According to the versions of the kernel packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities :
- The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system:
memory allocation, process allocation, device input and output, etc. Security Fix(es):In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.(CVE-2019-9445)In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932(CVE-2020-0009)A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found.
This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.(CVE-2020-0543)A flaw was found in the Linux kernel's implementation of the BTRFS file system.
A local attacker, with the ability to mount a file system, can create a use-after-free memory fault after the file system has been unmounted. This may lead to memory corruption or privilege escalation.(CVE-2019-19377)A NULL pointer dereference flaw may occur in the Linux kernel's relay_open in kernel/relay.c. if the alloc_percpu() function is not validated in time of failure and used as a valid address for access. An attacker could use this flaw to cause a denial of service.(CVE-2019-19462)A NULL pointer dereference flaw was found in tw5864_handle_frame function in drivers/media/pci/tw5864/tw5864-video.c in the TW5864 Series Video media driver. The pointer 'vb' is assigned, but not validated before its use, and can lead to a denial of service. This flaw allows a local attacker with special user or root privileges to crash the system or leak internal kernel information.(CVE-2019-20806)go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.(CVE-2019-20810)An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/coreet-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.(CVE-2019-20811)A flaw was found in the way the af_packet functionality in the Linux kernel handled the retirement timer setting for TPACKET_v3 when getting settings from the underlying network device errors out. This flaw allows a local user who can open the af_packet domain socket and who can hit the error path, to use this vulnerability to starve the system.(CVE-2019-20812)A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.(CVE-2020-10711)A flaw was found in the Linux kernel's SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.(CVE-2020-10751)A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.(CVE-2020-10757)A logic bug flaw was found in the Linux kernel's implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10766)A flaw was found in the Linux kernel's implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10767)A flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled.
This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10768)A flaw was found in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.(CVE-2020-10781)A stack buffer overflow issue was found in the get_raw_socket() routine of the Host kernel accelerator for virtio net (vhost-net) driver. It could occur while doing an ictol(VHOST_NET_SET_BACKEND) call, and retrieving socket name in a kernel stack variable via get_raw_socket(). A user able to perform ioctl(2) calls on the '/dev/vhost-net' device may use this flaw to crash the kernel resulting in DoS issue.(CVE-2020-10942)A flaw was found in the Linux kernel's implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.(CVE-2020-12114)A use-after-free flaw was found in usb_sg_cancel in drivers/usb/core/message.c in the USB core subsystem.
This flaw allows a local attacker with a special user or root privileges to crash the system due to a race problem in the scatter-gather cancellation and transfer completion in usb_sg_wait. This vulnerability can also lead to a leak of internal kernel information.(CVE-2020-12464)A memory overflow and data corruption flaw were found in the Mediatek MT76 driver module for WiFi in mt76_add_fragment in driverset/wireless/mediatek/mt76/dma.c. An oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with a special user or root privileges can cause a denial of service or a leak of internal kernel information.(CVE-2020-12465)A vulnerability was found in __mptctl_ioctl in drivers/message/fusion/mptctl.c in Fusion MPT base driver 'mptctl' in the SCSI device module, where an incorrect lock leads to a race problem. This flaw allows an attacker with local access and special user (or root) privileges to cause a denial of service.(CVE-2020-12652)A flaw was found in the way the mwifiex_cmd_append_vsie_tlv() in Linux kernel's Marvell WiFi-Ex driver handled vendor specific information elements. A local user could use this flaw to escalate their privileges on the system.(CVE-2020-12653)A flaw was found in the Linux kernel. The Marvell mwifiex driver allows a remote WiFi access point to trigger a heap-based memory buffer overflow due to an incorrect memcpy operation. The highest threat from this vulnerability is to data integrity and system availability.(CVE-2020-12654)A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.(CVE-2020-12655)An out-of-bounds (OOB) memory access flaw was found in the Network XDP (the eXpress Data Path) module in the Linux kernel's xdp_umem_reg function in net/xdp/xdp_umem.c.
When a user with special user privilege of CAP_NET_ADMIN (or root) calls setsockopt to register umem ring on XDP socket, passing the headroom value larger than the available space in the chunk, it leads to an out-of-bounds write, causing panic or possible memory corruption. This flaw may lead to privilege escalation if a local end-user is granted permission to influence the execution of code in this manner.(CVE-2020-12659)A vulnerability was found in sg_write in drivers/scsi/sg.c in the SCSI generic (sg) driver subsystem. This flaw allows an attacker with local access and special user or root privileges to cause a denial of service if the allocated list is not cleaned with an invalid (Sg_fd * sfp) pointer at the time of failure, also possibly causing a kernel internal information leak problem.(CVE-2020-12770)An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.(CVE-2020-12771)A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.(CVE-2020-12826)A flaw was found in the Linux kernel, where it allows userspace processes, for example, a guest VM, to directly access h/w devices via its VFIO driver modules. The VFIO modules allow users to enable or disable access to the devices' MMIO memory address spaces. If a user attempts to access the read/write devices' MMIO address space when it is disabled, some h/w devices issue an interrupt to the CPU to indicate a fatal error condition, crashing the system. This flaw allows a guest user or process to crash the host system resulting in a denial of service.(CVE-2020-12888)gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.(CVE-2020-13143)** DISPUTED ** An issue was discovered in the Linux kernel through 5.7.1.
drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.(CVE-2020-13974)A use-after-free flaw was found in slcan_write_wakeup in driverset/can/slcan.c in the serial CAN module slcan. A race condition occurs when communicating with can using slcan between the write (scheduling the transmit) and closing (flushing out any pending queues) the SLCAN channel. This flaw allows a local attacker with special user or root privileges to cause a denial of service or a kernel information leak. The highest threat from this vulnerability is to system availability.(CVE-2020-14416)In the Linux kernel through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.(CVE-2020-15393)The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.(CVE-2020-16166)A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.(CVE-2020-10732)A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.(CVE-2020-14356)The Linux kernel 4.9.x before 4.9.233, 4.14.x before 4.14.194, and 4.19.x before 4.19.140 has a use-after-free because skcd->no_refcnt was not considered during a backport of a CVE-2020-14356 patch. This is related to the cgroups feature.(CVE-2020-25220)get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount underflow. This can be triggered by any 64-bit process that can use ptrace() or process_vm_readv(), aka CID-9fa2dd946743.(CVE-2020-25221)In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.(CVE-2020-25211)A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash.
This flaw allows a local attacker with user privileges to cause a denial of service.(CVE-2020-10769)A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-14331)In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product:
AndroidVersions: Android-10Android ID:
A-153467744(CVE-2020-0305)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
{"id": "EULEROS_SA-2020-1958.NASL", "vendorId": null, "type": "nessus", "bulletinFamily": "scanner", "title": "EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2020-1958)", "description": "According to the versions of the kernel packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities :\n\n - The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system:\n memory allocation, process allocation, device input and output, etc. Security Fix(es):In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.(CVE-2019-9445)In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932(CVE-2020-0009)A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found.\n This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.(CVE-2020-0543)A flaw was found in the Linux kernel's implementation of the BTRFS file system.\n A local attacker, with the ability to mount a file system, can create a use-after-free memory fault after the file system has been unmounted. This may lead to memory corruption or privilege escalation.(CVE-2019-19377)A NULL pointer dereference flaw may occur in the Linux kernel's relay_open in kernel/relay.c. if the alloc_percpu() function is not validated in time of failure and used as a valid address for access. An attacker could use this flaw to cause a denial of service.(CVE-2019-19462)A NULL pointer dereference flaw was found in tw5864_handle_frame function in drivers/media/pci/tw5864/tw5864-video.c in the TW5864 Series Video media driver. The pointer 'vb' is assigned, but not validated before its use, and can lead to a denial of service. This flaw allows a local attacker with special user or root privileges to crash the system or leak internal kernel information.(CVE-2019-20806)go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.(CVE-2019-20810)An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/coreet-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.(CVE-2019-20811)A flaw was found in the way the af_packet functionality in the Linux kernel handled the retirement timer setting for TPACKET_v3 when getting settings from the underlying network device errors out. This flaw allows a local user who can open the af_packet domain socket and who can hit the error path, to use this vulnerability to starve the system.(CVE-2019-20812)A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.(CVE-2020-10711)A flaw was found in the Linux kernel's SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.(CVE-2020-10751)A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.(CVE-2020-10757)A logic bug flaw was found in the Linux kernel's implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10766)A flaw was found in the Linux kernel's implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10767)A flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled.\n This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10768)A flaw was found in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.(CVE-2020-10781)A stack buffer overflow issue was found in the get_raw_socket() routine of the Host kernel accelerator for virtio net (vhost-net) driver. It could occur while doing an ictol(VHOST_NET_SET_BACKEND) call, and retrieving socket name in a kernel stack variable via get_raw_socket(). A user able to perform ioctl(2) calls on the '/dev/vhost-net' device may use this flaw to crash the kernel resulting in DoS issue.(CVE-2020-10942)A flaw was found in the Linux kernel's implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.(CVE-2020-12114)A use-after-free flaw was found in usb_sg_cancel in drivers/usb/core/message.c in the USB core subsystem.\n This flaw allows a local attacker with a special user or root privileges to crash the system due to a race problem in the scatter-gather cancellation and transfer completion in usb_sg_wait. This vulnerability can also lead to a leak of internal kernel information.(CVE-2020-12464)A memory overflow and data corruption flaw were found in the Mediatek MT76 driver module for WiFi in mt76_add_fragment in driverset/wireless/mediatek/mt76/dma.c. An oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with a special user or root privileges can cause a denial of service or a leak of internal kernel information.(CVE-2020-12465)A vulnerability was found in __mptctl_ioctl in drivers/message/fusion/mptctl.c in Fusion MPT base driver 'mptctl' in the SCSI device module, where an incorrect lock leads to a race problem. This flaw allows an attacker with local access and special user (or root) privileges to cause a denial of service.(CVE-2020-12652)A flaw was found in the way the mwifiex_cmd_append_vsie_tlv() in Linux kernel's Marvell WiFi-Ex driver handled vendor specific information elements. A local user could use this flaw to escalate their privileges on the system.(CVE-2020-12653)A flaw was found in the Linux kernel. The Marvell mwifiex driver allows a remote WiFi access point to trigger a heap-based memory buffer overflow due to an incorrect memcpy operation. The highest threat from this vulnerability is to data integrity and system availability.(CVE-2020-12654)A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.(CVE-2020-12655)An out-of-bounds (OOB) memory access flaw was found in the Network XDP (the eXpress Data Path) module in the Linux kernel's xdp_umem_reg function in net/xdp/xdp_umem.c.\n When a user with special user privilege of CAP_NET_ADMIN (or root) calls setsockopt to register umem ring on XDP socket, passing the headroom value larger than the available space in the chunk, it leads to an out-of-bounds write, causing panic or possible memory corruption. This flaw may lead to privilege escalation if a local end-user is granted permission to influence the execution of code in this manner.(CVE-2020-12659)A vulnerability was found in sg_write in drivers/scsi/sg.c in the SCSI generic (sg) driver subsystem. This flaw allows an attacker with local access and special user or root privileges to cause a denial of service if the allocated list is not cleaned with an invalid (Sg_fd * sfp) pointer at the time of failure, also possibly causing a kernel internal information leak problem.(CVE-2020-12770)An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.(CVE-2020-12771)A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.(CVE-2020-12826)A flaw was found in the Linux kernel, where it allows userspace processes, for example, a guest VM, to directly access h/w devices via its VFIO driver modules. The VFIO modules allow users to enable or disable access to the devices' MMIO memory address spaces. If a user attempts to access the read/write devices' MMIO address space when it is disabled, some h/w devices issue an interrupt to the CPU to indicate a fatal error condition, crashing the system. This flaw allows a guest user or process to crash the host system resulting in a denial of service.(CVE-2020-12888)gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel through 5.6.13 relies on kstrdup without considering the possibility of an internal '\\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.(CVE-2020-13143)** DISPUTED ** An issue was discovered in the Linux kernel through 5.7.1.\n drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.(CVE-2020-13974)A use-after-free flaw was found in slcan_write_wakeup in driverset/can/slcan.c in the serial CAN module slcan. A race condition occurs when communicating with can using slcan between the write (scheduling the transmit) and closing (flushing out any pending queues) the SLCAN channel. This flaw allows a local attacker with special user or root privileges to cause a denial of service or a kernel information leak. The highest threat from this vulnerability is to system availability.(CVE-2020-14416)In the Linux kernel through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.(CVE-2020-15393)The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.(CVE-2020-16166)A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.(CVE-2020-10732)A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.(CVE-2020-14356)The Linux kernel 4.9.x before 4.9.233, 4.14.x before 4.14.194, and 4.19.x before 4.19.140 has a use-after-free because skcd->no_refcnt was not considered during a backport of a CVE-2020-14356 patch. This is related to the cgroups feature.(CVE-2020-25220)get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount underflow. This can be triggered by any 64-bit process that can use ptrace() or process_vm_readv(), aka CID-9fa2dd946743.(CVE-2020-25221)In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.(CVE-2020-25211)A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash.\n This flaw allows a local attacker with user privileges to cause a denial of service.(CVE-2020-10769)A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-14331)In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product:\n AndroidVersions: Android-10Android ID:\n A-153467744(CVE-2020-0305)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2020-09-08T00:00:00", "modified": "2021-07-06T00:00:00", "epss": [], "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.tenable.com/plugins/nessus/140328", "reporter": "This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12888", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10768", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12771", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10766", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12659", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10767", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13974", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14331", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20810", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12465", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10769", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12655", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15393", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25221", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25220", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14356", "http://www.nessus.org/u?ea61decf", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10781", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9445", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0009", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14416", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19377"], "cvelist": ["CVE-2019-19377", "CVE-2019-19462", "CVE-2019-20806", "CVE-2019-20810", "CVE-2019-20811", "CVE-2019-20812", "CVE-2019-9445", "CVE-2020-0009", "CVE-2020-0305", "CVE-2020-0543", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10781", "CVE-2020-10942", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12465", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12659", "CVE-2020-12770", "CVE-2020-12771", "CVE-2020-12826", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-16166", "CVE-2020-25211", "CVE-2020-25220", "CVE-2020-25221"], "immutableFields": [], "lastseen": "2023-05-18T15:22:33", "viewCount": 17, "enchantments": {"dependencies": {"references": [{"type": "almalinux", "idList": ["ALSA-2020:4431", "ALSA-2021:1578", "ALSA-2021:3027", "ALSA-2022:1988"]}, {"type": "amazon", "idList": ["ALAS-2020-1360", "ALAS-2020-1366", "ALAS-2020-1377", "ALAS-2020-1382", "ALAS-2020-1396", "ALAS-2020-1401", "ALAS-2020-1437", "ALAS-2020-1446", "ALAS-2020-1465", "ALAS2-2020-1405", "ALAS2-2020-1425", "ALAS2-2020-1431", "ALAS2-2020-1440", "ALAS2-2020-1444", "ALAS2-2020-1465", "ALAS2-2020-1480", "ALAS2-2020-1495", "ALAS2-2020-1556"]}, {"type": "androidsecurity", "idList": ["ANDROID:2019-09-01", "ANDROID:2020-01-01", "ANDROID:2020-06-01", "ANDROID:2020-09-01", "ANDROID:2020-12-01"]}, {"type": "archlinux", "idList": ["ASA-202006-10"]}, {"type": "attackerkb", "idList": ["AKB:555EF2E1-269F-4133-8D13-B67EA80F8CC3", "AKB:64124DE0-CCEB-4AC1-91D9-5E1834B667F5"]}, {"type": "centos", "idList": ["CESA-2020:2103", "CESA-2020:2430", "CESA-2020:2432", "CESA-2020:2433", "CESA-2020:2664", "CESA-2020:3220", "CESA-2020:4060", "CESA-2020:5023", "CESA-2020:5437", "CESA-2021:0856", "CESA-2021:3028"]}, {"type": "citrix", "idList": ["CTX275165"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:0835B914E665F771DA10821B3BDE2D9F", "CFOUNDRY:27F5DB3AFDCF54F32837F9CE39245DE1", "CFOUNDRY:2B547AA94018245E71F37CB94BA4EEBC", "CFOUNDRY:3B00E04C67EFB83F5D044A76DD92B52C", "CFOUNDRY:5D359B30C62666D917EB31596D1BFDE4", "CFOUNDRY:873D4C50CDC37566272A2CA3925ADB7A", "CFOUNDRY:8CFF4A0AF748B0C857C01324EB35B6D4", "CFOUNDRY:A5CCCF4486FE273FEA953C57B224799B", "CFOUNDRY:ABBF4BD74406CA92477E7CFB1AD01190"]}, {"type": "cloudlinux", "idList": ["CLSA-2021:1632261812", "CLSA-2021:1632261839", "CLSA-2022:1650576075"]}, {"type": "cve", "idList": ["CVE-2019-19377", "CVE-2019-19462", "CVE-2019-20806", "CVE-2019-20810", "CVE-2019-20811", "CVE-2019-20812", "CVE-2019-9445", "CVE-2020-0009", "CVE-2020-0255", "CVE-2020-0305", "CVE-2020-0543", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10741", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10781", "CVE-2020-10942", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12465", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12659", "CVE-2020-12770", "CVE-2020-12771", "CVE-2020-12826", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-16166", "CVE-2020-25211", "CVE-2020-25220", "CVE-2020-25221"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2241-1:DE3AB", "DEBIAN:DLA-2241-2:3E557", "DEBIAN:DLA-2242-1:573AF", "DEBIAN:DLA-2248-1:806E4", "DEBIAN:DLA-2248-1:D7645", "DEBIAN:DLA-2323-1:C146F", "DEBIAN:DLA-2385-1:FDE93", "DEBIAN:DLA-2417-1:4ADAB", "DEBIAN:DLA-2420-1:692E7", "DEBIAN:DLA-2420-2:175D1", "DEBIAN:DLA-2483-1:37DA1", "DEBIAN:DSA-4667-1:62006", "DEBIAN:DSA-4667-1:834A8", "DEBIAN:DSA-4698-1:66813", "DEBIAN:DSA-4698-1:E1A7D", "DEBIAN:DSA-4699-1:122C4", "DEBIAN:DSA-4699-1:D5D43", "DEBIAN:DSA-4701-1:768E4", "DEBIAN:DSA-4701-1:BB3B8", "DEBIAN:DSA-4774-1:EE27B", "DEBIAN:DSA-4774-1:EF524"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2019-19377", "DEBIANCVE:CVE-2019-19462", "DEBIANCVE:CVE-2019-20806", "DEBIANCVE:CVE-2019-20810", "DEBIANCVE:CVE-2019-20811", "DEBIANCVE:CVE-2019-20812", "DEBIANCVE:CVE-2019-9445", "DEBIANCVE:CVE-2020-0009", "DEBIANCVE:CVE-2020-0305", "DEBIANCVE:CVE-2020-0543", "DEBIANCVE:CVE-2020-10711", "DEBIANCVE:CVE-2020-10732", "DEBIANCVE:CVE-2020-10751", "DEBIANCVE:CVE-2020-10757", "DEBIANCVE:CVE-2020-10766", "DEBIANCVE:CVE-2020-10767", "DEBIANCVE:CVE-2020-10768", "DEBIANCVE:CVE-2020-10769", "DEBIANCVE:CVE-2020-10781", "DEBIANCVE:CVE-2020-10942", "DEBIANCVE:CVE-2020-12114", "DEBIANCVE:CVE-2020-12464", "DEBIANCVE:CVE-2020-12465", "DEBIANCVE:CVE-2020-12652", "DEBIANCVE:CVE-2020-12653", "DEBIANCVE:CVE-2020-12654", "DEBIANCVE:CVE-2020-12655", "DEBIANCVE:CVE-2020-12659", "DEBIANCVE:CVE-2020-12770", "DEBIANCVE:CVE-2020-12771", "DEBIANCVE:CVE-2020-12826", "DEBIANCVE:CVE-2020-12888", "DEBIANCVE:CVE-2020-13143", "DEBIANCVE:CVE-2020-13974", "DEBIANCVE:CVE-2020-14331", "DEBIANCVE:CVE-2020-14356", "DEBIANCVE:CVE-2020-14416", "DEBIANCVE:CVE-2020-15393", "DEBIANCVE:CVE-2020-16166", "DEBIANCVE:CVE-2020-25211", "DEBIANCVE:CVE-2020-25220", "DEBIANCVE:CVE-2020-25221"]}, {"type": "f5", "idList": ["F5:K01051400", "F5:K02354867", "F5:K05617914", "F5:K10429441", "F5:K21458044", "F5:K25225860", "F5:K25920352", "F5:K42745412", "F5:K44435547", "F5:K50928877", "F5:K52525232", "F5:K62532228"]}, {"type": "fedora", "idList": ["FEDORA:055473124314", "FEDORA:083D7313CFDA", "FEDORA:15484608781D", "FEDORA:1E93431CA0AD", "FEDORA:29E8B30D1A9E", "FEDORA:2A755608EC25", "FEDORA:2AE7F3118C24", "FEDORA:38BDC3095ADB", "FEDORA:3917560460DA", "FEDORA:3A4183118C44", "FEDORA:3C5D13124326", "FEDORA:48CC5309B6F7", "FEDORA:62D0460BC99C", "FEDORA:68BA3606732B", "FEDORA:803AE30C6416", "FEDORA:8143631CA0A0", "FEDORA:9F68660D2A0F", "FEDORA:AAD0A60B6998", "FEDORA:AEC7F30A071F", "FEDORA:AFFEA30BBFB5", "FEDORA:E251030B5E26"]}, {"type": "freebsd", "idList": ["FBCBA194-AC7D-11EA-8B5E-B42E99A1B9C3"]}, {"type": "hp", "idList": ["HP:C06655648"]}, {"type": "ibm", "idList": ["056E8E90DE65417DDBD317AECA59E4BA53529394DA5008F22A756C161156DBF1", "11A6D2D3E2F465B16C8FA5A033A65600813397804613FDB0328399EEA7561293", "180AC5D7287F51495B95E36020BFF2325D0F58CB7C4B6EA71A4C3D8EEB389808", "1879325E67264056B58E8AD7F16855960BE3D80A459CF04AA2C576744065C438", "1B4C690B7DA33A4807087B34223ECB27C2AA91A91D536267A98B4BCEEB54A441", "1FDB55812AD3D9AB018A402C76AD1A7D7977943CA45EE64E54E9B459FD5AD0BA", "22DFDD1FF1BBF70D9C813ACA916818103631328A11AEED7718476AD8FD37F722", "27D394FDCFC7CCD676B6A0CB669CCC21028A62B88FA5A040852A1E2BFAB5D49B", "2FE97BC0DB8A3B1BCF85FF8F69828770D4396C7CC3ABD37202D8089D2CADF87B", "36F5A24A0FE05876D471A20F32BE0669E453AF841B04CDD94792F8F80EF7F4D4", "3EAEDBE0E30513BE7769DF8783660E3102FA1E55B812C2C0193B4C7C36DD66CA", "4777AA656AFE2A7E99CB0D93F8BE73D4229AC1A8C767E59363E711B828FD7059", "570AF6CDC4F7E864E6852EBD03923041C13A884B424AC254820AD0EEB73694DF", "64ADFD088203597B59C398AB3DEF28DC4F72D37A4C48C7FA81C6531EDA6A9877", "65AC1B828E41A5505E1A8E4F6E7E2E7A2BE86DE58C539C97379A40C7ED8BBD9F", "74EB94293C5F397767E62C9F6D734DE973B44B9B7EC427A98C99E92C3C3D6590", "7BEBE6C769A16D13746B813CF456C36F85AE1B1A1CBD26E71A53BD6E5B34E2F4", "89705B406BC34CFDE34239974351BBFD8507A55179356911F33A32F43F42DBB9", "8B24753FF8758BF51E7C6001AC39E0EF90B14323A9756CCEF8AC68E99EF03367", "8E24EF903D56A888174BB1AB470E2DCC02807350FF9369DCD7234DA9B5758032", "9148A44BD9A1C1A13CCEBD8F0346557CF005830103920CDDC01519240525CB58", "93800CB903FCF930D2442012C501177682436E51AEBEA85D7632953A9A31B533", "B208854B100603393ABFE63FA8975A55F6379CCD86BE9A76E5EA76BC92BEB365", "B68653AE8B3B701FAB183C54D344C9C2EE03602A2C7365EC7CF172320BA1AA2E", "C4826F6BCD3E1EC358C895C9FCA1260EC7609135ED81CBE00F22A388F6B09D6C", "C6EAD3F3307C853EF572B5AA0C97E7BC9E1E5795E6DA460CC6BFA63F04CB54C5", "D860B85F49895E0D8CF0AC6A066F6902558B044E03F0320678E24399C41C6135", "E83BF63685F2C90305069981C071D32B53876ACF7043D5AEB7C2319D670A7EB9", "ED8A3D1B7861E9FADE2E56F3710C2F426BD0F046968D24A2807B0DBC778A1AA1", "F0AFFAB5446BEF6A6B346CA7237A1583252E55B1EA002352E7DFDFFB5796363C", "F0B9B56079F884F041664405C90E1EA3DD557A7DC4ACA69220B7A78B68F6A1BD", "FA4B683BEB9B49C87C8F293AD46CC6FEDB68A76B71FDD62413EE14D604E1FE34"]}, {"type": "ics", "idList": ["ICSA-20-252-07"]}, {"type": "intel", "idList": ["INTEL:INTEL-SA-00320"]}, {"type": "lenovo", "idList": ["LENOVO:PS500327-INTEL-SPECIAL-REGISTER-BUFFER-DATA-SAMPLING-ADVISORY-NOSID", "LENOVO:PS500327-NOSID"]}, {"type": "mageia", "idList": ["MGASA-2020-0183", "MGASA-2020-0184", "MGASA-2020-0201", "MGASA-2020-0227", "MGASA-2020-0228", "MGASA-2020-0298", "MGASA-2020-0333", "MGASA-2020-0392"]}, {"type": "nessus", "idList": ["AL2_ALAS-2020-1405.NASL", "AL2_ALAS-2020-1425.NASL", "AL2_ALAS-2020-1431.NASL", "AL2_ALAS-2020-1440.NASL", "AL2_ALAS-2020-1444.NASL", "AL2_ALAS-2020-1465.NASL", "AL2_ALAS-2020-1480.NASL", "AL2_ALAS-2020-1495.NASL", "AL2_ALAS-2020-1556.NASL", "AL2_ALASKERNEL-5_4-2022-011.NASL", "AL2_ALASKERNEL-5_4-2022-012.NASL", "AL2_ALASKERNEL-5_4-2022-013.NASL", "AL2_ALASKERNEL-5_4-2022-014.NASL", "AL2_ALASKERNEL-5_4-2022-016.NASL", "AL2_ALASKERNEL-5_4-2022-017.NASL", "ALA_ALAS-2020-1360.NASL", "ALA_ALAS-2020-1366.NASL", "ALA_ALAS-2020-1377.NASL", "ALA_ALAS-2020-1382.NASL", "ALA_ALAS-2020-1396.NASL", "ALA_ALAS-2020-1401.NASL", "ALA_ALAS-2020-1437.NASL", "ALA_ALAS-2020-1446.NASL", "ALMA_LINUX_ALSA-2020-4431.NASL", "ALMA_LINUX_ALSA-2021-1578.NASL", "ALMA_LINUX_ALSA-2021-3027.NASL", "ALMA_LINUX_ALSA-2022-1988.NASL", "CENTOS8_RHSA-2020-2102.NASL", "CENTOS8_RHSA-2020-2431.NASL", "CENTOS8_RHSA-2020-4286.NASL", "CENTOS8_RHSA-2020-4431.NASL", "CENTOS8_RHSA-2021-0003.NASL", "CENTOS8_RHSA-2021-1578.NASL", "CENTOS8_RHSA-2021-3027.NASL", "CENTOS_RHSA-2020-2103.NASL", "CENTOS_RHSA-2020-2432.NASL", "CENTOS_RHSA-2020-2433.NASL", "CENTOS_RHSA-2020-2664.NASL", "CENTOS_RHSA-2020-3220.NASL", "CENTOS_RHSA-2020-4060.NASL", "CENTOS_RHSA-2020-5023.NASL", "CENTOS_RHSA-2020-5437.NASL", "CENTOS_RHSA-2021-0856.NASL", "CENTOS_RHSA-2021-3028.NASL", "DEBIAN_DLA-2241.NASL", "DEBIAN_DLA-2242.NASL", "DEBIAN_DLA-2248.NASL", "DEBIAN_DLA-2323.NASL", "DEBIAN_DLA-2385.NASL", "DEBIAN_DLA-2417.NASL", "DEBIAN_DLA-2420.NASL", "DEBIAN_DLA-2483.NASL", "DEBIAN_DSA-4667.NASL", "DEBIAN_DSA-4698.NASL", "DEBIAN_DSA-4699.NASL", "DEBIAN_DSA-4701.NASL", "DEBIAN_DSA-4774.NASL", "EULEROS_SA-2020-1536.NASL", "EULEROS_SA-2020-1592.NASL", "EULEROS_SA-2020-1606.NASL", "EULEROS_SA-2020-1674.NASL", "EULEROS_SA-2020-1698.NASL", "EULEROS_SA-2020-1713.NASL", "EULEROS_SA-2020-1807.NASL", "EULEROS_SA-2020-1859.NASL", "EULEROS_SA-2020-1892.NASL", "EULEROS_SA-2020-1920.NASL", "EULEROS_SA-2020-1938.NASL", "EULEROS_SA-2020-2011.NASL", "EULEROS_SA-2020-2150.NASL", "EULEROS_SA-2020-2151.NASL", "EULEROS_SA-2020-2222.NASL", "EULEROS_SA-2020-2250.NASL", "EULEROS_SA-2020-2303.NASL", "EULEROS_SA-2020-2311.NASL", "EULEROS_SA-2020-2353.NASL", "EULEROS_SA-2020-2443.NASL", "EULEROS_SA-2020-2549.NASL", "EULEROS_SA-2021-1056.NASL", "EULEROS_SA-2021-1079.NASL", "EULEROS_SA-2021-1200.NASL", "EULEROS_SA-2021-1311.NASL", "EULEROS_SA-2021-1454.NASL", "EULEROS_SA-2021-1604.NASL", "EULEROS_SA-2021-1684.NASL", "EULEROS_SA-2021-2040.NASL", "EULEROS_SA-2021-2140.NASL", "EULEROS_SA-2021-2272.NASL", "EULEROS_SA-2021-2336.NASL", "F5_BIGIP_SOL62532228.NASL", "FEDORA_2020-07F0BE216F.NASL", "FEDORA_2020-11DDBFBDF0.NASL", "FEDORA_2020-125CCDC871.NASL", "FEDORA_2020-1AFBE7BA2D.NASL", "FEDORA_2020-1B2DAE6219.NASL", "FEDORA_2020-203FFEDEB5.NASL", "FEDORA_2020-2CD6393548.NASL", "FEDORA_2020-3364913ACE.NASL", "FEDORA_2020-3C6FEDEB83.NASL", "FEDORA_2020-5436586091.NASL", "FEDORA_2020-57BF620276.NASL", "FEDORA_2020-5920A7A0B2.NASL", "FEDORA_2020-5A69DECC0C.NASL", "FEDORA_2020-8D634E31C0.NASL", "FEDORA_2020-C6B9FFF7F8.NASL", "FEDORA_2020-E47D28BC2B.NASL", "FEDORA_2020-E8835A5F8E.NASL", "FREEBSD_PKG_FBCBA194AC7D11EA8B5EB42E99A1B9C3.NASL", "NEWSTART_CGSL_NS-SA-2020-0030_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0071_MICROCODE_CTL.NASL", "NEWSTART_CGSL_NS-SA-2020-0073_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0108_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0001_MICROCODE_CTL.NASL", "NEWSTART_CGSL_NS-SA-2021-0008_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0025_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0030_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0078_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0104_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0139_MICROCODE_CTL.NASL", "NEWSTART_CGSL_NS-SA-2021-0140_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0169_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0183_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0001_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0011_MICROCODE_CTL.NASL", "NEWSTART_CGSL_NS-SA-2022-0026_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0046_MICROCODE_CTL.NASL", "NEWSTART_CGSL_NS-SA-2022-0060_MICROCODE_CTL.NASL", "NEWSTART_CGSL_NS-SA-2022-0073_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0074_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0075_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0089_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0099_KERNEL.NASL", "NUTANIX_NXSA-AOS-5_15_3.NASL", "NUTANIX_NXSA-AOS-5_15_5.NASL", "NUTANIX_NXSA-AOS-5_15_5_5.NASL", "NUTANIX_NXSA-AOS-5_15_6.NASL", "NUTANIX_NXSA-AOS-5_15_7.NASL", "NUTANIX_NXSA-AOS-5_17_1_3.NASL", "NUTANIX_NXSA-AOS-5_17_1_5.NASL", "NUTANIX_NXSA-AOS-5_18.NASL", "NUTANIX_NXSA-AOS-5_18_0_5.NASL", "NUTANIX_NXSA-AOS-5_18_1.NASL", "NUTANIX_NXSA-AOS-5_19_0_5.NASL", "NUTANIX_NXSA-AOS-5_19_1.NASL", "NUTANIX_NXSA-AOS-5_19_2.NASL", "NUTANIX_NXSA-AOS-5_20.NASL", "NUTANIX_NXSA-AOS-6_0.NASL", "NUTANIX_NXSA-AOS-6_1.NASL", "OPENSUSE-2020-1062.NASL", "OPENSUSE-2020-1153.NASL", "OPENSUSE-2020-1236.NASL", "OPENSUSE-2020-1325.NASL", "OPENSUSE-2020-543.NASL", "OPENSUSE-2020-791.NASL", "OPENSUSE-2020-801.NASL", "OPENSUSE-2020-818.NASL", "OPENSUSE-2020-935.NASL", "OPENSUSE-2020-965.NASL", "OPENSUSE-2020-985.NASL", "OPENSUSE-2021-241.NASL", "OPENSUSE-2021-242.NASL", "OPENSUSE-2021-3179.NASL", "OPENSUSE-2021-3205.NASL", "OPENSUSE-2021-3876.NASL", "ORACLELINUX_ELSA-2020-2082.NASL", "ORACLELINUX_ELSA-2020-2102.NASL", "ORACLELINUX_ELSA-2020-2103.NASL", "ORACLELINUX_ELSA-2020-2431.NASL", "ORACLELINUX_ELSA-2020-2432.NASL", "ORACLELINUX_ELSA-2020-2433.NASL", "ORACLELINUX_ELSA-2020-2664.NASL", "ORACLELINUX_ELSA-2020-3220.NASL", "ORACLELINUX_ELSA-2020-4286.NASL", "ORACLELINUX_ELSA-2020-5023.NASL", "ORACLELINUX_ELSA-2020-5437.NASL", "ORACLELINUX_ELSA-2020-5473.NASL", "ORACLELINUX_ELSA-2020-5642.NASL", "ORACLELINUX_ELSA-2020-5649.NASL", "ORACLELINUX_ELSA-2020-5663.NASL", "ORACLELINUX_ELSA-2020-5676.NASL", "ORACLELINUX_ELSA-2020-5714.NASL", "ORACLELINUX_ELSA-2020-5715.NASL", "ORACLELINUX_ELSA-2020-5722.NASL", "ORACLELINUX_ELSA-2020-5732.NASL", "ORACLELINUX_ELSA-2020-5750.NASL", "ORACLELINUX_ELSA-2020-5755.NASL", "ORACLELINUX_ELSA-2020-5756.NASL", "ORACLELINUX_ELSA-2020-5801.NASL", "ORACLELINUX_ELSA-2020-5804.NASL", "ORACLELINUX_ELSA-2020-5805.NASL", "ORACLELINUX_ELSA-2020-5837.NASL", "ORACLELINUX_ELSA-2020-5841.NASL", "ORACLELINUX_ELSA-2020-5844.NASL", "ORACLELINUX_ELSA-2020-5845.NASL", "ORACLELINUX_ELSA-2020-5848.NASL", "ORACLELINUX_ELSA-2020-5866.NASL", "ORACLELINUX_ELSA-2020-5878.NASL", "ORACLELINUX_ELSA-2020-5884.NASL", "ORACLELINUX_ELSA-2020-5885.NASL", "ORACLELINUX_ELSA-2020-5912.NASL", "ORACLELINUX_ELSA-2020-5962.NASL", "ORACLELINUX_ELSA-2020-5968.NASL", "ORACLELINUX_ELSA-2020-5983.NASL", "ORACLELINUX_ELSA-2021-0003.NASL", "ORACLELINUX_ELSA-2021-0856.NASL", "ORACLELINUX_ELSA-2021-1578.NASL", "ORACLELINUX_ELSA-2021-3027.NASL", "ORACLELINUX_ELSA-2021-3028.NASL", "ORACLELINUX_ELSA-2021-9002.NASL", "ORACLELINUX_ELSA-2021-9030.NASL", "ORACLELINUX_ELSA-2021-9442.NASL", "ORACLELINUX_ELSA-2021-9459.NASL", "ORACLELINUX_ELSA-2021-9473.NASL", "ORACLELINUX_ELSA-2022-10065.NASL", "ORACLELINUX_ELSA-2022-1988.NASL", "ORACLELINUX_ELSA-2022-9852.NASL", "ORACLELINUX_ELSA-2022-9969.NASL", "ORACLEVM_OVMSA-2020-0019.NASL", "ORACLEVM_OVMSA-2020-0026.NASL", "ORACLEVM_OVMSA-2020-0027.NASL", "ORACLEVM_OVMSA-2020-0028.NASL", "ORACLEVM_OVMSA-2020-0032.NASL", "ORACLEVM_OVMSA-2020-0039.NASL", "ORACLEVM_OVMSA-2020-0041.NASL", "ORACLEVM_OVMSA-2020-0044.NASL", "ORACLEVM_OVMSA-2020-0054.NASL", "ORACLEVM_OVMSA-2021-0001.NASL", "ORACLEVM_OVMSA-2021-0005.NASL", "ORACLEVM_OVMSA-2021-0030.NASL", "ORACLEVM_OVMSA-2021-0031.NASL", "ORACLEVM_OVMSA-2021-0035.NASL", "ORACLEVM_OVMSA-2022-0026.NASL", "ORACLEVM_OVMSA-2022-0031.NASL", "PHOTONOS_PHSA-2020-1_0-0290_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0292_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0293_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0297_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0303_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0310_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0314_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0328_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0334_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0242_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0246_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0251_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0256_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0266_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0272_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0283_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0286_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0288_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0296_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0073_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0089_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0100_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0102_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0108_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0119_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0127_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0144_LINUX.NASL", "REDHAT-RHSA-2020-2082.NASL", "REDHAT-RHSA-2020-2085.NASL", "REDHAT-RHSA-2020-2102.NASL", "REDHAT-RHSA-2020-2103.NASL", "REDHAT-RHSA-2020-2104.NASL", "REDHAT-RHSA-2020-2125.NASL", "REDHAT-RHSA-2020-2171.NASL", "REDHAT-RHSA-2020-2199.NASL", "REDHAT-RHSA-2020-2203.NASL", "REDHAT-RHSA-2020-2214.NASL", "REDHAT-RHSA-2020-2242.NASL", "REDHAT-RHSA-2020-2277.NASL", "REDHAT-RHSA-2020-2285.NASL", "REDHAT-RHSA-2020-2289.NASL", "REDHAT-RHSA-2020-2291.NASL", "REDHAT-RHSA-2020-2429.NASL", "REDHAT-RHSA-2020-2431.NASL", "REDHAT-RHSA-2020-2432.NASL", "REDHAT-RHSA-2020-2433.NASL", "REDHAT-RHSA-2020-2519.NASL", "REDHAT-RHSA-2020-2522.NASL", "REDHAT-RHSA-2020-2664.NASL", "REDHAT-RHSA-2020-2665.NASL", "REDHAT-RHSA-2020-2677.NASL", "REDHAT-RHSA-2020-2679.NASL", "REDHAT-RHSA-2020-2680.NASL", "REDHAT-RHSA-2020-2706.NASL", "REDHAT-RHSA-2020-2707.NASL", "REDHAT-RHSA-2020-2757.NASL", "REDHAT-RHSA-2020-2758.NASL", "REDHAT-RHSA-2020-2771.NASL", "REDHAT-RHSA-2020-2831.NASL", "REDHAT-RHSA-2020-2832.NASL", "REDHAT-RHSA-2020-2842.NASL", "REDHAT-RHSA-2020-2851.NASL", "REDHAT-RHSA-2020-2854.NASL", "REDHAT-RHSA-2020-3010.NASL", "REDHAT-RHSA-2020-3016.NASL", "REDHAT-RHSA-2020-3019.NASL", "REDHAT-RHSA-2020-3041.NASL", "REDHAT-RHSA-2020-3073.NASL", "REDHAT-RHSA-2020-3220.NASL", "REDHAT-RHSA-2020-3221.NASL", "REDHAT-RHSA-2020-3222.NASL", "REDHAT-RHSA-2020-3224.NASL", "REDHAT-RHSA-2020-3226.NASL", "REDHAT-RHSA-2020-3230.NASL", "REDHAT-RHSA-2020-3232.NASL", "REDHAT-RHSA-2020-3297.NASL", "REDHAT-RHSA-2020-3389.NASL", "REDHAT-RHSA-2020-3432.NASL", "REDHAT-RHSA-2020-3545.NASL", "REDHAT-RHSA-2020-3598.NASL", "REDHAT-RHSA-2020-4060.NASL", "REDHAT-RHSA-2020-4062.NASL", "REDHAT-RHSA-2020-4279.NASL", "REDHAT-RHSA-2020-4286.NASL", "REDHAT-RHSA-2020-4289.NASL", "REDHAT-RHSA-2020-4431.NASL", "REDHAT-RHSA-2020-4609.NASL", "REDHAT-RHSA-2020-5023.NASL", "REDHAT-RHSA-2020-5026.NASL", "REDHAT-RHSA-2020-5206.NASL", "REDHAT-RHSA-2020-5418.NASL", "REDHAT-RHSA-2020-5428.NASL", "REDHAT-RHSA-2020-5430.NASL", "REDHAT-RHSA-2020-5437.NASL", "REDHAT-RHSA-2020-5441.NASL", "REDHAT-RHSA-2020-5473.NASL", "REDHAT-RHSA-2020-5506.NASL", "REDHAT-RHSA-2020-5656.NASL", "REDHAT-RHSA-2021-0003.NASL", "REDHAT-RHSA-2021-0004.NASL", "REDHAT-RHSA-2021-0184.NASL", "REDHAT-RHSA-2021-0189.NASL", "REDHAT-RHSA-2021-0763.NASL", "REDHAT-RHSA-2021-0765.NASL", "REDHAT-RHSA-2021-0774.NASL", "REDHAT-RHSA-2021-0856.NASL", "REDHAT-RHSA-2021-0857.NASL", "REDHAT-RHSA-2021-1531.NASL", "REDHAT-RHSA-2021-1578.NASL", "REDHAT-RHSA-2021-1739.NASL", "REDHAT-RHSA-2021-2164.NASL", "REDHAT-RHSA-2021-2185.NASL", "REDHAT-RHSA-2021-2190.NASL", "REDHAT-RHSA-2021-2355.NASL", "REDHAT-RHSA-2021-3027.NASL", "REDHAT-RHSA-2021-3028.NASL", "REDHAT-RHSA-2021-3029.NASL", "REDHAT-RHSA-2021-3176.NASL", "REDHAT-RHSA-2021-3255.NASL", "REDHAT-RHSA-2021-3317.NASL", "REDHAT-RHSA-2021-3322.NASL", "REDHAT-RHSA-2021-3323.NASL", "REDHAT-RHSA-2021-3364.NASL", "REDHAT-RHSA-2022-1975.NASL", "REDHAT-RHSA-2022-1988.NASL", "SLACKWARE_SSA_2020-086-01.NASL", "SLACKWARE_SSA_2020-163-01.NASL", "SLACKWARE_SSA_2020-295-01.NASL", "SL_20200512_KERNEL_ON_SL6_X.NASL", "SL_20200512_KERNEL_ON_SL7_X.NASL", "SL_20200610_MICROCODE_CTL_ON_SL6_X.NASL", "SL_20200623_KERNEL_ON_SL7_X.NASL", "SL_20201001_KERNEL_ON_SL7_X.NASL", "SL_20201110_KERNEL_ON_SL7_X.NASL", "SL_20201215_KERNEL_ON_SL7_X.NASL", "SL_20210809_MICROCODE_CTL_ON_SL7_X.NASL", "SUSE_SU-2020-1118-1.NASL", "SUSE_SU-2020-1119-1.NASL", "SUSE_SU-2020-1123-1.NASL", "SUSE_SU-2020-1141-1.NASL", "SUSE_SU-2020-1142-1.NASL", "SUSE_SU-2020-1146-1.NASL", "SUSE_SU-2020-1255-1.NASL", "SUSE_SU-2020-1275-1.NASL", "SUSE_SU-2020-14354-1.NASL", "SUSE_SU-2020-14393-1.NASL", "SUSE_SU-2020-14394-1.NASL", "SUSE_SU-2020-14442-1.NASL", "SUSE_SU-2020-14521-1.NASL", "SUSE_SU-2020-1475-1.NASL", "SUSE_SU-2020-1486-1.NASL", "SUSE_SU-2020-1587-1.NASL", "SUSE_SU-2020-1589-1.NASL", "SUSE_SU-2020-1595-1.NASL", "SUSE_SU-2020-1596-1.NASL", "SUSE_SU-2020-1597-1.NASL", "SUSE_SU-2020-1599-1.NASL", "SUSE_SU-2020-1601-1.NASL", "SUSE_SU-2020-1602-1.NASL", "SUSE_SU-2020-1603-1.NASL", "SUSE_SU-2020-1605-1.NASL", "SUSE_SU-2020-1609-1.NASL", "SUSE_SU-2020-1630-1.NASL", "SUSE_SU-2020-1632-1.NASL", "SUSE_SU-2020-1633-1.NASL", "SUSE_SU-2020-1663-1.NASL", "SUSE_SU-2020-1693-1.NASL", "SUSE_SU-2020-1699-1.NASL", "SUSE_SU-2020-1713-1.NASL", "SUSE_SU-2020-1764-1.NASL", "SUSE_SU-2020-1767-1.NASL", "SUSE_SU-2020-1779-1.NASL", "SUSE_SU-2020-1781-1.NASL", "SUSE_SU-2020-1784-1.NASL", "SUSE_SU-2020-1887-1.NASL", "SUSE_SU-2020-1889-1.NASL", "SUSE_SU-2020-1902-1.NASL", "SUSE_SU-2020-2105-1.NASL", "SUSE_SU-2020-2106-1.NASL", "SUSE_SU-2020-2107-1.NASL", "SUSE_SU-2020-2119-1.NASL", "SUSE_SU-2020-2121-1.NASL", "SUSE_SU-2020-2122-1.NASL", "SUSE_SU-2020-2134-1.NASL", "SUSE_SU-2020-2152-1.NASL", "SUSE_SU-2020-2486-1.NASL", "SUSE_SU-2020-2487-1.NASL", "SUSE_SU-2020-2491-1.NASL", "SUSE_SU-2020-2492-1.NASL", "SUSE_SU-2020-2497-1.NASL", "SUSE_SU-2020-2498-1.NASL", "SUSE_SU-2020-2499-1.NASL", "SUSE_SU-2020-2502-1.NASL", "SUSE_SU-2020-2540-1.NASL", "SUSE_SU-2020-2574-1.NASL", "SUSE_SU-2020-2575-1.NASL", "SUSE_SU-2020-2576-1.NASL", "SUSE_SU-2020-2582-1.NASL", "SUSE_SU-2020-2610-1.NASL", "SUSE_SU-2020-2623-1.NASL", "SUSE_SU-2020-2631-1.NASL", "SUSE_SU-2020-2822-1.NASL", "SUSE_SU-2021-0353-1.NASL", "SUSE_SU-2021-0354-1.NASL", "SUSE_SU-2021-0427-1.NASL", "SUSE_SU-2021-0434-1.NASL", "SUSE_SU-2021-0437-1.NASL", "SUSE_SU-2021-0438-1.NASL", "SUSE_SU-2021-0452-1.NASL", "SUSE_SU-2021-14630-1.NASL", "SUSE_SU-2021-3179-1.NASL", "SUSE_SU-2021-3205-1.NASL", "SUSE_SU-2021-3206-1.NASL", "SUSE_SU-2021-3217-1.NASL", "SUSE_SU-2021-3415-1.NASL", "SUSE_SU-2021-3876-1.NASL", "SUSE_SU-2021-3929-1.NASL", "SUSE_SU-2021-3935-1.NASL", "SUSE_SU-2021-3969-1.NASL", "SUSE_SU-2021-3972-1.NASL", "SUSE_SU-2022-14905-1.NASL", "SUSE_SU-2022-1651-1.NASL", "SUSE_SU-2022-1668-1.NASL", "SUSE_SU-2022-1686-1.NASL", "SUSE_SU-2022-2077-1.NASL", "SUSE_SU-2022-2078-1.NASL", "SUSE_SU-2022-2079-1.NASL", "SUSE_SU-2022-2080-1.NASL", "SUSE_SU-2022-2082-1.NASL", "SUSE_SU-2022-2083-1.NASL", "SUSE_SU-2022-2103-1.NASL", "SUSE_SU-2022-2104-1.NASL", "SUSE_SU-2022-2111-1.NASL", "SUSE_SU-2022-2116-1.NASL", "SUSE_SU-2022-2177-1.NASL", "SUSE_SU-2022-2393-1.NASL", "SUSE_SU-2022-2629-1.NASL", "SUSE_SU-2022-2721-1.NASL", "SUSE_SU-2022-2840-1.NASL", "UBUNTU_USN-4342-1.NASL", "UBUNTU_USN-4344-1.NASL", "UBUNTU_USN-4345-1.NASL", "UBUNTU_USN-4364-1.NASL", "UBUNTU_USN-4367-1.NASL", "UBUNTU_USN-4367-2.NASL", "UBUNTU_USN-4369-1.NASL", "UBUNTU_USN-4369-2.NASL", "UBUNTU_USN-4385-1.NASL", "UBUNTU_USN-4385-2.NASL", "UBUNTU_USN-4387-1.NASL", "UBUNTU_USN-4388-1.NASL", "UBUNTU_USN-4389-1.NASL", "UBUNTU_USN-4390-1.NASL", "UBUNTU_USN-4391-1.NASL", "UBUNTU_USN-4411-1.NASL", "UBUNTU_USN-4412-1.NASL", "UBUNTU_USN-4413-1.NASL", "UBUNTU_USN-4414-1.NASL", "UBUNTU_USN-4419-1.NASL", "UBUNTU_USN-4425-1.NASL", "UBUNTU_USN-4426-1.NASL", "UBUNTU_USN-4427-1.NASL", "UBUNTU_USN-4439-1.NASL", "UBUNTU_USN-4440-1.NASL", "UBUNTU_USN-4462-1.NASL", "UBUNTU_USN-4463-1.NASL", "UBUNTU_USN-4465-1.NASL", "UBUNTU_USN-4483-1.NASL", "UBUNTU_USN-4484-1.NASL", "UBUNTU_USN-4485-1.NASL", "UBUNTU_USN-4525-1.NASL", "UBUNTU_USN-4526-1.NASL", "UBUNTU_USN-4527-1.NASL", "UBUNTU_USN-4657-1.NASL", "UBUNTU_USN-4658-1.NASL", "UBUNTU_USN-4660-1.NASL", "UBUNTU_USN-5343-1.NASL", "UBUNTU_USN-5361-1.NASL", "UBUNTU_USN-5617-1.NASL", "VIRTUOZZO_VZA-2020-037.NASL", "VIRTUOZZO_VZA-2020-045.NASL", "XEN_SERVER_XSA-320.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310108766", "OPENVAS:1361412562310108812", "OPENVAS:1361412562310704667", "OPENVAS:1361412562310704698", "OPENVAS:1361412562310704699", "OPENVAS:1361412562310704701", "OPENVAS:1361412562310844406", "OPENVAS:1361412562310844409", "OPENVAS:1361412562310844410", "OPENVAS:1361412562310844433", "OPENVAS:1361412562310844438", "OPENVAS:1361412562310844443", "OPENVAS:1361412562310844448", "OPENVAS:1361412562310844451", "OPENVAS:1361412562310844461", "OPENVAS:1361412562310844462", "OPENVAS:1361412562310844463", "OPENVAS:1361412562310844464", "OPENVAS:1361412562310844465", "OPENVAS:1361412562310844466", "OPENVAS:1361412562310844468", "OPENVAS:1361412562310844482", "OPENVAS:1361412562310844483", "OPENVAS:1361412562310844484", "OPENVAS:1361412562310844485", "OPENVAS:1361412562310844496", "OPENVAS:1361412562310853121", "OPENVAS:1361412562310853200", "OPENVAS:1361412562310853206", "OPENVAS:1361412562310853214", "OPENVAS:1361412562310853260", "OPENVAS:1361412562310877834", "OPENVAS:1361412562310877859", "OPENVAS:1361412562310877862", "OPENVAS:1361412562310877884", "OPENVAS:1361412562310877888", "OPENVAS:1361412562310877909", "OPENVAS:1361412562310877951", "OPENVAS:1361412562310877952", "OPENVAS:1361412562310877958", "OPENVAS:1361412562310877960", "OPENVAS:1361412562310877968", "OPENVAS:1361412562310877974", "OPENVAS:1361412562310877977", "OPENVAS:1361412562310877980", "OPENVAS:1361412562310877999", "OPENVAS:1361412562310878006", "OPENVAS:1361412562310883236", "OPENVAS:1361412562310883249", "OPENVAS:1361412562310883250", "OPENVAS:1361412562310883251", "OPENVAS:1361412562310883257", "OPENVAS:1361412562310892241", "OPENVAS:1361412562310892242", "OPENVAS:1361412562310892248", "OPENVAS:1361412562311220201592", "OPENVAS:1361412562311220201606", "OPENVAS:1361412562311220201674", "OPENVAS:1361412562311220201698", "OPENVAS:1361412562311220201713"]}, {"type": "oracle", "idList": ["ORACLE:CPUAPR2021", "ORACLE:CPUJUL2022"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-2082", "ELSA-2020-2102", "ELSA-2020-2103", "ELSA-2020-2427", "ELSA-2020-2430", "ELSA-2020-2431", "ELSA-2020-2432", "ELSA-2020-2433", "ELSA-2020-2664", "ELSA-2020-2933", "ELSA-2020-3010", "ELSA-2020-3220", "ELSA-2020-4060", "ELSA-2020-4286", "ELSA-2020-4431", "ELSA-2020-5023", "ELSA-2020-5437", "ELSA-2020-5473", "ELSA-2020-5642", "ELSA-2020-5649", "ELSA-2020-5663", "ELSA-2020-5676", "ELSA-2020-5714", "ELSA-2020-5715", "ELSA-2020-5722", "ELSA-2020-5732", "ELSA-2020-5750", "ELSA-2020-5755", "ELSA-2020-5756", "ELSA-2020-5765", "ELSA-2020-5766", "ELSA-2020-5801", "ELSA-2020-5804", "ELSA-2020-5805", "ELSA-2020-5837", "ELSA-2020-5841", "ELSA-2020-5844", "ELSA-2020-5845", "ELSA-2020-5848", "ELSA-2020-5866", "ELSA-2020-5878", "ELSA-2020-5884", "ELSA-2020-5885", "ELSA-2020-5912", "ELSA-2020-5913", "ELSA-2020-5914", "ELSA-2020-5923", "ELSA-2020-5924", "ELSA-2020-5962", "ELSA-2020-5968", "ELSA-2020-5983", "ELSA-2021-0003", "ELSA-2021-0856", "ELSA-2021-1578", "ELSA-2021-3027", "ELSA-2021-3028", "ELSA-2021-9002", "ELSA-2021-9030", "ELSA-2021-9442", "ELSA-2021-9459", "ELSA-2021-9473", "ELSA-2022-10065", "ELSA-2022-1988", "ELSA-2022-9852", "ELSA-2022-9969"]}, {"type": "osv", "idList": ["OSV:ASB-A-156071259", "OSV:ASB-A-156766097", "OSV:ASB-A-169505740", "OSV:ASB-A-169505929", "OSV:ASB-A-170658976", "OSV:DLA-2241-1", "OSV:DLA-2242-1", "OSV:DLA-2248-1", "OSV:DLA-2323-1", "OSV:DLA-2385-1", "OSV:DLA-2417-1", "OSV:DLA-2420-1", "OSV:DLA-2483-1", "OSV:DSA-4667-1", "OSV:DSA-4698-1", "OSV:DSA-4699-1", "OSV:DSA-4701-1", "OSV:DSA-4774-1"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:155903"]}, {"type": "photon", "idList": ["PHSA-2019-0015", "PHSA-2019-3.0-0015", "PHSA-2020-0052", "PHSA-2020-0069", "PHSA-2020-0073", "PHSA-2020-0089", "PHSA-2020-0100", "PHSA-2020-0102", "PHSA-2020-0108", "PHSA-2020-0119", "PHSA-2020-0127", "PHSA-2020-0144", "PHSA-2020-0153", "PHSA-2020-0212", "PHSA-2020-0219", "PHSA-2020-0221", "PHSA-2020-0237", "PHSA-2020-0239", "PHSA-2020-0242", "PHSA-2020-0246", "PHSA-2020-0251", "PHSA-2020-0254", "PHSA-2020-0256", "PHSA-2020-0274", "PHSA-2020-0279", "PHSA-2020-0287", "PHSA-2020-0290", "PHSA-2020-0292", "PHSA-2020-0293", "PHSA-2020-0297", "PHSA-2020-0303", "PHSA-2020-0305", "PHSA-2020-0309", "PHSA-2020-0310", "PHSA-2020-0314", "PHSA-2020-0328", "PHSA-2020-0334", "PHSA-2020-1.0-0274", "PHSA-2020-1.0-0279", "PHSA-2020-1.0-0287", "PHSA-2020-1.0-0290", "PHSA-2020-1.0-0292", "PHSA-2020-1.0-0293", "PHSA-2020-1.0-0297", "PHSA-2020-1.0-0303", "PHSA-2020-1.0-0305", "PHSA-2020-1.0-0309", "PHSA-2020-1.0-0310", "PHSA-2020-1.0-0314", "PHSA-2020-1.0-0328", "PHSA-2020-1.0-0334", "PHSA-2020-2.0-0242", "PHSA-2020-2.0-0246", "PHSA-2020-2.0-0251", "PHSA-2020-2.0-0256", "PHSA-2020-2.0-0266", "PHSA-2020-2.0-0272", "PHSA-2020-2.0-0283", "PHSA-2020-2.0-0286", "PHSA-2020-2.0-0288", "PHSA-2020-2.0-0296", "PHSA-2020-3.0-0052", "PHSA-2020-3.0-0069", "PHSA-2020-3.0-0073", "PHSA-2020-3.0-0089", "PHSA-2020-3.0-0100", "PHSA-2020-3.0-0102", "PHSA-2020-3.0-0108", "PHSA-2020-3.0-0118", "PHSA-2020-3.0-0119", "PHSA-2020-3.0-0127", "PHSA-2020-3.0-0144", "PHSA-2020-3.0-0153", "PHSA-2020-3.0-0174", "PHSA-2021-0436"]}, {"type": "redhat", "idList": ["RHSA-2019:3517", "RHSA-2020:2082", "RHSA-2020:2085", "RHSA-2020:2102", "RHSA-2020:2103", "RHSA-2020:2104", "RHSA-2020:2125", "RHSA-2020:2171", "RHSA-2020:2199", "RHSA-2020:2203", "RHSA-2020:2214", "RHSA-2020:2242", "RHSA-2020:2277", "RHSA-2020:2285", "RHSA-2020:2289", "RHSA-2020:2291", "RHSA-2020:2427", "RHSA-2020:2428", "RHSA-2020:2429", "RHSA-2020:2430", "RHSA-2020:2431", "RHSA-2020:2432", "RHSA-2020:2433", "RHSA-2020:2519", "RHSA-2020:2522", "RHSA-2020:2664", "RHSA-2020:2665", "RHSA-2020:2667", "RHSA-2020:2677", "RHSA-2020:2679", "RHSA-2020:2680", "RHSA-2020:2706", "RHSA-2020:2707", "RHSA-2020:2757", "RHSA-2020:2758", "RHSA-2020:2770", "RHSA-2020:2771", "RHSA-2020:2777", "RHSA-2020:2831", "RHSA-2020:2832", "RHSA-2020:2842", "RHSA-2020:2851", "RHSA-2020:2854", "RHSA-2020:3010", "RHSA-2020:3016", "RHSA-2020:3019", "RHSA-2020:3041", "RHSA-2020:3073", "RHSA-2020:3194", "RHSA-2020:3220", "RHSA-2020:3221", "RHSA-2020:3222", "RHSA-2020:3224", "RHSA-2020:3226", "RHSA-2020:3230", "RHSA-2020:3232", "RHSA-2020:3297", "RHSA-2020:3389", "RHSA-2020:3432", "RHSA-2020:3545", "RHSA-2020:3598", "RHSA-2020:4060", "RHSA-2020:4062", "RHSA-2020:4279", "RHSA-2020:4286", "RHSA-2020:4289", "RHSA-2020:4431", "RHSA-2020:4609", "RHSA-2020:5023", "RHSA-2020:5026", "RHSA-2020:5118", "RHSA-2020:5206", "RHSA-2020:5364", "RHSA-2020:5418", "RHSA-2020:5428", "RHSA-2020:5430", "RHSA-2020:5437", "RHSA-2020:5441", "RHSA-2020:5473", "RHSA-2020:5506", "RHSA-2020:5614", "RHSA-2020:5633", "RHSA-2020:5635", "RHSA-2020:5656", "RHSA-2021:0003", "RHSA-2021:0004", "RHSA-2021:0184", "RHSA-2021:0187", "RHSA-2021:0189", "RHSA-2021:0719", "RHSA-2021:0763", "RHSA-2021:0765", "RHSA-2021:0774", "RHSA-2021:0856", "RHSA-2021:0857", "RHSA-2021:1129", "RHSA-2021:1531", "RHSA-2021:1578", "RHSA-2021:1739", "RHSA-2021:2121", "RHSA-2021:2136", "RHSA-2021:2164", "RHSA-2021:2185", "RHSA-2021:2190", "RHSA-2021:2355", "RHSA-2021:3027", "RHSA-2021:3028", "RHSA-2021:3029", "RHSA-2021:3176", "RHSA-2021:3255", "RHSA-2021:3317", "RHSA-2021:3322", "RHSA-2021:3323", "RHSA-2021:3364", "RHSA-2022:1975", "RHSA-2022:1988", "RHSA-2022:4814", "RHSA-2022:4956", "RHSA-2022:5201", "RHSA-2022:5392", "RHSA-2022:5483"]}, {"type": "redhatcve", "idList": ["RH:CVE-2019-19377", "RH:CVE-2019-19462", "RH:CVE-2019-20806", "RH:CVE-2019-20810", "RH:CVE-2019-20811", "RH:CVE-2019-20812", "RH:CVE-2019-9445", "RH:CVE-2020-0305", "RH:CVE-2020-0543", "RH:CVE-2020-10711", "RH:CVE-2020-10732", "RH:CVE-2020-10751", "RH:CVE-2020-10757", "RH:CVE-2020-10766", "RH:CVE-2020-10767", "RH:CVE-2020-10768", "RH:CVE-2020-10769", "RH:CVE-2020-10781", "RH:CVE-2020-10942", "RH:CVE-2020-12114", "RH:CVE-2020-12464", "RH:CVE-2020-12465", "RH:CVE-2020-12652", "RH:CVE-2020-12653", "RH:CVE-2020-12654", "RH:CVE-2020-12655", "RH:CVE-2020-12659", "RH:CVE-2020-12770", "RH:CVE-2020-12771", "RH:CVE-2020-12826", "RH:CVE-2020-12888", "RH:CVE-2020-13143", "RH:CVE-2020-13974", "RH:CVE-2020-14331", "RH:CVE-2020-14356", "RH:CVE-2020-14416", "RH:CVE-2020-15393", "RH:CVE-2020-16166", "RH:CVE-2020-25211", "RH:CVE-2020-25220", "RH:CVE-2020-25221", "RH:CVE-2020-35508"]}, {"type": "rocky", "idList": ["RLSA-2021:3027", "RLSA-2022:1975", "RLSA-2022:1988"]}, {"type": "slackware", "idList": ["SSA-2020-086-01", "SSA-2020-163-01", "SSA-2020-295-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2020:0543-1", "OPENSUSE-SU-2020:0791-1", "OPENSUSE-SU-2020:0801-1", "OPENSUSE-SU-2020:0818-1", "OPENSUSE-SU-2020:0935-1", "OPENSUSE-SU-2020:0965-1", "OPENSUSE-SU-2020:0985-1", "OPENSUSE-SU-2020:1062-1", "OPENSUSE-SU-2020:1153-1", "OPENSUSE-SU-2020:1236-1", "OPENSUSE-SU-2020:1325-1", "OPENSUSE-SU-2021:0241-1", "OPENSUSE-SU-2021:0242-1", "OPENSUSE-SU-2021:3179-1", "OPENSUSE-SU-2021:3205-1", "OPENSUSE-SU-2021:3876-1", "OPENSUSE-SU-2022:2177-1", "SUSE-SU-2022:2078-1", "SUSE-SU-2022:2079-1", "SUSE-SU-2022:2111-1"]}, {"type": "symantec", "idList": ["SMNTC-111032", "SMNTC-111389"]}, {"type": "thn", "idList": ["THN:8841D27BD6D8D04E9583E7E0F20898D5"]}, {"type": "threatpost", "idList": ["THREATPOST:17E00AD621A0ECD9F90FE97E083BF4AC", "THREATPOST:7016E3D2F3480C9399BCD12F9CE0D562", "THREATPOST:EF0075FFF210E542FF3ECB996DDA02A3"]}, {"type": "ubuntu", "idList": ["LSN-0068-1", "LSN-0069-1", "LSN-0072-1", "USN-4342-1", "USN-4344-1", "USN-4345-1", "USN-4364-1", "USN-4367-1", "USN-4367-2", "USN-4369-1", "USN-4369-2", "USN-4385-1", "USN-4385-2", "USN-4387-1", "USN-4388-1", "USN-4389-1", "USN-4390-1", "USN-4391-1", "USN-4392-1", "USN-4393-1", "USN-4411-1", "USN-4412-1", "USN-4413-1", "USN-4414-1", "USN-4419-1", "USN-4425-1", "USN-4426-1", "USN-4427-1", "USN-4439-1", "USN-4440-1", "USN-4462-1", "USN-4463-1", "USN-4465-1", "USN-4483-1", "USN-4484-1", "USN-4485-1", "USN-4525-1", "USN-4526-1", "USN-4527-1", "USN-4657-1", "USN-4658-1", "USN-4658-2", "USN-4660-1", "USN-4660-2", "USN-5343-1", "USN-5361-1", "USN-5617-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2019-19377", "UB:CVE-2019-19462", "UB:CVE-2019-20806", "UB:CVE-2019-20810", "UB:CVE-2019-20811", "UB:CVE-2019-20812", "UB:CVE-2019-9445", "UB:CVE-2020-0009", "UB:CVE-2020-0305", "UB:CVE-2020-0543", "UB:CVE-2020-10711", "UB:CVE-2020-10732", "UB:CVE-2020-10751", "UB:CVE-2020-10757", "UB:CVE-2020-10766", "UB:CVE-2020-10767", "UB:CVE-2020-10768", "UB:CVE-2020-10769", "UB:CVE-2020-10781", "UB:CVE-2020-10942", "UB:CVE-2020-12114", "UB:CVE-2020-12464", "UB:CVE-2020-12465", "UB:CVE-2020-12652", "UB:CVE-2020-12653", "UB:CVE-2020-12654", "UB:CVE-2020-12655", "UB:CVE-2020-12659", "UB:CVE-2020-12770", "UB:CVE-2020-12771", "UB:CVE-2020-12826", "UB:CVE-2020-12888", "UB:CVE-2020-13143", "UB:CVE-2020-13974", "UB:CVE-2020-14331", "UB:CVE-2020-14356", "UB:CVE-2020-14416", "UB:CVE-2020-15393", "UB:CVE-2020-16166", "UB:CVE-2020-25211", "UB:CVE-2020-25220", "UB:CVE-2020-25221", "UB:CVE-2021-0448"]}, {"type": "veracode", "idList": ["VERACODE:25398", "VERACODE:25645", "VERACODE:25748", "VERACODE:25824", "VERACODE:25825", "VERACODE:25934", "VERACODE:25938", "VERACODE:25939", "VERACODE:25942", "VERACODE:26831", "VERACODE:26876", "VERACODE:26883", "VERACODE:26911", "VERACODE:26927", "VERACODE:27151", "VERACODE:27184", "VERACODE:27227", "VERACODE:27228", "VERACODE:27638", "VERACODE:27771", "VERACODE:27775", "VERACODE:27776", "VERACODE:27778", "VERACODE:27781", "VERACODE:27782", "VERACODE:27783", "VERACODE:27784", "VERACODE:27803", "VERACODE:28081", "VERACODE:28648", "VERACODE:30571", "VERACODE:30572", "VERACODE:35826"]}, {"type": "virtuozzo", "idList": ["VZA-2020-036", "VZA-2020-037", "VZA-2020-044", "VZA-2020-045", "VZA-2020-046", "VZA-2020-048", "VZA-2020-055", "VZA-2020-056", "VZA-2020-061", "VZA-2020-064"]}, {"type": "xen", "idList": ["XSA-320"]}, {"type": "zdt", "idList": ["1337DAY-ID-33793", "1337DAY-ID-33813", "1337DAY-ID-33814"]}]}, "score": {"value": 0.2, "vector": "NONE"}, "backreferences": {"references": [{"type": "almalinux", "idList": ["ALSA-2020:4431"]}, {"type": "amazon", "idList": ["ALAS-2020-1360", "ALAS-2020-1366", "ALAS-2020-1377", "ALAS-2020-1446", "ALAS2-2020-1405", "ALAS2-2020-1425", "ALAS2-2020-1431", "ALAS2-2020-1440", "ALAS2-2020-1444", "ALAS2-2020-1465", "ALAS2-2020-1480", "ALAS2-2020-1495", "ALAS2-2020-1556"]}, {"type": "androidsecurity", "idList": ["ANDROID:2020-01-01", "ANDROID:2020-08-01", "ANDROID:2021-01-01"]}, {"type": "archlinux", "idList": ["ASA-202006-10"]}, {"type": "attackerkb", "idList": ["AKB:555EF2E1-269F-4133-8D13-B67EA80F8CC3"]}, {"type": "centos", "idList": ["CESA-2020:2103", "CESA-2020:2430", "CESA-2020:2432", "CESA-2020:2433", "CESA-2020:5023", "CESA-2020:5437"]}, {"type": "citrix", "idList": ["CTX275165"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:0835B914E665F771DA10821B3BDE2D9F", "CFOUNDRY:27F5DB3AFDCF54F32837F9CE39245DE1", "CFOUNDRY:A5CCCF4486FE273FEA953C57B224799B", "CFOUNDRY:ABBF4BD74406CA92477E7CFB1AD01190"]}, {"type": "cloudlinux", "idList": ["CLSA-2021:1632261812", "CLSA-2021:1632261839"]}, {"type": "cve", "idList": ["CVE-2019-20806", "CVE-2019-20810", "CVE-2019-20811", "CVE-2019-20812", "CVE-2019-9445", "CVE-2020-0009", "CVE-2020-10711", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-10942", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12465", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12659", "CVE-2020-12770", "CVE-2020-12771", "CVE-2020-12826", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2242-1:573AF", "DEBIAN:DSA-4667-1:62006", "DEBIAN:DSA-4698-1:66813", "DEBIAN:DSA-4699-1:122C4", "DEBIAN:DSA-4701-1:BB3B8"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2020-0543"]}, {"type": "f5", "idList": ["F5:K01051400", "F5:K02354867", "F5:K05617914", "F5:K10429441", "F5:K25920352", "F5:K42745412", "F5:K44435547", "F5:K50928877", "F5:K52525232", "F5:K62532228"]}, {"type": "fedora", "idList": ["FEDORA:055473124314", "FEDORA:083D7313CFDA", "FEDORA:15484608781D", "FEDORA:1E93431CA0AD", "FEDORA:29E8B30D1A9E", "FEDORA:2A755608EC25", "FEDORA:2AE7F3118C24", "FEDORA:38BDC3095ADB", "FEDORA:3917560460DA", "FEDORA:3A4183118C44", "FEDORA:3C5D13124326", "FEDORA:48CC5309B6F7", "FEDORA:62D0460BC99C", "FEDORA:68BA3606732B", "FEDORA:803AE30C6416", "FEDORA:8143631CA0A0", "FEDORA:9F68660D2A0F", "FEDORA:AAD0A60B6998", "FEDORA:AEC7F30A071F", "FEDORA:AFFEA30BBFB5", "FEDORA:E251030B5E26"]}, {"type": "freebsd", "idList": ["FBCBA194-AC7D-11EA-8B5E-B42E99A1B9C3"]}, {"type": "hp", "idList": ["HP:C06655648"]}, {"type": "ibm", "idList": ["22DFDD1FF1BBF70D9C813ACA916818103631328A11AEED7718476AD8FD37F722", "74EB94293C5F397767E62C9F6D734DE973B44B9B7EC427A98C99E92C3C3D6590", "7BEBE6C769A16D13746B813CF456C36F85AE1B1A1CBD26E71A53BD6E5B34E2F4"]}, {"type": "ics", "idList": ["ICSA-20-252-07"]}, {"type": "lenovo", "idList": ["LENOVO:PS500327-NOSID"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/ORACLE_LINUX-CVE-2020-10742/"]}, {"type": "nessus", "idList": ["AL2_ALAS-2020-1405.NASL", "AL2_ALAS-2020-1425.NASL", "AL2_ALAS-2020-1431.NASL", "AL2_ALAS-2020-1556.NASL", "ALA_ALAS-2020-1360.NASL", "ALA_ALAS-2020-1366.NASL", "ALA_ALAS-2020-1377.NASL", "ALA_ALAS-2020-1446.NASL", "CENTOS8_RHSA-2021-1578.NASL", "CENTOS_RHSA-2020-2103.NASL", "CENTOS_RHSA-2020-5023.NASL", "CENTOS_RHSA-2020-5437.NASL", "DEBIAN_DSA-4667.NASL", "EULEROS_SA-2020-1536.NASL", "EULEROS_SA-2020-1592.NASL", "EULEROS_SA-2020-1606.NASL", "FEDORA_2020-07F0BE216F.NASL", "FEDORA_2020-1AFBE7BA2D.NASL", "FEDORA_2020-5436586091.NASL", "FEDORA_2020-57BF620276.NASL", "FEDORA_2020-5A69DECC0C.NASL", "FEDORA_2020-C6B9FFF7F8.NASL", "FREEBSD_PKG_FBCBA194AC7D11EA8B5EB42E99A1B9C3.NASL", "OPENSUSE-2020-543.NASL", "OPENSUSE-2021-3179.NASL", "OPENSUSE-2021-3205.NASL", "ORACLELINUX_ELSA-2020-2082.NASL", "ORACLELINUX_ELSA-2020-2102.NASL", "ORACLELINUX_ELSA-2020-2103.NASL", "ORACLELINUX_ELSA-2020-5023.NASL", "ORACLELINUX_ELSA-2020-5642.NASL", "ORACLELINUX_ELSA-2020-5649.NASL", "ORACLELINUX_ELSA-2020-5663.NASL", "ORACLELINUX_ELSA-2020-5676.NASL", "ORACLELINUX_ELSA-2020-5714.NASL", "ORACLELINUX_ELSA-2020-5715.NASL", "ORACLELINUX_ELSA-2020-5962.NASL", "ORACLELINUX_ELSA-2021-0003.NASL", "ORACLELINUX_ELSA-2021-1578.NASL", "ORACLELINUX_ELSA-2021-9459.NASL", "ORACLEVM_OVMSA-2020-0019.NASL", "ORACLEVM_OVMSA-2021-0031.NASL", "PHOTONOS_PHSA-2020-1_0-0290_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0292_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0293_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0242_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0251_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0283_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0296_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0073_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0089_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0100_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0102_LINUX.NASL", "REDHAT-RHSA-2020-2082.NASL", "REDHAT-RHSA-2020-2085.NASL", "REDHAT-RHSA-2020-2102.NASL", "REDHAT-RHSA-2020-2103.NASL", "REDHAT-RHSA-2020-2104.NASL", "REDHAT-RHSA-2020-2171.NASL", "REDHAT-RHSA-2020-2199.NASL", "REDHAT-RHSA-2020-2214.NASL", "REDHAT-RHSA-2020-2242.NASL", "REDHAT-RHSA-2020-2277.NASL", "REDHAT-RHSA-2020-2285.NASL", "REDHAT-RHSA-2020-2289.NASL", "REDHAT-RHSA-2020-2429.NASL", "REDHAT-RHSA-2020-2431.NASL", "REDHAT-RHSA-2020-2433.NASL", "REDHAT-RHSA-2020-2679.NASL", "REDHAT-RHSA-2020-2707.NASL", "REDHAT-RHSA-2020-2854.NASL", "REDHAT-RHSA-2020-5023.NASL", "REDHAT-RHSA-2020-5026.NASL", "REDHAT-RHSA-2020-5206.NASL", "REDHAT-RHSA-2020-5656.NASL", "REDHAT-RHSA-2021-0003.NASL", "REDHAT-RHSA-2021-0004.NASL", "REDHAT-RHSA-2021-1578.NASL", "REDHAT-RHSA-2021-1739.NASL", "REDHAT-RHSA-2021-2164.NASL", "REDHAT-RHSA-2021-2185.NASL", "REDHAT-RHSA-2021-2190.NASL", "REDHAT-RHSA-2021-3255.NASL", "SLACKWARE_SSA_2020-086-01.NASL", "SL_20200512_KERNEL_ON_SL6_X.NASL", "SL_20200512_KERNEL_ON_SL7_X.NASL", "SL_20201110_KERNEL_ON_SL7_X.NASL", "SUSE_SU-2020-1118-1.NASL", "SUSE_SU-2020-1119-1.NASL", "SUSE_SU-2020-1123-1.NASL", "SUSE_SU-2020-1141-1.NASL", "SUSE_SU-2020-1142-1.NASL", "SUSE_SU-2020-1146-1.NASL", "SUSE_SU-2020-1255-1.NASL", "SUSE_SU-2020-1275-1.NASL", "SUSE_SU-2021-3179-1.NASL", "SUSE_SU-2021-3205-1.NASL", "SUSE_SU-2021-3206-1.NASL", "SUSE_SU-2021-3217-1.NASL", "UBUNTU_USN-4342-1.NASL", "UBUNTU_USN-4344-1.NASL", "UBUNTU_USN-4345-1.NASL", "UBUNTU_USN-4364-1.NASL", "UBUNTU_USN-4367-1.NASL", "UBUNTU_USN-4367-2.NASL", "UBUNTU_USN-4369-1.NASL", "UBUNTU_USN-4369-2.NASL", "UBUNTU_USN-4385-1.NASL", "UBUNTU_USN-4387-1.NASL", "UBUNTU_USN-4388-1.NASL", "UBUNTU_USN-4389-1.NASL", "UBUNTU_USN-4525-1.NASL", "UBUNTU_USN-4526-1.NASL", "UBUNTU_USN-4527-1.NASL", "UBUNTU_USN-4657-1.NASL", "UBUNTU_USN-4658-1.NASL", "VIRTUOZZO_VZA-2020-037.NASL", "XEN_SERVER_XSA-320.