (bnc#1105392).\n - genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n - genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n - gpio: Fix error message on out-of-range GPIO in lookup table\n (bsc#1051510).\n - gtp: avoid zero size hashtable (networking-stable-20_01_01).\n - gtp: do not allow adding duplicate tid and ms_addr pdp context\n (networking-stable-20_01_01).\n - gtp: fix an use-after-free in ipv4_pdp_find()\n (networking-stable-20_01_01).\n - gtp: fix wrong condition in gtp_genl_dump_pdp()\n (networking-stable-20_01_01).\n - gtp: make sure only SOCK_DGRAM UDP sockets are accepted\n (networking-stable-20_01_27).\n - gtp: use __GFP_NOWARN to avoid memalloc warning\n (networking-stable-20_02_05).\n - hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n - hotplug/drc-info: Add code to search ibm,drc-info property (bsc#1157480\n ltc#181028).\n - hv_netvsc: Fix memory leak when removing rndis device\n (networking-stable-20_01_20).\n - hv_netvsc: Fix offset usage in netvsc_send_table() (bsc#1164598).\n - hv_netvsc: Fix send_table offset in case of a host bug (bsc#1164598).\n - hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1164598).\n - hv_netvsc: Fix unwanted rx_table reset (bsc#1164598).\n - hwmon: (adt7475) Make volt2reg return same reg as reg2volt input\n (bsc#1051510).\n - hwmon: (core) Do not use device managed functions for memory allocations\n (bsc#1051510).\n - hwmon: (k10temp) Add support for AMD family 17h, model 70h CPUs\n (bsc#1163206).\n - hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n - hwmon: (pmbus/ltc2978) Fix PMBus polling of MFR_COMMON definitions\n (bsc#1051510).\n - hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).\n - i2c: imx: do not print error message on probe defer (bsc#1051510).\n - ibmveth: Detect unsupported packets before sending to the hypervisor\n (bsc#1159484 ltc#182983).\n - ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).\n - ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n - ibmvnic: Fix completion structure initialization (bsc#1155689\n ltc#182047).\n - ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n - ibmvnic: Terminate waiting device threads after loss of service\n (bsc#1155689 ltc#182047).\n - ice: fix stack leakage (bsc#1118661).\n - idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).\n - iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n - iio: buffer: align the size of scan bytes to size of the largest element\n (bsc#1051510).\n - inet: protect against too small mtu values (networking-stable-19_12_16).\n - iommu/amd: Fix IOMMU perf counter clobbering during init (bsc#1162617).\n - iommu/arm-smmu-v3: Populate VMID field for CMDQ_OP_TLBI_NH_VA\n (bsc#1164314).\n - iommu/io-pgtable-arm: Fix race handling in split_blk_unmap()\n (bsc#1164115).\n - iommu/iova: Init the struct iova to fix the possible memleak\n (bsc#1160469).\n - iommu/mediatek: Correct the flush_iotlb_all callback (bsc#1160470).\n - iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n - iommu: Remove device link to group on failure (bsc#1160755).\n - ipmi: Do not allow device module unload when in use (bsc#1154768).\n - ipv4: Fix table id reference in fib_sync_down_addr\n (networking-stable-19_11_10).\n - ipv4: ensure rcu_read_lock() in cipso_v4_error() (git-fixes).\n - ipv6: restrict IPV6_ADDRFORM operation (bsc#1109837).\n - iwlegacy: ensure loop counter addr does not wrap and cause an infinite\n loop (git-fixes).\n - iwlwifi: change monitor DMA to be coherent (bsc#1161243).\n - iwlwifi: clear persistence bit according to device family (bsc#1111666).\n - iwlwifi: do not throw error when trying to remove IGTK (bsc#1051510).\n - iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n - iwlwifi: mvm: fix NVM check for 3168 devices (bsc#1051510).\n - iwlwifi: mvm: force TCM re-evaluation on TCM resume (bsc#1111666).\n - iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n - iwlwifi: pcie: fix erroneous print (bsc#1111666).\n - iwlwifi: trans: Clear persistence bit when starting the FW (bsc#1111666).\n - jbd2: Fix possible overflow in jbd2_log_space_left() (bsc#1163860).\n - jbd2: clear JBD2_ABORT flag before journal_reset to update log tail info\n when load journal (bsc#1163862).\n - jbd2: do not clear the BH_Mapped flag when forgetting a metadata buffer\n (bsc#1163836).\n - jbd2: make sure ESHUTDOWN to be recorded in the journal superblock\n (bsc#1163863).\n - jbd2: move the clearing of b_modified flag to the journal_unmap_buffer()\n (bsc#1163880).\n - jbd2: switch to use jbd2_journal_abort() when failed to submit the\n commit record (bsc#1163852).\n - kABI fix for \"ipmi: Do not allow device module unload when in use\"\n (bsc#1154768).\n - kABI fixup for alloc_dax_region (bsc#1158071,bsc#1160678).\n - kABI workaround for can/skb.h inclusion (bsc#1051510).\n - crypto/dh: Make sure the FIPS pubkey check is only executed in FIPS mode.\n - kABI: Protest new fields in BPF structs (bsc#1160618).\n - kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n - kABI: protect struct sctp_ep_common (kabi).\n - kabi/severities: Whitelist rpaphp_get_drc_props (bsc#1157480 ltc#181028).\n - kconfig: fix broken dependency in randconfig-generated .config\n (bsc#1051510).\n - kernel-binary.spec.in: do not recommend firmware for kvmsmall and azure\n flavor (boo#1161360).\n - kernel/module.c: Only return -EEXIST for modules that have finished\n loading (bsc#1165488).\n - kernel/module.c: wakeup processes in module_wq on module unload\n (bsc#1165488).\n - kernel/trace: Fix do not unregister tracepoints when register\n sched_migrate_task fail (bsc#1160787).\n - kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n - kexec: bail out upon SIGKILL when allocating memory (git-fixes).\n - kvm: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD\n (bsc#1160476).\n - l2tp: Allow duplicate session creation with UDP\n (networking-stable-20_02_05).\n - lcoking/rwsem: Add missing ACQUIRE to read_slowpath sleep loop\n (bsc#1050549).\n - leds: Allow to call led_classdev_unregister() unconditionally\n (bsc#1161674).\n - leds: class: ensure workqueue is initialized before setting brightness\n (bsc#1161674).\n - lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n - lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more()\n (bsc#1051510).\n - lib: crc64: include <linux/crc64.h> for 'crc64_be' (bsc#1163762).\n - libnvdimm-fix-devm_nsio_enable-kabi.patch: Fixup compiler warning\n - libnvdimm/namespace: Differentiate between probe mapping and runtime\n mapping (bsc#1153535).\n - libnvdimm/pfn: Account for PAGE_SIZE > info-block-size in nd_pfn_init()\n (bsc#1127682 bsc#1153535 ltc#175033 ltc#181834).\n - libnvdimm: Fix devm_nsio_enable() kabi (bsc#1153535).\n - livepatch/samples/selftest: Use klp_shadow_alloc() API correctly\n (bsc#1071995).\n - livepatch/selftest: Clean up shadow variable names and type\n (bsc#1071995).\n - locking/rwsem: Prevent decrement of reader count before increment\n (bsc#1050549).\n - mac80211: Do not send Layer 2 Update frame before authorization\n (bsc#1051510).\n - mac80211: Fix TKIP replay protection immediately after key setup\n (bsc#1051510).\n - mac80211: fix ieee80211_txq_setup_flows() failure path (bsc#1111666).\n - mac80211: fix station inactive_time shortly after boot (bsc#1051510).\n - mac80211: mesh: restrict airtime metric to peered established plinks\n (bsc#1051510).\n - macvlan: do not assume mac_header is set in macvlan_broadcast()\n (bsc#1051510).\n - macvlan: use skb_reset_mac_header() in macvlan_queue_xmit()\n (bsc#1051510).\n - mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).\n - md/raid0: Fix buffer overflow at debug print (bsc#1164051).\n - media/v4l2-core: set pages dirty upon releasing DMA buffers\n (bsc#1051510).\n - media: af9005: uninitialized variable printked (bsc#1051510).\n - media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n - media: cec: CEC 2.0-only bcast messages were ignored (git-fixes).\n - media: cec: report Vendor ID after initialization (bsc#1051510).\n - media: digitv: do not continue if remote control state can't be read\n (bsc#1051510).\n - media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0 (bsc#1051510).\n - media: exynos4-is: fix wrong mdev and v4l2 dev order in error path\n (git-fixes).\n - media: gspca: zero usb_buf (bsc#1051510).\n - media: iguanair: fix endpoint sanity check (bsc#1051510).\n - media: ov6650: Fix control handler not freed on init error (git-fixes).\n - media: ov6650: Fix crop rectangle alignment not passed back (git-fixes).\n - media: ov6650: Fix incorrect use of JPEG colorspace (git-fixes).\n - media: pulse8-cec: fix lost cec_transmit_attempt_done() call.\n - media: pulse8-cec: return 0 when invalidating the logical address\n (bsc#1051510).\n - media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n - media: uvcvideo: Avoid cyclic entity chains due to malformed USB\n descriptors (bsc#1051510).\n - media: uvcvideo: Fix error path in control parsing failure (git-fixes).\n - media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).\n - media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n - media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments\n (bsc#1051510).\n - mei: bus: prefix device names on bus with the bus name (bsc#1051510).\n - mfd: da9062: Fix watchdog compatible string (bsc#1051510).\n - mfd: dln2: More sanity checking for endpoints (bsc#1051510).\n - mfd: rn5t618: Mark ADC control register volatile (bsc#1051510).\n - missing escaping of backslashes in macro expansions (bsc#1143959)\n - mlxsw: spectrum: Wipe xstats.backlog of down ports (bsc#1112374).\n - mlxsw: spectrum_qdisc: Ignore grafting of invisible FIFO (bsc#1112374).\n - mlxsw: spectrum_qdisc: Include MC TCs in Qdisc counters (bsc#1112374).\n - mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel\n (bsc#1112374).\n - mm, memory_hotplug: do not clear numa_node association after hot_remove\n (bnc#1115026).\n - mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock\n (bsc#1159394).\n - mm: memory_hotplug: use put_device() if device_register fail\n (bsc#1159955 ltc#182993).\n - mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n - mmc: sdhci-of-esdhc: Revert \"mmc: sdhci-of-esdhc: add erratum A-009204\n support\" (bsc#1051510).\n - mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n - mmc: sdhci: Add a quirk for broken command queuing (git-fixes).\n - mmc: sdhci: Workaround broken command queuing on Intel GLK (git-fixes).\n - mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n - mmc: spi: Toggle SPI polarity, do not hardcode it (bsc#1051510).\n - mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n - mod_devicetable: fix PHY module format (networking-stable-19_12_28).\n - moduleparam: fix parameter description mismatch (bsc#1051510).\n - mqprio: Fix out-of-bounds access in mqprio_dump (bsc#1109837).\n - mtd: fix mtd_oobavail() incoherent returned value (bsc#1051510).\n - mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).\n - mwifiex: delete unused mwifiex_get_intf_num() (bsc#1111666).\n - mwifiex: drop most magic numbers from\n mwifiex_process_tdls_action_frame() (git-fixes).\n - mwifiex: fix potential NULL dereference and use after free (bsc#1051510).\n - mwifiex: update set_mac_address logic (bsc#1111666).\n - namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1163851).\n - net, ip6_tunnel: fix namespaces move (networking-stable-20_01_27).\n - net, ip_tunnel: fix namespaces move (networking-stable-20_01_27).\n - net, sysctl: Fix compiler warning when only cBPF is present\n (bsc#1109837).\n - net-sysfs: Fix reference count leak (networking-stable-20_01_27).\n - net/ethtool: Introduce link_ksettings API for virtual network devices\n (bsc#1136157 ltc#177197).\n - net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n - net/mlx4_en: Fix wrong limitation for number of TX rings (bsc#1103989).\n - net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n - net/mlx5: Accumulate levels for chains prio namespaces (bsc#1103990).\n - net/mlx5: Fix lowest FDB pool size (bsc#1103990).\n - net/mlx5: IPsec, Fix esp modify function attribute (bsc#1103990 ).\n - net/mlx5: IPsec, fix memory leak at mlx5_fpga_ipsec_delete_sa_ctx\n (bsc#1103990).\n - net/mlx5: Update the list of the PCI supported devices (bsc#1127611).\n - net/mlx5: Update the list of the PCI supported devices (bsc#1127611).\n - net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n - net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n - net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n - net/mlx5e: Query global pause state before setting prio2buffer\n (bsc#1103990).\n - net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n - net/mlxfw: Verify FSM error code translation does not exceed array size\n (bsc#1051858).\n - net/sched: act_pedit: fix WARN() in the traffic path\n (networking-stable-19_11_25).\n - net/tls: fix async operation (bsc#1109837).\n - net/tls: free the record on encryption error (bsc#1109837).\n - net/tls: take into account that bpf_exec_tx_verdict() may free the\n record (bsc#1109837).\n - net/wan/fsl_ucc_hdlc: fix out of bounds write on array utdm_info\n (networking-stable-20_01_20).\n - net: Fix Tx hash bound checking (bsc#1109837).\n - net: add sendmsg_locked and sendpage_locked to af_inet6 (bsc#1144162).\n - net: bridge: deny dev_set_mac_address() when unregistering\n (networking-stable-19_12_16).\n - net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n - net: cxgb3_main: Add CAP_NET_ADMIN check to CHELSIO_GET_MEM\n (networking-stable-20_01_27).\n - net: dsa: mv88e6xxx: Preserve priority when setting CPU port\n (networking-stable-20_01_11).\n - net: dsa: tag_qca: fix doubled Tx statistics\n (networking-stable-20_01_20).\n - net: dst: Force 4-byte alignment of dst_metrics\n (networking-stable-19_12_28).\n - net: ena: fix napi handler misbehavior when the napi budget is zero\n (networking-stable-20_01_01).\n - net: ethernet: octeon_mgmt: Account for second possible VLAN header\n (networking-stable-19_11_10).\n - net: ethernet: ti: cpsw: fix extra rx interrupt\n (networking-stable-19_12_16).\n - net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n - net: hisilicon: Fix a BUG trigered by wrong bytes_compl\n (networking-stable-19_12_28).\n - net: hns3: fix ETS bandwidth validation bug (bsc#1104353 ).\n - net: hns3: fix a copying IPv6 address error in\n hclge_fd_get_flow_tuples() (bsc#1104353).\n - net: hns: fix soft lockup when there is not enough memory\n (networking-stable-20_01_20).\n - net: hsr: fix possible NULL deref in hsr_handle_frame()\n (networking-stable-20_02_05).\n - net: ip6_gre: fix moving ip6gre between namespaces\n (networking-stable-20_01_27).\n - net: nfc: nci: fix a possible sleep-in-atomic-context bug in\n nci_uart_tty_receive() (networking-stable-19_12_28).\n - net: phy: Check against net_device being NULL (bsc#1051510).\n - net: phy: Fix not to call phy_resume() if PHY is not attached\n (bsc#1051510).\n - net: phy: Fix the register offsets in Broadcom iProc mdio mux driver\n (bsc#1051510).\n - net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).\n - net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n - net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).\n - net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).\n - net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n - net: phy: marvell: clear wol event before setting it (bsc#1051510).\n - net: phy: meson-gxl: check phy_write return value (bsc#1051510).\n - net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n - net: phy: mscc: read 'vsc8531, edge-slowdown' as an u32 (bsc#1051510).\n - net: phy: mscc: read 'vsc8531,vddmac' as an u32 (bsc#1051510).\n - net: phy: xgene: disable clk on error paths (bsc#1051510).\n - net: phy: xgmiitorgmii: Check phy_driver ready before accessing\n (bsc#1051510).\n - net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).\n - net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).\n - net: psample: fix skb_over_panic (networking-stable-19_12_03).\n - net: qlogic: Fix error paths in ql_alloc_large_buffers()\n (networking-stable-19_12_28).\n - net: rtnetlink: prevent underflows in do_setvfinfo()\n (networking-stable-19_11_25).\n - net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()\n (networking-stable-20_01_27).\n - net: sch_prio: When ungrafting, replace with FIFO\n (networking-stable-20_01_11).\n - net: sched: correct flower port blocking (git-fixes).\n - net: sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key\n (bsc#1109837).\n - net: sched: fix `tc -s class show` no bstats on class with nolock\n subqueues (networking-stable-19_12_03).\n - net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues\n (bsc#1109837).\n - net: stmmac: Delete txtimer in suspend() (networking-stable-20_02_05).\n - net: stmmac: dwmac-sunxi: Allow all RGMII modes\n (networking-stable-20_01_11).\n - net: usb: lan78xx: Add .ndo_features_check (networking-stable-20_01_27).\n - net: usb: lan78xx: Fix suspend/resume PHY register access error\n (networking-stable-19_12_28).\n - net: usb: lan78xx: fix possible skb leak (networking-stable-20_01_11).\n - net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n - net: usb: qmi_wwan: add support for DW5821e with eSIM support\n (networking-stable-19_11_10).\n - net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules\n (networking-stable-19_11_18).\n - net_sched: ematch: reject invalid TCF_EM_SIMPLE\n (networking-stable-20_01_30).\n - net_sched: fix an OOB access in cls_tcindex (networking-stable-20_02_05).\n - net_sched: fix datalen for ematch (networking-stable-20_01_27).\n - netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n - new helper: lookup_positive_unlocked() (bsc#1159271).\n - nvme: fix the parameter order for nvme_get_log in nvme_get_fw_slot_info\n (bsc#1163774).