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310108766", "OPENVAS:1361412562310704667", "OPENVAS:1361412562310844406", "OPENVAS:1361412562310844409", "OPENVAS:1361412562310844410", "OPENVAS:1361412562310844433", "OPENVAS:1361412562310844438", "OPENVAS:1361412562310844443", "OPENVAS:1361412562310844448", "OPENVAS:1361412562310844451", "OPENVAS:1361412562310853121", "OPENVAS:1361412562310877834", "OPENVAS:1361412562310877859", "OPENVAS:1361412562310877862", "OPENVAS:1361412562310877884", "OPENVAS:1361412562310877888", "OPENVAS:1361412562310877909", "OPENVAS:1361412562310877951", "OPENVAS:1361412562310883236", "OPENVAS:1361412562311220201592", "OPENVAS:1361412562311220201606"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-2082", "ELSA-2020-2102", "ELSA-2020-2103", "ELSA-2020-2427", "ELSA-2020-2430", "ELSA-2020-2431", "ELSA-2020-5023", "ELSA-2020-5642", "ELSA-2020-5649", "ELSA-2020-5663", "ELSA-2020-5714", "ELSA-2020-5715", "ELSA-2020-5722", "ELSA-2020-5913", "ELSA-2020-5914", "ELSA-2020-5923", "ELSA-2020-5924", "ELSA-2020-5962", "ELSA-2021-0003", "ELSA-2021-1578", "ELSA-2021-9459"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:155903"]}, {"type": "photon", "idList": ["PHSA-2020-1.0-0274", "PHSA-2020-1.0-0279", "PHSA-2020-1.0-0287", "PHSA-2020-1.0-0290", "PHSA-2020-1.0-0292", "PHSA-2020-1.0-0293", "PHSA-2020-1.0-0297", "PHSA-2020-1.0-0303", "PHSA-2020-1.0-0305", "PHSA-2020-1.0-0309", "PHSA-2020-1.0-0310", "PHSA-2020-1.0-0314", "PHSA-2020-1.0-0328", "PHSA-2020-1.0-0334", "PHSA-2020-2.0-0242", "PHSA-2020-2.0-0246", "PHSA-2020-2.0-0251", "PHSA-2020-2.0-0256", "PHSA-2020-2.0-0266", "PHSA-2020-2.0-0272", "PHSA-2020-2.0-0283", "PHSA-2020-2.0-0286", "PHSA-2020-2.0-0296", "PHSA-2020-3.0-0069", "PHSA-2020-3.0-0073", "PHSA-2020-3.0-0089", "PHSA-2020-3.0-0100", "PHSA-2020-3.0-0102", "PHSA-2020-3.0-0108", "PHSA-2020-3.0-0119", "PHSA-2020-3.0-0127", "PHSA-2020-3.0-0144", "PHSA-2020-3.0-0153"]}, {"type": "redhat", "idList": ["RHSA-2020:2082", "RHSA-2020:2427", "RHSA-2020:2428", "RHSA-2020:2429", "RHSA-2020:2430", "RHSA-2020:2433", "RHSA-2020:5026", "RHSA-2021:0003", "RHSA-2021:0004"]}, {"type": "redhatcve", "idList": ["RH:CVE-2020-35508"]}, {"type": "slackware", "idList": ["SSA-2020-086-01", "SSA-2020-163-01", "SSA-2020-295-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2020:0543-1", "OPENSUSE-SU-2020:0791-1", "OPENSUSE-SU-2021:3179-1", "OPENSUSE-SU-2021:3205-1", "OPENSUSE-SU-2021:3876-1"]}, {"type": "thn", "idList": ["THN:8841D27BD6D8D04E9583E7E0F20898D5"]}, {"type": "threatpost", "idList": ["THREATPOST:17E00AD621A0ECD9F90FE97E083BF4AC", "THREATPOST:EF0075FFF210E542FF3ECB996DDA02A3"]}, {"type": "ubuntu", "idList": ["LSN-0068-1", "USN-4342-1", "USN-4344-1", "USN-4345-1", "USN-4364-1", "USN-4367-1", "USN-4367-2", "USN-4369-1", "USN-4369-2", "USN-4385-1", "USN-4385-2", "USN-4387-1", "USN-4389-1", "USN-4392-1", "USN-4393-1", "USN-4525-1", "USN-4526-1", "USN-4527-1", "USN-4657-1", "USN-4658-1", "USN-4660-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2019-19377", "UB:CVE-2019-19462", "UB:CVE-2019-20806", "UB:CVE-2019-20810", "UB:CVE-2019-20811", "UB:CVE-2019-20812", "UB:CVE-2019-9445", "UB:CVE-2020-0009", "UB:CVE-2020-0305", "UB:CVE-2020-0543", "UB:CVE-2020-10711", "UB:CVE-2020-10732", "UB:CVE-2020-10751", "UB:CVE-2020-10757", "UB:CVE-2020-10766", "UB:CVE-2020-10767", "UB:CVE-2020-10768", "UB:CVE-2020-10769", "UB:CVE-2020-10781", "UB:CVE-2020-10942", "UB:CVE-2020-12114", "UB:CVE-2020-12464", "UB:CVE-2020-12465", "UB:CVE-2020-12652", "UB:CVE-2020-12653", "UB:CVE-2020-12654", "UB:CVE-2020-12655", "UB:CVE-2020-12659", "UB:CVE-2020-12770", "UB:CVE-2020-12771", "UB:CVE-2020-12826", "UB:CVE-2020-12888", "UB:CVE-2020-13143", "UB:CVE-2020-13974", "UB:CVE-2020-14331", "UB:CVE-2020-14356", "UB:CVE-2020-14416", "UB:CVE-2020-15393", "UB:CVE-2020-16166", "UB:CVE-2020-25211", "UB:CVE-2020-25220", "UB:CVE-2020-25221"]}, {"type": "virtuozzo", "idList": ["VZA-2020-036", "VZA-2020-037", "VZA-2020-044", "VZA-2020-045"]}, {"type": "xen", "idList": ["XSA-320"]}, {"type": "zdt", "idList": ["1337DAY-ID-33793", "1337DAY-ID-33813", "1337DAY-ID-33814"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2019-19377", "epss": 0.00273, "percentile": 0.6327, "modified": "2023-05-07"}, {"cve": "CVE-2019-19462", "epss": 0.00044, "percentile": 0.0825, "modified": "2023-05-07"}, {"cve": "CVE-2019-20806", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2019-20810", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2019-20811", "epss": 0.00047, "percentile": 0.14367, "modified": "2023-05-07"}, {"cve": "CVE-2019-20812", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2019-9445", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-0009", "epss": 0.00045, "percentile": 0.12674, "modified": "2023-05-07"}, {"cve": "CVE-2020-0305", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-0543", "epss": 0.0005, "percentile": 0.16922, "modified": "2023-05-07"}, {"cve": "CVE-2020-10711", "epss": 0.00437, "percentile": 0.70958, "modified": "2023-05-07"}, {"cve": "CVE-2020-10732", "epss": 0.0005, "percentile": 0.16969, "modified": "2023-05-07"}, {"cve": "CVE-2020-10751", "epss": 0.0005, "percentile": 0.16969, "modified": "2023-05-07"}, {"cve": "CVE-2020-10757", "epss": 0.00044, "percentile": 0.0825, "modified": "2023-05-07"}, {"cve": "CVE-2020-10766", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-10767", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-10768", "epss": 0.00044, "percentile": 0.10248, "modified": "2023-05-07"}, {"cve": "CVE-2020-10769", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-10781", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-10942", "epss": 0.00062, "percentile": 0.24605, "modified": "2023-05-07"}, {"cve": "CVE-2020-12114", "epss": 0.00044, "percentile": 0.0825, "modified": "2023-05-07"}, {"cve": "CVE-2020-12464", "epss": 0.00093, "percentile": 0.38184, "modified": "2023-05-07"}, {"cve": "CVE-2020-12465", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-12652", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-12653", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-12654", "epss": 0.00135, "percentile": 0.47515, "modified": "2023-05-07"}, {"cve": "CVE-2020-12655", "epss": 0.00046, "percentile": 0.14002, "modified": "2023-05-07"}, {"cve": "CVE-2020-12659", "epss": 0.0008, "percentile": 0.32762, "modified": "2023-05-07"}, {"cve": "CVE-2020-12770", "epss": 0.00047, "percentile": 0.14112, "modified": "2023-05-07"}, {"cve": "CVE-2020-12771", "epss": 0.00054, "percentile": 0.19762, "modified": "2023-05-07"}, {"cve": "CVE-2020-12826", "epss": 0.00052, "percentile": 0.1822, "modified": "2023-05-07"}, {"cve": "CVE-2020-12888", "epss": 0.00047, "percentile": 0.14112, "modified": "2023-05-07"}, {"cve": "CVE-2020-13143", "epss": 0.00663, "percentile": 0.76665, "modified": "2023-05-07"}, {"cve": "CVE-2020-13974", "epss": 0.00077, "percentile": 0.31514, "modified": "2023-05-07"}, {"cve": "CVE-2020-14331", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-14356", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-14416", "epss": 0.00046, "percentile": 0.12718, "modified": "2023-05-07"}, {"cve": "CVE-2020-15393", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2020-16166", "epss": 0.00168, "percentile": 0.5203, "modified": "2023-05-07"}, {"cve": "CVE-2020-25211", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-25220", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2020-25221", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}], "vulnersScore": 0.2}, "_state": {"dependencies": 1684442002, "score": 1698840679, "epss": 0}, "_internal": {"score_hash": "a9f86257f1c6cfcb8654cdd2226ab0b4"}, "pluginID": "140328", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140328);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/07/06\");\n\n script_cve_id(\n \"CVE-2019-19377\",\n \"CVE-2019-19462\",\n \"CVE-2019-20806\",\n \"CVE-2019-20810\",\n \"CVE-2019-20811\",\n \"CVE-2019-20812\",\n \"CVE-2019-9445\",\n \"CVE-2020-0009\",\n \"CVE-2020-0305\",\n \"CVE-2020-0543\",\n \"CVE-2020-10711\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-10757\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-10769\",\n \"CVE-2020-10781\",\n \"CVE-2020-10942\",\n \"CVE-2020-12114\",\n \"CVE-2020-12464\",\n \"CVE-2020-12465\",\n \"CVE-2020-12652\",\n \"CVE-2020-12653\",\n \"CVE-2020-12654\",\n \"CVE-2020-12655\",\n \"CVE-2020-12659\",\n \"CVE-2020-12770\",\n \"CVE-2020-12771\",\n \"CVE-2020-12826\",\n \"CVE-2020-12888\",\n \"CVE-2020-13143\",\n \"CVE-2020-13974\",\n \"CVE-2020-14331\",\n \"CVE-2020-14356\",\n \"CVE-2020-14416\",\n \"CVE-2020-15393\",\n \"CVE-2020-16166\",\n \"CVE-2020-25211\",\n \"CVE-2020-25220\",\n \"CVE-2020-25221\"\n );\n\n script_name(english:\"EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2020-1958)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization for ARM 64 host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS Virtualization for ARM 64 installation on the remote host is\naffected by the following vulnerabilities :\n\n - The kernel package contains the Linux kernel (vmlinuz),\n the core of any Linux operating system. The kernel\n handles the basic functions of the operating system:\n memory allocation, process allocation, device input and\n output, etc. Security Fix(es):In the Android kernel in\n F2FS driver there is a possible out of bounds read due\n to a missing bounds check. This could lead to local\n information disclosure with system execution privileges\n needed. User interaction is not needed for\n exploitation.(CVE-2019-9445)In calc_vm_may_flags of\n ashmem.c, there is a possible arbitrary write to shared\n memory due to a permissions bypass. This could lead to\n local escalation of privilege by corrupting memory\n shared between processes, with no additional execution\n privileges needed. User interaction is not needed for\n exploitation. Product: Android Versions: Android kernel\n Android ID: A-142938932(CVE-2020-0009)A new domain\n bypass transient execution attack known as Special\n Register Buffer Data Sampling (SRBDS) has been found.\n This flaw allows data values from special internal\n registers to be leaked by an attacker able to execute\n code on any core of the CPU. An unprivileged, local\n attacker can use this flaw to infer values returned by\n affected instructions known to be commonly used during\n cryptographic operations that rely on uniqueness,\n secrecy, or both.(CVE-2020-0543)A flaw was found in the\n Linux kernel's implementation of the BTRFS file system.\n A local attacker, with the ability to mount a file\n system, can create a use-after-free memory fault after\n the file system has been unmounted. This may lead to\n memory corruption or privilege\n escalation.(CVE-2019-19377)A NULL pointer dereference\n flaw may occur in the Linux kernel's relay_open in\n kernel/relay.c. if the alloc_percpu() function is not\n validated in time of failure and used as a valid\n address for access. An attacker could use this flaw to\n cause a denial of service.(CVE-2019-19462)A NULL\n pointer dereference flaw was found in\n tw5864_handle_frame function in\n drivers/media/pci/tw5864/tw5864-video.c in the TW5864\n Series Video media driver. The pointer 'vb' is\n assigned, but not validated before its use, and can\n lead to a denial of service. This flaw allows a local\n attacker with special user or root privileges to crash\n the system or leak internal kernel\n information.(CVE-2019-20806)go7007_snd_init in\n drivers/media/usb/go7007/snd-go7007.c in the Linux\n kernel before 5.6 does not call snd_card_free for a\n failure path, which causes a memory leak, aka\n CID-9453264ef586.(CVE-2019-20810)An issue was\n discovered in the Linux kernel before 5.0.6. In\n rx_queue_add_kobject() and netdev_queue_add_kobject()\n in net/coreet-sysfs.c, a reference count is mishandled,\n aka CID-a3e23f719f5c.(CVE-2019-20811)A flaw was found\n in the way the af_packet functionality in the Linux\n kernel handled the retirement timer setting for\n TPACKET_v3 when getting settings from the underlying\n network device errors out. This flaw allows a local\n user who can open the af_packet domain socket and who\n can hit the error path, to use this vulnerability to\n starve the system.(CVE-2019-20812)A NULL pointer\n dereference flaw was found in the Linux kernel's\n SELinux subsystem. This flaw occurs while importing the\n Commercial IP Security Option (CIPSO) protocol's\n category bitmap into the SELinux extensible bitmap via\n the' ebitmap_netlbl_import' routine. While processing\n the CIPSO restricted bitmap tag in the\n 'cipso_v4_parsetag_rbm' routine, it sets the security\n attribute to indicate that the category bitmap is\n present, even if it has not been allocated. This issue\n leads to a NULL pointer dereference issue while\n importing the same category bitmap into SELinux. This\n flaw allows a remote network user to crash the system\n kernel, resulting in a denial of\n service.(CVE-2020-10711)A flaw was found in the Linux\n kernel's SELinux LSM hook implementation, where it\n anticipated the skb would only contain a single Netlink\n message. The hook incorrectly validated the first\n Netlink message in the skb only, to allow or deny the\n rest of the messages within the skb with the granted\n permissions and without further processing. At this\n time, there is no known ability for an attacker to\n abuse this flaw.(CVE-2020-10751)A flaw was found in the\n Linux Kernel in versions after 4.5-rc1 in the way\n mremap handled DAX Huge Pages. This flaw allows a local\n attacker with access to a DAX enabled storage to\n escalate their privileges on the\n system.(CVE-2020-10757)A logic bug flaw was found in\n the Linux kernel's implementation of SSBD. A bug in the\n logic handling allows an attacker with a local account\n to disable SSBD protection during a context switch when\n additional speculative execution mitigations are in\n place. This issue was introduced when the per\n task/process conditional STIPB switching was added on\n top of the existing SSBD switching. The highest threat\n from this vulnerability is to\n confidentiality.(CVE-2020-10766)A flaw was found in the\n Linux kernel's implementation of the Enhanced IBPB\n (Indirect Branch Prediction Barrier). The IBPB\n mitigation will be disabled when STIBP is not available\n or when the Enhanced Indirect Branch Restricted\n Speculation (IBRS) is available. This flaw allows a\n local attacker to perform a Spectre V2 style attack\n when this configuration is active. The highest threat\n from this vulnerability is to\n confidentiality.(CVE-2020-10767)A flaw was found in the\n prctl() function, where it can be used to enable\n indirect branch speculation after it has been disabled.\n This call incorrectly reports it as being 'force\n disabled' when it is not and opens the system to\n Spectre v2 attacks. The highest threat from this\n vulnerability is to confidentiality.(CVE-2020-10768)A\n flaw was found in the ZRAM kernel module, where a user\n with a local account and the ability to read the\n /sys/class/zram-control/hot_add file can create ZRAM\n device nodes in the /dev/ directory. This read\n allocates kernel memory and is not accounted for a user\n that triggers the creation of that ZRAM device. With\n this vulnerability, continually reading the device may\n consume a large amount of system memory and cause the\n Out-of-Memory (OOM) killer to activate and terminate\n random userspace processes, possibly making the system\n inoperable.(CVE-2020-10781)A stack buffer overflow\n issue was found in the get_raw_socket() routine of the\n Host kernel accelerator for virtio net (vhost-net)\n driver. It could occur while doing an\n ictol(VHOST_NET_SET_BACKEND) call, and retrieving\n socket name in a kernel stack variable via\n get_raw_socket(). A user able to perform ioctl(2) calls\n on the '/dev/vhost-net' device may use this flaw to\n crash the kernel resulting in DoS\n issue.(CVE-2020-10942)A flaw was found in the Linux\n kernel's implementation of the pivot_root syscall. This\n flaw allows a local privileged user (root outside or\n root inside a privileged container) to exploit a race\n condition to manipulate the reference count of the root\n filesystem. To be able to abuse this flaw, the process\n or user calling pivot_root must have advanced\n permissions. The highest threat from this vulnerability\n is to system availability.(CVE-2020-12114)A\n use-after-free flaw was found in usb_sg_cancel in\n drivers/usb/core/message.c in the USB core subsystem.\n This flaw allows a local attacker with a special user\n or root privileges to crash the system due to a race\n problem in the scatter-gather cancellation and transfer\n completion in usb_sg_wait. This vulnerability can also\n lead to a leak of internal kernel\n information.(CVE-2020-12464)A memory overflow and data\n corruption flaw were found in the Mediatek MT76 driver\n module for WiFi in mt76_add_fragment in\n driverset/wireless/mediatek/mt76/dma.c. An oversized\n packet with too many rx fragments causes an overflow\n and corruption in memory of adjacent pages. A local\n attacker with a special user or root privileges can\n cause a denial of service or a leak of internal kernel\n information.(CVE-2020-12465)A vulnerability was found\n in __mptctl_ioctl in drivers/message/fusion/mptctl.c in\n Fusion MPT base driver 'mptctl' in the SCSI device\n module, where an incorrect lock leads to a race\n problem. This flaw allows an attacker with local access\n and special user (or root) privileges to cause a denial\n of service.(CVE-2020-12652)A flaw was found in the way\n the mwifiex_cmd_append_vsie_tlv() in Linux kernel's\n Marvell WiFi-Ex driver handled vendor specific\n information elements. A local user could use this flaw\n to escalate their privileges on the\n system.(CVE-2020-12653)A flaw was found in the Linux\n kernel. The Marvell mwifiex driver allows a remote WiFi\n access point to trigger a heap-based memory buffer\n overflow due to an incorrect memcpy operation. The\n highest threat from this vulnerability is to data\n integrity and system availability.(CVE-2020-12654)A\n flaw was discovered in the XFS source in the Linux\n kernel. This flaw allows an attacker with the ability\n to mount an XFS filesystem, to trigger a denial of\n service while attempting to sync a file located on an\n XFS v5 image with crafted metadata.(CVE-2020-12655)An\n out-of-bounds (OOB) memory access flaw was found in the\n Network XDP (the eXpress Data Path) module in the Linux\n kernel's xdp_umem_reg function in net/xdp/xdp_umem.c.\n When a user with special user privilege of\n CAP_NET_ADMIN (or root) calls setsockopt to register\n umem ring on XDP socket, passing the headroom value\n larger than the available space in the chunk, it leads\n to an out-of-bounds write, causing panic or possible\n memory corruption. This flaw may lead to privilege\n escalation if a local end-user is granted permission to\n influence the execution of code in this\n manner.(CVE-2020-12659)A vulnerability was found in\n sg_write in drivers/scsi/sg.c in the SCSI generic (sg)\n driver subsystem. This flaw allows an attacker with\n local access and special user or root privileges to\n cause a denial of service if the allocated list is not\n cleaned with an invalid (Sg_fd * sfp) pointer at the\n time of failure, also possibly causing a kernel\n internal information leak problem.(CVE-2020-12770)An\n issue was discovered in the Linux kernel through\n 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c\n has a deadlock if a coalescing operation\n fails.(CVE-2020-12771)A flaw was found in the Linux\n kernel loose validation of child/parent process\n identification handling while filtering signal\n handlers. A local attacker is able to abuse this flaw\n to bypass checks to send any signal to a privileged\n process.(CVE-2020-12826)A flaw was found in the Linux\n kernel, where it allows userspace processes, for\n example, a guest VM, to directly access h/w devices via\n its VFIO driver modules. The VFIO modules allow users\n to enable or disable access to the devices' MMIO memory\n address spaces. If a user attempts to access the\n read/write devices' MMIO address space when it is\n disabled, some h/w devices issue an interrupt to the\n CPU to indicate a fatal error condition, crashing the\n system. This flaw allows a guest user or process to\n crash the host system resulting in a denial of\n service.(CVE-2020-12888)gadget_dev_desc_UDC_store in\n drivers/usb/gadget/configfs.c in the Linux kernel\n through 5.6.13 relies on kstrdup without considering\n the possibility of an internal '\\0' value, which allows\n attackers to trigger an out-of-bounds read, aka\n CID-15753588bcd4.(CVE-2020-13143)** DISPUTED ** An\n issue was discovered in the Linux kernel through 5.7.1.\n drivers/tty/vt/keyboard.c has an integer overflow if\n k_ascii is called several times in a row, aka\n CID-b86dab054059. NOTE: Members in the community argue\n that the integer overflow does not lead to a security\n issue in this case.(CVE-2020-13974)A use-after-free\n flaw was found in slcan_write_wakeup in\n driverset/can/slcan.c in the serial CAN module slcan. A\n race condition occurs when communicating with can using\n slcan between the write (scheduling the transmit) and\n closing (flushing out any pending queues) the SLCAN\n channel. This flaw allows a local attacker with special\n user or root privileges to cause a denial of service or\n a kernel information leak. The highest threat from this\n vulnerability is to system\n availability.(CVE-2020-14416)In the Linux kernel\n through 5.7.6, usbtest_disconnect in\n drivers/usb/misc/usbtest.c has a memory leak, aka\n CID-28ebeb8db770.(CVE-2020-15393)The Linux kernel\n through 5.7.11 allows remote attackers to make\n observations that help to obtain sensitive information\n about the internal state of the network RNG, aka\n CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and\n kernel/time/timer.c.(CVE-2020-16166)A flaw was found in\n the Linux kernel's implementation of Userspace core\n dumps. This flaw allows an attacker with a local\n account to crash a trivial program and exfiltrate\n private kernel data.(CVE-2020-10732)A flaw null pointer\n dereference in the Linux kernel cgroupv2 subsystem in\n versions before 5.7.10 was found in the way when reboot\n the system. A local user could use this flaw to crash\n the system or escalate their privileges on the\n system.(CVE-2020-14356)The Linux kernel 4.9.x before\n 4.9.233, 4.14.x before 4.14.194, and 4.19.x before\n 4.19.140 has a use-after-free because skcd->no_refcnt\n was not considered during a backport of a\n CVE-2020-14356 patch. This is related to the cgroups\n feature.(CVE-2020-25220)get_gate_page in mm/gup.c in\n the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows\n privilege escalation because of incorrect reference\n counting (caused by gate page mishandling) of the\n struct page that backs the vsyscall page. The result is\n a refcount underflow. This can be triggered by any\n 64-bit process that can use ptrace() or\n process_vm_readv(), aka\n CID-9fa2dd946743.(CVE-2020-25221)In the Linux kernel\n through 5.8.7, local attackers able to inject conntrack\n netlink configuration could overflow a local buffer,\n causing crashes or triggering use of incorrect protocol\n numbers in ctnetlink_parse_tuple_filter in\n net/netfilter/nf_conntrack_netlink.c, aka\n CID-1cc5ef91d2ff.(CVE-2020-25211)A buffer over-read\n flaw was found in RH kernel versions before 5.0 in\n crypto_authenc_extractkeys in crypto/authenc.c in the\n IPsec Cryptographic algorithm's module, authenc. When a\n payload longer than 4 bytes, and is not following\n 4-byte alignment boundary guidelines, it causes a\n buffer over-read threat, leading to a system crash.\n This flaw allows a local attacker with user privileges\n to cause a denial of service.(CVE-2020-10769)A flaw was\n found in the Linux kernel's implementation of the\n invert video code on VGA consoles when a local attacker\n attempts to resize the console, calling an ioctl\n VT_RESIZE, which causes an out-of-bounds write to\n occur. This flaw allows a local user with access to the\n VGA console to crash the system, potentially escalating\n their privileges on the system. The highest threat from\n this vulnerability is to data confidentiality and\n integrity as well as system\n availability.(CVE-2020-14331)In cdev_get of char_dev.c,\n there is a possible use-after-free due to a race\n condition. This could lead to local escalation of\n privilege with System execution privileges needed. User\n interaction is not needed for exploitation.Product:\n AndroidVersions: Android-10Android ID:\n A-153467744(CVE-2020-0305)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1958\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ea61decf\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-13974\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.2.0\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.2.0\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-4.19.36-vhulk1907.1.0.h820\",\n \"kernel-devel-4.19.36-vhulk1907.1.0.h820\",\n \"kernel-headers-4.19.36-vhulk1907.1.0.h820\",\n \"kernel-tools-4.19.36-vhulk1907.1.0.h820\",\n \"kernel-tools-libs-4.19.36-vhulk1907.1.0.h820\",\n \"kernel-tools-libs-devel-4.19.36-vhulk1907.1.0.h820\",\n \"perf-4.19.36-vhulk1907.1.0.h820\",\n \"python-perf-4.19.36-vhulk1907.1.0.h820\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "naslFamily": "Huawei Local Security Checks", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:kernel-tools-libs-devel", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:uvp:3.0.2.0"], "solution": "Update the affected kernel packages.", "nessusSeverity": "High", "cvssScoreSource": "CVE-2020-13974", "vendor_cvss2": {"score": 7.2, "vector": "CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "vendor_cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "vpr": {"risk factor": "Medium", "score": "6.7"}, "exploitAvailable": true, "exploitEase": "Exploits are available", "patchPublicationDate": "2020-09-07T00:00:00", "vulnerabilityPublicationDate": null, "exploitableWith": []}
{"nessus": [{"lastseen": "2023-05-18T15:05:21", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system:\n memory allocation, process allocation, device input and output, etc.Security Fix(es):An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.(CVE-2019-20806)A flaw was found in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.(CVE-2020-10781)In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/ net/slip/slip.c and drivers/ net/can/slcan.c.(CVE-2020-14416)The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.(CVE-2020-12888)The flow_dissector feature in the Linux kernel 4.3 through 5.x before 5.3.10 has a device tracking vulnerability, aka CID-55667441c84f. This occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and because jhash (instead of siphash) is used. The hashrnd value remains the same starting from boot time, and can be inferred by an attacker. This affects net/core/flow_dissector.c and related code.(CVE-2019-18282)In the Linux kernel through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.(CVE-2020-15393)An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/ net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.(CVE-2019-20811)A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.(CVE-2020-10751)In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.(CVE-2019-9445)A flaw was found in the Linux kernel's implementation of Userspace core dumps.\n This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.(CVE-2020-10732)go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.(CVE-2019-20810)Legacy pairing and secure-connections pairing authentication in Bluetooth(r) BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.(CVE-2020-10135)An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.(CVE-2019-20812)An issue was discovered in the Linux kernel through 5.7.1.\n drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.(CVE-2020-13974)In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions:\n Android kernel Android ID: A-142938932(CVE-2020-0009)A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.(CVE-2020-10757)gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel through 5.6.13 relies on kstrdup without considering the possibility of an internal '\\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.(CVE-2020-13143)Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.(CVE-2020-0543)A flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10768)A flaw was found in the Linux kernel's implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10767)A logic bug flaw was found in the Linux kernel's implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10766)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-07-30T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP8 : kernel (EulerOS-SA-2020-1807)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-18282", "CVE-2019-20806", "CVE-2019-20810", "CVE-2019-20811", "CVE-2019-20812", "CVE-2019-9445", "CVE-2020-0009", "CVE-2020-0543", "CVE-2020-10135", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10781", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:bpftool", "p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-source", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "p-cpe:/a:huawei:euleros:python3-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2020-1807.NASL", "href": "https://www.tenable.com/plugins/nessus/139137", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(139137);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2019-18282\",\n \"CVE-2019-20806\",\n \"CVE-2019-20810\",\n \"CVE-2019-20811\",\n \"CVE-2019-20812\",\n \"CVE-2019-9445\",\n \"CVE-2020-0009\",\n \"CVE-2020-0543\",\n \"CVE-2020-10135\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-10757\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-10781\",\n \"CVE-2020-12888\",\n \"CVE-2020-13143\",\n \"CVE-2020-13974\",\n \"CVE-2020-14416\",\n \"CVE-2020-15393\"\n );\n\n script_name(english:\"EulerOS 2.0 SP8 : kernel (EulerOS-SA-2020-1807)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - The kernel package contains the Linux kernel (vmlinuz),\n the core of any Linux operating system. The kernel\n handles the basic functions of the operating system:\n memory allocation, process allocation, device input and\n output, etc.Security Fix(es):An issue was discovered in\n the Linux kernel before 5.2. There is a NULL pointer\n dereference in tw5864_handle_frame() in\n drivers/media/pci/tw5864/tw5864-video.c, which may\n cause denial of service, aka\n CID-2e7682ebfc75.(CVE-2019-20806)A flaw was found in\n the ZRAM kernel module, where a user with a local\n account and the ability to read the\n /sys/class/zram-control/hot_add file can create ZRAM\n device nodes in the /dev/ directory. This read\n allocates kernel memory and is not accounted for a user\n that triggers the creation of that ZRAM device. With\n this vulnerability, continually reading the device may\n consume a large amount of system memory and cause the\n Out-of-Memory (OOM) killer to activate and terminate\n random userspace processes, possibly making the system\n inoperable.(CVE-2020-10781)In the Linux kernel before\n 5.4.16, a race condition in tty->disc_data handling in\n the slip and slcan line discipline could lead to a\n use-after-free, aka CID-0ace17d56824. This affects\n drivers/ net/slip/slip.c and drivers/\n net/can/slcan.c.(CVE-2020-14416)The VFIO PCI driver in\n the Linux kernel through 5.6.13 mishandles attempts to\n access disabled memory space.(CVE-2020-12888)The\n flow_dissector feature in the Linux kernel 4.3 through\n 5.x before 5.3.10 has a device tracking vulnerability,\n aka CID-55667441c84f. This occurs because the auto\n flowlabel of a UDP IPv6 packet relies on a 32-bit\n hashrnd value as a secret, and because jhash (instead\n of siphash) is used. The hashrnd value remains the same\n starting from boot time, and can be inferred by an\n attacker. This affects net/core/flow_dissector.c and\n related code.(CVE-2019-18282)In the Linux kernel\n through 5.7.6, usbtest_disconnect in\n drivers/usb/misc/usbtest.c has a memory leak, aka\n CID-28ebeb8db770.(CVE-2020-15393)An issue was\n discovered in the Linux kernel before 5.0.6. In\n rx_queue_add_kobject() and netdev_queue_add_kobject()\n in net/core/ net-sysfs.c, a reference count is\n mishandled, aka CID-a3e23f719f5c.(CVE-2019-20811)A flaw\n was found in the Linux kernels SELinux LSM hook\n implementation before version 5.7, where it incorrectly\n assumed that an skb would only contain a single netlink\n message. The hook would incorrectly only validate the\n first netlink message in the skb and allow or deny the\n rest of the messages within the skb with the granted\n permission without further\n processing.(CVE-2020-10751)In the Android kernel in\n F2FS driver there is a possible out of bounds read due\n to a missing bounds check. This could lead to local\n information disclosure with system execution privileges\n needed. User interaction is not needed for\n exploitation.(CVE-2019-9445)A flaw was found in the\n Linux kernel's implementation of Userspace core dumps.\n This flaw allows an attacker with a local account to\n crash a trivial program and exfiltrate private kernel\n data.(CVE-2020-10732)go7007_snd_init in\n drivers/media/usb/go7007/snd-go7007.c in the Linux\n kernel before 5.6 does not call snd_card_free for a\n failure path, which causes a memory leak, aka\n CID-9453264ef586.(CVE-2019-20810)Legacy pairing and\n secure-connections pairing authentication in Bluetooth(r)\n BR/EDR Core Specification v5.2 and earlier may allow an\n unauthenticated user to complete authentication without\n pairing credentials via adjacent access. An\n unauthenticated, adjacent attacker could impersonate a\n Bluetooth BR/EDR master or slave to pair with a\n previously paired remote device to successfully\n complete the authentication procedure without knowing\n the link key.(CVE-2020-10135)An issue was discovered in\n the Linux kernel before 5.4.7. The\n prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of\n service (CPU consumption and soft lockup) in a certain\n failure case involving TPACKET_V3, aka\n CID-b43d1f9f7067.(CVE-2019-20812)An issue was\n discovered in the Linux kernel through 5.7.1.\n drivers/tty/vt/keyboard.c has an integer overflow if\n k_ascii is called several times in a row, aka\n CID-b86dab054059. NOTE: Members in the community argue\n that the integer overflow does not lead to a security\n issue in this case.(CVE-2020-13974)In calc_vm_may_flags\n of ashmem.c, there is a possible arbitrary write to\n shared memory due to a permissions bypass. This could\n lead to local escalation of privilege by corrupting\n memory shared between processes, with no additional\n execution privileges needed. User interaction is not\n needed for exploitation. Product: Android Versions:\n Android kernel Android ID: A-142938932(CVE-2020-0009)A\n flaw was found in the Linux Kernel in versions after\n 4.5-rc1 in the way mremap handled DAX Huge Pages. This\n flaw allows a local attacker with access to a DAX\n enabled storage to escalate their privileges on the\n system.(CVE-2020-10757)gadget_dev_desc_UDC_store in\n drivers/usb/gadget/configfs.c in the Linux kernel\n through 5.6.13 relies on kstrdup without considering\n the possibility of an internal '\\0' value, which allows\n attackers to trigger an out-of-bounds read, aka\n CID-15753588bcd4.(CVE-2020-13143)Incomplete cleanup\n from specific special register read operations in some\n Intel(R) Processors may allow an authenticated user to\n potentially enable information disclosure via local\n access.(CVE-2020-0543)A flaw was found in the prctl()\n function, where it can be used to enable indirect\n branch speculation after it has been disabled. This\n call incorrectly reports it as being 'force disabled'\n when it is not and opens the system to Spectre v2\n attacks. The highest threat from this vulnerability is\n to confidentiality.(CVE-2020-10768)A flaw was found in\n the Linux kernel's implementation of the Enhanced IBPB\n (Indirect Branch Prediction Barrier). The IBPB\n mitigation will be disabled when STIBP is not available\n or when the Enhanced Indirect Branch Restricted\n Speculation (IBRS) is available. This flaw allows a\n local attacker to perform a Spectre V2 style attack\n when this configuration is active. The highest threat\n from this vulnerability is to\n confidentiality.(CVE-2020-10767)A logic bug flaw was\n found in the Linux kernel's implementation of SSBD. A\n bug in the logic handling allows an attacker with a\n local account to disable SSBD protection during a\n context switch when additional speculative execution\n mitigations are in place. This issue was introduced\n when the per task/process conditional STIPB switching\n was added on top of the existing SSBD switching. The\n highest threat from this vulnerability is to\n confidentiality.(CVE-2020-10766)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1807\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6e94ba4c\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python3-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(8)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"bpftool-4.19.36-vhulk1907.1.0.h794.eulerosv2r8\",\n \"kernel-4.19.36-vhulk1907.1.0.h794.eulerosv2r8\",\n \"kernel-devel-4.19.36-vhulk1907.1.0.h794.eulerosv2r8\",\n \"kernel-headers-4.19.36-vhulk1907.1.0.h794.eulerosv2r8\",\n \"kernel-source-4.19.36-vhulk1907.1.0.h794.eulerosv2r8\",\n \"kernel-tools-4.19.36-vhulk1907.1.0.h794.eulerosv2r8\",\n \"kernel-tools-libs-4.19.36-vhulk1907.1.0.h794.eulerosv2r8\",\n \"perf-4.19.36-vhulk1907.1.0.h794.eulerosv2r8\",\n \"python-perf-4.19.36-vhulk1907.1.0.h794.eulerosv2r8\",\n \"python3-perf-4.19.36-vhulk1907.1.0.h794.eulerosv2r8\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"8\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:07:04", "description": "According to the versions of the kernel packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities :\n\n - In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932(CVE-2020-0009)\n\n - A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.