\n - openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info()\n (networking-stable-19_12_03).\n - openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n - openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n - orinoco_usb: fix interface sanity check (git-fixes).\n - percpu: Separate decrypted varaibles anytime encryption can be enabled\n (bsc#1114279).\n - perf/x86/intel: Fix inaccurate period in context switch for auto-reload\n (bsc#1164315).\n - phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n - pinctrl: cherryview: Fix irq_valid_mask calculation (bsc#1111666).\n - pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n - pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B\n (bsc#1051510).\n - pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).\n - pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM\n (networking-stable-20_01_11).\n - pktcdvd: remove warning on attempting to register non-passthrough dev\n (bsc#1051510).\n - platform/mellanox: fix potential deadlock in the tmfifo driver\n (bsc#1136333 jsc#SLE-4994).\n - platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0\n (bsc#1051510).\n - platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size\n (bsc#1051510).\n - platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer\n (bsc#1051510).\n - platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes\n (bsc#1051510).\n - platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI\n table (bsc#1051510).\n - power: supply: ltc2941-battery-gauge: fix use-after-free (bsc#1051510).\n - powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n - powerpc/irq: fix stack overflow verification (bsc#1065729).\n - powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2\n (bsc#1061840).\n - powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n - powerpc/papr_scm: Do not enable direct map for a region by default\n (bsc#1129551).\n - powerpc/papr_scm: Fix leaking 'bus_desc.provider_name' in some paths\n (bsc#1142685 ltc#179509).\n - powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n - powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n - powerpc/pseries/hotplug-memory: Change rc variable to bool (bsc#1065729).\n - powerpc/pseries/lparcfg: Fix display of Maximum Memory (bsc#1162028\n ltc#181740).\n - powerpc/pseries/memory-hotplug: Only update DT once per memory DLPAR\n request (bsc#1165404 ltc#183498).\n - powerpc/pseries/mobility: notify network peers after migration\n (bsc#1152631 ltc#181798).\n - powerpc/pseries/vio: Fix iommu_table use-after-free refcount warning\n (bsc#1065729).\n - powerpc/pseries: Add cpu DLPAR support for drc-info property\n (bsc#1157480 ltc#181028).\n - powerpc/pseries: Advance pfn if section is not present in\n lmb_is_removable() (bsc#1065729).\n - powerpc/pseries: Allow not having ibm,\n hypertas-functions::hcall-multi-tce for DDW (bsc#1065729).\n - powerpc/pseries: Avoid NULL pointer dereference when drmem is\n unavailable (bsc#1160659).\n - powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init()\n (git-fixes).\n - powerpc/pseries: Enable support for ibm,drc-info property (bsc#1157480\n ltc#181028).\n - powerpc/pseries: Fix bad drc_index_start value parsing of drc-info entry\n (bsc#1157480 ltc#181028).\n - powerpc/pseries: Fix drc-info mappings of logical cpus to drc-index\n (bsc#1157480 ltc#181028).\n - powerpc/pseries: Fix vector5 in ibm architecture vector table\n (bsc#1157480 ltc#181028).\n - powerpc/pseries: Revert support for ibm,drc-info devtree property\n (bsc#1157480 ltc#181028).\n - powerpc/pseries: group lmb operation and memblock's (bsc#1165404\n ltc#183498).\n - powerpc/pseries: update device tree before ejecting hotplug uevents\n (bsc#1165404 ltc#183498).\n - powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n - powerpc/smp: Use nid as fallback for package_id (bsc#1165813 ltc#184091).\n - powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal\n delivery (bsc#1118338 ltc#173734).\n - powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n - powerpc/xive: Discard ESB load value when interrupt is invalid\n (bsc#1085030).\n - powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts\n (bsc#1085030).\n - powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n - powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges\n >4GB (bnc#1151927 5.3.17).\n - powerpc: Allow flush_icache_range to work across ranges >4GB\n (bnc#1151927 5.3.17).\n - powerpc: Enable support for ibm,drc-info devtree property (bsc#1157480\n ltc#181028).\n - powerpc: Fix vDSO clock_getres() (bsc#1065729).\n - powerpc: avoid adjusting memory_limit for capture kernel memory\n reservation (bsc#1140025 ltc#176086).\n - powerpc: reserve memory for capture kernel after hugepages init\n (bsc#1140025 ltc#176086).\n - ppp: Adjust indentation into ppp_async_input (git-fixes).\n - prevent active file list thrashing due to refault detection (VM\n Performance, bsc#1156286).\n - pseries/drc-info: Search DRC properties for CPU indexes (bsc#1157480\n ltc#181028).\n - pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n - ptr_ring: add include of linux/mm.h (bsc#1109837).\n - pwm: Clear chip_data in pwm_put() (bsc#1051510).\n - pwm: Remove set but not set variable 'pwm' (git-fixes).\n - pwm: clps711x: Fix period calculation (bsc#1051510).\n - pwm: omap-dmtimer: Remove PWM chip in .remove before making it\n unfunctional (git-fixes).\n - pxa168fb: Fix the function used to release some memory in an error\n (bsc#1114279)\n - qede: Disable hardware gro when xdp prog is installed (bsc#1086314\n bsc#1086313 bsc#1086301 ).\n - qede: Fix multicast mac configuration (networking-stable-19_12_28).\n - qede: fix NULL pointer deref in __qede_remove()\n (networking-stable-19_11_10).\n - qmi_wwan: Add support for Quectel RM500Q (bsc#1051510).\n - quota: Check that quota is not dirty before release (bsc#1163858).\n - quota: fix livelock in dquot_writeback_dquots (bsc#1163857).\n - r8152: add missing endpoint sanity check (bsc#1051510).\n - r8152: get default setting of WOL before initializing (bsc#1051510).\n - random: move FIPS continuous test to output functions (bsc#1155334).\n - regulator: Fix return value of _set_load() stub (bsc#1051510).\n - regulator: rk808: Lower log level on optional GPIOs being not available\n (bsc#1051510).\n - regulator: rn5t618: fix module aliases (bsc#1051510).\n - regulator: tps65910: fix a missing check of return value (bsc#1051510).\n - reiserfs: Fix memory leak of journal device string (bsc#1163867).\n - reiserfs: Fix spurious unlock in reiserfs_fill_super() error handling\n (bsc#1163869).\n - reset: fix reset_control_ops kerneldoc comment (bsc#1051510).\n - resource: fix locking in find_next_iomem_res() (bsc#1114279).\n - rpm/kabi.pl: support new (>=5.4) Module.symvers format (new symbol\n namespace field)\n - rpm/kernel-binary.spec.in: Conflict with too old powerpc-utils\n (jsc#ECO-920, jsc#SLE-11054, jsc#SLE-11322).\n - rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends\n (bsc#1143959) For reducing the dependency on kernel-firmware in sub\n packages\n - rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n - rpm/modules.fips: update module list (bsc#1157853)\n - rsi_91x_usb: fix interface sanity check (git-fixes).\n - rtc: cmos: Stop using shared IRQ (bsc#1051510).\n - rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n - rtc: hym8563: Return -EINVAL if the time is known to be invalid\n (bsc#1051510).\n - rtc: max8997: Fix the returned value in case of error in\n 'max8997_rtc_read_alarm()' (bsc#1051510).\n - rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n - rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n - rtc: s35390a: Change buf's type to u8 in s35390a_init (bsc#1051510).\n - rtl818x: fix potential use after free (bsc#1051510).\n - rtl8xxxu: fix interface sanity check (git-fixes).\n - rtlwifi: Fix MAX MPDU of VHT capability (git-fixes).\n - rtlwifi: Remove redundant semicolon in wifi.h (git-fixes).\n - rtlwifi: rtl8192de: Fix missing callback that tests for hw release of\n buffer (bsc#1111666).\n - rxrpc: Fix insufficient receive notification generation\n (networking-stable-20_02_05).\n - s390/qeth: clean up page frag creation (git-fixes).\n - s390/qeth: consolidate skb allocation (git-fixes).\n - s390/qeth: ensure linear access to packet headers (git-fixes).\n - s390/qeth: guard against runt packets (git-fixes).\n - sched/fair: Add tmp_alone_branch assertion (bnc#1156462).\n - sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).\n - sched/fair: Fix insertion in rq->leaf_cfs_rq_list (bnc#1156462).\n - sched/fair: Optimize update_blocked_averages() (bnc#1156462).\n - sched/fair: WARN() and refuse to set buddy when !se->on_rq (bsc#1158132).\n - scsi-qla2xxx-Fix-qla2x00_request_irqs-for-MSI.patch\n - scsi-qla2xxx-fix-rports-not-being-mark-as-lost-in-sy.patch\n - scsi-qla2xxx-unregister-ports-after-GPN_FT-failure.patch\n - scsi: fnic: do not queue commands during fwreset (bsc#1146539).\n - scsi: ibmvfc: Add failed PRLI to cmd_status lookup array (bsc#1161951\n ltc#183551).\n - scsi: ibmvfc: Avoid loss of all paths during SVC node reboot\n (bsc#1161951 ltc#183551).\n - scsi: ibmvfc: Byte swap status and error codes when logging (bsc#1161951\n ltc#183551).\n - scsi: ibmvfc: Clean up transport events (bsc#1161951 ltc#183551).\n - scsi: ibmvfc: Do not call fc_block_scsi_eh() on host reset (bsc#1161951\n ltc#183551).\n - scsi: ibmvfc: Mark expected switch fall-throughs (bsc#1161951\n ltc#183551).\n - scsi: ibmvfc: Remove \"failed\" from logged errors (bsc#1161951\n ltc#183551).\n - scsi: ibmvfc: Remove unneeded semicolons (bsc#1161951 ltc#183551).\n - scsi: ibmvfc: constify dev_pm_ops structures (bsc#1161951 ltc#183551).\n - scsi: ibmvfc: ibmvscsi: ibmvscsi_tgt: constify vio_device_id\n (bsc#1161951 ltc#183551).\n - scsi: ibmvscsi: Do not use rc uninitialized in ibmvscsi_do_work\n (bsc#1161951 ltc#183551).\n - scsi: ibmvscsi: Improve strings handling (bsc#1161951 ltc#183551).\n - scsi: ibmvscsi: Wire up host_reset() in the driver's scsi_host_template\n (bsc#1161951 ltc#183551).\n - scsi: ibmvscsi: change strncpy+truncation to strlcpy (bsc#1161951\n ltc#183551).\n - scsi: ibmvscsi: constify dev_pm_ops structures (bsc#1161951 ltc#183551).\n - scsi: ibmvscsi: fix tripping of blk_mq_run_hw_queue WARN_ON (bsc#1161951\n ltc#183551).\n - scsi: ibmvscsi: redo driver work thread to use enum action states\n (bsc#1161951 ltc#183551).\n - scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1154601).\n - scsi: qla2xxx: Add 16.0GT for PCI String (bsc#1157424).\n - scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs\n (bsc#1158013).\n - scsi: qla2xxx: Add a shadow variable to hold disc_state history of\n fcport (bsc#1158013).\n - scsi: qla2xxx: Add beacon LED config sysfs interface (bsc#1157424).\n - scsi: qla2xxx: Add changes in preparation for vendor extended FDMI/RDP\n (bsc#1157424).\n - scsi: qla2xxx: Add deferred queue for processing ABTS and RDP\n (bsc#1157424).\n - scsi: qla2xxx: Add endianizer macro calls to fc host stats (bsc#1157424).\n - scsi: qla2xxx: Add fixes for mailbox command (bsc#1157424).\n - scsi: qla2xxx: Add ql2xrdpenable module parameter for RDP (bsc#1157424).\n - scsi: qla2xxx: Add sysfs node for D-Port Diagnostics AEN data\n (bsc#1157424).\n - scsi: qla2xxx: Add vendor extended FDMI commands (bsc#1157424).\n - scsi: qla2xxx: Add vendor extended RDP additions and amendments\n (bsc#1157424).\n - scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX\n (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n - scsi: qla2xxx: Avoid setting firmware options twice in\n 24xx_update_fw_options (bsc#1157424).\n - scsi: qla2xxx: Check locking assumptions at runtime in\n qla2x00_abort_srb() (bsc#1157424).\n - scsi: qla2xxx: Cleanup ELS/PUREX iocb fields (bsc#1157424).\n - scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n - scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n - scsi: qla2xxx: Convert MAKE_HANDLE() from a define into an inline\n function (bsc#1157424).\n - scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n - scsi: qla2xxx: Correction to selection of loopback/echo test\n (bsc#1157424).\n - scsi: qla2xxx: Correctly retrieve and interpret active flash region\n (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n - scsi: qla2xxx: Display message for FCE enabled (bsc#1157424).\n - scsi: qla2xxx: Fix FCP-SCSI FC4 flag passing error (bsc#1157424).\n - scsi: qla2xxx: Fix NPIV instantiation after FW dump (bsc#1157424).\n - scsi: qla2xxx: Fix RDP respond data format (bsc#1157424).\n - scsi: qla2xxx: Fix RDP response size (bsc#1157424).\n - scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n - scsi: qla2xxx: Fix a NULL pointer dereference in an error path\n (bsc#1157966 bsc#1158013 bsc#1157424).\n - scsi: qla2xxx: Fix control flags for login/logout IOCB (bsc#1157424).\n - scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n - scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB\n Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n - scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n - scsi: qla2xxx: Fix qla2x00_echo_test() based on ISP type (bsc#1157424).\n - scsi: qla2xxx: Fix sparse warning reported by kbuild bot (bsc#1157424).\n - scsi: qla2xxx: Fix sparse warnings triggered by the PCI state checking\n code (bsc#1157424).\n - scsi: qla2xxx: Fix stuck login session using prli_pend_timer\n (bsc#1158013).\n - scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n - scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return\n type (bsc#1158013).\n - scsi: qla2xxx: Fix unbound NVME response length (bsc#1157966 bsc#1158013\n bsc#1157424).\n - scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n - scsi: qla2xxx: Force semaphore on flash validation failure (bsc#1157424).\n - scsi: qla2xxx: Handle NVME status iocb correctly (bsc#1157424).\n - scsi: qla2xxx: Handle cases for limiting RDP response payload length\n (bsc#1157424).\n - scsi: qla2xxx: Improve readability of the code that handles\n qla_flt_header (bsc#1158013).\n - scsi: qla2xxx: Improved secure flash support messages (bsc#1157424).\n - scsi: qla2xxx: Move free of fcport out of interrupt context\n (bsc#1157424).\n - scsi: qla2xxx: Print portname for logging in qla24xx_logio_entry()\n (bsc#1157424).\n - scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss\n (bsc#1158013).\n - scsi: qla2xxx: Remove restriction of FC T10-PI and FC-NVMe (bsc#1157424).\n - scsi: qla2xxx: Return appropriate failure through BSG Interface\n (bsc#1157424).\n - scsi: qla2xxx: Save rscn_gen for new fcport (bsc#1157424).\n - scsi: qla2xxx: Serialize fc_port alloc in N2N (bsc#1157424).\n - scsi: qla2xxx: Set Nport ID for N2N (bsc#1157424).\n - scsi: qla2xxx: Show correct port speed capabilities for RDP command\n (bsc#1157424).\n - scsi: qla2xxx: Simplify the code for aborting SCSI commands\n (bsc#1157424).\n - scsi: qla2xxx: Suppress endianness complaints in\n qla2x00_configure_local_loop() (bsc#1157424).\n - scsi: qla2xxx: Update BPM enablement semantics (bsc#1157424).\n - scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n - scsi: qla2xxx: Update driver version to 10.01.00.24-k (bsc#1157424).\n - scsi: qla2xxx: Update driver version to 10.01.00.25-k (bsc#1157424).\n - scsi: qla2xxx: Use FC generic update firmware options routine for\n ISP27xx (bsc#1157424).\n - scsi: qla2xxx: Use QLA_FW_STOPPED macro to propagate flag (bsc#1157424).\n - scsi: qla2xxx: Use a dedicated interrupt handler for\n 'handshake-required' ISPs (bsc#1157424).\n - scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n - scsi: qla2xxx: Use correct ISP28xx active FW region (bsc#1157424).\n - scsi: qla2xxx: Use endian macros to assign static fields in fwdump\n header (bsc#1157424).\n - scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these\n functions (bsc#1158013).\n - scsi: qla2xxx: add more FW debug information (bsc#1157424).\n - scsi: qla2xxx: fix FW resource count values (bsc#1157424).\n - scsi: tcm_qla2xxx: Make qlt_alloc_qfull_cmd() set cmd->se_cmd.map_tag\n (bsc#1157424).\n - scsi: zfcp: trace channel log even for FCP command responses (git-fixes).\n - sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n - sctp: free cmd->obj.chunk for the unprocessed SCTP_CMD_REPLY\n (networking-stable-20_01_11).\n - sctp: fully initialize v4 addr in some functions\n (networking-stable-19_12_28).\n - serial: 8250_bcm2835aux: Fix line mismatch on driver unbind\n (bsc#1051510).\n - serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n - serial: max310x: Fix tx_empty() callback (bsc#1051510).\n - serial: pl011: Fix DMA ->flush_buffer() (bsc#1051510).\n - serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n - serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n - sfc: Only cancel the PPS workqueue if it exists\n (networking-stable-19_11_25).\n - sfc: Remove 'PCIE error reporting unavailable' (bsc#1161472).\n - sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n - sh_eth: check sh_eth_cpu_data::dual_port when dumping registers\n (bsc#1051510).\n - sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n - sh_eth: fix TXALCR1 offsets (bsc#1051510).\n - sh_eth: fix dumping ARSTR (bsc#1051510).\n - sh_eth: fix invalid context bug while calling auto-negotiation by\n ethtool (bsc#1051510).\n - sh_eth: fix invalid context bug while changing link options by ethtool\n (bsc#1051510).\n - smb3: Add defines for new information level, FileIdInformation\n (bsc#1144333).\n - smb3: Add missing reparse tags (bsc#1144333).\n - smb3: Fix regression in time handling (bsc#1144333).\n - smb3: add debug messages for closing unmatched open (bsc#1144333).\n - smb3: add dynamic tracepoints for flush and close (bsc#1144333).\n - smb3: add missing flag definitions (bsc#1144333).\n - smb3: add missing worker function for SMB3 change notify (bsc#1144333).\n - smb3: add mount option to allow RW caching of share accessed by only 1\n client (bsc#1144333).\n - smb3: add mount option to allow forced caching of read only share\n (bsc#1144333).\n - smb3: add one more dynamic tracepoint missing from strict fsync path\n (bsc#1144333).\n - smb3: add some more descriptive messages about share when mounting\n cache=ro (bsc#1144333).\n - smb3: allow decryption keys to be dumped by admin for debugging\n (bsc#1144333).\n - smb3: allow disabling requesting leases (bsc#1144333).\n - smb3: allow parallelizing decryption of reads (bsc#1144333).\n - smb3: allow skipping signature verification for perf sensitive\n configurations (bsc#1144333).\n - smb3: cleanup some recent endian errors spotted by updated sparse\n (bsc#1144333).\n - smb3: display max smb3 requests in flight at any one time (bsc#1144333).\n - smb3: dump in_send and num_waiters stats counters by default\n (bsc#1144333).\n - smb3: enable offload of decryption of large reads via mount option\n (bsc#1144333).\n - smb3: fix default permissions on new files when mounting with\n modefromsid (bsc#1144333).\n - smb3: fix mode passed in on create for modetosid mount option\n (bsc#1144333).\n - smb3: fix performance regression with setting mtime (bsc#1144333).\n - smb3: fix potential null dereference in decrypt offload (bsc#1144333).\n - smb3: fix problem with null cifs super block with previous patch\n (bsc#1144333).\n - smb3: fix refcount underflow warning on unmount when no directory leases\n (bsc#1144333).\n - smb3: improve check for when we send the security descriptor context on\n create (bsc#1144333).\n - smb3: log warning if CSC policy conflicts with cache mount option\n (bsc#1144333).\n - smb3: missing ACL related flags (bsc#1144333).\n - smb3: only offload decryption of read responses if multiple requests\n (bsc#1144333).\n - smb3: pass mode bits into create calls (bsc#1144333).\n - smb3: query attributes on file close (bsc#1144333).\n - smb3: remove confusing dmesg when mounting with encryption (\"seal\")\n (bsc#1144333).\n - smb3: remove noisy debug message and minor cleanup (bsc#1144333).\n - smb3: remove unused flag passed into close functions (bsc#1144333).\n - soc/tegra: fuse: Correct straps' address for older Tegra124 device trees\n (bsc#1051510).\n - soc: renesas: rcar-sysc: Add goto to of_node_put() before return\n (bsc#1051510).\n - soc: ti: wkup_m3_ipc: Fix race condition with rproc_boot (bsc#1051510).\n - spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch\n (bsc#1051510).\n - spi: omap2-mcspi: Set FIFO DMA trigger level to word length\n (bsc#1051510).\n - spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n - spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n - spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n - spi: tegra114: flush fifos (bsc#1051510).\n - spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n - sr_vendor: support Beurer GL50 evo CD-on-a-chip devices (boo#1164632).\n - staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713\n (bsc#1051510).\n - staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n - staging: rtl8192e: fix potential use after free (bsc#1051510).\n - staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids\n (bsc#1051510).\n - staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).\n - staging: vt6656: Fix false Tx excessive retries reporting (bsc#1051510).\n - staging: vt6656: correct packet types for CTS protect, mode\n (bsc#1051510).\n - staging: vt6656: use NULLFUCTION stack on mac80211 (bsc#1051510).\n - staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n - stm class: Fix a double free of stm_source_device (bsc#1051510).\n - stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock\n (bsc#1088810, bsc#1161702).\n - stop_machine: Atomically queue and wake stopper threads (bsc#1088810,\n bsc#1161702).\n - stop_machine: Disable preemption after queueing stopper threads\n (bsc#1088810, bsc#1161702).\n - stop_machine: Disable preemption when waking two stopper threads\n (bsc#1088810, bsc#1161702).\n - tcp: clear tp->data_segs{in|out} in tcp_disconnect()\n (networking-stable-20_02_05).\n - tcp: clear tp->delivered in tcp_disconnect()\n (networking-stable-20_02_05).\n - tcp: clear tp->packets_out when purging write queue (bsc#1160560).\n - tcp: clear tp->segs_{in|out} in tcp_disconnect()\n (networking-stable-20_02_05).\n - tcp: clear tp->total_retrans in tcp_disconnect()\n (networking-stable-20_02_05).\n - tcp: do not send empty skb from tcp_write_xmit()\n (networking-stable-20_01_01).\n - tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable\n 4.14.159).\n - tcp: fix \"old stuff\" D-SACK causing SACK to be treated as D-SACK\n (networking-stable-20_01_11).\n - tcp: fix marked lost packets not being retransmitted\n (networking-stable-20_01_20).\n - tcp: md5: fix potential overestimation of TCP option space\n (networking-stable-19_12_16).\n - tcp_bbr: improve arithmetic division in bbr_update_bw()\n (networking-stable-20_01_27).\n - thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).\n - thunderbolt: Prevent crash if non-active NVMem file is read (git-fixes).\n - tipc: fix a missing check of genlmsg_put (bsc#1051510).\n - tipc: fix link name length check (bsc#1051510).\n - tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).\n - tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).\n - tools lib traceevent: Do not free tep->cmdlines in add_new_comm() on\n failure (git-fixes).\n - tracing: Annotate ftrace_graph_hash pointer with __rcu (git-fixes).\n - tracing: Annotate ftrace_graph_notrace_hash pointer with __rcu\n (git-fixes).\n - tracing: Fix tracing_stat return values in error handling paths\n (git-fixes).\n - tracing: Fix very unlikely race of registering two stat tracers\n (git-fixes).\n - tracing: Have the histogram compare functions convert to u64 first\n (bsc#1160210).\n - tracing: xen: Ordered comparison of function pointers (git-fixes).\n - tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n - tty: n_hdlc: fix build on SPARC (bsc#1051510).\n - tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n - tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n - ttyprintk: fix a potential deadlock in interrupt context issue\n (git-fixes).\n - tun: add mutex_unlock() call and napi.skb clearing in tun_get_user()\n (bsc#1109837).\n - uaccess: Add non-pagefault user-space write function (bsc#1083647).\n - ubifs: Fix FS_IOC_SETFLAGS unexpectedly clearing encrypt flag\n (bsc#1163855).\n - ubifs: Fix deadlock in concurrent bulk-read and writepage (bsc#1163856).\n - ubifs: Reject unsupported ioctl flags explicitly (bsc#1163844).\n - ubifs: do not trigger assertion on invalid no-key filename (bsc#1163850).\n - udp: fix integer overflow while computing available space in sk_rcvbuf\n (networking-stable-20_01_01).\n - usb-storage: Disable UAS on JMicron SATA enclosure (bsc#1051510).\n - usb: Allow USB device to be warm reset in suspended state (bsc#1051510).\n - usb: chipidea: host: Disable port power only if previously enabled\n (bsc#1051510).\n - usb: core: hub: Improved device recognition on remote wakeup\n (bsc#1051510).\n - usb: core: urb: fix URB structure initialization function (bsc#1051510).\n - usb: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n - usb: dwc3: do not log probe deferrals; but do log other error codes\n (bsc#1051510).\n - usb: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n - usb: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n - usb: gadget: Zero ffs_io_data (bsc#1051510).\n - usb: gadget: f_ecm: Use atomic_t to track in-flight request\n (bsc#1051510).\n - usb: gadget: f_ncm: Use atomic_t to track in-flight request\n (bsc#1051510).\n - usb: gadget: legacy: set max_speed to super-speed (bsc#1051510).\n - usb: gadget: pch_udc: fix use after free (bsc#1051510).\n - usb: gadget: u_serial: add missing port entry locking (bsc#1051510).\n - usb: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n - usb: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n - usb: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n - usb: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n - usb: musb: fix idling for suspend after disconnect interrupt\n (bsc#1051510).\n - usb: roles: fix a potential use after free (git-fixes).\n - usb: typec: tcpci: mask event interrupts when remove driver\n (bsc#1051510).\n - usb: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n - usb: xhci: only set D3hot for pci device (bsc#1051510).\n - usbip: Fix error path of vhci_recv_ret_submit() (git-fixes).\n - usbip: Fix receive error in vhci-hcd when using scatter-gather\n (bsc#1051510).\n - usbip: Fix uninitialized symbol 'nents' in stub_recv_cmd_submit()\n (git-fixes).\n - vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1\n (bsc#1051510).\n - vhost/vsock: accept only packets with the right dst_cid\n (networking-stable-20_01_01).\n - video: backlight: Add devres versions of of_find_backlight (bsc#1090888)\n Taken for 6010831dde5.\n - video: backlight: Add of_find_backlight helper in backlight.c\n (bsc#1090888) Taken for 6010831dde5.\n - vlan: fix memory leak in vlan_dev_set_egress_priority\n (networking-stable-20_01_11).\n - vlan: vlan_changelink() should propagate errors\n (networking-stable-20_01_11).\n - vxlan: fix tos value before xmit (networking-stable-20_01_11).\n - watchdog: max77620_wdt: fix potential build errors (bsc#1051510).\n - watchdog: rn5t618_wdt: fix module aliases (bsc#1051510).\n - watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).\n - watchdog: wdat_wdt: fix get_timeleft call for wdat_wdt (bsc#1162557).\n - wireless: fix enabling channel 12 for custom regulatory domain\n (bsc#1051510).\n - wireless: wext: avoid gcc -O3 warning (bsc#1051510).\n - workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n - x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks\n (bsc#1114279).\n - x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure()\n (bsc#1114279).\n - x86/amd_nb: Add PCI device IDs for family 17h, model 70h (bsc#1163206).\n - x86/cpu: Update cached HLE state on write to TSX_CTRL_CPUID_CLEAR\n (bsc#1162619).\n - x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n - x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n - x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n - x86/mce/AMD: Allow any CPU to initialize the smca_banks array\n (bsc#1114279).\n - x86/mce: Fix possibly incorrect severity calculation on AMD\n (bsc#1114279).\n - x86/resctrl: Check monitoring static key in the MBM overflow handler\n (bsc#1114279).\n - x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n - x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n - x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n - x86/resctrl: Fix potential memory leak (bsc#1114279).\n - x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup\n (bsc#1112178).\n - x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup\n (bsc#1112178).\n - x86/resctrl: Fix use-after-free when deleting resource groups\n (bsc#1114279).\n - x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).\n - x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).\n - xen-blkfront: switch kcalloc to kvcalloc for large array allocation\n (bsc#1160917).\n - xen/balloon: Support xend-based toolstack take two (bsc#1065600).\n - xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n - xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n - xen: Enable interrupts when calling _cond_resched() (bsc#1065600).\n - xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n - xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087,\n bsc#1153917).\n - xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n - xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n - xhci: fix USB3 device initiated resume race with roothub autosuspend\n (bsc#1051510).\n - xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour\n (bsc#1051510).\n - xhci: make sure interrupts are restored to correct state (bsc#1051510).\n - zd1211rw: fix storage endpoint lookup (git-fixes).\n\n\nSpecial Instructions and Notes:\n\n Please reboot the system after installing this update.\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.1:\n\n zypper in -t patch openSUSE-2020-336=1", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-03-13T00:00:00", "type": "suse", "title": "Security update for the Linux Kernel (important)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-14615", "CVE-2019-14896", "CVE-2019-14897", "CVE-2019-16746", "CVE-2019-16994", "CVE-2019-18808", "CVE-2019-19036", "CVE-2019-19045", "CVE-2019-19051", "CVE-2019-19054", "CVE-2019-19066", "CVE-2019-19318", "CVE-2019-19319", "CVE-2019-19332", "CVE-2019-19338", "CVE-2019-19447", "CVE-2019-19523", "CVE-2019-19526", "CVE-2019-19527", "CVE-2019-19532", "CVE-2019-19533", "CVE-2019-19535", "CVE-2019-19537", "CVE-2019-19767", "CVE-2019-19927", "CVE-2019-19965", "CVE-2019-19966", "CVE-2019-20054", "CVE-2019-20095", "CVE-2019-20096", "CVE-2020-2732", "CVE-2020-7053", "CVE-2020-8428", "CVE-2020-8648", "CVE-2020-8992"], "modified": "2020-03-13T00:00:00", "id": "OPENSUSE-SU-2020:0336-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2023-09-24T16:22:52", "description": "The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-15211: There was a use-after-free caused by a malicious USB device in drivers/media/v4l2-core/v4l2-dev.c (bnc#1146519).\n\n - CVE-2019-15213: There was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).\n\n - CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca (bnc#1158427 1158445).\n\n - CVE-2019-19543: There is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).\n\n - CVE-2019-19525: There is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035 (bnc#1158417).\n\n - CVE-2019-19530: There is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef (bnc#1158410).\n\n - CVE-2019-19536: There is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0 (bnc#1158394).\n\n - CVE-2019-19524: There is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9 (bnc#1158413).\n\n - CVE-2019-19528: There is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d (bnc#1158407).\n\n - CVE-2019-19534: There is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29 (bnc#1158398).\n\n - CVE-2019-19529: There is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41 (bnc#1158381).\n\n - CVE-2019-14901: A heap overflow flaw was found in the Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).\n\n - CVE-2019-14895: A heap-based buffer overflow was discovered in the Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).\n\n - CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).\n\n - CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid, which was exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).\n\n - CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c allowed attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559 (bnc#1156258).\n\n - CVE-2019-19046: A memory leak in the\n __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c was fixed (bnc#1157304).\n\n - CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2 (bnc#1157032).\n\n - CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042 (bnc#1157333).\n\n - CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e (bnc#1157193).\n\n - CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932 (bnc#1157197).\n\n - CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6 (bnc#1157307).\n\n - CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allowed attackers to cause a denial of service (memory consumption), aka CID-3f9361695113 (bnc#1157298).\n\n - CVE-2019-19227: In the AppleTalk subsystem there was a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122 (bnc#1157678).\n\n - CVE-2019-19081: A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c allowed attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a (bnc#1157045).\n\n - CVE-2019-19080: Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c allowed attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a (bnc#1157044).\n\n - CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e (bnc#1157191).\n\n - CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c allowed attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14 (bnc#1157171).\n\n - CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486 (bnc#1157324).\n\n - CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c were fixed. (bnc#1157180).\n\n - CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c allowed attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41 (bnc#1157178).\n\n - CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c was fixed.\n (bnc#1157173).\n\n - CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e (bnc#1157162).\n\n - CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allowed attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5 (bnc#1157145).\n\n - CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4 (bnc#1157143).\n\n - CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10 (bnc#1157070).\n\n - CVE-2019-19083: Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc allowed attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1 (bnc#1157049).\n\n - CVE-2019-19082: Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc allowed attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad (bnc#1157046).\n\n - CVE-2019-15916: There was a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service (bnc#1149448).\n\nThe following non-security bugs were fixed :\n\n - ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n\n - ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n\n - ACPI / hotplug / PCI: Allocate resources directly under the non-hotplug bridge (bsc#1111666).\n\n - ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n\n - acpi/nfit, device-dax: Identify differentiated memory with a unique numa-node (bsc#1158071).