(CVE-2020-10757)\n\n - go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.(CVE-2019-20810)\n\n - In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.(CVE-2019-9445)\n\n - A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.(CVE-2020-10751)\n\n - An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.(CVE-2019-20812)\n\n - ** DISPUTED ** An issue was discovered in the Linux kernel through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.(CVE-2020-13974)\n\n - An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.(CVE-2019-20811)\n\n - A flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10768)\n\n - A flaw was found in the Linux kernel's implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10767)\n\n - A logic bug flaw was found in the Linux kernel's implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.(CVE-2020-10766)\n\n - A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.(CVE-2020-0543)\n\n - In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.(CVE-2020-14416)\n\n - The flow_dissector feature in the Linux kernel 4.3 through 5.x before 5.3.10 has a device tracking vulnerability, aka CID-55667441c84f. This occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and because jhash (instead of siphash) is used. The hashrnd value remains the same starting from boot time, and can be inferred by an attacker. This affects net/core/flow_dissector.c and related code.(CVE-2019-18282)\n\n - The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.(CVE-2020-12888)\n\n - In the Linux kernel through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.(CVE-2020-15393)\n\n - A flaw was found in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.(CVE-2020-10781)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-28T00:00:00", "type": "nessus", "title": "EulerOS Virtualization for ARM 64 3.0.6.0 : kernel (EulerOS-SA-2020-1892)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-18282", "CVE-2019-20810", "CVE-2019-20811", "CVE-2019-20812", "CVE-2019-9445", "CVE-2020-0009", "CVE-2020-0543", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10781", "CVE-2020-12888", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:kernel-tools-libs-devel", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "p-cpe:/a:huawei:euleros:python3-perf", "cpe:/o:huawei:euleros:uvp:3.0.6.0"], "id": "EULEROS_SA-2020-1892.NASL", "href": "https://www.tenable.com/plugins/nessus/139995", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(139995);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2019-18282\",\n \"CVE-2019-20810\",\n \"CVE-2019-20811\",\n \"CVE-2019-20812\",\n \"CVE-2019-9445\",\n \"CVE-2020-0009\",\n \"CVE-2020-0543\",\n \"CVE-2020-10751\",\n \"CVE-2020-10757\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-10781\",\n \"CVE-2020-12888\",\n \"CVE-2020-13974\",\n \"CVE-2020-14416\",\n \"CVE-2020-15393\"\n );\n\n script_name(english:\"EulerOS Virtualization for ARM 64 3.0.6.0 : kernel (EulerOS-SA-2020-1892)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization for ARM 64 host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS Virtualization for ARM 64 installation on the remote host is\naffected by the following vulnerabilities :\n\n - In calc_vm_may_flags of ashmem.c, there is a possible\n arbitrary write to shared memory due to a permissions\n bypass. This could lead to local escalation of\n privilege by corrupting memory shared between\n processes, with no additional execution privileges\n needed. User interaction is not needed for\n exploitation. Product: Android Versions: Android kernel\n Android ID: A-142938932(CVE-2020-0009)\n\n - A flaw was found in the Linux Kernel in versions after\n 4.5-rc1 in the way mremap handled DAX Huge Pages. This\n flaw allows a local attacker with access to a DAX\n enabled storage to escalate their privileges on the\n system.(CVE-2020-10757)\n\n - go7007_snd_init in\n drivers/media/usb/go7007/snd-go7007.c in the Linux\n kernel before 5.6 does not call snd_card_free for a\n failure path, which causes a memory leak, aka\n CID-9453264ef586.(CVE-2019-20810)\n\n - In the Android kernel in F2FS driver there is a\n possible out of bounds read due to a missing bounds\n check. This could lead to local information disclosure\n with system execution privileges needed. User\n interaction is not needed for\n exploitation.(CVE-2019-9445)\n\n - A flaw was found in the Linux kernels SELinux LSM hook\n implementation before version 5.7, where it incorrectly\n assumed that an skb would only contain a single netlink\n message. The hook would incorrectly only validate the\n first netlink message in the skb and allow or deny the\n rest of the messages within the skb with the granted\n permission without further processing.(CVE-2020-10751)\n\n - An issue was discovered in the Linux kernel before\n 5.4.7. The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of\n service (CPU consumption and soft lockup) in a certain\n failure case involving TPACKET_V3, aka\n CID-b43d1f9f7067.(CVE-2019-20812)\n\n - ** DISPUTED ** An issue was discovered in the Linux\n kernel through 5.7.1. drivers/tty/vt/keyboard.c has an\n integer overflow if k_ascii is called several times in\n a row, aka CID-b86dab054059. NOTE: Members in the\n community argue that the integer overflow does not lead\n to a security issue in this case.(CVE-2020-13974)\n\n - An issue was discovered in the Linux kernel before\n 5.0.6. In rx_queue_add_kobject() and\n netdev_queue_add_kobject() in net/core/net-sysfs.c, a\n reference count is mishandled, aka\n CID-a3e23f719f5c.(CVE-2019-20811)\n\n - A flaw was found in the prctl() function, where it can\n be used to enable indirect branch speculation after it\n has been disabled. This call incorrectly reports it as\n being 'force disabled' when it is not and opens the\n system to Spectre v2 attacks. The highest threat from\n this vulnerability is to\n confidentiality.(CVE-2020-10768)\n\n - A flaw was found in the Linux kernel's implementation\n of the Enhanced IBPB (Indirect Branch Prediction\n Barrier). The IBPB mitigation will be disabled when\n STIBP is not available or when the Enhanced Indirect\n Branch Restricted Speculation (IBRS) is available. This\n flaw allows a local attacker to perform a Spectre V2\n style attack when this configuration is active. The\n highest threat from this vulnerability is to\n confidentiality.(CVE-2020-10767)\n\n - A logic bug flaw was found in the Linux kernel's\n implementation of SSBD. A bug in the logic handling\n allows an attacker with a local account to disable SSBD\n protection during a context switch when additional\n speculative execution mitigations are in place. This\n issue was introduced when the per task/process\n conditional STIPB switching was added on top of the\n existing SSBD switching. The highest threat from this\n vulnerability is to confidentiality.(CVE-2020-10766)\n\n - A new domain bypass transient execution attack known as\n Special Register Buffer Data Sampling (SRBDS) has been\n found. This flaw allows data values from special\n internal registers to be leaked by an attacker able to\n execute code on any core of the CPU. An unprivileged,\n local attacker can use this flaw to infer values\n returned by affected instructions known to be commonly\n used during cryptographic operations that rely on\n uniqueness, secrecy, or both.(CVE-2020-0543)\n\n - In the Linux kernel before 5.4.16, a race condition in\n tty->disc_data handling in the slip and slcan line\n discipline could lead to a use-after-free, aka\n CID-0ace17d56824. This affects drivers/net/slip/slip.c\n and drivers/net/can/slcan.c.(CVE-2020-14416)\n\n - The flow_dissector feature in the Linux kernel 4.3\n through 5.x before 5.3.10 has a device tracking\n vulnerability, aka CID-55667441c84f. This occurs\n because the auto flowlabel of a UDP IPv6 packet relies\n on a 32-bit hashrnd value as a secret, and because\n jhash (instead of siphash) is used. The hashrnd value\n remains the same starting from boot time, and can be\n inferred by an attacker. This affects\n net/core/flow_dissector.c and related\n code.(CVE-2019-18282)\n\n - The VFIO PCI driver in the Linux kernel through 5.6.13\n mishandles attempts to access disabled memory\n space.(CVE-2020-12888)\n\n - In the Linux kernel through 5.7.6, usbtest_disconnect\n in drivers/usb/misc/usbtest.c has a memory leak, aka\n CID-28ebeb8db770.(CVE-2020-15393)\n\n - A flaw was found in the ZRAM kernel module, where a\n user with a local account and the ability to read the\n /sys/class/zram-control/hot_add file can create ZRAM\n device nodes in the /dev/ directory. This read\n allocates kernel memory and is not accounted for a user\n that triggers the creation of that ZRAM device. With\n this vulnerability, continually reading the device may\n consume a large amount of system memory and cause the\n Out-of-Memory (OOM) killer to activate and terminate\n random userspace processes, possibly making the system\n inoperable.(CVE-2020-10781)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1892\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?210b9b25\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/28\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python3-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.6.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.6.0\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.6.0\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-4.19.36-vhulk1907.1.0.h799.eulerosv2r8\",\n \"kernel-devel-4.19.36-vhulk1907.1.0.h799.eulerosv2r8\",\n \"kernel-headers-4.19.36-vhulk1907.1.0.h799.eulerosv2r8\",\n \"kernel-tools-4.19.36-vhulk1907.1.0.h799.eulerosv2r8\",\n \"kernel-tools-libs-4.19.36-vhulk1907.1.0.h799.eulerosv2r8\",\n \"kernel-tools-libs-devel-4.19.36-vhulk1907.1.0.h799.eulerosv2r8\",\n \"perf-4.19.36-vhulk1907.1.0.h799.eulerosv2r8\",\n \"python-perf-4.19.36-vhulk1907.1.0.h799.eulerosv2r8\",\n \"python3-perf-4.19.36-vhulk1907.1.0.h799.eulerosv2r8\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:28", "description": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n\nCVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).\n\nCVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth® BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine.\nThis flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n\nCVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-10781: A zram sysfs resource consumption was fixed (bnc#1173074).\n\nCVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).\n\nCVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n\nCVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-04T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2105-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19462", "CVE-2019-20810", "CVE-2019-20812", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12656", "CVE-2020-12769", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2022-05-12T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-preempt", "p-cpe:/a:novell:suse_linux:kernel-preempt-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-preempt-debugsource", "p-cpe:/a:novell:suse_linux:kernel-preempt-devel", "p-cpe:/a:novell:suse_linux:kernel-preempt-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2105-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139308", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2105-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(139308);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/12\");\n\n script_cve_id(\n \"CVE-2019-19462\",\n \"CVE-2019-20810\",\n \"CVE-2019-20812\",\n \"CVE-2020-0305\",\n \"CVE-2020-10135\",\n \"CVE-2020-10711\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-10773\",\n \"CVE-2020-10781\",\n \"CVE-2020-12656\",\n \"CVE-2020-12769\",\n \"CVE-2020-12771\",\n \"CVE-2020-12888\",\n \"CVE-2020-13143\",\n \"CVE-2020-13974\",\n \"CVE-2020-14416\",\n \"CVE-2020-15393\",\n \"CVE-2020-15780\"\n );\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2105-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel\nallowed local users to cause a denial of service (such as relay\nblockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n\nCVE-2019-20810: Fixed a memory leak in go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c because it did not call\nsnd_card_free for a failure path (bnc#1172458).\n\nCVE-2019-20812: An issue was discovered in the\nprb_calc_retire_blk_tmo() function in net/packet/af_packet.c could\nresult in a denial of service (CPU consumption and soft lockup) in a\ncertain failure case involving TPACKET_V3 (bnc#1172453).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth® BR/EDR Core Specification v5.2\nand earlier may have allowed an unauthenticated user to complete\nauthentication without pairing credentials via adjacent access. An\nunauthenticated, adjacent attacker could impersonate a Bluetooth\nBR/EDR master or slave to pair with a previously paired remote device\nto successfully complete the authentication procedure without knowing\nthe link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the\nSELinux subsystem in versions This flaw occurs while importing the\nCommercial IP Security Option (CIPSO) protocol's category bitmap into\nthe SELinux extensible bitmap via the' ebitmap_netlbl_import' routine.\nThis flaw allowed a remote network user to crash the system kernel,\nresulting in a denial of service (bnc#1171191).\n\nCVE-2020-10732: A flaw was found in the implementation of Userspace\ncore dumps. This flaw allowed an attacker with a local account to\ncrash a trivial program and exfiltrate private kernel data\n(bnc#1171220).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook\nimplementation, where it incorrectly assumed that an skb would only\ncontain a single netlink message. The hook would incorrectly only\nvalidate the first netlink message in the skb and allow or deny the\nrest of the messages within the skb with the granted permission\nwithout further processing (bnc#1171189).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local\naccount to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction\nBarrier was disabled in certain circumstances, leaving the system open\nto a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where\nindirect branch speculation could be enabled even though it was\ndiabled before (bnc#1172783).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the\ncmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-10781: A zram sysfs resource consumption was fixed\n(bnc#1173074).\n\nCVE-2020-12656: Fixed a memory leak in gss_mech_free in the\nrpcsec_gss_krb5 implementation, caused by a lack of certain\ndomain_release calls (bnc#1171219).\n\nCVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c\nallowed attackers to cause a panic via concurrent calls to dw_spi_irq\nand dw_spi_transfer_one (bnc#1171983).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in\ndrivers/md/bcache/btree.c has a deadlock if a coalescing operation\nfails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-13143: gadget_dev_desc_UDC_store in\ndrivers/usb/gadget/configfs.c relies on kstrdup without considering\nthe possibility of an internal '\\0' value, which allowed attackers to\ntrigger an out-of-bounds read (bnc#1171982).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c,\nif k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in\nthe slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c\n(bnc#1162002).\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect\n(bnc#1173514).\n\nCVE-2020-15780: An issue was discovered in\ndrivers/acpi/acpi_configfs.c where injection of malicious ACPI tables\nvia configfs could be used by attackers to bypass lockdown and secure\nboot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152472\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152489\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1153274\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154353\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154492\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155518\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155798\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1156395\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1157169\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158050\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158242\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158265\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158748\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158765\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159781\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159867\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160947\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1161495\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162063\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162400\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162702\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164648\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164777\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165211\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165933\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165975\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166985\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167104\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167651\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167773\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168230\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168779\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168838\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168959\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169094\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169194\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169681\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169771\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170442\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170774\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170879\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170891\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170895\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171150\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171246\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171417\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171513\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171529\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171530\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171662\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171688\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171699\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171743\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171759\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171828\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171857\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171904\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171915\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171982\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172046\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172061\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172062\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172063\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172064\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172065\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172066\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172067\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172068\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172069\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172073\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172086\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172095\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172169\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172170\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172201\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172208\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172223\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172342\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172365\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172366\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172391\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172393\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172394\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172453\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172467\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172537\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172543\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172687\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172719\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172759\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172814\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172823\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172841\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172938\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172939\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172940\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172956\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172984\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172985\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172986\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172987\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172988\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172989\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172990\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173068\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173074\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173085\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173139\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173206\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173271\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173438\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173461\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173552\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173746\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173776\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173817\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173818\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173820\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173822\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173823\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173824\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173825\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173826\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173827\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173828\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173830\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173831\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173832\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173833\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173834\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173836\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173837\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173838\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173839\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173841\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173843\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173844\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173845\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173847\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173849\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173860\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173894\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173941\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174018\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174072\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174116\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174126\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174127\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174128\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174129\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174185\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174244\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174263\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174264\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174331\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174332\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174333\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174345\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174356\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174396\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174398\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174407\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174409\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174411\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174438\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174513\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174527\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174627\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=962849\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19462/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20810/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20812/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-0305/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10135/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10711/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10732/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10751/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10766/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10767/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10768/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10773/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10781/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12656/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12769/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12771/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12888/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13143/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13974/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-14416/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-15393/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-15780/\");\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202105-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?965229cb\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Product-WE-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Live Patching 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP2 :\n\nzypper in -t patch\nSUSE-SLE-Module-Development-Tools-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise High Availability 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Product-HA-15-SP2-2020-2105=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-13974\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP2\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-base-5.3.18-24.9.1.9.2.6\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-devel-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-devel-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-obs-build-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-obs-build-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-syms-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"reiserfs-kmp-default-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"reiserfs-kmp-default-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-base-5.3.18-24.9.1.9.2.6\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-devel-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-devel-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-obs-build-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-obs-build-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-syms-5.3.18-24.9.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:31", "description": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n\nCVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\nCVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-06T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2134-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20810", "CVE-2019-20812", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10773", "CVE-2020-12771", "CVE-2020-13974", "CVE-2020-14416"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_138-default", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2134-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139364", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2134-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139364);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-20810\", \"CVE-2019-20812\", \"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10773\", \"CVE-2020-12771\", \"CVE-2020-13974\", \"CVE-2020-14416\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2134-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth may have allowed an unauthenticated user\nto complete authentication without pairing credentials via adjacent\naccess. An unauthenticated, adjacent attacker could impersonate a\nBluetooth BR/EDR master or slave to pair with a previously paired\nremote device to successfully complete the authentication procedure\nwithout knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the\nSELinux subsystem. This flaw occurs while importing the Commercial IP\nSecurity Option (CIPSO) protocol's category bitmap into the SELinux\nextensible bitmap via the' ebitmap_netlbl_import' routine. This flaw\nallowed a remote network user to crash the system kernel, resulting in\na denial of service (bnc#1171191).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook\nimplementation, where it incorrectly assumed that an skb would only\ncontain a single netlink message. The hook would incorrectly only\nvalidate the first netlink message in the skb and allow or deny the\nrest of the messages within the skb with the granted permission\nwithout further processing (bnc#1171189).\n\nCVE-2019-20812: An issue was discovered in the\nprb_calc_retire_blk_tmo() function in net/packet/af_packet.c can\nresult in a denial of service (CPU consumption and soft lockup) in a\ncertain failure case involving TPACKET_V3, aka CID-b43d1f9f7067\n(bnc#1172453).\n\nCVE-2020-10732: A flaw was found in the implementation of userspace\ncore dumps. This flaw allowed an attacker with a local account to\ncrash a trivial program and exfiltrate private kernel data\n(bnc#1171220).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a\ndeadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was\nfixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the\nslip and slcan line discipline could lead to a use-after-free, aka\nCID-0ace17d56824. This affects drivers/net/slip/slip.c and\ndrivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled\nafter it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl\ncommand. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux\nscheduler logical bug allows an attacker to turn off the SSBD\nprotection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled\nwhen STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if\nk_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call\nsnd_card_free for a failure path, which causes a memory leak, aka\nCID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170383\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172049\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172453\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20810/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20812/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10135/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10711/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10732/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10751/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10766/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10767/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10768/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-13974/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202134-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a3821185\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud 7 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-7-2020-2134=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP2-2020-2134=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-2134=1\n\nSUSE Linux Enterprise Server 12-SP2-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2020-2134=1\n\nSUSE Linux Enterprise High Availability 12-SP2 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP2-2020-2134=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-13974\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_138-default\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_121-92_138-default-1-3.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-man-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-base-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-base-debuginfo-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-debuginfo-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-debugsource-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-devel-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-syms-4.4.121-92.138.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-27T15:00:36", "description": "Chuhong Yuan discovered that go7007 USB audio device driver in the Linux kernel did not properly deallocate memory in some failure conditions. A physically proximate attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-20810) Fan Yang discovered that the mremap implementation in the Linux kernel did not properly handle DAX Huge Pages. A local attacker with access to DAX storage could use this to gain administrative privileges.\n(CVE-2020-10757) It was discovered that the Linux kernel did not correctly apply Speculative Store Bypass Disable (SSBD) mitigations in certain situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-10766) It was discovered that the Linux kernel did not correctly apply Indirect Branch Predictor Barrier (IBPB) mitigations in certain situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-10767) It was discovered that the Linux kernel could incorrectly enable Indirect Branch Speculation after it has been disabled for a process via a prctl() call. A local attacker could possibly use this to expose sensitive information. (CVE-2020-10768) Luca Bruno discovered that the zram module in the Linux kernel did not properly restrict unprivileged users from accessing the hot_add sysfs file. A local attacker could use this to cause a denial of service (memory exhaustion).\n(CVE-2020-10781) It was discovered that the XFS file system implementation in the Linux kernel did not properly validate meta data in some circumstances. An attacker could use this to construct a malicious XFS image that, when mounted, could cause a denial of service. (CVE-2020-12655) It was discovered that the bcache subsystem in the Linux kernel did not properly release a lock in some error conditions. A local attacker could possibly use this to cause a denial of service. (CVE-2020-12771) It was discovered that the Virtual Terminal keyboard driver in the Linux kernel contained an integer overflow. A local attacker could possibly use this to have an unspecified impact. (CVE-2020-13974) It was discovered that the cgroup v2 subsystem in the Linux kernel did not properly perform reference counting in some situations, leading to a NULL pointer dereference. A local attacker could use this to cause a denial of service or possibly gain administrative privileges. (CVE-2020-14356) Kyungtae Kim discovered that the USB testing driver in the Linux kernel did not properly deallocate memory on disconnect events. A physically proximate attacker could use this to cause a denial of service (memory exhaustion). (CVE-2020-15393) It was discovered that the NFS server implementation in the Linux kernel did not properly honor umask settings when setting permissions while creating file system objects if the underlying file system did not support ACLs. An attacker could possibly use this to expose sensitive information or violate system integrity. (CVE-2020-24394) It was discovered that the Kerberos SUNRPC GSS implementation in the Linux kernel did not properly deallocate memory on module unload. A local privileged attacker could possibly use this to cause a denial of service (memory exhaustion).\n(CVE-2020-12656).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-02T00:00:00", "type": "nessus", "title": "Ubuntu 18.04 LTS / 20.04 LTS : Linux kernel vulnerabilities (USN-4483-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20810", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10781", "CVE-2020-12655", "CVE-2020-12656", "CVE-2020-12771", "CVE-2020-13974", "CVE-2020-14356", "CVE-2020-15393", "CVE-2020-24394"], "modified": "2023-10-20T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1016-raspi", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1022-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1022-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1022-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1023-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-45-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-45-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-45-lowlatency", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "cpe:/o:canonical:ubuntu_linux:20.04:-:lts"], "id": "UBUNTU_USN-4483-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140181", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4483-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140181);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/20\");\n\n script_cve_id(\n \"CVE-2019-20810\",\n \"CVE-2020-10757\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-10781\",\n \"CVE-2020-12655\",\n \"CVE-2020-12656\",\n \"CVE-2020-12771\",\n \"CVE-2020-13974\",\n \"CVE-2020-14356\",\n \"CVE-2020-15393\",\n \"CVE-2020-24394\"\n );\n script_xref(name:\"USN\", value:\"4483-1\");\n\n script_name(english:\"Ubuntu 18.04 LTS / 20.04 LTS : Linux kernel vulnerabilities (USN-4483-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"Chuhong Yuan discovered that go7007 USB audio device driver in the\nLinux kernel did not properly deallocate memory in some failure\nconditions. A physically proximate attacker could use this to cause a\ndenial of service (memory exhaustion). (CVE-2019-20810) Fan Yang\ndiscovered that the mremap implementation in the Linux kernel did not\nproperly handle DAX Huge Pages. A local attacker with access to DAX\nstorage could use this to gain administrative privileges.\n(CVE-2020-10757) It was discovered that the Linux kernel did not\ncorrectly apply Speculative Store Bypass Disable (SSBD) mitigations in\ncertain situations. A local attacker could possibly use this to expose\nsensitive information. (CVE-2020-10766) It was discovered that the\nLinux kernel did not correctly apply Indirect Branch Predictor Barrier\n(IBPB) mitigations in certain situations. A local attacker could\npossibly use this to expose sensitive information. (CVE-2020-10767) It\nwas discovered that the Linux kernel could incorrectly enable Indirect\nBranch Speculation after it has been disabled for a process via a\nprctl() call. A local attacker could possibly use this to expose\nsensitive information. (CVE-2020-10768) Luca Bruno discovered that the\nzram module in the Linux kernel did not properly restrict unprivileged\nusers from accessing the hot_add sysfs file. A local attacker could\nuse this to cause a denial of service (memory exhaustion).\n(CVE-2020-10781) It was discovered that the XFS file system\nimplementation in the Linux kernel did not properly validate meta data\nin some circumstances. An attacker could use this to construct a\nmalicious XFS image that, when mounted, could cause a denial of\nservice. (CVE-2020-12655) It was discovered that the bcache subsystem\nin the Linux kernel did not properly release a lock in some error\nconditions. A local attacker could possibly use this to cause a denial\nof service. (CVE-2020-12771) It was discovered that the Virtual\nTerminal keyboard driver in the Linux kernel contained an integer\noverflow. A local attacker could possibly use this to have an\nunspecified impact. (CVE-2020-13974) It was discovered that the cgroup\nv2 subsystem in the Linux kernel did not properly perform reference\ncounting in some situations, leading to a NULL pointer dereference. A\nlocal attacker could use this to cause a denial of service or possibly\ngain administrative privileges. (CVE-2020-14356) Kyungtae Kim\ndiscovered that the USB testing driver in the Linux kernel did not\nproperly deallocate memory on disconnect events. A physically\nproximate attacker could use this to cause a denial of service (memory\nexhaustion). (CVE-2020-15393) It was discovered that the NFS server\nimplementation in the Linux kernel did not properly honor umask\nsettings when setting permissions while creating file system objects\nif the underlying file system did not support ACLs. An attacker could\npossibly use this to expose sensitive information or violate system\nintegrity. (CVE-2020-24394) It was discovered that the Kerberos SUNRPC\nGSS implementation in the Linux kernel did not properly deallocate\nmemory on module unload. A local privileged attacker could possibly\nuse this to cause a denial of service (memory exhaustion).\n(CVE-2020-12656).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-4483-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14356\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1016-raspi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1022-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1022-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1022-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1023-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-45-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-45-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-45-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04:-:lts\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2020-2023 Canonical, Inc. / NASL script (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\ninclude('ksplice.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('18.04' >< os_release || '20.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 18.04 / 20.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar kernel_mappings = {\n '18.04': {\n '5.4.0': {\n 'generic': '5.4.0-45',\n 'generic-lpae': '5.4.0-45',\n 'lowlatency': '5.4.0-45',\n 'raspi': '5.4.0-1016',\n 'aws': '5.4.0-1022',\n 'gcp': '5.4.0-1022',\n 'oracle': '5.4.0-1022',\n 'azure': '5.4.0-1023'\n }\n },\n '20.04': {\n '5.4.0': {\n 'generic': '5.4.0-45',\n 'generic-lpae': '5.4.0-45',\n 'lowlatency': '5.4.0-45',\n 'raspi': '5.4.0-1016',\n 'aws': '5.4.0-1022',\n 'gcp': '5.4.0-1022',\n 'oracle': '5.4.0-1022',\n 'azure': '5.4.0-1023'\n }\n }\n};\n\nvar host_kernel_release = get_kb_item_or_exit('Host/uname-r');\nvar host_kernel_version = get_kb_item_or_exit('Host/Debian/kernel-version');\nvar host_kernel_base_version = get_kb_item_or_exit('Host/Debian/kernel-base-version');\nvar host_kernel_type = get_kb_item_or_exit('Host/Debian/kernel-type');\nif(empty_or_null(kernel_mappings[os_release][host_kernel_base_version][host_kernel_type])) audit(AUDIT_INST_VER_NOT_VULN, 'kernel ' + host_kernel_release);\n\nvar extra = '';\nvar kernel_fixed_version = kernel_mappings[os_release][host_kernel_base_version][host_kernel_type];\nif (deb_ver_cmp(ver1:host_kernel_version, ver2:kernel_fixed_version) < 0)\n{\n extra = extra + 'Running Kernel level of ' + host_kernel_version + ' does not meet the minimum fixed level of ' + kernel_fixed_version + ' for this advisory.\\n\\n';\n}\n else\n{\n audit(AUDIT_PATCH_INSTALLED, 'Kernel package for USN-4483-1');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n var cve_list = make_list('CVE-2019-20810', 'CVE-2020-10757', 'CVE-2020-10766', 'CVE-2020-10767', 'CVE-2020-10768', 'CVE-2020-10781', 'CVE-2020-12655', 'CVE-2020-12656', 'CVE-2020-12771', 'CVE-2020-13974', 'CVE-2020-14356', 'CVE-2020-15393', 'CVE-2020-24394');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for USN-4483-1');\n }\n else\n {\n extra = extra + ksplice_reporting_text();\n }\n}\nif (extra) {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:05:41", "description": "The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n\n - CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\n - CVE-2020-10711: A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n\n - CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n\n - CVE-2020-10751: SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown.\n Linux scheduler logical bug allowed an attacker to turn off the SSBD protection. (bnc#1172781).\n\n - CVE-2020-10767: Fixed that Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).\n\n - CVE-2020-10768: Fixed that indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command (bnc#1172783).\n\n - CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x. (bnc#1172999).\n\n - CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation due to lack of certain domain_release calls (bnc#1171219).\n\n - CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8 (bnc#1171983).\n\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\n - CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relied on kstrdup without considering the possibility of an internal '\\0' value, which allowed attackers to trigger an out-of-bounds read, aka CID-15753588bcd4 (bnc#1171982).\n\n - CVE-2020-13974: tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).\n\n - CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nThe following non-security bugs were fixed :\n\n - ACPICA: Fixes for acpiExec namespace init file (git-fixes).\n\n - ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).\n\n - ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).\n\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).\n\n - ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).\n\n - ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).\n\n - af_unix: add compat_ioctl support (git-fixes).\n\n - agp/intel: Reinforce the barrier after GTT updates (git-fixes).\n\n - ALSA: emu10k1: delete an unnecessary condition (git-fixes).\n\n - ALSA: es1688: Add the missed snd_card_free() (git-fixes).\n\n - ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).\n\n - ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).\n\n - ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).\n\n - ALSA: hda: add member to store ratio for stripe control (git-fixes).\n\n - ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).\n\n - ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n\n - ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n\n - ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).\n\n - ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).\n\n - ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n\n - ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n\n - ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).\n\n - ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).\n\n - ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).\n\n - ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).\n\n - ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).\n\n - ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).\n\n - ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n\n - ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n\n - ALSA: pcm: disallow linking stream to itself (git-fixes).\n\n - ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n\n - ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).\n\n - ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).\n\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).\n\n - ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).\n\n - ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).\n\n - ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).\n\n - ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).\n\n - ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).\n\n - ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).\n\n - ALSA: usb-audio: Fix racy list management in output queue (git-fixes).\n\n - ALSA: usb-audio: Improve frames size computation (git-fixes).\n\n - ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).\n\n - ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n\n - ALSA: usb-audio: Print more information in stream proc files (git-fixes).\n\n - ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n\n - ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).\n\n - ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).\n\n - ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).\n\n - amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).\n\n - arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).\n\n - ARM: oxnas: make ox820_boot_secondary static (git-fixes).\n\n - asm-gemeric/tlb: remove stray function declarations (bsc#1156395).\n\n - ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).\n\n - ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).\n\n - ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).\n\n - ASoC: intel - fix the card names (git-fixes).\n\n - ASoC: max9867: fix volume controls (git-fixes).\n\n - ASoC: meson: add missing free_irq() in error path (git-fixes).\n\n - ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).\n\n - ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).\n\n - ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).\n\n - ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).\n\n - ath10k: remove the max_sched_scan_reqs value (git-fixes).\n\n - ath10k: Skip handling del_server during driver exit (git-fixes).\n\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).\n\n - ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).\n\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).\n\n - ath9k_htc: Silence undersized packet warnings (git-fixes).\n\n - ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).\n\n - ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).\n\n - b43legacy: Fix case where channel status is corrupted (git-fixes).\n\n - bfq: Avoid false bfq queue merging (bsc#1171513).\n\n - bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).\n\n - bfq: Use only idle IO periods for think time calculations (bsc#1171513).\n\n - bfq: Use 'ttime' local variable (bsc#1171513).\n\n - blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).\n\n - blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).\n\n - bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).\n\n - bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).\n\n - bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).\n\n - bpf: Fix map permissions check (bsc#1155518).\n\n - bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).\n\n - bpf: Restrict bpf_probe_read(, str)() only to archs where they work (bsc#1172344).\n\n - bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).\n\n - bpf, sockmap: Check update requirements after locking (git-fixes).\n\n - bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).\n\n - brcmfmac: fix wrong location to get firmware feature (git-fixes).\n\n - btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n\n - btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n\n - btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n\n - btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).\n\n - ceph: allow rename operation under different quota realms (bsc#1172988).\n\n - ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).\n\n - ceph: convert mdsc->cap_dirty to a per-session list (bsc#1172984 bsc#1167104).\n\n - ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).\n\n - ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).\n\n - ceph: do not return -ESTALE if there's still an open file (bsc#1171915).\n\n - ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).\n\n - ceph: fix potential race in ceph_check_caps (bsc#1172940).\n\n - ceph: flush release queue when handling caps for unknown inode (bsc#1172939).\n\n - ceph: make sure mdsc->mutex is nested in s->s_mutex to fix dead lock (bsc#1172989).\n\n - ceph: normalize 'delta' parameter usage in check_quota_exceeded (bsc#1172987).\n\n - ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).\n\n - ceph: request expedited service on session's last cap flush (bsc#1172985 bsc#1167104).\n\n - ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).\n\n - ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).\n\n - ceph: split up __finish_cap_flush (bsc#1172940).\n\n - ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).\n\n - char/random: Add a newline at the end of the file (jsc#SLE-12424).\n\n - clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).\n\n - clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).\n\n - clk: clk-flexgen: fix clock-critical handling (git-fixes).\n\n - clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).\n\n - clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).\n\n - clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).\n\n - clk: meson: meson8b: Fix the vclk_div(1, 2, 4, 6, 12)_en gate bits (git-fixes).\n\n - clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).\n\n - clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).\n\n - clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).\n\n - clk: sprd: return correct type of value for\n _sprd_pll_recalc_rate (git-fixes).\n\n - clk: sunxi: Fix incorrect usage of round_down() (git-fixes).\n\n - clk: ti: am33xx: fix RTC clock parent (git-fixes).\n\n - clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).\n\n - component: Silence bind error on -EPROBE_DEFER (git-fixes).\n\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739\n\n - coredump: fix crash when umh is disabled (git-fixes).\n\n - coredump: fix NULL pointer dereference on coredump (git-fixes).\n\n - crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).\n\n - crypto: algboss - do not wait during notifier callback (git-fixes).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).\n\n - crypto: ccp -- do not 'select' CONFIG_DMADEVICES (git-fixes).\n\n - crypto: chelsio/chtls: properly set tp->lsndtime (git-fixes).\n\n - crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).\n\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n\n - crypto: stm32/crc32 - fix multi-instance (git-fixes).\n\n - crypto: stm32/crc32 - fix run-time self test issue (git-fixes).\n\n - cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).\n\n - cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).\n\n - Delete patches.suse/seltests-powerpc-Add-a-selftest-for-memcpy_ mcsafe.patch (bsc#1171699).\n\n - dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).\n\n - dma-debug: fix displaying of dma allocation type (git-fixes).\n\n - dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).\n\n - dmaengine: dmatest: Fix process hang when reading 'wait' parameter (git-fixes).\n\n - dmaengine: dmatest: Restore default for channel (git-fixes).\n\n - dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).\n\n - dmaengine: mmp_tdma: Reset channel error on release (git-fixes).\n\n - dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).\n\n - dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).\n\n - dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (git-fixes).\n\n - dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n\n - dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n\n - drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n\n - drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).\n\n - drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).\n\n - drm/amd/display: add basic atomic check for cursor plane (git-fixes).\n\n - drm/amd/display: drop cursor position check in atomic test (git-fixes).\n\n - drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).\n\n - drm/amdgpu: force fbdev into vram (bsc#1152472) 	* context changes\n\n - drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).\n\n - drm/amdgpu: simplify padding calculations (v2) (git-fixes).\n\n - drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).\n\n - drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).\n\n - drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) 	* context changes\n\n - drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).\n\n - drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).\n\n - drm: encoder_slave: fix refcouting error for modules (git-fixes).\n\n - drm/etnaviv: fix perfmon domain interation (git-fixes).\n\n - drm/etnaviv: rework perfmon query infrastructure (git-fixes).\n\n - drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)\n\n - drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).\n\n - drm/i915: extend audio CDCLK>=2*BCLK constraint to more platforms (git-fixes).\n\n - drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)\n\n - drm/i915: fix port checks for MST support on gen >= 11 (git-fixes).\n\n - drm/i915/gem: Avoid iterating an empty list (git-fixes).\n\n - drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)\n\n - drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).\n\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)\n\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).\n\n - drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) 	* context changes\n\n - drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).\n\n - drm/i915: Limit audio CDCLK>=2*BCLK constraint back to GLK only (git-fixes).\n\n - drm/i915: Propagate error from completed fences (git-fixes).\n\n - drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).\n\n - drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).\n\n - drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).\n\n - drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).\n\n - drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).\n\n - drm/vkms: Hold gem object while still in-use (git-fixes).\n\n - dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).\n\n - e1000e: Disable TSO for buffer overrun workaround (git-fixes).\n\n - e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).\n\n - EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).\n\n - EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).\n\n - EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).\n\n - EDAC/synopsys: Do not dump uninitialized pinf->col (bsc#1152489).\n\n - efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).\n\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).\n\n - efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).\n\n - efi/tpm: Verify event log header before parsing (bsc#1173461).\n\n - eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).\n\n - evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).\n\n - evm: Fix a small race in init_desc() (git-fixes).\n\n - evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).\n\n - evm: Fix RCU list related warnings (git-fixes).\n\n - extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (git-fixes).\n\n - fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n\n - fdt: add support for rng-seed (jsc#SLE-12424).\n\n - fdt: Update CRC check for rng-seed (jsc#SLE-12424).\n\n - firmware: imx: scu: Fix corruption of header (git-fixes).\n\n - firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).\n\n - firmware: imx-scu: Support one TX and one RX (git-fixes).\n\n - firmware: imx: warn on unexpected RX (git-fixes).\n\n - firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).\n\n - firmware: xilinx: Fix an error handling path in 'zynqmp_firmware_probe()' (git-fixes).\n\n - Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)\n\n - fpga: dfl: afu: Corrected error handling levels (git-fixes).\n\n - fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).\n\n - fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).\n\n - genetlink: clean up family attributes allocations (git-fixes).\n\n - genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).\n\n - gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).\n\n - gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).\n\n - gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).\n\n - gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).\n\n - gpiolib: Document that GPIO line names are not globally unique (git-fixes).\n\n - gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).\n\n - gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).\n\n - gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).\n\n - gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).\n\n - habanalabs: Align protection bits configuration of all TPCs (git-fixes).\n\n - HID: alps: Add AUI1657 device ID (git-fixes).\n\n - HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).\n\n - HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).\n\n - HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).\n\n - HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).\n\n - HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).\n\n - HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).\n\n - HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).\n\n - HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).\n\n - hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n\n - i2c: acpi: put device when verifying client fails (git-fixes).\n\n - i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).\n\n - i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).\n\n - i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).\n\n - i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).\n\n - i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).\n\n - i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n\n - i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (git-fixes).\n\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n\n - ibmvnic: Flush existing work items before device removal (bsc#1065729).\n\n - ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n\n - ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).\n\n - ice: Fix inability to set channels when down (jsc#SLE-7926).\n\n - ieee80211: Fix incorrect mask for default PE duration (git-fixes).\n\n - iio: adc: stm32-adc: fix device used to request dma (git-fixes).\n\n - iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).\n\n - iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).\n\n - iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).\n\n - iio: adc: ti-ads8344: Fix channel selection (git-fixes).\n\n - iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).\n\n - iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).\n\n - iio:chemical:sps30: Fix timestamp alignment (git-fixes).\n\n - iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (git-fixes).\n\n - iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).\n\n - iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).\n\n - iio: vcnl4000: Fix i2c swapped word reading (git-fixes).\n\n - ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).\n\n - ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223)\n\n - ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).\n\n - ima: Remove __init annotation from ima_pcrread() (git-fixes).\n\n - include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n\n - Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).\n\n - Input: edt-ft5x06 - fix get_default register write access (git-fixes).\n\n - Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).\n\n - Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).\n\n - Input: mms114 - fix handling of mms345l (git-fixes).\n\n - Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).\n\n - Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).\n\n - Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n\n - Input: usbtouchscreen - add support for BonXeon TP (git-fixes).\n\n - Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).\n\n - iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).\n\n - iocost: do not let vrate run wild while there's no saturation signal (bsc1173206).\n\n - iocost: over-budget forced IOs should schedule async delay (bsc#1173206).\n\n - iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).\n\n - iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).\n\n - iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).\n\n - iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).\n\n - iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).\n\n - iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).\n\n - iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).\n\n - iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).\n\n - iommu/qcom: Fix local_base status check (bsc#1172067).\n\n - iommu/virtio: Reverse arguments to list_add (bsc#1172068).\n\n - ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).\n\n - ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n\n - ipvs: Improve robustness to the ipvs sysctl (git-fixes).\n\n - irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).\n\n - irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).\n\n - irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).\n\n - irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).\n\n - iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).\n\n - iwlwifi: mvm: limit maximum queue appropriately (git-fixes).\n\n - iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).\n\n - jbd2: fix data races at struct journal_head (bsc#1173438).\n\n - kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).\n\n - kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third-party.\n\n - kABI workaround for struct hdac_bus changes (git-fixes).