\n\n - ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n\n - ALSA: 6fire: Drop the dead code (git-fixes).\n\n - ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n\n - ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n\n - ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n\n - ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n\n - ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n\n - ALSA: hda: Fix racy display power access (bsc#1156928).\n\n - ALSA: hda/hdmi - Clear codec->relaxed_resume flag at unbinding (git-fixes).\n\n - ALSA: hda: hdmi - fix port numbering for ICL and TGL platforms (git-fixes).\n\n - ALSA: hda: hdmi - remove redundant code comments (git-fixes).\n\n - ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n\n - ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC (git-fixes).\n\n - ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop (git-fixes).\n\n - ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n\n - ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n\n - ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n\n - ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n\n - ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n\n - ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n\n - ALSA: pcm: Yet another missing check of non-cached buffer type (bsc#1111666).\n\n - ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n\n - ALSA: usb-audio: Add skip_validation option (git-fixes).\n\n - ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n\n - ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk() (git-fixes).\n\n - ALSA: usb-audio: Fix incorrect size check for processing/extension units (git-fixes).\n\n - ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n\n - ALSA: usb-audio: Fix NULL dereference at parsing BADD (git-fixes).\n\n - ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n\n - ALSA: usb-audio: sound: usb: usb true/false for bool return type (git-fixes).\n\n - appledisplay: fix error handling in the scheduled work (git-fixes).\n\n - arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n\n - ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n\n - ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n\n - ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n\n - ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n\n - ASoC: kirkwood: fix external clock probe defer (git-fixes).\n\n - ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n\n - ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n\n - ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n\n - ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n\n - ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n\n - ata: ep93xx: Use proper enums for directions (bsc#1051510).\n\n - ath10k: allocate small size dma memory in ath10k_pci_diag_write_mem (bsc#1111666).\n\n - ath10k: avoid possible memory access violation (bsc#1111666).\n\n - ath10k: Correct error handling of dma_map_single() (bsc#1111666).\n\n - ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n\n - ath10k: fix vdev-start timeout on error (bsc#1051510).\n\n - ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n\n - ath10k: skip resetting rx filter for WCN3990 (bsc#1111666).\n\n - ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n\n - ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n\n - ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n\n - ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n\n - ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n\n - ath9k_hw: fix uninitialized variable data (bsc#1051510).\n\n - ax88172a: fix information leak on short answers (bsc#1051510).\n\n - backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n\n - Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n\n - Bluetooth: delete a stray unlock (bsc#1051510).\n\n - Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n\n - Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n\n - Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n\n - Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n\n - bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands (bsc#1104745).\n\n - bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands (bsc#1104745 FATE#325918).\n\n - bnxt_en: Update firmware interface spec. to 1.10.0.47 (bsc#1157115)\n\n - bnxt_en: Update firmware interface spec. to 1.10.0.89 (bsc#1157115)\n\n - bnxt_en: Update firmware interface to 1.10.0.69 (bsc#1157115)\n\n - bpf: fix BTF limits (bsc#1109837).\n\n - bpf: fix BTF verification of enums (bsc#1109837).\n\n - bpf: Fix use after free in subprog's jited symbol removal (bsc#1109837).\n\n - brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n\n - brcmfmac: fix wrong strnchr usage (bsc#1111666).\n\n - brcmfmac: increase buffer for obtaining firmware capabilities (bsc#1111666).\n\n - brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n\n - brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n\n - brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).\n\n - brcmsmac: Use kvmalloc() for ucode allocations (bsc#1111666).\n\n - btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n\n - can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n\n - can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n\n - can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n\n - can: peak_usb: fix slab info leak (git-fixes).\n\n - can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n\n - can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n\n - can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n\n - can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n\n - ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n\n - ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n\n - ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n\n - ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n\n - cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n\n - cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n\n - cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n\n - cfg80211: validate wmm rule when setting (bsc#1111666).\n\n - cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).\n\n - cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n\n - cifs: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n\n - cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n\n - cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n\n - cifs: fix max ea value size (bsc#1144333, bsc#1154355).\n\n - cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n\n - cifs: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n\n - cifs: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n\n - cifs: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n\n - cifs: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n\n - cifs: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n\n - cifs: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n\n - cifs: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n\n - cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n\n - cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n\n - cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n\n - cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n\n - cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n\n - cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n\n - clk: at91: avoid sleeping early (git-fixes).\n\n - clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n\n - clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n\n - clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n\n - clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n\n - clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n\n - clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n\n - clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n\n - compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n\n - component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n\n - cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n\n - cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n\n - cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n\n - cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).\n\n - cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n\n - cpupower: Fix coredump on VMware (bsc#1051510).\n\n - cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n\n - cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n\n - crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n\n - crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n\n - crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n\n - crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n\n - crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n\n - crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n\n - crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n\n - crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).\n\n - crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n\n - crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n\n - cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n\n - cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n\n - cxgb4: request the TX CIDX updates to status page (bsc#1127354 bsc#1127371).\n\n - dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n\n - dlm: do not leak kernel pointer to userspace (bsc#1051510).\n\n - dlm: fix invalid free (bsc#1051510).\n\n - dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n\n - dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n\n - dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n\n - dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n\n - dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n\n - dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n\n - docs: move protection-keys.rst to the core-api book (bsc#1078248).\n\n - docs: move protection-keys.rst to the core-api book (FATE#322447, bsc#1078248).\n\n - Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n\n - Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n\n - Documentation: x86: convert protection-keys.txt to reST (FATE#322447, bsc#1078248).\n\n - drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1111666).\n\n - drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported (bsc#1113956)\n\n - drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n\n - drm: fix module name in edid_firmware log message (bsc#1113956)\n\n - drm/i915: Do not dereference request if it may have been retired when (bsc#1142635)\n\n - drm/i915: Fix and improve MCR selection logic (bsc#1112178)\n\n - drm/i915/gvt: fix dropping obj reference twice (bsc#1111666).\n\n - drm/i915: Lock the engine while dumping the active request (bsc#1142635)\n\n - drm/i915/pmu: 'Frequency' is reported as accumulated cycles (bsc#1112178)\n\n - drm/i915: Reacquire priolist cache after dropping the engine lock (bsc#1129770)\n\n - drm/i915: Skip modeset for cdclk changes if possible (bsc#1156928).\n\n - drm/msm: fix memleak on release (bsc#1111666).\n\n - drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n\n - drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n\n - drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n\n - Drop scsi-qla2xxx-Fix-memory-leak-when-sending-I-O-fails.patc h This patch has introduces an double free. Upstream has dropped it from the scsi-queue before it hit mainline.\n So let's drop it as well.\n\n - e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n\n - e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n\n - e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n\n - ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable (bsc#1158646).\n\n - ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either (bsc#1158647).\n\n - EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n\n - EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n\n - ext4: fix punch hole for inline_data file systems (bsc#1158640).\n\n - ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n\n - extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n\n - fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n\n - fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n\n - ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n\n - gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n\n - gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n\n - gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n\n - gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n\n - HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n\n - HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n\n - HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n\n - HID: Fix assumption that devices have inputs (git-fixes).\n\n - HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n\n - hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n\n - hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n\n - hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n\n - hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n\n - hypfs: Fix error number left in struct pointer member (bsc#1051510).\n\n - i2c: of: Try to find an I2C adapter matching the parent (bsc#1129770)\n\n - i40e: enable X710 support (bsc#1151067).\n\n - IB/mlx5: Free mpi in mp_slave mode (bsc#1103991).\n\n - IB/mlx5: Free mpi in mp_slave mode (bsc#1103991 FATE#326007).\n\n - IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command (bsc#1103991).\n\n - IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command (bsc#1103991 FATE#326007).\n\n - ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n\n - ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n\n - ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n\n - ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n\n - ice: fix potential infinite loop because loop counter being too small (bsc#1118661).\n\n - ice: fix potential infinite loop because loop counter being too small (bsc#1118661 FATE#325277).\n\n - iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n\n - iio: adc: stm32-adc: fix stopping dma (git-fixes).\n\n - iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n\n - iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n\n - iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n\n - iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n\n - iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n\n - include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n\n - inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n\n - Input: ff-memless - kill timer in destroy() (bsc#1051510).\n\n - Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n\n - Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n\n - Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n\n - Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n\n - Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n\n - Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n\n - Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n\n - intel_th: Fix a double put_device() in error path (git-fixes).\n\n - iomap: Fix pipe page leakage during splicing (bsc#1158651).\n\n - iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n\n - ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n\n - ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).\n\n - irqdomain: Add the missing assignment of domain->fwnode for named fwnode (bsc#1111666).\n\n - iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n\n - iwlwifi: check kasprintf() return value (bsc#1051510).\n\n - iwlwifi: drop packets with bad status in CD (bsc#1111666).\n\n - iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n\n - iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n\n - iwlwifi: mvm: use correct FIFO length (bsc#1111666).\n\n - iwlwifi: pcie: fit reclaim msg to MAX_MSG_LEN (bsc#1111666).\n\n - iwlwifi: pcie: read correct prph address for newer devices (bsc#1111666).\n\n - ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 ).\n\n - ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 FATE#326315 FATE#326317).\n\n - ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 ).\n\n - ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 FATE#326315 FATE#326317).\n\n - kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).\n\n - kABI fixup alloc_dax_region (bsc#1158071).\n\n - kabi: s390: struct subchannel (git-fixes).\n\n - kABI workaround for ath10k hw_filter_reset_required field (bsc#1111666).\n\n - kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n\n - kABI workaround for iwlwifi iwl_rx_cmd_buffer change (bsc#1111666).\n\n - kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n\n - KVM: s390: fix __insn32_query() inline assembly (git-fixes).\n\n - KVM: s390: vsie: Do not shadow CRYCB when no AP and no keys (git-fixes).\n\n - KVM: s390: vsie: Return correct values for Invalid CRYCB format (git-fixes).\n\n - KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n\n - KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n\n - KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n\n - KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n\n - KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).\n\n - KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n\n - libnvdimm: Export the target_node attribute for regions and namespaces (bsc#1158071).\n\n - lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n\n - lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n\n - liquidio: fix race condition in instruction completion processing (bsc#1051510).\n\n - livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n\n - livepatch: Allow to distinguish different version of system state changes (bsc#1071995 fate#323487).\n\n - livepatch: Basic API to track system state changes (bsc#1071995 ).\n\n - livepatch: Basic API to track system state changes (bsc#1071995 fate#323487).\n\n - livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n\n - livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995 fate#323487).\n\n - livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n\n - livepatch: Selftests of the API for tracking system state changes (bsc#1071995 fate#323487).\n\n - loop: add ioctl for changing logical block size (bsc#1108043).\n\n - loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n\n - lpfc: size cpu map by last cpu id set (bsc#1157160).\n\n - mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n\n - mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n\n - mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n\n - macvlan: schedule bc_work even if error (bsc#1051510).\n\n - mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n\n - media: au0828: Fix incorrect error messages (bsc#1051510).\n\n - media: bdisp: fix memleak on release (git-fixes).\n\n - media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n\n - media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n\n - media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n\n - media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n\n - media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n\n - media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n\n - media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n\n - media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n\n - media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).\n\n - media: radio: wl1273: fix interrupt masking on release (git-fixes).\n\n - media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n\n - media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n\n - media: vim2m: Fix abort issue (git-fixes).\n\n - media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n\n - mei: fix modalias documentation (git-fixes).\n\n - mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n\n - mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n\n - mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n\n - mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n\n - mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n\n - mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n\n - mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n\n - mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n\n - mlx5: add parameter to disable enhanced IPoIB (bsc#1142095) Fix badly backported patch\n\n - mlxsw: spectrum_flower: Fail in case user specifies multiple mirror actions (bsc#1112374).\n\n - mmc: core: fix wl1251 sdio quirks (git-fixes).\n\n - mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n\n - mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n\n - mm/compaction.c: clear total_(migrate,free)_scanned before scanning a new zone (git fixes (mm/compaction)).\n\n - mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n\n - mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n\n - mmc: sdio: fix wl1251 vendor id (git-fixes).\n\n - mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n\n - mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n\n - mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n\n - mt76x0: init hw capabilities.\n\n - mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n\n - mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n\n - mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n\n - mwifex: free rx_cmd skb in suspended state (bsc#1111666).\n\n - mwifiex: do no submit URB in suspended state (bsc#1111666).\n\n - mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n\n - nbd: prevent memory leak (bsc#1158638).\n\n - net: add READ_ONCE() annotation in\n __skb_wait_for_more_packets() (networking-stable-19_11_05).\n\n - net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n\n - net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).\n\n - net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).\n\n - net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n\n - net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n\n - net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n\n - net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).\n\n - net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n\n - net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n\n - net: dsa: fix switch tree list (networking-stable-19_11_05).\n\n - net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n\n - net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n\n - net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n\n - net: hns3: change GFP flag during lock period (bsc#1104353 ).\n\n - net: hns3: change GFP flag during lock period (bsc#1104353 FATE#326415).\n\n - net: hns3: do not query unsupported commands in debugfs (bsc#1104353).\n\n - net: hns3: do not query unsupported commands in debugfs (bsc#1104353 FATE#326415).\n\n - net: hns3: fix GFP flag error in hclge_mac_update_stats() (bsc#1126390).\n\n - net: hns3: fix some reset handshake issue (bsc#1104353 ).\n\n - net: hns3: fix some reset handshake issue (bsc#1104353 FATE#326415).\n\n - net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353 bsc#1134983).\n\n - net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353 FATE#326415 bsc#1134983).\n\n - net: hns: Fix the stray netpoll locks causing deadlock in NAPI path (bsc#1104353).\n\n - net: hns: Fix the stray netpoll locks causing deadlock in NAPI path (bsc#1104353 FATE#326415).\n\n - net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n\n - net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n\n - net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 ).\n\n - net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 FATE#326006).\n\n - net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 ).\n\n - net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 FATE#326006).\n\n - net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n\n - net/mlx5e: Print a warning when LRO feature is dropped or not allowed (bsc#1103990).\n\n - net/mlx5e: Print a warning when LRO feature is dropped or not allowed (bsc#1103990 FATE#326006).\n\n - net/mlx5: FWTrace, Reduce stack usage (bsc#1103990).\n\n - net/mlx5: FWTrace, Reduce stack usage (bsc#1103990 FATE#326006).\n\n - netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n\n - net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 ).\n\n - net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 FATE#326472).\n\n - net: phylink: Fix flow control resolution (bsc#1119113 ).\n\n - net: phylink: Fix flow control resolution (bsc#1119113 FATE#326472).\n\n - net: sched: cbs: Avoid division by zero when calculating the port rate (bsc#1109837).\n\n - net/sched: cbs: Fix not adding cbs instance to list (bsc#1109837).\n\n - net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate (bsc#1109837).\n\n - net: sched: fix possible crash in tcf_action_destroy() (bsc#1109837).\n\n - net: sched: fix reordering issues (bsc#1109837).\n\n - net/smc: avoid fallback in case of non-blocking connect (git-fixes).\n\n - net/smc: do not schedule tx_work in SMC_CLOSED state (git-fixes).\n\n - net/smc: fix closing of fallback SMC sockets (git-fixes).\n\n - net/smc: Fix error path in smc_init (git-fixes).\n\n - net/smc: fix ethernet interface refcounting (git-fixes).\n\n - net/smc: fix fastopen for non-blocking connect() (git-fixes).\n\n - net/smc: fix refcounting for non-blocking connect() (git-fixes).\n\n - net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).\n\n - net/smc: fix SMCD link group creation with VLAN id (git-fixes).\n\n - net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).\n\n - net/smc: original socket family in inet_sock_diag (git-fixes).\n\n - net: sock_map, fix missing ulp check in sock hash case (bsc#1109837).\n\n - net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n\n - net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n\n - net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n\n - net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n\n - net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n\n - net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n\n - nfc: netlink: fix double device reference drop (git-fixes).\n\n - NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n\n - nfc: port100: handle command failure cleanly (git-fixes).\n\n - nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs (bsc#1109837).\n\n - nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs (bsc#1109837).\n\n - nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n\n - nvme-tcp: support C2HData with SUCCESS flag (bsc#1157386).\n\n - ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n\n - ocfs2: fix passing zero to 'PTR_ERR' warning (bsc#1158649).\n\n - openvswitch: fix flow command message size (git-fixes).\n\n - padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n\n - PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n\n - PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n\n - PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n\n - PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n\n - PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n\n - PCI: pciehp: Do not disable interrupt twice on suspend (bsc#1111666).\n\n - PCI/PM: Clear PCIe PME Status even for legacy power management (bsc#1111666).\n\n - PCI/PME: Fix possible use-after-free on remove (git-fixes).\n\n - PCI/PTM: Remove spurious 'd' from granularity message (bsc#1051510).\n\n - PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n\n - PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n\n - PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30 (git-fixes).\n\n - perf/x86/amd: Change/fix NMI latency mitigation to use a timestamp (bsc#1142924).\n\n - phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n\n - pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n\n - pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n\n - pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n\n - pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n\n - pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n\n - pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n\n - pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n\n - pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n\n - pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n\n - pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).\n\n - pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n\n - PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n\n - PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n\n - PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n\n - PM / devfreq: passive: fix compiler warning (bsc#1051510).\n\n - PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n\n - PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n\n - powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n\n - powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n\n - powerpc/bpf: Fix tail call implementation (bsc#1157698).\n\n - powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n\n - powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n\n - powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n\n - powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n\n - powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n\n - powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n\n - powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n\n - power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n\n - power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n\n - power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n\n - power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n\n - ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n\n - printk: Export console_printk (bsc#1071995).\n\n - printk: Export console_printk (bsc#1071995 fate#323487).\n\n - pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n\n - pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n\n - qxl: fix NULL pointer crash during suspend (bsc#1111666).\n\n - r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n\n - RDMA/bnxt_re: Fix stat push into dma buffer on gen p5 devices (bsc#1157115)\n\n - RDMA/efa: Clear the admin command buffer prior to its submission (git-fixes) Patch was already picked through Amazon driver repo but was not marked with a Git-commit tag\n\n - RDMA/hns: Fix comparison of unsigned long variable 'end' with less than zero (bsc#1104427 bsc#1137236).\n\n - RDMA/hns: Fix comparison of unsigned long variable 'end' with less than zero (bsc#1104427 FATE#326416 bsc#1137236).\n\n - RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 ).\n\n - RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 FATE#326416).\n\n - regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n\n - regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n\n - remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n\n - Remove patches that reportedly cause regression (bsc#1155689 ltc#182047).\n\n - reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n\n - reset: Fix potential use-after-free in\n __of_reset_control_get() (bsc#1051510).\n\n - reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n\n - Revert 'drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)' This reverts commit 71e3a1b8d8cf73f711f3e4100aa51f68e631f94f. ATM the backported patch does not build on x86.\n\n - rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n\n - rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n\n - rt2800: remove errornous duplicate condition (git-fixes).\n\n - rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n\n - rtlwifi: btcoex: Use proper enumerated types for Wi-Fi only interface (bsc#1111666).\n\n - rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n\n - rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n\n - rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n\n - rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n\n - s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n\n - s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n\n - s390/cio: avoid calling strlen on NULL pointer (bsc#1051510).\n\n - s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n\n - s390/cio: fix virtio-ccw DMA without PV (git-fixes).\n\n - s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n\n - s390: fix stfle zero padding (bsc#1051510).\n\n - s390/idle: fix cpu idle time calculation (bsc#1051510).\n\n - s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n\n - s390/process: avoid potential reading of freed stack (bsc#1051510).\n\n - s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n\n - s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n\n - s390/qeth: return proper errno on IO error (bsc#1051510).\n\n - s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n\n - s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n\n - s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n\n - s390: vsie: Use effective CRYCBD.31 to check CRYCBD validity (git-fixes).\n\n - s390/zcrypt: fix memleak at release (git-fixes).\n\n - scsi: lpfc: Add enablement of multiple adapter dumps (bsc#1154601).\n\n - scsi: lpfc: Add registration for CPU Offline/Online events (bsc#1154601).\n\n - scsi: lpfc: Change default IRQ model on AMD architectures (bsc#1154601).\n\n - scsi: lpfc: Clarify FAWNN error message (bsc#1154601).\n\n - scsi: lpfc: Fix a kernel warning triggered by lpfc_get_sgl_per_hdwq() (bsc#1154601).\n\n - scsi: lpfc: Fix a kernel warning triggered by lpfc_sli4_enable_intr() (bsc#1154601).\n\n - scsi: lpfc: fix build error of lpfc_debugfs.c for vfree/vmalloc (bsc#1154601).\n\n - scsi: lpfc: Fix configuration of BB credit recovery in service parameters (bsc#1154601).\n\n - scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): NULL pointer dereferences (bsc#1154601).\n\n - scsi: lpfc: fix: Coverity: lpfc_get_scsi_buf_s3(): NULL pointer dereferences (bsc#1154601).\n\n - scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow (bsc#1154601).\n\n - scsi: lpfc: Fix dynamic fw log enablement check (bsc#1154601).\n\n - scsi: lpfc: fix inlining of lpfc_sli4_cleanup_poll_list() (bsc#1154601).\n\n - scsi: lpfc: Fix kernel crash at lpfc_nvme_info_show during remote port bounce (bsc#1154601).\n\n - scsi: lpfc: Fix lpfc_cpumask_of_node_init() (bsc#1154601).\n\n - scsi: lpfc: Fix NULL check before mempool_destroy is not needed (bsc#1154601).\n\n - scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n\n - scsi: lpfc: fix spelling error in MAGIC_NUMER_xxx (bsc#1154601).\n\n - scsi: lpfc: Fix unexpected error messages during RSCN handling (bsc#1154601).\n\n - scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n\n - scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1154601).\n\n - scsi: lpfc: Initialize cpu_map for not present cpus (bsc#1154601).\n\n - scsi: lpfc: lpfc_attr: Fix Use plain integer as NULL pointer (bsc#1154601).\n\n - scsi: lpfc: lpfc_nvmet: Fix Use plain integer as NULL pointer (bsc#1154601).\n\n - scsi: lpfc: Make lpfc_debugfs_ras_log_data static (bsc#1154601).\n\n - scsi: lpfc: Mitigate high memory pre-allocation by SCSI-MQ (bsc#1154601).\n\n - scsi: lpfc: Raise config max for lpfc_fcp_mq_threshold variable (bsc#1154601).\n\n - scsi: lpfc: revise nvme max queues to be hdwq count (bsc#1154601).\n\n - scsi: lpfc: Sync with FC-NVMe-2 SLER change to require Conf with SLER (bsc#1154601).\n\n - scsi: lpfc: Update lpfc version to 12.6.0.1 (bsc#1154601).\n\n - scsi: lpfc: Update lpfc version to 12.6.0.2 (bsc#1154601).\n\n - scsi: lpfc: use hdwq assigned cpu for allocation (bsc#1157160).\n\n - scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n\n - scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908.\n bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n\n - scsi: qla2xxx: Use correct number of vectors for online CPUs (bsc#1137223).