\n\n - ktest: Add timeout for ssh sync testing (git-fixes).\n\n - KVM: Check validity of resolved slot when searching memslots (bsc#1172069).\n\n - KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).\n\n - KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n\n - l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n\n - libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).\n\n - libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).\n\n - lib: devres: add a helper function for ioremap_uc (git-fixes).\n\n - libertas_tf: avoid a null dereference in pointer priv (git-fixes).\n\n - lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).\n\n - libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).\n\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n\n - libnvdimm: cover up nd_region changes (bsc#1162400).\n\n - libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n\n - libnvdimm/label: Remove the dpa align check (bsc#1171759).\n\n - libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).\n\n - libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).\n\n - libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n\n - libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).\n\n - libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n\n - libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n\n - libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n\n - libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n\n - libnvdimm/region: Fix build error (bsc#1162400).\n\n - libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).\n\n - libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).\n\n - libnvdimm/region: Rewrite _probe_success() to\n _advance_seeds() (bsc#1171743).\n\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n\n - lib: Uplevel the pmem 'region' ida to a global allocator (bc#1162400).\n\n - list: Add hlist_unhashed_lockless() (bsc#1173438).\n\n - livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n\n - livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n\n - livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n\n - livepatch: Remove .klp.arch (bsc#1071995).\n\n - locktorture: Allow CPU-hotplug to be disabled via\n --bootargs (bsc#1173068).\n\n - lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).\n\n - lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).\n\n - lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).\n\n - lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).\n\n - lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n\n - mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).\n\n - mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).\n\n - Make the 'Reducing compressed framebufer size' message be DRM_INFO_ONCE() (git-fixes).\n\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n\n - media: cedrus: Program output format during each run (git-fixes).\n\n - media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).\n\n - media: platform: fcp: Set appropriate DMA parameters (git-fixes).\n\n - media: Revert 'staging: imgu: Address a compiler warning on alignment' (git-fixes).\n\n - media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).\n\n - media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).\n\n - mei: release me_cl object reference (git-fixes).\n\n - mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).\n\n - mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).\n\n - mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).\n\n - mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).\n\n - misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).\n\n - misc: rtsx: Add short delay after exit from ASPM (git-fixes).\n\n - mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n\n - mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).\n\n - mmc: block: Fix use-after-free issue for rpmb (git-fixes).\n\n - mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).\n\n - mmc: fix compilation of user API (git-fixes).\n\n - mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).\n\n - mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).\n\n - mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).\n\n - mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).\n\n - mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).\n\n - mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).\n\n - mmc: tmio: Further fixup runtime PM management at remove (git-fixes).\n\n - mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).\n\n - mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).\n\n - mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).\n\n - mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).\n\n - mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).\n\n - mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).\n\n - mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).\n\n - mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).\n\n - mtd: Fix mtd not registered due to nvmem name collision (git-fixes).\n\n - mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).\n\n - mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).\n\n - mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).\n\n - mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).\n\n - mtd: rawnand: ingenic: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: marvell: Fix probe error path (git-fixes).\n\n - mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).\n\n - mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).\n\n - mtd: rawnand: mtk: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).\n\n - mtd: rawnand: orion: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).\n\n - mtd: rawnand: oxnas: Release all devices in the\n _remove() path (git-fixes).\n\n - mtd: rawnand: pasemi: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: socrates: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: sunxi: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).\n\n - mtd: rawnand: tmio: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: xway: Fix the probe error path (git-fixes).\n\n - mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).\n\n - mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).\n\n - mwifiex: avoid -Wstringop-overflow warning (git-fixes).\n\n - mwifiex: Fix memory corruption in dump_station (git-fixes).\n\n - net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n\n - net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).\n\n - net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n\n - net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).\n\n - net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n\n - net: dsa: declare lockless TX feature for slave ports (bsc#1154353).\n\n - net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).\n\n - net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).\n\n - net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).\n\n - netfilter: connlabels: prefer static lock initialiser (git-fixes).\n\n - netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n\n - netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).\n\n - netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).\n\n - netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).\n\n - netfilter: not mark a spinlock as __read_mostly (git-fixes).\n\n - net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n\n - net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n\n - net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n\n - net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).\n\n - net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).\n\n - net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).\n\n - net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).\n\n - net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).\n\n - net/mlx5: Fix crash upon suspend/resume (bsc#1172365).\n\n - net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).\n\n - net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n\n - net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).\n\n - net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).\n\n - net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).\n\n - net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n\n - net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (bnc#1158748 (network regression)).\n\n - net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).\n\n - net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n\n - net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n\n - NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).\n\n - nfs: add minor version to nfs_server_key for fscache (bsc#1172467).\n\n - nfsd4: make drc_slab global, not per-net (git-fixes).\n\n - nfsd: always check return value of find_any_file (bsc#1172208).\n\n - NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).\n\n - nfs: fix NULL deference in nfs4_get_valid_delegation.\n\n - nfs: fscache: use timespec64 in inode auxdata (git-fixes).\n\n - nfs: set invalid blocks after NFSv4 writes (git-fixes).\n\n - NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).\n\n - NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).\n\n - ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).\n\n - ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).\n\n - ntb: intel: fix static declaration (jsc#SLE-12710).\n\n - nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n\n - nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).\n\n - nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).\n\n - nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n\n - objtool: Allow no-op CFI ops in alternatives (bsc#1169514).\n\n - objtool: Clean instruction state before each function validation (bsc#1169514).\n\n - objtool: Fix !CFI insn_state propagation (bsc#1169514).\n\n - objtool: Fix ORC vs alternatives (bsc#1169514).\n\n - objtool: Ignore empty alternatives (bsc#1169514).\n\n - objtool: Remove check preventing branches within alternative (bsc#1169514).\n\n - objtool: Rename struct cfi_state (bsc#1169514).\n\n - objtool: Uniquely identify alternative instruction groups (bsc#1169514).\n\n - p54usb: add AirVasT USB stick device-id (git-fixes).\n\n - panic: do not print uninitialized taint_flags (bsc#1172814).\n\n - PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).\n\n - PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).\n\n - PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n\n - PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n\n - PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n\n - PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n\n - pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.\n\n - PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).\n\n - PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).\n\n - PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).\n\n - PCI: mobiveil: Add callback function for link up check (bsc#1161495).\n\n - PCI: mobiveil: Add Header Type field check (bsc#1161495).\n\n - PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).\n\n - PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).\n\n - PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).\n\n - PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).\n\n - PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).\n\n - PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).\n\n - PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).\n\n - PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).\n\n - PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).\n\n - PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).\n\n - PCI: mobiveil: Move the host initialization into a function (bsc#1161495).\n\n - PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).\n\n - PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n\n - PCI: Program MPS for RCiEP devices (git-fixes).\n\n - PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).\n\n - PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n\n - PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).\n\n - PCI: vmd: Filter resource type bits from shadow register (git-fixes).\n\n - pcm_native: result of put_user() needs to be checked (git-fixes).\n\n - perf/core: Fix endless multiplex timer (git-fixes).\n\n - perf/core: fix parent pid/tid in task exit events (git-fixes).\n\n - pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (git-fixes).\n\n - pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()' (git-fixes).\n\n - pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (git-fixes).\n\n - pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).\n\n - pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).\n\n - pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).\n\n - pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).\n\n - pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).\n\n - pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).\n\n - pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).\n\n - pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).\n\n - platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).\n\n - platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).\n\n - platform/x86: intel-vbtn: Also handle tablet-mode switch on 'Detachable' and 'Portable' chassis-types (git-fixes).\n\n - platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).\n\n - platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / 'Laptop' chasis-type (git-fixes).\n\n - platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).\n\n - platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).\n\n - PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).\n\n - pnp: Use list_for_each_entry() instead of open coding (git-fixes).\n\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n\n - powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).\n\n - powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).\n\n - powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n\n - powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n\n - powerpc/bpf: Enable bpf_probe_read(, str)() on powerpc again (bsc#1172344).\n\n - powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).\n\n - powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).\n\n - powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).\n\n - powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).\n\n - powerpc/powernv: Fix a warning message (bsc#1156395).\n\n - powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n\n - powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n\n - power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).\n\n - power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).\n\n - power: supply: core: fix HWMON temperature labels (git-fixes).\n\n - power: supply: core: fix memory leak in HWMON error path (git-fixes).\n\n - power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (git-fixes).\n\n - power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).\n\n - printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).\n\n - proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).\n\n - pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).\n\n - r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).\n\n - r8169: Revive default chip version for r8168 (bsc#1173085).\n\n - raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n\n - random: fix data races at timer_rand_state (bsc#1173438).\n\n - rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).\n\n - rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).\n\n - rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).\n\n - rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).\n\n - rcutorture: Add 100-CPU configuration (bsc#1173068).\n\n - rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).\n\n - rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).\n\n - rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).\n\n - rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).\n\n - rcutorture: Summarize summary of build and run results (bsc#1173068).\n\n - rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).\n\n - rcu: Use *_ONCE() to protect lockless ->expmask accesses (bsc#1171828).\n\n - rcu: Use WRITE_ONCE() for assignments to ->pprev for hlist_nulls (bsc#1173438).\n\n - RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).\n\n - RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).\n\n - RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).\n\n - RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).\n\n - RDMA/srpt: Fix disabling device management (jsc#SLE-8449).\n\n - RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).\n\n - remoteproc: Add missing '\\n' in log messages (git-fixes).\n\n - remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).\n\n - remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).\n\n - remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).\n\n - Revert 'drm/amd/display: disable dcn20 abm feature for bring up' (git-fixes).\n\n - Revert 'fs/seq_file.c: seq_read(): add info message about buggy .next functions' (bsc#1172751) The message floods dmesg and its benefit is marginal in default kernel.\n\n - Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()'' (git-fixes).\n\n - rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n\n - rpm/modules.fips: * add aes-ce-ccm and des3_ede-x86_64 (boo#173030) * add aes_ti and aes_neon_bs (boo#1172956)\n\n - rtc: mc13xxx: fix a double-unlock issue (git-fixes).\n\n - rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).\n\n - rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).\n\n - rtw88: fix an issue about leak system resources (git-fixes).\n\n - rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).\n\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).\n\n - s390/pci: Log new handle in clp_disable_fh() (git-fixes).\n\n - sched/cfs: change initial value of runnable_avg (bsc#1158765).\n\n - sched/core: Check cpus_mask, not cpus_ptr in\n __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).\n\n - sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes (sched)).\n\n - sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/deadline: Initialize ->dl_boosted (bsc#1172823).\n\n - sched/deadline: Initialize ->dl_boosted (git fixes (sched)).\n\n - sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).\n\n - sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).\n\n - sched: Optimize ttwu() spinning on p->on_cpu (bnc#1158748, bnc#1159781).\n\n - sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n\n - scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n\n - scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Copyright updates for 12.6.0.4 patches (bsc#1171530).\n\n - scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).\n\n - scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).\n\n - scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).\n\n - scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).\n\n - scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).\n\n - scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).\n\n - scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n\n - scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n\n - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n\n - scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).\n\n - scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).\n\n - scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).\n\n - scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).\n\n - scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).\n\n - scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).\n\n - scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).\n\n - scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).\n\n - scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).\n\n - scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).\n\n - scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).\n\n - scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).\n\n - scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).\n\n - scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).\n\n - scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).\n\n - scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).\n\n - scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).\n\n - scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).\n\n - scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).\n\n - scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).\n\n - scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).\n\n - scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).\n\n - scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).\n\n - scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).\n\n - scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).\n\n - scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).\n\n - scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).\n\n - scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).\n\n - scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).\n\n - scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).\n\n - selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).\n\n - selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).\n\n - selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).\n\n - selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).\n\n - selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).\n\n - selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).\n\n - serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).\n\n - slimbus: core: Fix mismatch in of_node_get/put (git-fixes).\n\n - soc: mediatek: cmdq: return send msg error code (git-fixes).\n\n - soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).\n\n - soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).\n\n - soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).\n\n - soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).\n\n - soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).\n\n - soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).\n\n - spi: bcm2835aux: Fix controller unregister order (git-fixes).\n\n - spi: bcm2835: Fix controller unregister order (git-fixes).\n\n - spi: bcm-qspi: Handle clock probe deferral (git-fixes).\n\n - spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).\n\n - SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).\n\n - spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).\n\n - spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).\n\n - spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).\n\n - spi: dw: Fix controller unregister order (git-fixes).\n\n - spi: dw: Fix native CS being unset (git-fixes).\n\n - spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).\n\n - spi: dw-pci: Add runtime power management support (jsc#SLE-12735).\n\n - spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).\n\n - spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).\n\n - spi: dw: use 'smp_mb()' to avoid sending spi data error (git-fixes).\n\n - spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).\n\n - spi: Fix controller unregister order (git-fixes).\n\n - spi: fsl: do not map irq during probe (git-fixes).\n\n - spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n\n - spi: pxa2xx: Fix controller unregister order (git-fixes).\n\n - spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).\n\n - spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).\n\n - spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).\n\n - spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).\n\n - spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).\n\n - spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).\n\n - staging: iio: ad2s1210: Fix SPI reading (git-fixes).\n\n - staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).\n\n - staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).\n\n - staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).\n\n - sun6i: dsi: fix gcc-4.8 (bsc#1152489)\n\n - SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).\n\n - supported.conf: Add pinctrl-tigerlake as supported\n\n - supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)\n\n - svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).\n\n - tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n\n - team: fix hang in team_mode_get() (networking-stable-20_04_27).\n\n - thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).\n\n - tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).\n\n - timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).\n\n - torture: Allow 'CFLIST' to specify default list of scenarios (bsc#1173068).\n\n - torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).\n\n - torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).\n\n - torture: Handle systems lacking the mpstat command (bsc#1173068).\n\n - torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).\n\n - torture: Make results-directory date format completion-friendly (bsc#1173068).\n\n - torture: Use gawk instead of awk for systime() function (bsc#1173068).\n\n - tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).\n\n - tty: n_gsm: Fix SOF skipping (git-fixes).\n\n - tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).\n\n - tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).\n\n - tun: correct header offsets in napi frags mode (git-fixes).\n\n - Update config files: Add CONFIG_PINCTRL_TIGERLAKE=m\n\n - Update patch reference for intel_th patch (jsc#SLE-12705)\n\n - Update the patch reference for ish-hid fix (jsc#SLE-12683)\n\n - usb: core: Fix misleading driver bug report (git-fixes).\n\n - usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).\n\n - usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).\n\n - usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n\n - usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n\n - usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).\n\n - usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n\n - usb: gadget: fix illegal array access in binding with UDC (git-fixes).\n\n - usb: gadget: fix potential double-free in m66592_probe (git-fixes).\n\n - usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n\n - usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n\n - usb: gadget: legacy: fix redundant initialization warnings (git-fixes).\n\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).\n\n - usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).\n\n - usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).\n\n - usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).\n\n - usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n\n - usb: musb: Fix runtime PM imbalance on error (git-fixes).\n\n - usb: musb: start session in resume for host port (git-fixes).\n\n - usb: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).\n\n - usb: serial: option: add Telit LE910C1-EUX compositions (git-fixes).\n\n - usb: serial: qcserial: add DW5816e QDL support (git-fixes).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n\n - usb: usbfs: correct kernel->user page attribute mismatch (git-fixes).\n\n - usb: usbfs: fix mmap dma mismatch (git-fixes).\n\n - vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).\n\n - vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).\n\n - vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).\n\n - vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).\n\n - vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).\n\n - video: fbdev: w100fb: Fix a potential double free (git-fixes).\n\n - virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n\n - vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n\n - vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n\n - vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n\n - vmxnet3: update to version 4 (bsc#1172484).\n\n - vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n\n - vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n\n - vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).\n\n - vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).\n\n - vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n\n - vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n\n - vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).\n\n - w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).\n\n - watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).\n\n - wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).\n\n - wireguard: device: avoid circular netns references (git-fixes).\n\n - wireguard: noise: do not assign initiation time in if condition (git-fixes).\n\n - wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).\n\n - wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).\n\n - wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).\n\n - wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).\n\n - wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).\n\n - work around mvfs bug (bsc#1162063).\n\n - workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).\n\n - workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).\n\n - x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).\n\n - x86: Fix early boot crash on gcc-10, third try (bsc#1152489).\n\n - x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).\n\n - x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).\n\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).\n\n - x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).\n\n - x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).\n\n - x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n\n - xfrm: Always set XFRM_TRANSFORMED in xfrm(4,6)_output_finish (networking-stable-20_04_27).\n\n - xfrm: fix error in comment (git fixes (block drivers)).\n\n - xfs: clean up the error handling in xfs_swap_extents (git-fixes).\n\n - xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).\n\n - xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).\n\n - xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).\n\n - xfs: force writes to delalloc regions to unwritten (bsc#1158242).\n\n - xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).\n\n - xfs: preserve default grace interval during quotacheck (bsc#1172170).\n\n - xfs: refactor agfl length computation function (bsc#1172169).\n\n - xfs: split the sunit parameter update into two parts (bsc#1172169).\n\n - wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).", "cvss3": {}, "published": "2020-07-20T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2020-935)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19462", "CVE-2019-20810", "CVE-2019-20812", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10773", "CVE-2020-12656", "CVE-2020-12769", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14416"], "modified": "2020-07-22T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-base-rebuild", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-preempt", "p-cpe:/a:novell:opensuse:kernel-preempt-debuginfo", "p-cpe:/a:novell:opensuse:kernel-preempt-debugsource", "p-cpe:/a:novell:opensuse:kernel-preempt-devel", "p-cpe:/a:novell:opensuse:kernel-preempt-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "cpe:/o:novell:opensuse:15.2"], "id": "OPENSUSE-2020-935.NASL", "href": "https://www.tenable.com/plugins/nessus/138727", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2020-935.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(138727);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/22\");\n\n script_cve_id(\"CVE-2019-19462\", \"CVE-2019-20810\", \"CVE-2019-20812\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10773\", \"CVE-2020-12656\", \"CVE-2020-12769\", \"CVE-2020-12888\", \"CVE-2020-13143\", \"CVE-2020-13974\", \"CVE-2020-14416\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2020-935)\");\n script_summary(english:\"Check for the openSUSE-2020-935 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The openSUSE Leap 15.2 kernel was updated to receive various security\nand bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed\n local users to cause a denial of service (such as relay\n blockage) by triggering a NULL alloc_percpu result\n (bnc#1158265).\n\n - CVE-2019-20810: go7007_snd_init in\n drivers/media/usb/go7007/snd-go7007.c did not call\n snd_card_free for a failure path, which causes a memory\n leak, aka CID-9453264ef586 (bnc#1172458).\n\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function\n in net/packet/af_packet.c can result in a denial of\n service (CPU consumption and soft lockup) in a certain\n failure case involving TPACKET_V3, aka CID-b43d1f9f7067\n (bnc#1172453).\n\n - CVE-2020-10711: A NULL pointer dereference flaw was\n found in the Linux kernel's SELinux subsystem. This flaw\n occurs while importing the Commercial IP Security Option\n (CIPSO) protocol's category bitmap into the SELinux\n extensible bitmap via the' ebitmap_netlbl_import'\n routine. While processing the CIPSO restricted bitmap\n tag in the 'cipso_v4_parsetag_rbm' routine, it sets the\n security attribute to indicate that the category bitmap\n is present, even if it has not been allocated. This\n issue leads to a NULL pointer dereference issue while\n importing the same category bitmap into SELinux. This\n flaw allowed a remote network user to crash the system\n kernel, resulting in a denial of service (bnc#1171191).