\n\n - scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n\n - scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n\n - sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n\n - sctp: fix SCTP regression (bsc#1158082) (networking-stable-19_10_24 bsc#1158082).\n\n - selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n\n - serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n\n - serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n\n - serial: uartps: Fix suspend functionality (bsc#1051510).\n\n - signal: Properly set TRACE_SIGNAL_LOSE_INFO in\n __send_signal (bsc#1157463).\n\n - slcan: Fix memory leak in error path (bsc#1051510).\n\n - slip: Fix memory leak in slip_open error path (bsc#1051510).\n\n - slip: Fix use-after-free Read in slip_open (bsc#1051510).\n\n - smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).\n\n - smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n\n - smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n\n - smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n\n - smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n\n - soc: imx: gpc: fix PDN delay (bsc#1051510).\n\n - soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n\n - Sort series.conf.\n\n - spi: atmel: Fix CS high support (bsc#1051510).\n\n - spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n\n - spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n\n - spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n\n - spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#1051510).\n\n - spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n\n - spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n\n - spi: spidev: Fix OF tree warning logic (bsc#1051510).\n\n - supported.conf :\n\n - synclink_gt(): fix compat_ioctl() (bsc#1051510).\n\n - tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n\n - thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n\n - tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n\n - tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n\n - tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n\n - tipc: check msg->req data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n\n - tipc: compat: allow tipc commands without arguments (bsc#1051510).\n\n - tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n\n - tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n\n - tipc: handle the err returned from cmd header function (bsc#1051510).\n\n - tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n\n - tipc: tipc clang warning (bsc#1051510).\n\n - tools: bpftool: fix arguments for p_err() in do_event_pipe() (bsc#1109837).\n\n - tools/power/x86/intel-speed-select: Fix a read overflow in isst_set_tdp_level_msr() (bsc#1111666).\n\n - tpm: add check after commands attribs tab allocation (bsc#1051510).\n\n - tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n\n - tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n\n - tty: serial: msm_serial: Fix flow control (bsc#1051510).\n\n - tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n\n - tun: fix data-race in gro_normal_list() (bsc#1111666).\n\n - UAS: Revert commit 3ae62a42090f ('UAS: fix alignment of scatter/gather segments').\n\n - ubifs: Correctly initialize c->min_log_bytes (bsc#1158641).\n\n - ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n\n - udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n\n - Update patches.suse/ipv6-defrag-drop-non-last-frags-smaller-tha n-min-mtu.patch (add bsc#1141054).\n\n - Update patches.suse/RDMA-Fix-goto-target-to-release-the-allocat ed-memory.patch (bsc#1050244 FATE#322915 bsc#1157171 CVE-2019-19077).\n\n - USB: chaoskey: fix error case of a timeout (git-fixes).\n\n - usb: chipidea: Fix otg event handler (bsc#1051510).\n\n - usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n\n - usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n\n - usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n\n - usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n\n - usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n\n - usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n\n - usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n\n - USBIP: add config dependency for SGL_ALLOC (git-fixes).\n\n - usbip: Fix free of unallocated memory in vhci tx (git-fixes).\n\n - usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n\n - usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n\n - usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n\n - USB: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n\n - usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n\n - USB: serial: mos7720: fix remote wakeup (git-fixes).\n\n - USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n\n - USB: serial: mos7840: fix remote wakeup (git-fixes).\n\n - USB: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n\n - USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n\n - usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n\n - vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n\n - vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n\n - vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n\n - video/hdmi: Fix AVI bar unpack (git-fixes).\n\n - virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n\n - virtio_ring: fix return code on DMA mapping fails (git-fixes).\n\n - virtio/s390: fix race on airq_areas (bsc#1051510).\n\n - vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n\n - vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n\n - watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n\n - wil6210: drop Rx multicast packets that are looped-back to STA (bsc#1111666).\n\n - wil6210: fix debugfs memory access alignment (bsc#1111666).\n\n - wil6210: fix invalid memory access for rx_buff_mgmt debugfs (bsc#1111666).\n\n - wil6210: fix L2 RX status handling (bsc#1111666).\n\n - wil6210: fix locking in wmi_call (bsc#1111666).\n\n - wil6210: fix RGF_CAF_ICR address for Talyn-MB (bsc#1111666).\n\n - wil6210: prevent usage of tx ring 0 for eDMA (bsc#1111666).\n\n - wil6210: set edma variables only for Talyn-MB devices (bsc#1111666).\n\n - x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n\n - x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n\n - x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n\n - x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (FATE#322447, bsc#1078248).\n\n - x86/pkeys: Update documentation about availability (bsc#1078248).\n\n - x86/pkeys: Update documentation about availability (FATE#322447, bsc#1078248).\n\n - x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n\n - x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n\n - x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n\n - xfrm: fix sa selector validation (bsc#1156609).\n\n - xfrm: Fix xfrm sel prefix length validation (git-fixes).\n\n - xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n\n - xsk: Fix registration of Rx-only sockets (bsc#1109837).\n\n - xsk: relax UMEM headroom alignment (bsc#1109837).", "cvss3": {}, "published": "2019-12-13T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2019-2675)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-14895", "CVE-2019-14901", "CVE-2019-15211", "CVE-2019-15213", "CVE-2019-15916", "CVE-2019-18660", "CVE-2019-18683", "CVE-2019-18809", "CVE-2019-19046", "CVE-2019-19049", "CVE-2019-19052", "CVE-2019-19056", "CVE-2019-19057", "CVE-2019-19058", "CVE-2019-19060", "CVE-2019-19062", "CVE-2019-19063", "CVE-2019-19065", "CVE-2019-19067", "CVE-2019-19068", "CVE-2019-19073", "CVE-2019-19074", "CVE-2019-19075", "CVE-2019-19077", "CVE-2019-19078", "CVE-2019-19080", "CVE-2019-19081", "CVE-2019-19082", "CVE-2019-19083", "CVE-2019-19227", "CVE-2019-19524", "CVE-2019-19525", "CVE-2019-19528", "CVE-2019-19529", "CVE-2019-19530", "CVE-2019-19531", "CVE-2019-19534", "CVE-2019-19536", "CVE-2019-19543"], "modified": "2019-12-24T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "cpe:/o:novell:opensuse:15.1"], "id": "OPENSUSE-2019-2675.NASL", "href": "https://www.tenable.com/plugins/nessus/132032", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-2675.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(132032);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2019/12/24\");\n\n script_cve_id(\"CVE-2019-14895\", \"CVE-2019-14901\", \"CVE-2019-15211\", \"CVE-2019-15213\", \"CVE-2019-15916\", \"CVE-2019-18660\", \"CVE-2019-18683\", \"CVE-2019-18809\", \"CVE-2019-19046\", \"CVE-2019-19049\", \"CVE-2019-19052\", \"CVE-2019-19056\", \"CVE-2019-19057\", \"CVE-2019-19058\", \"CVE-2019-19060\", \"CVE-2019-19062\", \"CVE-2019-19063\", \"CVE-2019-19065\", \"CVE-2019-19067\", \"CVE-2019-19068\", \"CVE-2019-19073\", \"CVE-2019-19074\", \"CVE-2019-19075\", \"CVE-2019-19077\", \"CVE-2019-19078\", \"CVE-2019-19080\", \"CVE-2019-19081\", \"CVE-2019-19082\", \"CVE-2019-19083\", \"CVE-2019-19227\", \"CVE-2019-19524\", \"CVE-2019-19525\", \"CVE-2019-19528\", \"CVE-2019-19529\", \"CVE-2019-19530\", \"CVE-2019-19531\", \"CVE-2019-19534\", \"CVE-2019-19536\", \"CVE-2019-19543\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2019-2675)\");\n script_summary(english:\"Check for the openSUSE-2019-2675 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The openSUSE Leap 15.1 kernel was updated to receive various security\nand bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-15211: There was a use-after-free caused by a\n malicious USB device in\n drivers/media/v4l2-core/v4l2-dev.c (bnc#1146519).\n\n - CVE-2019-15213: There was a use-after-free caused by a\n malicious USB device in the\n drivers/media/usb/dvb-usb/dvb-usb-init.c driver\n (bnc#1146544).\n\n - CVE-2019-19531: There was a use-after-free bug that can\n be caused by a malicious USB device in the\n drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca\n (bnc#1158427 1158445).\n\n - CVE-2019-19543: There is a use-after-free in\n serial_ir_init_module() in drivers/media/rc/serial_ir.c\n (bnc#1158427).\n\n - CVE-2019-19525: There is a use-after-free bug that can\n be caused by a malicious USB device in the\n drivers/net/ieee802154/atusb.c driver, aka\n CID-7fd25e6fc035 (bnc#1158417).\n\n - CVE-2019-19530: There is a use-after-free bug that can\n be caused by a malicious USB device in the\n drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef\n (bnc#1158410).\n\n - CVE-2019-19536: There is an info-leak bug that can be\n caused by a malicious USB device in the\n drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka\n CID-ead16e53c2f0 (bnc#1158394).\n\n - CVE-2019-19524: There is a use-after-free bug that can\n be caused by a malicious USB device in the\n drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9\n (bnc#1158413).\n\n - CVE-2019-19528: There is a use-after-free bug that can\n be caused by a malicious USB device in the\n drivers/usb/misc/iowarrior.c driver, aka\n CID-edc4746f253d (bnc#1158407).\n\n - CVE-2019-19534: There is an info-leak bug that can be\n caused by a malicious USB device in the\n drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka\n CID-f7a1337f0d29 (bnc#1158398).\n\n - CVE-2019-19529: There is a use-after-free bug that can\n be caused by a malicious USB device in the\n drivers/net/can/usb/mcba_usb.c driver, aka\n CID-4d6636498c41 (bnc#1158381).\n\n - CVE-2019-14901: A heap overflow flaw was found in the\n Marvell WiFi chip driver. The vulnerability allowed a\n remote attacker to cause a system crash, resulting in a\n denial of service, or execute arbitrary code. The\n highest threat with this vulnerability is with the\n availability of the system. If code execution occurs,\n the code will run with the permissions of root. This\n will affect both confidentiality and integrity of files\n on the system (bnc#1157042).\n\n - CVE-2019-14895: A heap-based buffer overflow was\n discovered in the Marvell WiFi chip driver. The flaw\n could occur when the station attempts a connection\n negotiation during the handling of the remote devices\n country settings. This could allowed the remote device\n to cause a denial of service (system crash) or possibly\n execute arbitrary code (bnc#1157158).\n\n - CVE-2019-18660: The Linux kernel on powerpc allowed\n Information Exposure because the Spectre-RSB mitigation\n is not in place for all applicable CPUs, aka\n CID-39e72bf96f58. This is related to\n arch/powerpc/kernel/entry_64.S and\n arch/powerpc/kernel/security.c (bnc#1157038).\n\n - CVE-2019-18683: An issue was discovered in\n drivers/media/platform/vivid, which was exploitable for\n privilege escalation on some Linux distributions where\n local users have /dev/video0 access, but only if the\n driver happens to be loaded. There are multiple race\n conditions during streaming stopping in this driver\n (part of the V4L2 subsystem). These issues are caused by\n wrong mutex locking in vivid_stop_generating_vid_cap(),\n vivid_stop_generating_vid_out(),\n sdr_cap_stop_streaming(), and the corresponding\n kthreads. At least one of these race conditions leads to\n a use-after-free (bnc#1155897).\n\n - CVE-2019-18809: A memory leak in the\n af9005_identify_state() function in\n drivers/media/usb/dvb-usb/af9005.c allowed attackers to\n cause a denial of service (memory consumption), aka\n CID-2289adbfa559 (bnc#1156258).\n\n - CVE-2019-19046: A memory leak in the\n __ipmi_bmc_register() function in\n drivers/char/ipmi/ipmi_msghandler.c was fixed\n (bnc#1157304).\n\n - CVE-2019-19078: A memory leak in the\n ath10k_usb_hif_tx_sg() function in\n drivers/net/wireless/ath/ath10k/usb.c allowed attackers\n to cause a denial of service (memory consumption) by\n triggering usb_submit_urb() failures, aka\n CID-b8d17e7d93d2 (bnc#1157032).\n\n - CVE-2019-19062: A memory leak in the crypto_report()\n function in crypto/crypto_user_base.c allowed attackers\n to cause a denial of service (memory consumption) by\n triggering crypto_report_alg() failures, aka\n CID-ffdde5932042 (bnc#1157333).\n\n - CVE-2019-19057: Two memory leaks in the\n mwifiex_pcie_init_evt_ring() function in\n drivers/net/wireless/marvell/mwifiex/pcie.c allowed\n attackers to cause a denial of service (memory\n consumption) by triggering mwifiex_map_pci_memory()\n failures, aka CID-d10dcb615c8e (bnc#1157193).\n\n - CVE-2019-19056: A memory leak in the\n mwifiex_pcie_alloc_cmdrsp_buf() function in\n drivers/net/wireless/marvell/mwifiex/pcie.c allowed\n attackers to cause a denial of service (memory\n consumption) by triggering mwifiex_map_pci_memory()\n failures, aka CID-db8fd2cde932 (bnc#1157197).\n\n - CVE-2019-19068: A memory leak in the\n rtl8xxxu_submit_int_urb() function in\n drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c\n allowed attackers to cause a denial of service (memory\n consumption) by triggering usb_submit_urb() failures,\n aka CID-a2cdd07488e6 (bnc#1157307).\n\n - CVE-2019-19063: Two memory leaks in the rtl_usb_probe()\n function in drivers/net/wireless/realtek/rtlwifi/usb.c\n allowed attackers to cause a denial of service (memory\n consumption), aka CID-3f9361695113 (bnc#1157298).\n\n - CVE-2019-19227: In the AppleTalk subsystem there was a\n potential NULL pointer dereference because\n register_snap_client may return NULL. This will lead to\n denial of service in net/appletalk/aarp.c and\n net/appletalk/ddp.c, as demonstrated by\n unregister_snap_client, aka CID-9804501fa122\n (bnc#1157678).\n\n - CVE-2019-19081: A memory leak in the\n nfp_flower_spawn_vnic_reprs() function in\n drivers/net/ethernet/netronome/nfp/flower/main.c allowed\n attackers to cause a denial of service (memory\n consumption), aka CID-8ce39eb5a67a (bnc#1157045).\n\n - CVE-2019-19080: Four memory leaks in the\n nfp_flower_spawn_phy_reprs() function in\n drivers/net/ethernet/netronome/nfp/flower/main.c allowed\n attackers to cause a denial of service (memory\n consumption), aka CID-8572cea1461a (bnc#1157044).\n\n - CVE-2019-19065: A memory leak in the sdma_init()\n function in drivers/infiniband/hw/hfi1/sdma.c allowed\n attackers to cause a denial of service (memory\n consumption) by triggering rhashtable_init() failures,\n aka CID-34b3be18a04e (bnc#1157191).\n\n - CVE-2019-19077: A memory leak in the\n bnxt_re_create_srq() function in\n drivers/infiniband/hw/bnxt_re/ib_verbs.c allowed\n attackers to cause a denial of service (memory\n consumption) by triggering copy to udata failures, aka\n CID-4a9d46a9fe14 (bnc#1157171).\n\n - CVE-2019-19052: A memory leak in the gs_can_open()\n function in drivers/net/can/usb/gs_usb.c allowed\n attackers to cause a denial of service (memory\n consumption) by triggering usb_submit_urb() failures,\n aka CID-fb5be6a7b486 (bnc#1157324).\n\n - CVE-2019-19067: Four memory leaks in the acp_hw_init()\n function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c were\n fixed. (bnc#1157180).\n\n - CVE-2019-19060: A memory leak in the\n adis_update_scan_mode() function in\n drivers/iio/imu/adis_buffer.c allowed attackers to cause\n a denial of service (memory consumption), aka\n CID-ab612b1daf41 (bnc#1157178).\n\n - CVE-2019-19049: A memory leak in the unittest_data_add()\n function in drivers/of/unittest.c was fixed.\n (bnc#1157173).\n\n - CVE-2019-19075: A memory leak in the ca8210_probe()\n function in drivers/net/ieee802154/ca8210.c allowed\n attackers to cause a denial of service (memory\n consumption) by triggering ca8210_get_platform_data()\n failures, aka CID-6402939ec86e (bnc#1157162).\n\n - CVE-2019-19058: A memory leak in the alloc_sgtable()\n function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c\n allowed attackers to cause a denial of service (memory\n consumption) by triggering alloc_page() failures, aka\n CID-b4b814fec1a5 (bnc#1157145).\n\n - CVE-2019-19074: A memory leak in the ath9k_wmi_cmd()\n function in drivers/net/wireless/ath/ath9k/wmi.c allowed\n attackers to cause a denial of service (memory\n consumption), aka CID-728c1e2a05e4 (bnc#1157143).\n\n - CVE-2019-19073: Memory leaks in\n drivers/net/wireless/ath/ath9k/htc_hst.c allowed\n attackers to cause a denial of service (memory\n consumption) by triggering wait_for_completion_timeout()\n failures. This affects the htc_config_pipe_credits()\n function, the htc_setup_complete() function, and the\n htc_connect_service() function, aka CID-853acf7caf10\n (bnc#1157070).\n\n - CVE-2019-19083: Memory leaks in *clock_source_create()\n functions under drivers/gpu/drm/amd/display/dc allowed\n attackers to cause a denial of service (memory\n consumption). This affects the\n dce112_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c,\n the dce100_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c,\n the dcn10_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c,\n the dcn20_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c,\n the dce120_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c,\n the dce110_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c,\n and the dce80_clock_source_create() function in\n drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c,\n aka CID-055e547478a1 (bnc#1157049).\n\n - CVE-2019-19082: Memory leaks in *create_resource_pool()\n functions under drivers/gpu/drm/amd/display/dc allowed\n attackers to cause a denial of service (memory\n consumption). This affects the\n dce120_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c,\n the dce110_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c,\n the dce100_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c,\n the dcn10_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c,\n and the dce112_create_resource_pool() function in\n drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c,\n aka CID-104c307147ad (bnc#1157046).\n\n - CVE-2019-15916: There was a memory leak in\n register_queue_kobjects() in net/core/net-sysfs.c, which\n will cause denial of service (bnc#1149448).\n\nThe following non-security bugs were fixed :\n\n - ACPICA: Never run _REG on system_memory and system_IO\n (bsc#1051510).\n\n - ACPICA: Use %d for signed int print formatting instead\n of %u (bsc#1051510).\n\n - ACPI / hotplug / PCI: Allocate resources directly under\n the non-hotplug bridge (bsc#1111666).\n\n - ACPI / LPSS: Exclude I2C busses shared with PUNIT from\n pmc_atom_d3_mask (bsc#1051510).\n\n - acpi/nfit, device-dax: Identify differentiated memory\n with a unique numa-node (bsc#1158071).\n\n - ACPI / SBS: Fix rare oops when removing modules\n (bsc#1051510).\n\n - ALSA: 6fire: Drop the dead code (git-fixes).\n\n - ALSA: cs4236: fix error return comparison of an unsigned\n integer (git-fixes).\n\n - ALSA: firewire-motu: Correct a typo in the clock proc\n string (git-fixes).\n\n - ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n\n - ALSA: hda - Add mute led support for HP ProBook 645 G4\n (git-fixes).\n\n - ALSA: hda - Fix pending unsol events at shutdown\n (git-fixes).\n\n - ALSA: hda: Fix racy display power access (bsc#1156928).\n\n - ALSA: hda/hdmi - Clear codec->relaxed_resume flag at\n unbinding (git-fixes).\n\n - ALSA: hda: hdmi - fix port numbering for ICL and TGL\n platforms (git-fixes).\n\n - ALSA: hda: hdmi - remove redundant code comments\n (git-fixes).\n\n - ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n\n - ALSA: hda/realtek - Enable internal speaker of ASUS\n UX431FLC (git-fixes).\n\n - ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's\n laptop (git-fixes).\n\n - ALSA: hda/realtek - Move some alc236 pintbls to fallback\n table (git-fixes).\n\n - ALSA: hda/realtek - Move some alc256 pintbls to fallback\n table (git-fixes).\n\n - ALSA: i2c/cs8427: Fix int to char conversion\n (bsc#1051510).\n\n - ALSA: intel8x0m: Register irq handler after register\n initializations (bsc#1051510).\n\n - ALSA: pcm: Fix stream lock usage in\n snd_pcm_period_elapsed() (git-fixes).\n\n - ALSA: pcm: signedness bug in snd_pcm_plug_alloc()\n (bsc#1051510).\n\n - ALSA: pcm: Yet another missing check of non-cached\n buffer type (bsc#1111666).\n\n - ALSA: seq: Do error checks at creating system ports\n (bsc#1051510).\n\n - ALSA: usb-audio: Add skip_validation option (git-fixes).\n\n - ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input\n handling (git-fixes).\n\n - ALSA: usb-audio: Fix incorrect NULL check in\n create_yamaha_midi_quirk() (git-fixes).\n\n - ALSA: usb-audio: Fix incorrect size check for\n processing/extension units (git-fixes).\n\n - ALSA: usb-audio: Fix missing error check at mixer\n resolution test (git-fixes).\n\n - ALSA: usb-audio: Fix NULL dereference at parsing BADD\n (git-fixes).\n\n - ALSA: usb-audio: not submit urb for stopped endpoint\n (git-fixes).\n\n - ALSA: usb-audio: sound: usb: usb true/false for bool\n return type (git-fixes).\n\n - appledisplay: fix error handling in the scheduled work\n (git-fixes).\n\n - arm64: Update config files. (bsc#1156466) Enable\n HW_RANDOM_OMAP driver and mark driver omap-rng as\n supported.\n\n - ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n\n - ASoC: davinci-mcasp: Handle return value of\n devm_kasprintf (stable 4.14.y).\n\n - ASoC: dpcm: Properly initialise hw->rate_max\n (bsc#1051510).\n\n - ASoC: Intel: hdac_hdmi: Limit sampling rates at dai\n creation (bsc#1051510).\n\n - ASoC: kirkwood: fix external clock probe defer\n (git-fixes).\n\n - ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX\n (git-fixes).\n\n - ASoC: sgtl5000: avoid division by zero if lo_vag is zero\n (bsc#1051510).\n\n - ASoC: tegra_sgtl5000: fix device_node refcounting\n (bsc#1051510).\n\n - ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP\n modes (stable 4.14.y).\n\n - ASoC: tlv320dac31xx: mark expected switch fall-through\n (stable 4.14.y).\n\n - ata: ep93xx: Use proper enums for directions\n (bsc#1051510).\n\n - ath10k: allocate small size dma memory in\n ath10k_pci_diag_write_mem (bsc#1111666).\n\n - ath10k: avoid possible memory access violation\n (bsc#1111666).\n\n - ath10k: Correct error handling of dma_map_single()\n (bsc#1111666).\n\n - ath10k: fix kernel panic by moving pci flush after\n napi_disable (bsc#1051510).\n\n - ath10k: fix vdev-start timeout on error (bsc#1051510).\n\n - ath10k: limit available channels via DT\n ieee80211-freq-limit (bsc#1051510).\n\n - ath10k: skip resetting rx filter for WCN3990\n (bsc#1111666).\n\n - ath10k: wmi: disable softirq's while calling\n ieee80211_rx (bsc#1051510).\n\n - ath9k: add back support for using active monitor\n interfaces for tx99 (bsc#1051510).\n\n - ath9k: Fix a locking bug in ath9k_add_interface()\n (bsc#1051510).\n\n - ath9k: fix reporting calculated new FFT upper max\n (bsc#1051510).\n\n - ath9k: fix tx99 with monitor mode interface\n (bsc#1051510).\n\n - ath9k_hw: fix uninitialized variable data (bsc#1051510).\n\n - ax88172a: fix information leak on short answers\n (bsc#1051510).\n\n - backlight: lm3639: Unconditionally call\n led_classdev_unregister (bsc#1051510).\n\n - Bluetooth: btusb: fix PM leak in error case of setup\n (bsc#1051510).\n\n - Bluetooth: delete a stray unlock (bsc#1051510).\n\n - Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n\n - Bluetooth: Fix memory leak in hci_connect_le_scan\n (bsc#1051510).\n\n - Bluetooth: hci_core: fix init for HCI_USER_CHANNEL\n (bsc#1051510).\n\n - Bluetooth: L2CAP: Detect if remote is not able to use\n the whole MPS (bsc#1051510).\n\n - bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX\n commands (bsc#1104745).\n\n - bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX\n commands (bsc#1104745 FATE#325918).\n\n - bnxt_en: Update firmware interface spec. to 1.10.0.47\n (bsc#1157115)\n\n - bnxt_en: Update firmware interface spec. to 1.10.0.89\n (bsc#1157115)\n\n - bnxt_en: Update firmware interface to 1.10.0.69\n (bsc#1157115)\n\n - bpf: fix BTF limits (bsc#1109837).\n\n - bpf: fix BTF verification of enums (bsc#1109837).\n\n - bpf: Fix use after free in subprog's jited symbol\n removal (bsc#1109837).\n\n - brcmfmac: fix full timeout waiting for action frame\n on-channel tx (bsc#1051510).\n\n - brcmfmac: fix wrong strnchr usage (bsc#1111666).\n\n - brcmfmac: increase buffer for obtaining firmware\n capabilities (bsc#1111666).\n\n - brcmfmac: reduce timeout for action frame scan\n (bsc#1051510).\n\n - brcmsmac: AP mode: update beacon when TIM changes\n (bsc#1051510).\n\n - brcmsmac: never log 'tid x is not agg'able' by default\n (bsc#1051510).\n\n - brcmsmac: Use kvmalloc() for ucode allocations\n (bsc#1111666).\n\n - btrfs: fix log context list corruption after rename\n exchange operation (bsc#1156494).\n\n - can: c_can: c_can_poll(): only read status register\n after status IRQ (git-fixes).\n\n - can: mcba_usb: fix use-after-free on disconnect\n (git-fixes).\n\n - can: peak_usb: fix a potential out-of-sync while\n decoding packets (git-fixes).\n\n - can: peak_usb: fix slab info leak (git-fixes).\n\n - can: rx-offload: can_rx_offload_offload_one(): do not\n increase the skb_queue beyond skb_queue_len_max\n (git-fixes).\n\n - can: rx-offload: can_rx_offload_queue_sorted(): fix\n error handling, avoid skb mem leak (git-fixes).\n\n - can: rx-offload: can_rx_offload_queue_tail(): fix error\n handling, avoid skb mem leak (git-fixes).\n\n - can: usb_8dev: fix use-after-free on disconnect\n (git-fixes).\n\n - ceph: add missing check in d_revalidate snapdir handling\n (bsc#1157183).\n\n - ceph: do not try to handle hashed dentries in\n non-O_CREAT atomic_open (bsc#1157184).\n\n - ceph: fix use-after-free in __ceph_remove_cap()\n (bsc#1154058).\n\n - ceph: just skip unrecognized info in\n ceph_reply_info_extra (bsc#1157182).\n\n - cfg80211: Avoid regulatory restore when\n COUNTRY_IE_IGNORE is set (bsc#1051510).\n\n - cfg80211: call disconnect_wk when AP stops\n (bsc#1051510).\n\n - cfg80211: Prevent regulatory restore during STA\n disconnect in concurrent interfaces (bsc#1051510).\n\n - cfg80211: validate wmm rule when setting (bsc#1111666).\n\n - cgroup,writeback: do not switch wbs immediately on dead\n wbs if the memcg is dead (bsc#1158645).\n\n - cifs: add a helper to find an existing readable handle\n to a file (bsc#1144333, bsc#1154355).\n\n - cifs: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n\n - cifs: create a helper to find a writeable handle by path\n name (bsc#1144333, bsc#1154355).\n\n - cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect\n occurs (bsc#1144333, bsc#1154355).\n\n - cifs: fix max ea value size (bsc#1144333, bsc#1154355).\n\n - cifs: Fix missed free operations (bsc#1144333,\n bsc#1154355).\n\n - cifs: Fix oplock handling for SMB 2.1+ protocols\n (bsc#1144333, bsc#1154355).\n\n - cifs: Fix retry mid list corruption on reconnects\n (bsc#1144333, bsc#1154355).\n\n - cifs: Fix SMB2 oplock break processing (bsc#1144333,\n bsc#1154355).\n\n - cifs: Fix use after free of file info structures\n (bsc#1144333, bsc#1154355).\n\n - cifs: Force reval dentry if LOOKUP_REVAL flag is set\n (bsc#1144333, bsc#1154355).\n\n - cifs: Force revalidate inode when dentry is stale\n (bsc#1144333, bsc#1154355).\n\n - cifs: Gracefully handle QueryInfo errors during open\n (bsc#1144333, bsc#1154355).\n\n - cifs: move cifsFileInfo_put logic into a work-queue\n (bsc#1144333, bsc#1154355).\n\n - cifs: prepare SMB2_Flush to be usable in compounds\n (bsc#1144333, bsc#1154355).\n\n - cifs: set domainName when a domain-key is used in\n multiuser (bsc#1144333, bsc#1154355).\n\n - cifs: use cifsInodeInfo->open_file_lock while iterating\n to avoid a panic (bsc#1144333, bsc#1154355).\n\n - cifs: use existing handle for compound_op(OP_SET_INFO)\n when possible (bsc#1144333, bsc#1154355).\n\n - cifs: Use kzfree() to zero out the password\n (bsc#1144333, bsc#1154355).\n\n - clk: at91: avoid sleeping early (git-fixes).\n\n - clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n\n - clk: samsung: exynos5420: Preserve CPU clocks\n configuration during suspend/resume (bsc#1051510).\n\n - clk: samsung: exynos5420: Preserve PLL configuration\n during suspend/resume (git-fixes).\n\n - clk: samsung: Use clk_hw API for calling clk framework\n from clk notifiers (bsc#1051510).\n\n - clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18\n (git-fixes).\n\n - clocksource/drivers/sh_cmt: Fix clocksource width for\n 32-bit machines (bsc#1051510).\n\n - clocksource/drivers/sh_cmt: Fixup for 64-bit machines\n (bsc#1051510).\n\n - compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n\n - component: fix loop condition to call unbind() if bind()\n fails (bsc#1051510).\n\n - cpufreq: intel_pstate: Register when ACPI PCCH is\n present (bsc#1051510).\n\n - cpufreq/pasemi: fix use-after-free in\n pas_cpufreq_cpu_init() (bsc#1051510).\n\n - cpufreq: powernv: fix stack bloat and hard limit on\n number of CPUs (bsc#1051510).\n\n - cpufreq: Skip cpufreq resume if it's not suspended\n (bsc#1051510).\n\n - cpufreq: ti-cpufreq: add missing of_node_put()\n (bsc#1051510).\n\n - cpupower: Fix coredump on VMware (bsc#1051510).\n\n - cpupower : Fix cpupower working when cpu0 is offline\n (bsc#1051510).\n\n - cpupower : frequency-set -r option misses the last cpu\n in related cpu list (bsc#1051510).\n\n - crypto: af_alg - cast ki_complete ternary op to int\n (bsc#1051510).\n\n - crypto: crypto4xx - fix double-free in\n crypto4xx_destroy_sdr (bsc#1051510).\n\n - crypto: ecdh - fix big endian bug in ECC library\n (bsc#1051510).\n\n - crypto: fix a memory leak in rsa-kcs1pad's encryption\n mode (bsc#1051510).\n\n - crypto: geode-aes - switch to skcipher for cbc(aes)\n fallback (bsc#1051510).\n\n - crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n\n - crypto: mxs-dcp - Fix SHA null hashes and output length\n (bsc#1051510).\n\n - crypto: mxs-dcp - make symbols 'sha1_null_hash' and\n 'sha256_null_hash' static (bsc#1051510).\n\n - crypto: s5p-sss: Fix Fix argument list alignment\n (bsc#1051510).\n\n - crypto: tgr192 - remove unneeded semicolon\n (bsc#1051510).\n\n - cw1200: Fix a signedness bug in cw1200_load_firmware()\n (bsc#1051510).\n\n - cxgb4: fix panic when attaching to ULD fail\n (networking-stable-19_11_05).\n\n - cxgb4: request the TX CIDX updates to status page\n (bsc#1127354 bsc#1127371).\n\n - dccp: do not leak jiffies on the wire\n (networking-stable-19_11_05).\n\n - dlm: do not leak kernel pointer to userspace\n (bsc#1051510).\n\n - dlm: fix invalid free (bsc#1051510).\n\n - dmaengine: dma-jz4780: Do not depend on MACH_JZ4780\n (bsc#1051510).\n\n - dmaengine: dma-jz4780: Further residue status fix\n (bsc#1051510).\n\n - dmaengine: ep93xx: Return proper enum in\n ep93xx_dma_chan_direction (bsc#1051510).\n\n - dmaengine: imx-sdma: fix use-after-free on probe error\n path (bsc#1051510).\n\n - dmaengine: rcar-dmac: set scatter/gather max segment\n size (bsc#1051510).\n\n - dmaengine: timb_dma: Use proper enum in td_prep_slave_sg\n (bsc#1051510).\n\n - docs: move protection-keys.rst to the core-api book\n (bsc#1078248).\n\n - docs: move protection-keys.rst to the core-api book\n (FATE#322447, bsc#1078248).\n\n - Documentation: debugfs: Document debugfs helper for\n unsigned long values (git-fixes).\n\n - Documentation: x86: convert protection-keys.txt to reST\n (bsc#1078248).\n\n - Documentation: x86: convert protection-keys.txt to reST\n (FATE#322447, bsc#1078248).\n\n - drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2\n (bsc#1111666).\n\n - drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on\n unsupported (bsc#1113956)\n\n - drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n\n - drm: fix module name in edid_firmware log message\n (bsc#1113956)\n\n - drm/i915: Do not dereference request if it may have been\n retired when (bsc#1142635)\n\n - drm/i915: Fix and improve MCR selection logic\n (bsc#1112178)\n\n - drm/i915/gvt: fix dropping obj reference twice\n (bsc#1111666).\n\n - drm/i915: Lock the engine while dumping the active\n request (bsc#1142635)\n\n - drm/i915/pmu: 'Frequency' is reported as accumulated\n cycles (bsc#1112178)\n\n - drm/i915: Reacquire priolist cache after dropping the\n engine lock (bsc#1129770)\n\n - drm/i915: Skip modeset for cdclk changes if possible\n (bsc#1156928).\n\n - drm/msm: fix memleak on release (bsc#1111666).\n\n - drm/omap: fix max fclk divider for omap36xx\n (bsc#1113722)\n\n - drm/radeon: fix bad DMA from INTERRUPT_CNTL2\n (git-fixes).\n\n - drm/radeon: fix si_enable_smc_cac() failed issue\n (bsc#1113722)\n\n - Drop\n scsi-qla2xxx-Fix-memory-leak-when-sending-I-O-fails.patc\n h This patch has introduces an double free. Upstream has\n dropped it from the scsi-queue before it hit mainline.\n So let's drop it as well.\n\n - e1000e: Drop unnecessary __E1000_DOWN bit twiddling\n (bsc#1158049).\n\n - e1000e: Use dev_get_drvdata where possible\n (bsc#1158049).\n\n - e1000e: Use rtnl_lock to prevent race conditions between\n net and pci/pm (bsc#1158049).\n\n - ecryptfs_lookup_interpose(): lower_dentry->d_inode is\n not stable (bsc#1158646).\n\n - ecryptfs_lookup_interpose(): lower_dentry->d_parent is\n not stable either (bsc#1158647).\n\n - EDAC/ghes: Fix locking and memory barrier issues\n (bsc#1114279). EDAC/ghes: Do not warn when incrementing\n refcount on 0 (bsc#1114279).\n\n - EDAC/ghes: Fix Use after free in ghes_edac remove path\n (bsc#1114279).\n\n - ext4: fix punch hole for inline_data file systems\n (bsc#1158640).\n\n - ext4: update direct I/O read lock pattern for\n IOCB_NOWAIT (bsc#1158639).\n\n - extcon: cht-wc: Return from default case to avoid\n warnings (bsc#1051510).\n\n - fbdev: sbuslib: integer overflow in\n sbusfb_ioctl_helper() (bsc#1051510).\n\n - fbdev: sbuslib: use checked version of put_user()\n (bsc#1051510).\n\n - ftrace: Introduce PERMANENT ftrace_ops flag\n (bsc#1120853).\n\n - gpiolib: acpi: Add Terra Pad 1061 to the\n run_edge_events_on_boot_blacklist (bsc#1051510).\n\n - gpio: mpc8xxx: Do not overwrite default irq_set_type\n callback (bsc#1051510).