\n\n - CVE-2020-10732: A flaw was found in the implementation\n of Userspace core dumps. This flaw allowed an attacker\n with a local account to crash a trivial program and\n exfiltrate private kernel data (bnc#1171220).\n\n - CVE-2020-10751: SELinux LSM hook implementation before\n version 5.7, where it incorrectly assumed that an skb\n would only contain a single netlink message. The hook\n would incorrectly only validate the first netlink\n message in the skb and allow or deny the rest of the\n messages within the skb with the granted permission\n without further processing (bnc#1171189).\n\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown.\n Linux scheduler logical bug allowed an attacker to turn\n off the SSBD protection. (bnc#1172781).\n\n - CVE-2020-10767: Fixed that Indirect Branch Prediction\n Barrier is force-disabled when STIBP is unavailable or\n enhanced IBRS is available. (bnc#1172782).\n\n - CVE-2020-10768: Fixed that indirect branch speculation\n can be enabled after it was force-disabled by the\n PR_SPEC_FORCE_DISABLE prctl command (bnc#1172783).\n\n - CVE-2020-10773: Fixed a kernel stack information leak on\n s390/s390x. (bnc#1172999).\n\n - CVE-2020-12656: Fixed a memory leak in gss_mech_free in\n the rpcsec_gss_krb5 implementation due to lack of\n certain domain_release calls (bnc#1171219).\n\n - CVE-2020-12769: An issue was discovered in\n drivers/spi/spi-dw.c allowed attackers to cause a panic\n via concurrent calls to dw_spi_irq and\n dw_spi_transfer_one, aka CID-19b61392c5a8 (bnc#1171983).\n\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts\n to access disabled memory space (bnc#1171868).\n\n - CVE-2020-13143: gadget_dev_desc_UDC_store in\n drivers/usb/gadget/configfs.c relied on kstrdup without\n considering the possibility of an internal '\\0' value,\n which allowed attackers to trigger an out-of-bounds\n read, aka CID-15753588bcd4 (bnc#1171982).\n\n - CVE-2020-13974: tty/vt/keyboard.c had an integer\n overflow if k_ascii is called several times in a row,\n aka CID-b86dab054059. (bnc#1172775).\n\n - CVE-2020-14416: A race condition in tty->disc_data\n handling in the slip and slcan line discipline could\n lead to a use-after-free, aka CID-0ace17d56824. This\n affects drivers/net/slip/slip.c and\n drivers/net/can/slcan.c (bnc#1162002).\n\nThe following non-security bugs were fixed :\n\n - ACPICA: Fixes for acpiExec namespace init file\n (git-fixes).\n\n - ACPI: CPPC: Fix reference count leak in\n acpi_cppc_processor_probe() (git-fixes).\n\n - ACPI: GED: add support for _Exx / _Lxx handler methods\n (git-fixes).\n\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx\n handling (git-fixes).\n\n - ACPI: PM: Avoid using power resources if there are none\n for D0 (git-fixes).\n\n - ACPI: sysfs: Fix reference count leak in\n acpi_sysfs_add_hotplug_profile() (git-fixes).\n\n - af_unix: add compat_ioctl support (git-fixes).\n\n - agp/intel: Reinforce the barrier after GTT updates\n (git-fixes).\n\n - ALSA: emu10k1: delete an unnecessary condition\n (git-fixes).\n\n - ALSA: es1688: Add the missed snd_card_free()\n (git-fixes).\n\n - ALSA: fireface: fix configuration error for nominal\n sampling transfer frequency (git-fixes).\n\n - ALSA: firewire-lib: fix invalid assignment to union data\n for directional parameter (git-fixes).\n\n - ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).\n\n - ALSA: hda: add member to store ratio for stripe control\n (git-fixes).\n\n - ALSA: hda: add sienna_cichlid audio asic id for\n sienna_cichlid up (git-fixes).\n\n - ALSA: hda: Fix potential race in unsol event handler\n (git-fixes).\n\n - ALSA: hda/realtek - Add a model for Thinkpad T570\n without DAC workaround (bsc#1172017).\n\n - ALSA: hda/realtek - add a pintbl quirk for several\n Lenovo machines (git-fixes).\n\n - ALSA: hda/realtek - Add LED class support for micmute\n LED (git-fixes).\n\n - ALSA: hda/realtek - Add more fixup entries for Clevo\n machines (git-fixes).\n\n - ALSA: hda/realtek - Add new codec supported for ALC287\n (git-fixes).\n\n - ALSA: hda/realtek - Enable micmute LED on and HP system\n (git-fixes).\n\n - ALSA: hda/realtek - Fix silent output on Gigabyte X570\n Aorus Xtreme (git-fixes).\n\n - ALSA: hda/realtek - Fix unused variable warning w/o\n CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).\n\n - ALSA: hda/realtek - Introduce polarity for micmute LED\n GPIO (git-fixes).\n\n - ALSA: hda/tegra: correct number of SDO lines for\n Tegra194 (git-fixes).\n\n - ALSA: hda/tegra: workaround playback failure on Tegra194\n (git-fixes).\n\n - ALSA: hwdep: fix a left shifting 1 by 31 UB bug\n (git-fixes).\n\n - ALSA: iec1712: Initialize STDSP24 properly when using\n the model=staudio option (git-fixes).\n\n - ALSA: pcm: disallow linking stream to itself\n (git-fixes).\n\n - ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n\n - ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).\n\n - ALSA: usb-audio: Add duplex sound support for USB\n devices using implicit feedback (git-fixes).\n\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support\n (git-fixes).\n\n - ALSA: usb-audio: Add vendor, product and profile name\n for HP Thunderbolt Dock (git-fixes).\n\n - ALSA: usb-audio: Clean up quirk entries with macros\n (git-fixes).\n\n - ALSA: usb-audio: Fix a limit check in\n proc_dump_substream_formats() (git-fixes).\n\n - ALSA: usb-audio: Fix inconsistent card PM state after\n resume (git-fixes).\n\n - ALSA: usb-audio: fixing upper volume limit for RME\n Babyface Pro routing crosspoints (git-fixes).\n\n - ALSA: usb-audio: Fixing usage of plain int instead of\n NULL (git-fixes).\n\n - ALSA: usb-audio: Fix racy list management in output\n queue (git-fixes).\n\n - ALSA: usb-audio: Improve frames size computation\n (git-fixes).\n\n - ALSA: usb-audio: Manage auto-pm of all bundled\n interfaces (git-fixes).\n\n - ALSA: usb-audio: mixer: volume quirk for ESS Technology\n Asus USB DAC (git-fixes).\n\n - ALSA: usb-audio: Print more information in stream proc\n files (git-fixes).\n\n - ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master\n onboard audio (git-fixes).\n\n - ALSA: usb-audio: Remove async workaround for Scarlett\n 2nd gen (git-fixes).\n\n - ALSA: usb-audio: RME Babyface Pro mixer patch\n (git-fixes).\n\n - ALSA: usb-audio: Use the new macro for HP Dock rename\n quirks (git-fixes).\n\n - amd-xgbe: Use __napi_schedule() in BH context\n (networking-stable-20_04_17).\n\n - arm64: map FDT as RW for early_init_dt_scan()\n (jsc#SLE-12424).\n\n - ARM: oxnas: make ox820_boot_secondary static\n (git-fixes).\n\n - asm-gemeric/tlb: remove stray function declarations\n (bsc#1156395).\n\n - ASoC: fix incomplete error-handling in img_i2s_in_probe\n (git-fixes).\n\n - ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore\n WT10-A tablet (git-fixes).\n\n - ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks\n that need pmc_plt_clk_0 quirk (bsc#1171246).\n\n - ASoC: intel - fix the card names (git-fixes).\n\n - ASoC: max9867: fix volume controls (git-fixes).\n\n - ASoC: meson: add missing free_irq() in error path\n (git-fixes).\n\n - ASoC: rt5645: Add platform-data for Asus T101HA\n (git-fixes).\n\n - ASoC: SOF: core: fix error return code in\n sof_probe_continue() (git-fixes).\n\n - ASoC: ux500: mop500: Fix some refcounted resources\n issues (git-fixes).\n\n - ath10k: Remove ath10k_qmi_register_service_notifier()\n declaration (git-fixes).\n\n - ath10k: remove the max_sched_scan_reqs value\n (git-fixes).\n\n - ath10k: Skip handling del_server during driver exit\n (git-fixes).\n\n - ath9k: Fix general protection fault in\n ath9k_hif_usb_rx_cb (git-fixes).\n\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx\n (git-fixes).\n\n - ath9k: Fix use-after-free Read in htc_connect_service\n (git-fixes).\n\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg\n (git-fixes).\n\n - ath9k_htc: Silence undersized packet warnings\n (git-fixes).\n\n - ath9x: Fix stack-out-of-bounds Write in\n ath9k_hif_usb_rx_cb (git-fixes).\n\n - ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).\n\n - b43legacy: Fix case where channel status is corrupted\n (git-fixes).\n\n - bfq: Avoid false bfq queue merging (bsc#1171513).\n\n - bfq: Fix check detecting whether waker queue should be\n selected (bsc#1168838).\n\n - bfq: Use only idle IO periods for think time\n calculations (bsc#1171513).\n\n - bfq: Use 'ttime' local variable (bsc#1171513).\n\n - blk-iocost: Fix error on iocost_ioc_vrate_adj\n (bsc#1173206).\n\n - blk-iocost: fix incorrect vtime comparison in\n iocg_is_idle() (bsc#1173206).\n\n - bluetooth: btmtkuart: Improve exception handling in\n btmtuart_probe() (git-fixes).\n\n - bluetooth: hci_bcm: fix freeing not-requested IRQ\n (git-fixes).\n\n - bnxt_en: Improve TQM ring context memory sizing formulas\n (jsc#SLE-8371 bsc#1153274).\n\n - bpf: Fix map permissions check (bsc#1155518).\n\n - bpf: Prevent mmap()'ing read-only maps as writable\n (bsc#1155518).\n\n - bpf: Restrict bpf_probe_read(, str)() only to archs\n where they work (bsc#1172344).\n\n - bpf, sockhash: Synchronize_rcu before free'ing map\n (git-fixes).\n\n - bpf, sockmap: Check update requirements after locking\n (git-fixes).\n\n - bpf: Undo internal BPF_PROBE_MEM in BPF insns dump\n (bsc#1155518).\n\n - brcmfmac: fix wrong location to get firmware feature\n (git-fixes).\n\n - btrfs: fix log context list corruption after rename\n whiteout error (bsc#1172342).\n\n - btrfs: fix partial loss of prealloc extent past i_size\n after fsync (bsc#1172343).\n\n - btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots\n to prevent runaway balance (bsc#1171417 bsc#1160947\n bsc#1172366).\n\n - btrfs: reloc: fix reloc root leak and NULL pointer\n dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - ceph: add comments for handle_cap_flush_ack logic\n (bsc#1172940).\n\n - ceph: allow rename operation under different quota\n realms (bsc#1172988).\n\n - ceph: ceph_kick_flushing_caps needs the s_mutex\n (bsc#1172986).\n\n - ceph: convert mdsc->cap_dirty to a per-session list\n (bsc#1172984 bsc#1167104).\n\n - ceph: document what protects i_dirty_item and\n i_flushing_item (bsc#1172940).\n\n - ceph: do not release i_ceph_lock in handle_cap_trunc\n (bsc#1172940).\n\n - ceph: do not return -ESTALE if there's still an open\n file (bsc#1171915).\n\n - ceph: do not take i_ceph_lock in handle_cap_import\n (bsc#1172940).\n\n - ceph: fix potential race in ceph_check_caps\n (bsc#1172940).\n\n - ceph: flush release queue when handling caps for unknown\n inode (bsc#1172939).\n\n - ceph: make sure mdsc->mutex is nested in s->s_mutex to\n fix dead lock (bsc#1172989).\n\n - ceph: normalize 'delta' parameter usage in\n check_quota_exceeded (bsc#1172987).\n\n - ceph: reorganize __send_cap for less spinlock abuse\n (bsc#1172940).\n\n - ceph: request expedited service on session's last cap\n flush (bsc#1172985 bsc#1167104).\n\n - ceph: reset i_requested_max_size if file write is not\n wanted (bsc#1172983).\n\n - ceph: skip checking caps when session reconnecting and\n releasing reqs (bsc#1172990).\n\n - ceph: split up __finish_cap_flush (bsc#1172940).\n\n - ceph: throw a warning if we destroy session with mutex\n still locked (bsc#1172940).\n\n - char/random: Add a newline at the end of the file\n (jsc#SLE-12424).\n\n - clk: bcm2835: Fix return type of bcm2835_register_gate\n (git-fixes).\n\n - clk: bcm2835: Remove casting to bcm2835_clk_register\n (git-fixes).\n\n - clk: clk-flexgen: fix clock-critical handling\n (git-fixes).\n\n - clk: mediatek: assign the initial value to clk_init_data\n of mtk_mux (git-fixes).\n\n - clk: meson: meson8b: Do not rely on u-boot to init all\n GP_PLL registers (git-fixes).\n\n - clk: meson: meson8b: Fix the polarity of the RESET_N\n lines (git-fixes).\n\n - clk: meson: meson8b: Fix the vclk_div(1, 2, 4, 6, 12)_en\n gate bits (git-fixes).\n\n - clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src\n (git-fixes).\n\n - clk: renesas: cpg-mssr: Fix STBCR suspend/resume\n handling (git-fixes).\n\n - clk: samsung: Mark top ISP and CAM clocks on Exynos542x\n as critical (git-fixes).\n\n - clk: sprd: return correct type of value for\n _sprd_pll_recalc_rate (git-fixes).\n\n - clk: sunxi: Fix incorrect usage of round_down()\n (git-fixes).\n\n - clk: ti: am33xx: fix RTC clock parent (git-fixes).\n\n - clocksource: dw_apb_timer_of: Fix missing clockevent\n timers (git-fixes).\n\n - component: Silence bind error on -EPROBE_DEFER\n (git-fixes).\n\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH\n References: bsc#1172739\n\n - coredump: fix crash when umh is disabled (git-fixes).\n\n - coredump: fix NULL pointer dereference on coredump\n (git-fixes).\n\n - crypto: algapi - Avoid spurious modprobe on LOADED\n (git-fixes).\n\n - crypto: algboss - do not wait during notifier callback\n (git-fixes).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()'\n when ndevlist is fully iterated (git-fixes).\n\n - crypto: ccp -- do not 'select' CONFIG_DMADEVICES\n (git-fixes).\n\n - crypto: chelsio/chtls: properly set tp->lsndtime\n (git-fixes).\n\n - crypto: drbg - fix error return code in\n drbg_alloc_state() (git-fixes).\n\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON()\n (git-fixes).\n\n - crypto: stm32/crc32 - fix multi-instance (git-fixes).\n\n - crypto: stm32/crc32 - fix run-time self test issue\n (git-fixes).\n\n - cxgb4: fix adapter crash due to wrong MC size\n (networking-stable-20_04_27).\n\n - cxgb4: fix large delays in PTP synchronization\n (networking-stable-20_04_27).\n\n - Delete\n patches.suse/seltests-powerpc-Add-a-selftest-for-memcpy_\n mcsafe.patch (bsc#1171699).\n\n - dma-coherent: fix integer overflow in the\n reserved-memory dma allocation (git-fixes).\n\n - dma-debug: fix displaying of dma allocation type\n (git-fixes).\n\n - dma-direct: fix data truncation in\n dma_direct_get_required_mask() (git-fixes).\n\n - dmaengine: dmatest: Fix process hang when reading 'wait'\n parameter (git-fixes).\n\n - dmaengine: dmatest: Restore default for channel\n (git-fixes).\n\n - dmaengine: mmp_tdma: Do not ignore slave config\n validation errors (git-fixes).\n\n - dmaengine: mmp_tdma: Reset channel error on release\n (git-fixes).\n\n - dmaengine: owl: Use correct lock in owl_dma_get_pchan()\n (git-fixes).\n\n - dmaengine: pch_dma.c: Avoid data race between probe and\n irq handler (git-fixes).\n\n - dmaengine: tegra210-adma: Fix an error handling path in\n 'tegra_adma_probe()' (git-fixes).\n\n - dm verity fec: fix hash block number in\n verity_fec_decode (git fixes (block drivers)).\n\n - dm writecache: fix data corruption when reloading the\n target (git fixes (block drivers)).\n\n - drivers/net/ibmvnic: Update VNIC protocol version\n reporting (bsc#1065729).\n\n - drivers: phy: sr-usb: do not use internal fsm for USB2\n phy init (git-fixes).\n\n - drivers: soc: ti: knav_qmss_queue: Make\n knav_gp_range_ops static (git-fixes).\n\n - drm/amd/display: add basic atomic check for cursor plane\n (git-fixes).\n\n - drm/amd/display: drop cursor position check in atomic\n test (git-fixes).\n\n - drm/amd/display: Prevent dpcd reads with passive dongles\n (git-fixes).\n\n - drm/amdgpu: force fbdev into vram (bsc#1152472) 	*\n context changes\n\n - drm/amdgpu: invalidate L2 before SDMA IBs (v2)\n (git-fixes).\n\n - drm/amdgpu: simplify padding calculations (v2)\n (git-fixes).\n\n - drm/amd/powerplay: avoid using pm_en before it is\n initialized revised (git-fixes).\n\n - drm/amd/powerplay: perform PG ungate prior to CG ungate\n (git-fixes).\n\n - drm/dp_mst: Increase ACT retry timeout to 3s\n (bsc#1152472) 	* context changes\n\n - drm/dp_mst: Reformat drm_dp_check_act_status() a bit\n (git-fixes).\n\n - drm/edid: Add Oculus Rift S to non-desktop list\n (git-fixes).\n\n - drm: encoder_slave: fix refcouting error for modules\n (git-fixes).\n\n - drm/etnaviv: fix perfmon domain interation (git-fixes).\n\n - drm/etnaviv: rework perfmon query infrastructure\n (git-fixes).\n\n - drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when\n IPC is (bsc#1152489)\n\n - drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when\n IPC is disabled (git-fixes).\n\n - drm/i915: extend audio CDCLK>=2*BCLK constraint to more\n platforms (git-fixes).\n\n - drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl\n (bsc#1152489)\n\n - drm/i915: fix port checks for MST support on gen >= 11\n (git-fixes).\n\n - drm/i915/gem: Avoid iterating an empty list (git-fixes).\n\n - drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest\n (bsc#1152489)\n\n - drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest\n (git-fixes).\n\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display\n instead of (bsc#1152489)\n\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display\n instead of inheritance (git-fixes).\n\n - drm/i915: HDCP: fix Ri prime check done during link\n check (bsc#1152489) 	* context changes\n\n - drm/i915: HDCP: fix Ri prime check done during link\n check (git-fixes).\n\n - drm/i915: Limit audio CDCLK>=2*BCLK constraint back to\n GLK only (git-fixes).\n\n - drm/i915: Propagate error from completed fences\n (git-fixes).\n\n - drm/i915: Whitelist context-local timestamp in the gen9\n cmdparser (git-fixes).\n\n - drm/i915: work around false-positive maybe-uninitialized\n warning (git-fixes).\n\n - drm/mcde: dsi: Fix return value check in mcde_dsi_bind()\n (git-fixes).\n\n - drm/qxl: lost qxl_bo_kunmap_atomic_page in\n qxl_image_init_helper() (git-fixes).\n\n - drm/sun4i: hdmi ddc clk: Fix size of m divider\n (git-fixes).\n\n - drm/vkms: Hold gem object while still in-use\n (git-fixes).\n\n - dwc3: Remove check for HWO flag in\n dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).\n\n - e1000e: Disable TSO for buffer overrun workaround\n (git-fixes).\n\n - e1000e: Do not wake up the system via WOL if device\n wakeup is disabled (git-fixes).\n\n - EDAC/amd64: Add PCI device IDs for family 17h, model 70h\n (bsc#1165975).\n\n - EDAC/ghes: Setup DIMM label from DMI and use it in error\n reports (bsc#1168779).\n\n - EDAC/skx: Use the mcmtr register to retrieve\n close_pg/bank_xor_enable (bsc#1152489).\n\n - EDAC/synopsys: Do not dump uninitialized pinf->col\n (bsc#1152489).\n\n - efi/efivars: Add missing kobject_put() in sysfs entry\n creation error path (git-fixes).\n\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader\n randomness (jsc#SLE-12424).\n\n - efi: READ_ONCE rng seed size before munmap\n (jsc#SLE-12424).\n\n - efi/tpm: Verify event log header before parsing\n (bsc#1173461).\n\n - eventpoll: fix missing wakeup for ovflist in\n ep_poll_callback (bsc#1159867).\n\n - evm: Check also if *tfm is an error pointer in\n init_desc() (git-fixes).\n\n - evm: Fix a small race in init_desc() (git-fixes).\n\n - evm: Fix possible memory leak in evm_calc_hmac_or_hash()\n (git-fixes).\n\n - evm: Fix RCU list related warnings (git-fixes).\n\n - extcon: adc-jack: Fix an error handling path in\n 'adc_jack_probe()' (git-fixes).\n\n - fanotify: fix ignore mask logic for events on child and\n on dir (bsc#1172719).\n\n - fdt: add support for rng-seed (jsc#SLE-12424).\n\n - fdt: Update CRC check for rng-seed (jsc#SLE-12424).\n\n - firmware: imx: scu: Fix corruption of header\n (git-fixes).\n\n - firmware: imx: scu: Fix possible memory leak in\n imx_scu_probe() (git-fixes).\n\n - firmware: imx-scu: Support one TX and one RX\n (git-fixes).\n\n - firmware: imx: warn on unexpected RX (git-fixes).\n\n - firmware: qcom_scm: fix bogous abuse of dma-direct\n internals (git-fixes).\n\n - firmware: xilinx: Fix an error handling path in\n 'zynqmp_firmware_probe()' (git-fixes).\n\n - Fix a regression of AF_ALG crypto interface hang with\n aes_s390 (bsc#1167651)\n\n - fpga: dfl: afu: Corrected error handling levels\n (git-fixes).\n\n - fs: Do not check if there is a fsnotify watcher on\n pseudo inodes (bsc#1158765).\n\n - fsnotify: Rearrange fast path to minimise overhead when\n there is no watcher (bsc#1158765).\n\n - genetlink: clean up family attributes allocations\n (git-fixes).\n\n - genetlink: fix memory leaks in\n genl_family_rcv_msg_dumpit() (bsc#1154353).\n\n - gpio: bcm-kona: Fix return value of\n bcm_kona_gpio_probe() (git-fixes).\n\n - gpio: dwapb: Append MODULE_ALIAS for platform driver\n (git-fixes).\n\n - gpio: dwapb: Call acpi_gpiochip_free_interrupts() on\n GPIO chip de-registration (git-fixes).\n\n - gpio: exar: Fix bad handling for ida_simple_get error\n path (git-fixes).\n\n - gpiolib: Document that GPIO line names are not globally\n unique (git-fixes).\n\n - gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).\n\n - gpio: pxa: Fix return value of pxa_gpio_probe()\n (git-fixes).\n\n - gpio: tegra: mask GPIO IRQs during IRQ shutdown\n (git-fixes).\n\n - gpu/drm: Ingenic: Fix opaque pointer casted to wrong\n type (git-fixes).\n\n - habanalabs: Align protection bits configuration of all\n TPCs (git-fixes).\n\n - HID: alps: Add AUI1657 device ID (git-fixes).\n\n - HID: alps: ALPS_1657 is too specific; use\n U1_UNICORN_LEGACY instead (git-fixes).\n\n - HID: i2c-hid: add Schneider SCL142ALM to descriptor\n override (git-fixes).\n\n - HID: i2c-hid: reset Synaptics SYNA2393 on resume\n (git-fixes).\n\n - HID: intel-ish-hid: avoid bogus uninitialized-variable\n warning (git-fixes).\n\n - HID: multitouch: add eGalaxTouch P80H84 support\n (git-fixes).\n\n - HID: multitouch: enable multi-input as a quirk for some\n devices (git-fixes).\n\n - HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for\n Dell K12A keyboard-dock (git-fixes).\n\n - HID: sony: Fix for broken buttons on DS3 USB dongles\n (git-fixes).\n\n - hsr: check protocol version in hsr_newlink()\n (networking-stable-20_04_17).\n\n - i2c: acpi: put device when verifying client fails\n (git-fixes).\n\n - i2c: altera: Fix race between xfer_msg and isr thread\n (git-fixes).\n\n - i2c: designware-pci: Add support for Elkhart Lake PSE\n I2C (jsc#SLE-12734).\n\n - i2c: designware-pci: Fix BUG_ON during device removal\n (jsc#SLE-12734).\n\n - i2c: designware-pci: Switch over to MSI interrupts\n (jsc#SLE-12734).\n\n - i2c: dev: Fix the race between the release of i2c_dev\n and cdev (git-fixes).\n\n - i2c: fix missing pm_runtime_put_sync in i2c_device_probe\n (git-fixes).\n\n - i2c: mux: demux-pinctrl: Fix an error handling path in\n 'i2c_demux_pinctrl_probe()' (git-fixes).\n\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED\n (bsc#1173280 ltc#185369).\n\n - ibmvnic: Flush existing work items before device removal\n (bsc#1065729).\n\n - ibmvnic: Harden device login requests (bsc#1170011\n ltc#183538).\n\n - ice: Fix error return code in ice_add_prof()\n (jsc#SLE-7926).\n\n - ice: Fix inability to set channels when down\n (jsc#SLE-7926).\n\n - ieee80211: Fix incorrect mask for default PE duration\n (git-fixes).\n\n - iio: adc: stm32-adc: fix device used to request dma\n (git-fixes).\n\n - iio: adc: stm32-adc: Use dma_request_chan() instead\n dma_request_slave_channel() (git-fixes).\n\n - iio: adc: stm32-dfsdm: fix device used to request dma\n (git-fixes).\n\n - iio: adc: stm32-dfsdm: Use dma_request_chan() instead\n dma_request_slave_channel() (git-fixes).\n\n - iio: adc: ti-ads8344: Fix channel selection (git-fixes).\n\n - iio: buffer: Do not allow buffers without any channels\n enabled to be activated (git-fixes).\n\n - iio:chemical:pms7003: Fix timestamp alignment and\n prevent data leak (git-fixes).\n\n - iio:chemical:sps30: Fix timestamp alignment (git-fixes).\n\n - iio: dac: vf610: Fix an error handling path in\n 'vf610_dac_probe()' (git-fixes).\n\n - iio: pressure: bmp280: Tolerate IRQ before registering\n (git-fixes).\n\n - iio: sca3000: Remove an erroneous 'get_device()'\n (git-fixes).\n\n - iio: vcnl4000: Fix i2c swapped word reading (git-fixes).\n\n - ima: Call ima_calc_boot_aggregate() in\n ima_eventdigest_init() (bsc#1172223).\n\n - ima: Directly assign the ima_default_policy pointer to\n ima_rules (bsc#1172223)\n\n - ima: Directly free *entry in ima_alloc_init_template()\n if digests is NULL (bsc#1172223).\n\n - ima: Remove __init annotation from ima_pcrread()\n (git-fixes).\n\n - include/asm-generic/topology.h: guard cpumask_of_node()\n macro argument (bsc#1148868).\n\n - Input: dlink-dir685-touchkeys - fix a typo in driver\n name (git-fixes).\n\n - Input: edt-ft5x06 - fix get_default register write\n access (git-fixes).\n\n - Input: evdev - call input_flush_device() on release(),\n not flush() (git-fixes).\n\n - Input: i8042 - add ThinkPad S230u to i8042 reset list\n (git-fixes).\n\n - Input: mms114 - fix handling of mms345l (git-fixes).\n\n - Input: synaptics - add a second working PNP_ID for\n Lenovo T470s (git-fixes).\n\n - Input: synaptics-rmi4 - fix error return code in\n rmi_driver_probe() (git-fixes).\n\n - Input: synaptics-rmi4 - really fix attn_data\n use-after-free (git-fixes).\n\n - Input: usbtouchscreen - add support for BonXeon TP\n (git-fixes).\n\n - Input: xpad - add custom init packet for Xbox One S\n controllers (git-fixes).\n\n - iocost: check active_list of all the ancestors in\n iocg_activate() (bsc#1173206).\n\n - iocost: do not let vrate run wild while there's no\n saturation signal (bsc1173206).\n\n - iocost: over-budget forced IOs should schedule async\n delay (bsc#1173206).\n\n - iommu/amd: Call domain_flush_complete() in\n update_domain() (bsc#1172061).\n\n - iommu/amd: Do not flush Device Table in iommu_map_page()\n (bsc#1172062).\n\n - iommu/amd: Do not loop forever when trying to increase\n address space (bsc#1172063).\n\n - iommu/amd: Fix legacy interrupt remapping for\n x2APIC-enabled system (bsc#1172393).\n\n - iommu/amd: Fix over-read of ACPI UID from IVRS table\n (bsc#1172064).\n\n - iommu/amd: Fix race in\n increase_address_space()/fetch_pte() (bsc#1172065).\n\n - iommu/amd: Update Device Table in\n increase_address_space() (bsc#1172066).\n\n - iommu: Fix reference count leak in iommu_group_alloc\n (bsc#1172394).\n\n - iommu/qcom: Fix local_base status check (bsc#1172067).\n\n - iommu/virtio: Reverse arguments to list_add\n (bsc#1172068).\n\n - ipv4: Update fib_select_default to handle nexthop\n objects (networking-stable-20_04_27).\n\n - ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n\n - ipvs: Improve robustness to the ipvs sysctl (git-fixes).\n\n - irqchip/al-fic: Add support for irq retrigger\n (jsc#SLE-10505).\n\n - irqchip/ti-sci-inta: Fix processing of masked irqs\n (git-fixes).\n\n - irqchip/versatile-fpga: Apply clear-mask earlier\n (git-fixes).\n\n - irqchip/versatile-fpga: Handle chained IRQs properly\n (git-fixes).\n\n - iwlwifi: avoid debug max amsdu config overwriting itself\n (git-fixes).\n\n - iwlwifi: mvm: limit maximum queue appropriately\n (git-fixes).\n\n - iwlwifi: pcie: handle QuZ configs with killer NICs as\n well (bsc#1172374).\n\n - jbd2: fix data races at struct journal_head\n (bsc#1173438).\n\n - kabi: ppc64le: prevent struct dma_map_ops to become\n defined (jsc#SLE-12424).\n\n - kabi/severities: Ingnore get_dev_data() The function is\n internal to the AMD IOMMU driver and must not be called\n by any third-party.\n\n - kABI workaround for struct hdac_bus changes (git-fixes).\n\n - ktest: Add timeout for ssh sync testing (git-fixes).\n\n - KVM: Check validity of resolved slot when searching\n memslots (bsc#1172069).\n\n - KVM: x86/mmu: Set mmio_value to '0' if reserved #PF\n can't be generated (bsc#1171904).\n\n - KVM: x86: only do L1TF workaround on affected processors\n (bsc#1171904).\n\n - l2tp: Allow management of tunnels and session in user\n namespace (networking-stable-20_04_17).\n\n - libbpf: Fix perf_buffer__free() API for sparse allocs\n (bsc#1155518).\n\n - libceph: ignore pool overlay and cache logic on\n redirects (bsc#1172938).\n\n - lib: devres: add a helper function for ioremap_uc\n (git-fixes).\n\n - libertas_tf: avoid a null dereference in pointer priv\n (git-fixes).\n\n - lib/lzo: fix ambiguous encoding bug in lzo-rle\n (git-fixes).\n\n - libnvdimm/btt: fix variable 'rc' set but not used\n (bsc#1162400).\n\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n\n - libnvdimm: cover up nd_region changes (bsc#1162400).\n\n - libnvdimm/dax: Pick the right alignment default when\n creating dax devices (bsc#1171759).\n\n - libnvdimm/label: Remove the dpa align check\n (bsc#1171759).\n\n - libnvdimm/namespace: Enforce memremap_compat_align()\n (bsc#1162400).\n\n - libnvdimm/namsepace: Do not set claim_class on error\n (bsc#1162400).\n\n - libnvdimm/of_pmem: Provide a unique name for bus\n provider (bsc#1171739).\n\n - libnvdimm: Out of bounds read in __nd_ioctl()\n (bsc#1065729).\n\n - libnvdimm/pfn_dev: Add a build check to make sure we\n notice when struct page size change (bsc#1171743).\n\n - libnvdimm/pfn_dev: Add page size and struct page size to\n pfn superblock (bsc#1171759).\n\n - libnvdimm/pfn: Prevent raw mode fallback if\n pfn-infoblock valid (bsc#1171743).\n\n - libnvdimm/pmem: Advance namespace seed for specific\n probe errors (bsc#1171743).\n\n - libnvdimm/region: Fix build error (bsc#1162400).\n\n - libnvdimm/region: Introduce an 'align' attribute\n (bsc#1162400).\n\n - libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).\n\n - libnvdimm/region: Rewrite _probe_success() to\n _advance_seeds() (bsc#1171743).\n\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align\n check (bsc#1171759).\n\n - lib: Uplevel the pmem 'region' ida to a global allocator\n (bc#1162400).\n\n - list: Add hlist_unhashed_lockless() (bsc#1173438).\n\n - livepatch: Apply vmlinux-specific KLP relocations early\n (bsc#1071995).\n\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n\n - livepatch: Make klp_apply_object_relocs static\n (bsc#1071995).\n\n - livepatch: Prevent module-specific KLP rela sections\n from referencing vmlinux symbols (bsc#1071995).\n\n - livepatch: Remove .klp.arch (bsc#1071995).\n\n - locktorture: Allow CPU-hotplug to be disabled via\n --bootargs (bsc#1173068).\n\n - lpfc_debugfs: get rid of pointless access_ok()\n (bsc#1171530).\n\n - lpfc: fix axchg pointer reference after free and double\n frees (bsc#1171530).\n\n - lpfc: Fix pointer checks and comments in LS receive\n refactoring (bsc#1171530).\n\n - lpfc: Fix return value in __lpfc_nvme_ls_abort\n (bsc#1171530).\n\n - lpfc: Synchronize NVME transport and lpfc driver\n devloss_tmo (bcs#1173060).\n\n - mac80211: mesh: fix discovery timer re-arming issue /\n crash (git-fixes).\n\n - mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in\n zynqmp_ipi_mbox_probe() (git-fixes).\n\n - Make the 'Reducing compressed framebufer size' message\n be DRM_INFO_ONCE() (git-fixes).\n\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n\n - media: cedrus: Program output format during each run\n (git-fixes).\n\n - media: dvb: return -EREMOTEIO on i2c transfer failure\n (git-fixes).\n\n - media: platform: fcp: Set appropriate DMA parameters\n (git-fixes).\n\n - media: Revert 'staging: imgu: Address a compiler warning\n on alignment' (git-fixes).\n\n - media: staging: ipu3: Fix stale list entries on\n parameter queue failure (git-fixes).\n\n - media: staging: ipu3-imgu: Move alignment attribute to\n field (git-fixes).\n\n - mei: release me_cl object reference (git-fixes).\n\n - mfd: intel-lpss: Add Intel Tiger Lake PCI IDs\n (jsc#SLE-12737).\n\n - mfd: intel-lpss: Use devm_ioremap_uc for MMIO\n (git-fixes).\n\n - mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).\n\n - mfd: stmfx: Reset chip on resume as supply was disabled\n (git-fixes).\n\n - misc: fastrpc: fix potential fastrpc_invoke_ctx leak\n (git-fixes).\n\n - misc: rtsx: Add short delay after exit from ASPM\n (git-fixes).\n\n - mlxsw: Fix some IS_ERR() vs NULL bugs\n (networking-stable-20_04_27).\n\n - mm: adjust vm_committed_as_batch according to vm\n overcommit policy (bnc#1173271).\n\n - mmc: block: Fix use-after-free issue for rpmb\n (git-fixes).\n\n - mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of\n DEFINE_SIMPLE_ATTRIBUTE (git-fixes).\n\n - mmc: fix compilation of user API (git-fixes).\n\n - mmc: meson-mx-sdio: trigger a soft reset after a timeout\n or CRC error (git-fixes).\n\n - mmc: mmci_sdmmc: fix DMA API warning overlapping\n mappings (git-fixes).\n\n - mmc: sdhci-esdhc-imx: fix the mask for tuning start\n point (git-fixes).\n\n - mmc: sdhci-msm: Clear tuning done flag while hs400\n tuning (git-fixes).\n\n - mmc: sdio: Fix potential NULL pointer error in\n mmc_sdio_init_card() (git-fixes).\n\n - mmc: sdio: Fix several potential memory leaks in\n mmc_sdio_init_card() (git-fixes).\n\n - mmc: tmio: Further fixup runtime PM management at remove\n (git-fixes).\n\n - mmc: uniphier-sd: call devm_request_irq() after\n tmio_mmc_host_probe() (git-fixes).\n\n - mm: do not prepare anon_vma if vma has VM_WIPEONFORK\n (bsc#1169681).\n\n - mm: memcontrol: fix memory.low proportional distribution\n (bsc#1168230).\n\n - mm/memremap: drop unused SECTION_SIZE and SECTION_MASK\n (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).\n\n - mm/memremap_pages: Introduce memremap_compat_align()\n (bsc#1162400).\n\n - mm/memremap_pages: Kill unused __devm_memremap_pages()\n (bsc#1162400).\n\n - mm/util.c: make vm_memory_committed() more accurate\n (bnc#1173271).\n\n - mt76: mt76x02u: Add support for newer versions of the\n XBox One wifi adapter (git-fixes).\n\n - mtd: Fix mtd not registered due to nvmem name collision\n (git-fixes).\n\n - mtd: rawnand: brcmnand: correctly verify erased pages\n (git-fixes).\n\n - mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).\n\n - mtd: rawnand: brcmnand: fix hamming oob layout\n (git-fixes).\n\n - mtd: rawnand: diskonchip: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).