\n\n - gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n\n - gsmi: Fix bug in append_to_eventlog sysfs handler\n (bsc#1051510).\n\n - HID: Add ASUS T100CHI keyboard dock battery quirks\n (bsc#1051510).\n\n - HID: Add quirk for Microsoft PIXART OEM mouse\n (bsc#1051510).\n\n - HID: asus: Add T100CHI bluetooth keyboard dock special\n keys mapping (bsc#1051510).\n\n - HID: Fix assumption that devices have inputs\n (git-fixes).\n\n - HID: wacom: generic: Treat serial number and related\n fields as unsigned (git-fixes).\n\n - hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros\n (bsc#1051510).\n\n - hwmon: (pwm-fan) Silence error on probe deferral\n (bsc#1051510).\n\n - hwrng: omap3-rom - Call clk_disable_unprepare() on exit\n only if not idled (bsc#1051510).\n\n - hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n\n - hypfs: Fix error number left in struct pointer member\n (bsc#1051510).\n\n - i2c: of: Try to find an I2C adapter matching the parent\n (bsc#1129770)\n\n - i40e: enable X710 support (bsc#1151067).\n\n - IB/mlx5: Free mpi in mp_slave mode (bsc#1103991).\n\n - IB/mlx5: Free mpi in mp_slave mode (bsc#1103991\n FATE#326007).\n\n - IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general\n command (bsc#1103991).\n\n - IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general\n command (bsc#1103991 FATE#326007).\n\n - ibmvnic: Bound waits for device queries (bsc#1155689\n ltc#182047).\n\n - ibmvnic: Fix completion structure initialization\n (bsc#1155689 ltc#182047).\n\n - ibmvnic: Serialize device queries (bsc#1155689\n ltc#182047).\n\n - ibmvnic: Terminate waiting device threads after loss of\n service (bsc#1155689 ltc#182047).\n\n - ice: fix potential infinite loop because loop counter\n being too small (bsc#1118661).\n\n - ice: fix potential infinite loop because loop counter\n being too small (bsc#1118661 FATE#325277).\n\n - iio: adc: max9611: explicitly cast gain_selectors\n (bsc#1051510).\n\n - iio: adc: stm32-adc: fix stopping dma (git-fixes).\n\n - iio: dac: mcp4922: fix error handling in\n mcp4922_write_raw (bsc#1051510).\n\n - iio: imu: adis16480: assign bias value only if operation\n succeeded (git-fixes).\n\n - iio: imu: adis16480: make sure provided frequency is\n positive (git-fixes).\n\n - iio: imu: adis: assign read val in debugfs hook only if\n op successful (git-fixes).\n\n - iio: imu: adis: assign value only if return code zero in\n read funcs (git-fixes).\n\n - include/linux/bitrev.h: fix constant bitrev\n (bsc#1114279).\n\n - inet: stop leaking jiffies on the wire\n (networking-stable-19_11_05).\n\n - Input: ff-memless - kill timer in destroy()\n (bsc#1051510).\n\n - Input: silead - try firmware reload after unsuccessful\n resume (bsc#1051510).\n\n - Input: st1232 - set INPUT_PROP_DIRECT property\n (bsc#1051510).\n\n - Input: synaptics-rmi4 - clear IRQ enables for F54\n (bsc#1051510).\n\n - Input: synaptics-rmi4 - destroy F54 poller workqueue\n when removing (bsc#1051510).\n\n - Input: synaptics-rmi4 - disable the relative position\n IRQ in the F12 driver (bsc#1051510).\n\n - Input: synaptics-rmi4 - do not consume more data than we\n have (F11, F12) (bsc#1051510).\n\n - Input: synaptics-rmi4 - fix video buffer size\n (git-fixes).\n\n - intel_th: Fix a double put_device() in error path\n (git-fixes).\n\n - iomap: Fix pipe page leakage during splicing\n (bsc#1158651).\n\n - iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and\n QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n\n - ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base\n address (bsc#1051510).\n\n - ipv4: Return -ENETUNREACH if we can't create route but\n saddr is valid (networking-stable-19_10_24).\n\n - irqdomain: Add the missing assignment of domain->fwnode\n for named fwnode (bsc#1111666).\n\n - iwlwifi: api: annotate compressed BA notif array sizes\n (bsc#1051510).\n\n - iwlwifi: check kasprintf() return value (bsc#1051510).\n\n - iwlwifi: drop packets with bad status in CD\n (bsc#1111666).\n\n - iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n\n - iwlwifi: mvm: do not send keys when entering D3\n (bsc#1051510).\n\n - iwlwifi: mvm: use correct FIFO length (bsc#1111666).\n\n - iwlwifi: pcie: fit reclaim msg to MAX_MSG_LEN\n (bsc#1111666).\n\n - iwlwifi: pcie: read correct prph address for newer\n devices (bsc#1111666).\n\n - ixgbe: fix double clean of Tx descriptors with xdp\n (bsc#1113994 ).\n\n - ixgbe: fix double clean of Tx descriptors with xdp\n (bsc#1113994 FATE#326315 FATE#326317).\n\n - ixgbevf: Fix secpath usage for IPsec Tx offload\n (bsc#1113994 ).\n\n - ixgbevf: Fix secpath usage for IPsec Tx offload\n (bsc#1113994 FATE#326315 FATE#326317).\n\n - kABI: Fix for 'KVM: x86: Introduce\n vcpu->arch.xsaves_enabled' (bsc#1158066).\n\n - kABI fixup alloc_dax_region (bsc#1158071).\n\n - kabi: s390: struct subchannel (git-fixes).\n\n - kABI workaround for ath10k hw_filter_reset_required\n field (bsc#1111666).\n\n - kABI workaround for ath10k last_wmi_vdev_start_status\n field (bsc#1051510).\n\n - kABI workaround for iwlwifi iwl_rx_cmd_buffer change\n (bsc#1111666).\n\n - kABI workaround for struct mwifiex_power_cfg change\n (bsc#1051510).\n\n - KVM: s390: fix __insn32_query() inline assembly\n (git-fixes).\n\n - KVM: s390: vsie: Do not shadow CRYCB when no AP and no\n keys (git-fixes).\n\n - KVM: s390: vsie: Return correct values for Invalid CRYCB\n format (git-fixes).\n\n - KVM: SVM: Guard against DEACTIVATE when performing\n WBINVD/DF_FLUSH (bsc#1114279).\n\n - KVM: SVM: Serialize access to the SEV ASID bitmap\n (bsc#1114279).\n\n - KVM: VMX: Consider PID.PIR to determine if vCPU has\n pending interrupts (bsc#1158064).\n\n - KVM: VMX: Fix conditions for guest IA32_XSS support\n (bsc#1158065).\n\n - KVM: x86: Introduce vcpu->arch.xsaves_enabled\n (bsc#1158066).\n\n - KVM: x86/mmu: Take slots_lock when using\n kvm_mmu_zap_all_fast() (bsc#1158067).\n\n - libnvdimm: Export the target_node attribute for regions\n and namespaces (bsc#1158071).\n\n - lib/scatterlist: Fix chaining support in\n sgl_alloc_order() (git-fixes).\n\n - lib/scatterlist: Introduce sgl_alloc() and sgl_free()\n (git-fixes).\n\n - liquidio: fix race condition in instruction completion\n processing (bsc#1051510).\n\n - livepatch: Allow to distinguish different version of\n system state changes (bsc#1071995).\n\n - livepatch: Allow to distinguish different version of\n system state changes (bsc#1071995 fate#323487).\n\n - livepatch: Basic API to track system state changes\n (bsc#1071995 ).\n\n - livepatch: Basic API to track system state changes\n (bsc#1071995 fate#323487).\n\n - livepatch: Keep replaced patches until post_patch\n callback is called (bsc#1071995).\n\n - livepatch: Keep replaced patches until post_patch\n callback is called (bsc#1071995 fate#323487).\n\n - livepatch: Selftests of the API for tracking system\n state changes (bsc#1071995).\n\n - livepatch: Selftests of the API for tracking system\n state changes (bsc#1071995 fate#323487).\n\n - loop: add ioctl for changing logical block size\n (bsc#1108043).\n\n - loop: fix no-unmap write-zeroes request behavior\n (bsc#1158637).\n\n - lpfc: size cpu map by last cpu id set (bsc#1157160).\n\n - mac80211: consider QoS Null frames for\n STA_NULLFUNC_ACKED (bsc#1051510).\n\n - mac80211: minstrel: fix CCK rate group streams value\n (bsc#1051510).\n\n - mac80211: minstrel: fix sampling/reporting of CCK rates\n in HT mode (bsc#1051510).\n\n - macvlan: schedule bc_work even if error (bsc#1051510).\n\n - mailbox: reset txdone_method TXDONE_BY_POLL if client\n knows_txdone (git-fixes).\n\n - media: au0828: Fix incorrect error messages\n (bsc#1051510).\n\n - media: bdisp: fix memleak on release (git-fixes).\n\n - media: cxusb: detect cxusb_ctrl_msg error in query\n (bsc#1051510).\n\n - media: davinci: Fix implicit enum conversion warning\n (bsc#1051510).\n\n - media: exynos4-is: Fix recursive locking in\n isp_video_release() (git-fixes).\n\n - media: fix: media: pci: meye: validate offset to avoid\n arbitrary access (bsc#1051510).\n\n - media: flexcop-usb: ensure -EIO is returned on error\n condition (git-fixes).\n\n - media: imon: invalid dereference in imon_touch_event\n (bsc#1051510).\n\n - media: isif: fix a NULL pointer dereference bug\n (bsc#1051510).\n\n - media: pci: ivtv: Fix a sleep-in-atomic-context bug in\n ivtv_yuv_init() (bsc#1051510).\n\n - media: pxa_camera: Fix check for pdev->dev.of_node\n (bsc#1051510).\n\n - media: radio: wl1273: fix interrupt masking on release\n (git-fixes).\n\n - media: ti-vpe: vpe: Fix Motion Vector vpdma stride\n (git-fixes).\n\n - media: usbvision: Fix races among open, close, and\n disconnect (bsc#1051510).\n\n - media: vim2m: Fix abort issue (git-fixes).\n\n - media: vivid: Set vid_cap_streaming and\n vid_out_streaming to true (bsc#1051510).\n\n - mei: fix modalias documentation (git-fixes).\n\n - mei: samples: fix a signedness bug in amt_host_if_call()\n (bsc#1051510).\n\n - mfd: intel-lpss: Add default I2C device properties for\n Gemini Lake (bsc#1051510).\n\n - mfd: max8997: Enale irq-wakeup unconditionally\n (bsc#1051510).\n\n - mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC\n values (bsc#1051510).\n\n - mfd: palmas: Assign the right powerhold mask for\n tps65917 (git-fixes).\n\n - mfd: ti_am335x_tscadc: Keep ADC interface on if child is\n wakeup capable (bsc#1051510).\n\n - mISDN: Fix type of switch control variable in\n ctrl_teimanager (bsc#1051510).\n\n - mlx5: add parameter to disable enhanced IPoIB\n (bsc#1142095)\n\n - mlx5: add parameter to disable enhanced IPoIB\n (bsc#1142095) Fix badly backported patch\n\n - mlxsw: spectrum_flower: Fail in case user specifies\n multiple mirror actions (bsc#1112374).\n\n - mmc: core: fix wl1251 sdio quirks (git-fixes).\n\n - mmc: host: omap_hsmmc: add code for special init of\n wl1251 to get rid of pandora_wl1251_init_card\n (git-fixes).\n\n - mmc: mediatek: fix cannot receive new request when\n msdc_cmd_is_ready fail (bsc#1051510).\n\n - mm/compaction.c: clear total_(migrate,free)_scanned\n before scanning a new zone (git fixes (mm/compaction)).\n\n - mmc: sdhci-esdhc-imx: correct the fix of ERR004536\n (git-fixes).\n\n - mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n\n - mmc: sdio: fix wl1251 vendor id (git-fixes).\n\n - mm/debug.c: PageAnon() is true for PageKsm() pages (git\n fixes (mm/debug)).\n\n - mm, thp: Do not make page table dirty unconditionally in\n touch_p[mu]d() (git fixes (mm/gup)).\n\n - mt7601u: fix bbp version check in mt7601u_wait_bbp_ready\n (bsc#1051510).\n\n - mt76x0: init hw capabilities.\n\n - mtd: nand: mtk: fix incorrect register setting order\n about ecc irq.\n\n - mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n\n - mtd: spi-nor: fix silent truncation in spi_nor_read()\n (bsc#1051510).\n\n - mwifex: free rx_cmd skb in suspended state\n (bsc#1111666).\n\n - mwifiex: do no submit URB in suspended state\n (bsc#1111666).\n\n - mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n\n - nbd: prevent memory leak (bsc#1158638).\n\n - net: add READ_ONCE() annotation in\n __skb_wait_for_more_packets()\n (networking-stable-19_11_05).\n\n - net: add skb_queue_empty_lockless()\n (networking-stable-19_11_05).\n\n - net: annotate accesses to sk->sk_incoming_cpu\n (networking-stable-19_11_05).\n\n - net: annotate lockless accesses to sk->sk_napi_id\n (networking-stable-19_11_05).\n\n - net: avoid potential infinite loop in tc_ctl_action()\n (networking-stable-19_10_24).\n\n - net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3\n (networking-stable-19_10_24).\n\n - net: bcmgenet: reset 40nm EPHY on energy detect\n (networking-stable-19_11_05).\n\n - net: bcmgenet: Set phydev->dev_flags only for internal\n PHYs (networking-stable-19_10_24).\n\n - net: dsa: b53: Do not clear existing mirrored port mask\n (networking-stable-19_11_05).\n\n - net: dsa: bcm_sf2: Fix IMP setup for port different than\n 8 (networking-stable-19_11_05).\n\n - net: dsa: fix switch tree list\n (networking-stable-19_11_05).\n\n - net: ethernet: ftgmac100: Fix DMA coherency issue with\n SW checksum (networking-stable-19_11_05).\n\n - net: fix sk_page_frag() recursion from memory reclaim\n (networking-stable-19_11_05).\n\n - net: hisilicon: Fix ping latency when deal with high\n throughput (networking-stable-19_11_05).\n\n - net: hns3: change GFP flag during lock period\n (bsc#1104353 ).\n\n - net: hns3: change GFP flag during lock period\n (bsc#1104353 FATE#326415).\n\n - net: hns3: do not query unsupported commands in debugfs\n (bsc#1104353).\n\n - net: hns3: do not query unsupported commands in debugfs\n (bsc#1104353 FATE#326415).\n\n - net: hns3: fix GFP flag error in\n hclge_mac_update_stats() (bsc#1126390).\n\n - net: hns3: fix some reset handshake issue (bsc#1104353\n ).\n\n - net: hns3: fix some reset handshake issue (bsc#1104353\n FATE#326415).\n\n - net: hns3: prevent unnecessary MAC TNL interrupt\n (bsc#1104353 bsc#1134983).\n\n - net: hns3: prevent unnecessary MAC TNL interrupt\n (bsc#1104353 FATE#326415 bsc#1134983).\n\n - net: hns: Fix the stray netpoll locks causing deadlock\n in NAPI path (bsc#1104353).\n\n - net: hns: Fix the stray netpoll locks causing deadlock\n in NAPI path (bsc#1104353 FATE#326415).\n\n - net/ibmvnic: Ignore H_FUNCTION return from H_EOI to\n tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544,\n git-fixes).\n\n - net/mlx4_core: Dynamically set guaranteed amount of\n counters per VF (networking-stable-19_11_05).\n\n - net/mlx5e: Fix eswitch debug print of max fdb flow\n (bsc#1103990 ).\n\n - net/mlx5e: Fix eswitch debug print of max fdb flow\n (bsc#1103990 FATE#326006).\n\n - net/mlx5e: Fix ethtool self test: link speed\n (bsc#1103990 ).\n\n - net/mlx5e: Fix ethtool self test: link speed\n (bsc#1103990 FATE#326006).\n\n - net/mlx5e: Fix handling of compressed CQEs in case of\n low NAPI budget (networking-stable-19_11_05).\n\n - net/mlx5e: Print a warning when LRO feature is dropped\n or not allowed (bsc#1103990).\n\n - net/mlx5e: Print a warning when LRO feature is dropped\n or not allowed (bsc#1103990 FATE#326006).\n\n - net/mlx5: FWTrace, Reduce stack usage (bsc#1103990).\n\n - net/mlx5: FWTrace, Reduce stack usage (bsc#1103990\n FATE#326006).\n\n - netns: fix GFP flags in rtnl_net_notifyid()\n (networking-stable-19_11_05).\n\n - net: phy: bcm7xxx: define soft_reset for 40nm EPHY\n (bsc#1119113 ).\n\n - net: phy: bcm7xxx: define soft_reset for 40nm EPHY\n (bsc#1119113 FATE#326472).\n\n - net: phylink: Fix flow control resolution (bsc#1119113\n ).\n\n - net: phylink: Fix flow control resolution (bsc#1119113\n FATE#326472).\n\n - net: sched: cbs: Avoid division by zero when calculating\n the port rate (bsc#1109837).\n\n - net/sched: cbs: Fix not adding cbs instance to list\n (bsc#1109837).\n\n - net/sched: cbs: Set default link speed to 10 Mbps in\n cbs_set_port_rate (bsc#1109837).\n\n - net: sched: fix possible crash in tcf_action_destroy()\n (bsc#1109837).\n\n - net: sched: fix reordering issues (bsc#1109837).\n\n - net/smc: avoid fallback in case of non-blocking connect\n (git-fixes).\n\n - net/smc: do not schedule tx_work in SMC_CLOSED state\n (git-fixes).\n\n - net/smc: fix closing of fallback SMC sockets\n (git-fixes).\n\n - net/smc: Fix error path in smc_init (git-fixes).\n\n - net/smc: fix ethernet interface refcounting (git-fixes).\n\n - net/smc: fix fastopen for non-blocking connect()\n (git-fixes).\n\n - net/smc: fix refcounting for non-blocking connect()\n (git-fixes).\n\n - net/smc: fix refcount non-blocking connect() -part 2\n (git-fixes).\n\n - net/smc: fix SMCD link group creation with VLAN id\n (git-fixes).\n\n - net/smc: keep vlan_id for SMC-R in smc_listen_work()\n (git-fixes).\n\n - net/smc: original socket family in inet_sock_diag\n (git-fixes).\n\n - net: sock_map, fix missing ulp check in sock hash case\n (bsc#1109837).\n\n - net: stmmac: disable/enable ptp_ref_clk in\n suspend/resume flow (networking-stable-19_10_24).\n\n - net: use skb_queue_empty_lockless() in busy poll\n contexts (networking-stable-19_11_05).\n\n - net: use skb_queue_empty_lockless() in poll() handlers\n (networking-stable-19_11_05).\n\n - net: wireless: ti: remove local VENDOR_ID and DEVICE_ID\n definitions (git-fixes).\n\n - net: wireless: ti: wl1251 use new\n SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n\n - net: Zeroing the structure ethtool_wolinfo in\n ethtool_get_wol() (networking-stable-19_11_05).\n\n - nfc: netlink: fix double device reference drop\n (git-fixes).\n\n - NFC: nxp-nci: Fix NULL pointer dereference after I2C\n communication error (git-fixes).\n\n - nfc: port100: handle command failure cleanly\n (git-fixes).\n\n - nfp: flower: fix memory leak in\n nfp_flower_spawn_vnic_reprs (bsc#1109837).\n\n - nfp: flower: prevent memory leak in\n nfp_flower_spawn_phy_reprs (bsc#1109837).\n\n - nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n\n - nvme-tcp: support C2HData with SUCCESS flag\n (bsc#1157386).\n\n - ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n\n - ocfs2: fix passing zero to 'PTR_ERR' warning\n (bsc#1158649).\n\n - openvswitch: fix flow command message size (git-fixes).\n\n - padata: use smp_mb in padata_reorder to avoid orphaned\n padata jobs (git-fixes).\n\n - PCI/ACPI: Correct error message for ASPM disabling\n (bsc#1051510).\n\n - PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3\n (bsc#1051510).\n\n - PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n\n - PCI: Fix Intel ACS quirk UPDCR register address\n (bsc#1051510).\n\n - PCI/MSI: Fix incorrect MSI-X masking on resume\n (bsc#1051510).\n\n - PCI: pciehp: Do not disable interrupt twice on suspend\n (bsc#1111666).\n\n - PCI/PM: Clear PCIe PME Status even for legacy power\n management (bsc#1111666).\n\n - PCI/PME: Fix possible use-after-free on remove\n (git-fixes).\n\n - PCI/PTM: Remove spurious 'd' from granularity message\n (bsc#1051510).\n\n - PCI: rca