\n\n - mtd: rawnand: ingenic: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: marvell: Fix probe error path (git-fixes).\n\n - mtd: rawnand: marvell: Fix the condition on a return\n code (git-fixes).\n\n - mtd: rawnand: marvell: Use nand_cleanup() when the\n device is not yet registered (git-fixes).\n\n - mtd: rawnand: mtk: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: onfi: Fix redundancy detection check\n (git-fixes).\n\n - mtd: rawnand: orion: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: oxnas: Keep track of registered devices\n (git-fixes).\n\n - mtd: rawnand: oxnas: Release all devices in the\n _remove() path (git-fixes).\n\n - mtd: rawnand: pasemi: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: plat_nand: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: sharpsl: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: socrates: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: sunxi: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: timings: Fix default tR_max and tCCS_min\n timings (git-fixes).\n\n - mtd: rawnand: tmio: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: xway: Fix the probe error path\n (git-fixes).\n\n - mtd: spinand: Propagate ECC information to the MTD\n structure (git-fixes).\n\n - mtd: spi-nor: intel-spi: Add support for Intel Tiger\n Lake SPI serial flash (jsc#SLE-12737).\n\n - mwifiex: avoid -Wstringop-overflow warning (git-fixes).\n\n - mwifiex: Fix memory corruption in dump_station\n (git-fixes).\n\n - net: bcmgenet: correct per TX/RX ring statistics\n (networking-stable-20_04_27).\n\n - net: dsa: b53: b53_arl_rw_op() needs to select IVL or\n SVL (networking-stable-20_04_27).\n\n - net: dsa: b53: Fix ARL register definitions\n (networking-stable-20_04_27).\n\n - net: dsa: b53: Lookup VID in ARL searches when VLAN is\n enabled (networking-stable-20_04_27).\n\n - net: dsa: b53: Rework ARL bin logic\n (networking-stable-20_04_27).\n\n - net: dsa: declare lockless TX feature for slave ports\n (bsc#1154353).\n\n - net: dsa: mt7530: fix tagged frames pass-through in\n VLAN-unaware mode (networking-stable-20_04_17).\n\n - net: ena: xdp: update napi budget for DROP and ABORTED\n (bsc#1154492).\n\n - net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).\n\n - netfilter: connlabels: prefer static lock initialiser\n (git-fixes).\n\n - netfilter: nf_queue: enqueue skbs with NULL dst\n (git-fixes).\n\n - netfilter: nf_tables_offload: return EOPNOTSUPP if rule\n specifies no actions (git-fixes).\n\n - netfilter: nft_tproxy: Fix port selector on Big Endian\n (git-fixes).\n\n - netfilter: nft_tunnel: add the missing ERSPAN_VERSION\n nla_policy (git-fixes).\n\n - netfilter: not mark a spinlock as __read_mostly\n (git-fixes).\n\n - net: ipv4: devinet: Fix crash when add/del multicast IP\n with autojoin (networking-stable-20_04_17).\n\n - net: ipv6: do not consider routes via gateways for\n anycast address check (networking-stable-20_04_17).\n\n - net/mlx4_en: avoid indirect call in TX completion\n (networking-stable-20_04_27).\n\n - net/mlx5e: Add missing release firmware call\n (networking-stable-20_04_17).\n\n - net/mlx5e: Fix pfnum in devlink port attribute\n (networking-stable-20_04_17).\n\n - net/mlx5e: Fix stats update for matchall classifier\n (jsc#SLE-8464).\n\n - net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta()\n (jsc#SLE-8464).\n\n - net/mlx5: Fix cleaning unmanaged flow tables\n (jsc#SLE-8464).\n\n - net/mlx5: Fix crash upon suspend/resume (bsc#1172365).\n\n - net/mlx5: Fix frequent ioread PCI access during recovery\n (networking-stable-20_04_17).\n\n - net: netrom: Fix potential nr_neigh refcnt leak in\n nr_add_node (networking-stable-20_04_27).\n\n - net: openvswitch: ovs_ct_exit to be done under ovs_lock\n (networking-stable-20_04_27).\n\n - net: phy: propagate an error back to the callers of\n phy_sfp_probe (bsc#1154353).\n\n - net: qrtr: send msgs from local of same id as broadcast\n (networking-stable-20_04_17).\n\n - net: revert default NAPI poll timeout to 2 jiffies\n (networking-stable-20_04_17).\n\n - net: revert 'net: get rid of an signed integer overflow\n in ip_idents_reserve()' (bnc#1158748 (network\n regression)).\n\n - net: tun: record RX queue in skb before do_xdp_generic()\n (networking-stable-20_04_17).\n\n - net: vmxnet3: fix possible buffer overflow caused by bad\n DMA value in vmxnet3_get_rss() (bsc#1172484).\n\n - net/x25: Fix x25_neigh refcnt leak when receiving frame\n (networking-stable-20_04_27).\n\n - NFC: st21nfca: add missed kfree_skb() in an error path\n (git-fixes).\n\n - nfs: add minor version to nfs_server_key for fscache\n (bsc#1172467).\n\n - nfsd4: make drc_slab global, not per-net (git-fixes).\n\n - nfsd: always check return value of find_any_file\n (bsc#1172208).\n\n - NFS: Fix fscache super_cookie index_key from changing\n after umount (git-fixes).\n\n - nfs: fix NULL deference in nfs4_get_valid_delegation.\n\n - nfs: fscache: use timespec64 in inode auxdata\n (git-fixes).\n\n - nfs: set invalid blocks after NFSv4 writes (git-fixes).\n\n - NFSv4.1 fix rpc_call_done assignment for\n BIND_CONN_TO_SESSION (git-fixes).\n\n - NFSv4: Fix fscache cookie aux_data to ensure change_attr\n is included (git-fixes).\n\n - ntb: intel: add hw workaround for NTB BAR alignment\n (jsc#SLE-12710).\n\n - ntb: intel: Add Icelake (gen4) support for Intel NTB\n (jsc#SLE-12710).\n\n - ntb: intel: fix static declaration (jsc#SLE-12710).\n\n - nvdimm: Avoid race between probe and reading device\n attributes (bsc#1170442).\n\n - nvme-fc: avoid gcc-10 zero-length-bounds warning\n (bsc#1173206).\n\n - nvme-fc: do not call nvme_cleanup_cmd() for AENs\n (bsc#1171688).\n\n - nvme-fc: print proper nvme-fc devloss_tmo value\n (bsc#1172391).\n\n - objtool: Allow no-op CFI ops in alternatives\n (bsc#1169514).\n\n - objtool: Clean instruction state before each function\n validation (bsc#1169514).\n\n - objtool: Fix !CFI insn_state propagation (bsc#1169514).\n\n - objtool: Fix ORC vs alternatives (bsc#1169514).\n\n - objtool: Ignore empty alternatives (bsc#1169514).\n\n - objtool: Remove check preventing branches within\n alternative (bsc#1169514).\n\n - objtool: Rename struct cfi_state (bsc#1169514).\n\n - objtool: Uniquely identify alternative instruction\n groups (bsc#1169514).\n\n - p54usb: add AirVasT USB stick device-id (git-fixes).\n\n - panic: do not print uninitialized taint_flags\n (bsc#1172814).\n\n - PCI: Allow pci_resize_resource() for devices on root bus\n (git-fixes).\n\n - PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up\n link (git-fixes).\n\n - PCI: brcmstb: Assert fundamental reset on initialization\n (git-fixes).\n\n - PCI: brcmstb: Assert fundamental reset on initialization\n (git-fixes).\n\n - PCI: brcmstb: Fix window register offset from 4 to 8\n (git-fixes).\n\n - PCI: brcmstb: Fix window register offset from 4 to 8\n (git-fixes).\n\n - pcie: mobiveil: remove patchset v9 Prepare to backport\n upstream version.\n\n - PCI: Fix pci_register_host_bridge() device_register()\n error handling (git-fixes).\n\n - PCI: mobiveil: Add 8-bit and 16-bit CSR register\n accessors (bsc#1161495).\n\n - PCI: mobiveil: Add callback function for interrupt\n initialization (bsc#1161495).\n\n - PCI: mobiveil: Add callback function for link up check\n (bsc#1161495).\n\n - PCI: mobiveil: Add Header Type field check\n (bsc#1161495).\n\n - PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape\n SoCs (bsc#1161495).\n\n - PCI: mobiveil: Allow mobiveil_host_init() to be used to\n re-init host (bsc#1161495).\n\n - PCI: mobiveil: Collect the interrupt related operations\n into a function (bsc#1161495).\n\n - PCI: mobiveil: Fix sparse different address space\n warnings (bsc#1161495).\n\n - PCI: mobiveil: Fix unmet dependency warning for\n PCIE_MOBIVEIL_PLAT (bsc#1161495).\n\n - PCI: mobiveil: Introduce a new structure\n mobiveil_root_port (bsc#1161495).\n\n - PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451\n (bsc#1161495).\n\n - PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577\n (bsc#1161495).\n\n - PCI: mobiveil: ls_pcie_g4: fix SError when accessing\n config space (bsc#1161495).\n\n - PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge\n IP driver (bsc#1161495).\n\n - PCI: mobiveil: Move the host initialization into a\n function (bsc#1161495).\n\n - PCI/PM: Adjust pcie_wait_for_link_delay() for caller\n delay (git-fixes).\n\n - PCI/PM: Call .bridge_d3() hook only if non-NULL\n (git-fixes).\n\n - PCI: Program MPS for RCiEP devices (git-fixes).\n\n - PCI/PTM: Inherit Switch Downstream Port PTM settings\n from Upstream Port (git-fixes).\n\n - PCI: rcar: Fix incorrect programming of OB windows\n (git-fixes).\n\n - PCI: v3-semi: Fix a memory leak in v3_pci_probe() error\n handling paths (git-fixes).\n\n - PCI: vmd: Filter resource type bits from shadow register\n (git-fixes).\n\n - pcm_native: result of put_user() needs to be checked\n (git-fixes).\n\n - perf/core: Fix endless multiplex timer (git-fixes).\n\n - perf/core: fix parent pid/tid in task exit events\n (git-fixes).\n\n - pinctrl: freescale: imx: Fix an error handling path in\n 'imx_pinctrl_probe()' (git-fixes).\n\n - pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid\n a resource leak in case of error in\n 'imx_pinctrl_probe()' (git-fixes).\n\n - pinctrl: imxl: Fix an error handling path in\n 'imx1_pinctrl_core_probe()' (git-fixes).\n\n - pinctrl: intel: Add Intel Tiger Lake pin controller\n support (jsc#SLE-12737).\n\n - pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2\n (git-fixes).\n\n - pinctrl: rza1: Fix wrong array assignment of\n rza1l_swio_entries (git-fixes).\n\n - pinctrl: samsung: Correct setting of eint wakeup mask on\n s5pv210 (git-fixes).\n\n - pinctrl: samsung: Save/restore eint_mask over suspend\n for EINT_TYPE GPIOs (git-fixes).\n\n - pinctrl: sprd: Fix the incorrect pull-up definition\n (git-fixes).\n\n - pinctrl: stmfx: stmfx_pinconf_set does not require to\n get direction anymore (git-fixes).\n\n - pinctrl: tigerlake: Tiger Lake uses _HID enumeration\n (jsc#SLE-12737).\n\n - platform/x86: asus-nb-wmi: Do not load on Asus T100TA\n and T200TA (git-fixes).\n\n - platform/x86: dell-laptop: do not register micmute LED\n if there is no token (git-fixes).\n\n - platform/x86: intel-vbtn: Also handle tablet-mode switch\n on 'Detachable' and 'Portable' chassis-types\n (git-fixes).\n\n - platform/x86: intel-vbtn: Do not advertise switches to\n userspace if they are not there (git-fixes).\n\n - platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE\n on the 9 / 'Laptop' chasis-type (git-fixes).\n\n - platform/x86: intel-vbtn: Split keymap into buttons and\n switches parts (git-fixes).\n\n - platform/x86: intel-vbtn: Use acpi_evaluate_integer()\n (git-fixes).\n\n - PM: runtime: clk: Fix clk_pm_runtime_get() error path\n (git-fixes).\n\n - pnp: Use list_for_each_entry() instead of open coding\n (git-fixes).\n\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR\n (bsc#1065729).\n\n - powerpc/64s/exception: Fix machine check no-loss idle\n wakeup (bsc#1156395).\n\n - powerpc/64s/kuap: Restore AMR in system reset exception\n (bsc#1156395).\n\n - powerpc/64s: Save FSCR to init_task.thread.fscr after\n feature init (bsc#1065729).\n\n - powerpc/book3s64: Export has_transparent_hugepage()\n related functions (bsc#1171759).\n\n - powerpc/bpf: Enable bpf_probe_read(, str)() on powerpc\n again (bsc#1172344).\n\n - powerpc/fadump: Account for memory_limit while reserving\n memory (jsc#SLE-9099 git-fixes).\n\n - powerpc/fadump: consider reserved ranges while reserving\n memory (jsc#SLE-9099 git-fixes).\n\n - powerpc/fadump: use static allocation for reserved\n memory ranges (jsc#SLE-9099 git-fixes).\n\n - powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP\n (bsc#1156395).\n\n - powerpc/powernv: Fix a warning message (bsc#1156395).\n\n - powerpc/setup_64: Set cache-line-size based on\n cache-block-size (bsc#1065729).\n\n - powerpc/xive: Clear the page tables for the ESB IO\n mapping (bsc#1085030).\n\n - power: reset: qcom-pon: reg write mask depends on pon\n generation (git-fixes).\n\n - power: supply: bq24257_charger: Replace depends on\n REGMAP_I2C with select (git-fixes).\n\n - power: supply: core: fix HWMON temperature labels\n (git-fixes).\n\n - power: supply: core: fix memory leak in HWMON error path\n (git-fixes).\n\n - power: supply: lp8788: Fix an error handling path in\n 'lp8788_charger_probe()' (git-fixes).\n\n - power: supply: smb347-charger: IRQSTAT_D is volatile\n (git-fixes).\n\n - printk: queue wake_up_klogd irq_work only if per-CPU\n areas are ready (bsc#1172095).\n\n - proc/meminfo: avoid open coded reading of\n vm_committed_as (bnc#1173271).\n\n - pwm: sun4i: Move pwm_calculate() out of spin_lock()\n (git-fixes).\n\n - r8152: support additional Microsoft Surface Ethernet\n Adapter variant (git-fixes).\n\n - r8169: Revive default chip version for r8168\n (bsc#1173085).\n\n - raid5: remove gfp flags from scribble_alloc()\n (bsc#1166985).\n\n - random: fix data races at timer_rand_state\n (bsc#1173438).\n\n - rcu: Avoid data-race in rcu_gp_fqs_check_wake()\n (bsc#1171828).\n\n - rcu: Fix data-race due to atomic_t copy-by-value\n (bsc#1171828).\n\n - rcu: Make rcu_read_unlock_special() checks match\n raise_softirq_irqoff() (bsc#1172046).\n\n - rcu: Simplify rcu_read_unlock_special() deferred wakeups\n (bsc#1172046).\n\n - rcutorture: Add 100-CPU configuration (bsc#1173068).\n\n - rcutorture: Add worst-case call_rcu() forward-progress\n results (bsc#1173068).\n\n - rcutorture: Dispense with Dracut for initrd creation\n (bsc#1173068).\n\n - rcutorture: Make kvm-find-errors.sh abort on bad\n directory (bsc#1173068).\n\n - rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios\n (bsc#1173068).\n\n - rcutorture: Summarize summary of build and run results\n (bsc#1173068).\n\n - rcutorture: Test TREE03 with the threadirqs kernel boot\n parameter (bsc#1173068).\n\n - rcu: Use *_ONCE() to protect lockless ->expmask accesses\n (bsc#1171828).\n\n - rcu: Use WRITE_ONCE() for assignments to ->pprev for\n hlist_nulls (bsc#1173438).\n\n - RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).\n\n - RDMA/core: Move and rename trace_cm_id_create()\n (jsc#SLE-8449).\n\n - RDMA/mlx5: Fix NULL pointer dereference in\n destroy_prefetch_work (jsc#SLE-8446).\n\n - RDMA/nl: Do not permit empty devices names during\n RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).\n\n - RDMA/srpt: Fix disabling device management\n (jsc#SLE-8449).\n\n - RDMA/uverbs: Make the event_queue fds return POLLERR\n when disassociated (jsc#SLE-8449).\n\n - remoteproc: Add missing '\\n' in log messages\n (git-fixes).\n\n - remoteproc: Fall back to using parent memory pool if no\n dedicated available (git-fixes).\n\n - remoteproc: Fix and restore the parenting hierarchy for\n vdev (git-fixes).\n\n - remoteproc: Fix IDR initialisation in rproc_alloc()\n (git-fixes).\n\n - Revert 'drm/amd/display: disable dcn20 abm feature for\n bring up' (git-fixes).\n\n - Revert 'fs/seq_file.c: seq_read(): add info message\n about buggy .next functions' (bsc#1172751) The message\n floods dmesg and its benefit is marginal in default\n kernel.\n\n - Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()'\n to avoid a resource leak in case of error in\n 'imx_pinctrl_probe()'' (git-fixes).\n\n - rpm/kernel-source.spec.in: Add obsolete_rebuilds\n (boo#1172073).\n\n - rpm/modules.fips: * add aes-ce-ccm and des3_ede-x86_64\n (boo#173030) * add aes_ti and aes_neon_bs (boo#1172956)\n\n - rtc: mc13xxx: fix a double-unlock issue (git-fixes).\n\n - rtc: rv3028: Add missed check for devm_regmap_init_i2c()\n (git-fixes).\n\n - rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup()\n (git-fixes).\n\n - rtw88: fix an issue about leak system resources\n (git-fixes).\n\n - rxrpc: Fix call RCU cleanup using non-bh-safe locks\n (git-fixes).\n\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194,\n LTC#185911).\n\n - s390/pci: Log new handle in clp_disable_fh()\n (git-fixes).\n\n - sched/cfs: change initial value of runnable_avg\n (bsc#1158765).\n\n - sched/core: Check cpus_mask, not cpus_ptr in\n __set_cpus_allowed_ptr(), to fix mask corruption\n (bnc#1155798 (CPU scheduler functional and performance\n backports)).\n\n - sched/core: Fix PI boosting between RT and DEADLINE\n tasks (bsc#1172823).\n\n - sched/core: Fix PI boosting between RT and DEADLINE\n tasks (git fixes (sched)).\n\n - sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n\n - sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU\n scheduler functional and performance backports)).\n\n - sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798\n (CPU scheduler functional and performance backports)).\n\n - sched/deadline: Initialize ->dl_boosted (bsc#1172823).\n\n - sched/deadline: Initialize ->dl_boosted (git fixes\n (sched)).\n\n - sched: etf: do not assume all sockets are full blown\n (networking-stable-20_04_27).\n\n - sched/fair: find_idlest_group(): Remove unused sd_flag\n parameter (bnc#1155798 (CPU scheduler functional and\n performance backports)).\n\n - sched/fair: Fix enqueue_task_fair() warning some more\n (bnc#1155798 (CPU scheduler functional and performance\n backports)).\n\n - sched/fair: fix nohz next idle balance (bnc#1155798 (CPU\n scheduler functional and performance backports)).\n\n - sched/fair: Optimize dequeue_task_fair() (bnc#1155798\n (CPU scheduler functional and performance backports)).\n\n - sched/fair: Optimize enqueue_task_fair() (bnc#1155798\n (CPU scheduler functional and performance backports)).\n\n - sched/fair: Simplify the code of should_we_balance()\n (bnc#1155798 (CPU scheduler functional and performance\n backports)).\n\n - sched: Make newidle_balance() static again (bnc#1155798\n (CPU scheduler functional and performance backports)).\n\n - sched: Offload wakee task activation if it the wakee is\n descheduling (bnc#1158748, bnc#1159781).\n\n - sched: Optimize ttwu() spinning on p->on_cpu\n (bnc#1158748, bnc#1159781).\n\n - sched/pelt: Sync util/runnable_sum with PELT window when\n propagating (bnc#1155798 (CPU scheduler functional and\n performance backports)).\n\n - scripts/decodecode: fix trapping instruction formatting\n (bsc#1065729).\n\n - scsi: ibmvscsi: Do not send host info in adapter info\n MAD after LPM (bsc#1172759 ltc#184814).\n\n - scsi: lpfc: Change default queue allocation for reduced\n memory consumption (bsc#1164777 bsc#1164780 bsc#1165211\n jsc#SLE-8654).\n\n - scsi: lpfc: Copyright updates for 12.6.0.4 patches\n (bsc#1171530).\n\n - scsi: lpfc: fix build failure with DEBUGFS disabled\n (bsc#1171530).\n\n - scsi: lpfc: Fix incomplete NVME discovery when target\n (bsc#1171530).\n\n - scsi: lpfc: Fix lpfc_nodelist leak when processing\n unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211\n jsc#SLE-8654).\n\n - scsi: lpfc: Fix MDS Diagnostic Enablement definition\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set\n func (bsc#1171530).\n\n - scsi: lpfc: Fix negation of else clause in\n lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780\n bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Fix noderef and address space warnings\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: fix spelling mistakes of asynchronous\n (bsc#1171530).\n\n - scsi: lpfc: Maintain atomic consistency of queue_claimed\n flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Make lpfc_defer_acc_rsp static\n (bsc#1171530).\n\n - scsi: lpfc: remove duplicate unloading checks\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Remove re-binding of nvme rport during\n registration (bsc#1164777 bsc#1164780 bsc#1165211\n jsc#SLE-8654).\n\n - scsi: lpfc: Remove redundant initialization to variable\n rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Remove unnecessary lockdep_assert_held calls\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777\n bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN\n macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).\n\n - scsi: qla2xxx: Delete all sessions before unregister\n local nvme port (jsc#SLE-9714 jsc#SLE-10327\n jsc#SLE-10334 bsc#1157169).\n\n - scsi: qla2xxx: Do not log message when reading port\n speed via sysfs (jsc#SLE-9714 jsc#SLE-10327\n jsc#SLE-10334 bsc#1157169).\n\n - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all\n in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334\n bsc#1157169).\n\n - scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).\n\n - scsi: smartpqi: Update attribute name to\n `driver_version` (bsc#1173206).\n\n - scsi: zfcp: add diagnostics buffer for exchange config\n data (bsc#1158050).\n\n - scsi: zfcp: auto variables for dereferenced structs in\n open port handler (bsc#1158050).\n\n - scsi: zfcp: diagnostics buffer caching and use for\n exchange port data (bsc#1158050).\n\n - scsi: zfcp: enhance handling of FC Endpoint Security\n errors (bsc#1158050).\n\n - scsi: zfcp: expose fabric name as common fc_host sysfs\n attribute (bsc#1158050).\n\n - scsi: zfcp: Fence adapter status propagation for common\n statuses (bsc#1158050).\n\n - scsi: zfcp: Fence early sysfs interfaces for accesses of\n shost objects (bsc#1158050).\n\n - scsi: zfcp: Fence fc_host updates during link-down\n handling (bsc#1158050).\n\n - scsi: zfcp: fix fc_host attributes that should be\n unknown on local link down (bsc#1158050).\n\n - scsi: zfcp: fix wrong data and display format of SFP+\n temperature (bsc#1158050).\n\n - scsi: zfcp: implicitly refresh config-data diagnostics\n when reading sysfs (bsc#1158050).\n\n - scsi: zfcp: implicitly refresh port-data diagnostics\n when reading sysfs (bsc#1158050).\n\n - scsi: zfcp: introduce sysfs interface for diagnostics of\n local SFP transceiver (bsc#1158050).\n\n - scsi: zfcp: introduce sysfs interface to read the local\n B2B-Credit (bsc#1158050).\n\n - scsi: zfcp: log FC Endpoint Security errors\n (bsc#1158050).\n\n - scsi: zfcp: log FC Endpoint Security of connections\n (bsc#1158050).\n\n - scsi: zfcp: Move allocation of the shost object to after\n xconf- and xport-data (bsc#1158050).\n\n - scsi: zfcp: Move fc_host updates during xport data\n handling into fenced function (bsc#1158050).\n\n - scsi: zfcp: move maximum age of diagnostic buffers into\n a per-adapter variable (bsc#1158050).\n\n - scsi: zfcp: Move p-t-p port allocation to after xport\n data (bsc#1158050).\n\n - scsi: zfcp: Move shost modification after QDIO (re-)open\n into fenced function (bsc#1158050).\n\n - scsi: zfcp: Move shost updates during xconfig data\n handling into fenced function (bsc#1158050).\n\n - scsi: zfcp: proper indentation to reduce confusion in\n zfcp_erp_required_act (bsc#1158050).\n\n - scsi: zfcp: report FC Endpoint Security in sysfs\n (bsc#1158050).\n\n - scsi: zfcp: signal incomplete or error for sync exchange\n config/port data (bsc#1158050).\n\n - scsi: zfcp: support retrieval of SFP Data via Exchange\n Port Data (bsc#1158050).\n\n - scsi: zfcp: trace FC Endpoint Security of FCP devices\n and connections (bsc#1158050).\n\n - scsi: zfcp: wire previously driver-specific sysfs\n attributes also to fc_host (bsc#1158050).\n\n - selftests/bpf: CONFIG_IPV6_SEG6_BPF required for\n test_seg6_loop.o (bsc#1155518).\n\n - selftests/bpf: CONFIG_LIRC required for\n test_lirc_mode2.sh (bsc#1155518).\n\n - selftests/bpf: Fix invalid memory reads in core_relo\n selftest (bsc#1155518).\n\n - selftests/bpf: Fix memory leak in extract_build_id()\n (bsc#1155518).\n\n - selftests/bpf, flow_dissector: Close TAP device FD after\n the test (bsc#1155518).\n\n - selftests/timens: handle a case when alarm clocks are\n not supported (bsc#1164648,jsc#SLE-11493).\n\n - serial: 8250: Fix max baud limit in generic 8250 port\n (git-fixes).\n\n - slimbus: core: Fix mismatch in of_node_get/put\n (git-fixes).\n\n - soc: mediatek: cmdq: return send msg error code\n (git-fixes).\n\n - soc: qcom: rpmh: Dirt can only make you dirtier, not\n cleaner (git-fixes).\n\n - soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before\n flushing new data (git-fixes).\n\n - soc: qcom: rpmh-rsc: Allow using free WAKE TCS for\n active request (git-fixes).\n\n - soc: qcom: rpmh-rsc: Clear active mode configuration for\n wake TCS (git-fixes).\n\n - soc: qcom: rpmh: Update dirty flag only when data\n changes (git-fixes).\n\n - soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).\n\n - spi: bcm2835aux: Fix controller unregister order\n (git-fixes).\n\n - spi: bcm2835: Fix controller unregister order\n (git-fixes).\n\n - spi: bcm-qspi: Handle clock probe deferral (git-fixes).\n\n - spi: bcm-qspi: when tx/rx buffer is NULL set to 0\n (git-fixes).\n\n - SPI: designware: pci: Switch over to MSI interrupts\n (jsc#SLE-12735).\n\n - spi: dt-bindings: spi-controller: Fix #address-cells for\n slave mode (git-fixes).\n\n - spi: dw: Add SPI Rx-done wait method to DMA-based\n transfer (git-fixes).\n\n - spi: dw: Add SPI Tx-done wait method to DMA-based\n transfer (git-fixes).\n\n - spi: dw: Fix controller unregister order (git-fixes).\n\n - spi: dw: Fix native CS being unset (git-fixes).\n\n - spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).\n\n - spi: dw-pci: Add runtime power management support\n (jsc#SLE-12735).\n\n - spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI\n (jsc#SLE-12735).\n\n - spi: dw-pci: Fix Chip Select amount on Intel Elkhart\n Lake PSE SPI (jsc#SLE-12735).\n\n - spi: dw: use 'smp_mb()' to avoid sending spi data error\n (git-fixes).\n\n - spi: dw: Zero DMA Tx and Rx configurations on stack\n (git-fixes).\n\n - spi: Fix controller unregister order (git-fixes).\n\n - spi: fsl: do not map irq during probe (git-fixes).\n\n - spi: fsl: use platform_get_irq() instead of\n of_irq_to_resource() (git-fixes).\n\n - spi: pxa2xx: Fix controller unregister order\n (git-fixes).\n\n - spi: pxa2xx: Fix runtime PM ref imbalance on probe error\n (git-fixes).\n\n - spi: Respect DataBitLength field of SpiSerialBusV2()\n ACPI resource (git-fixes).\n\n - spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and\n SPI_CTAR_* macros (git-fixes).\n\n - spi: spi-fsl-dspi: Do not access reserved fields in\n SPI_MCR (git-fixes).\n\n - spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI\n mode (git-fixes).\n\n - spi: spi-fsl-dspi: Replace interruptible wait queue with\n a simple completion (git-fixes).\n\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable\n devices (git-fixes).\n\n - staging: iio: ad2s1210: Fix SPI reading (git-fixes).\n\n - staging: kpc2000: fix error return code in\n kp2000_pcie_probe() (git-fixes).\n\n - staging: rtl8712: Fix\n IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).\n\n - staging: sm750fb: add missing case while setting\n FB_VISUAL (git-fixes).\n\n - sun6i: dsi: fix gcc-4.8 (bsc#1152489)\n\n - SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).\n\n - supported.conf: Add pinctrl-tigerlake as supported\n\n - supported.conf: Mark two hwtracing helper modules as\n externally supported (bsc#1170879)\n\n - svcrdma: Fix leak of svc_rdma_recv_ctxt objects\n (git-fixes).\n\n - tcp: cache line align MAX_TCP_HEADER\n (networking-stable-20_04_27).\n\n - team: fix hang in team_mode_get()\n (networking-stable-20_04_27).\n\n - thermal: intel: intel_pch_thermal: Add Comet Lake (CML)\n platform support (jsc#SLE-12668).\n\n - tick/sched: Annotate lockless access to\n last_jiffies_update (bsc#1173438).\n\n - timer: Use hlist_unhashed_lockless() in timer_pending()\n (bsc#1173438).\n\n - torture: Allow 'CFLIST' to specify default list of\n scenarios (bsc#1173068).\n\n - torture: Expand last_ts variable in kvm-test-1-run.sh\n (bsc#1173068).\n\n - torture: Handle jitter for CPUs that cannot be offlined\n (bsc#1173068).\n\n - torture: Handle systems lacking the mpstat command\n (bsc#1173068).\n\n - torture: Hoist calls to lscpu to higher-level kvm.sh\n script (bsc#1173068).\n\n - torture: Make results-directory date format\n completion-friendly (bsc#1173068).\n\n - torture: Use gawk instead of awk for systime() function\n (bsc#1173068).\n\n - tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()\n (bsc#1065729).\n\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).\n\n - tty: n_gsm: Fix SOF skipping (git-fixes).\n\n - tty: n_gsm: Fix waking up upper tty layer when room\n available (git-fixes).\n\n - tty: serial: add missing spin_lock_init for SiFive\n serial console (git-fixes).\n\n - tun: correct header offsets in napi frags mode\n (git-fixes).\n\n - Update config files: Add CONFIG_PINCTRL_TIGERLAKE=m\n\n - Update patch reference for intel_th patch\n (jsc#SLE-12705)\n\n - Update the patch reference for ish-hid fix\n (jsc#SLE-12683)\n\n - usb: core: Fix misleading driver bug report (git-fixes).\n\n - usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to\n USB5534B (git-fixes).\n\n - usb: dwc2: gadget: move gadget resume after the core is\n in L0 state (git-fixes).\n\n - usb: dwc3: gadget: Properly handle ClearFeature(halt)\n (git-fixes).\n\n - usb: dwc3: gadget: Properly handle failed kick_transfer\n (git-fixes).\n\n - usb: dwc3: pci: Enable extcon driver for Intel\n Merrifield (git-fixes).\n\n - usb: gadget: audio: Fix a missing error return value in\n audio_bind() (git-fixes).\n\n - usb: gadget: fix illegal array access in binding with\n UDC (git-fixes).\n\n - usb: gadget: fix potential double-free in m66592_probe\n (git-fixes).\n\n - usb: gadget: legacy: fix error return code in cdc_bind()\n (git-fixes).\n\n - usb: gadget: legacy: fix error return code in\n gncm_bind() (git-fixes).\n\n - usb: gadget: legacy: fix redundant initialization\n warnings (git-fixes).\n\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer\n before null check (git-fixes).\n\n - usb: gadget: net2272: Fix a memory leak in an error\n handling path in 'net2272_plat_probe()' (git-fixes).\n\n - usb: gadget: udc: atmel: Make some symbols static\n (git-fixes).\n\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL\n check in s3c2410_udc_nuke (git-fixes).\n\n - usb: host: ehci-mxc: Add error handling in\n ehci_mxc_drv_probe() (git-fixes).\n\n - usb: host: xhci-plat: keep runtime active when removing\n host (git-fixes).\n\n - usb: musb: Fix runtime PM imbalance on error\n (git-fixes).\n\n - usb: musb: start session in resume for host port\n (git-fixes).\n\n - usb: ohci-sm501: fix error return code in\n ohci_hcd_sm501_drv_probe() (git-fixes).\n\n - usb: serial: option: add Telit LE910C1-EUX compositions\n (git-fixes).\n\n - usb: serial: qcserial: add DW5816e QDL support\n (git-fixes).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal\n errors (git-fixes).\n\n - usb: usbfs: correct kernel->user page attribute mismatch\n (git-fixes).\n\n - usb: usbfs: fix mmap dma mismatch (git-fixes).\n\n - vfio: avoid possible overflow in\n vfio_iommu_type1_pin_pages (git-fixes).\n\n - vfio: Ignore -ENODEV when getting MSI cookie\n (git-fixes).\n\n - vfio/mdev: Fix reference count leak in\n add_mdev_supported_type (git-fixes).\n\n - vfio/pci: fix memory leaks in alloc_perm_bits()\n (git-fixes).\n\n - vfio/type1: Fix VA->PA translation for PFNMAP VMAs in\n vaddr_get_pfn() (git-fixes).\n\n - video: fbdev: w100fb: Fix a potential double free\n (git-fixes).\n\n - virtio-blk: handle block_device_operations callbacks\n after hot unplug (git fixes (block drivers)).\n\n - vmxnet3: add geneve and vxlan tunnel offload support\n (bsc#1172484).\n\n - vmxnet3: add support to get/set rx flow hash\n (bsc#1172484).\n\n - vmxnet3: allow rx flow hash ops only when rss is enabled\n (bsc#1172484).\n\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n\n - vmxnet3: update to version 4 (bsc#1172484).\n\n - vmxnet3: use correct hdr reference when packet is\n encapsulated (bsc#1172484).\n\n - vrf: Check skb for XFRM_TRANSFORMED flag\n (networking-stable-20_04_27).\n\n - vrf: Fix IPv6 with qdisc and xfrm\n (networking-stable-20_04_27).\n\n - vsprintf: do not obfuscate NULL and error pointers\n (bsc#1172086).\n\n - vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual\n console (git-fixes).\n\n - vt: vt_ioctl: remove unnecessary console allocation\n checks (git-fixes).\n\n - vxlan: use the correct nlattr array in\n NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).\n\n - w1: omap-hdq: cleanup to add missing newline for some\n dev_dbg (git-fixes).\n\n - watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).\n\n - wcn36xx: Fix error handling path in 'wcn36xx_probe()'\n (git-fixes).\n\n - wireguard: device: avoid circular netns references\n (git-fixes).\n\n - wireguard: noise: do not assign initiation time in if\n condition (git-fixes).\n\n - wireguard: noise: read preshared key while taking lock\n (bsc#1169021 jsc#SLE-12250).\n\n - wireguard: noise: separate receive counter from send\n counter (bsc#1169021 jsc#SLE-12250).\n\n - wireguard: queueing: preserve flow hash across packet\n scrubbing (bsc#1169021 jsc#SLE-12250).\n\n - wireguard: receive: account for napi_gro_receive never\n returning GRO_DROP (git-fixes).\n\n - wireguard: selftests: use newer iproute2 for gcc-10\n (bsc#1169021 jsc#SLE-12250).\n\n - work around mvfs bug (bsc#1162063).\n\n - workqueue: do not use wq_select_unbound_cpu() for bound\n works (git-fixes).\n\n - workqueue: Remove the warning in wq_worker_sleeping()\n (git-fixes).\n\n - x86/cpu/amd: Make erratum #1054 a legacy erratum\n (bsc#1152489).\n\n - x86: Fix early boot crash on gcc-10, third try\n (bsc#1152489).\n\n - x86/mm/cpa: Flush direct map alias during cpa\n (bsc#1152489).\n\n - x86/PCI: Mark Intel C620 MROMs as having non-compliant\n BARs (git-fixes).\n\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk\n (git-fixes).\n\n - x86/resctrl: Fix invalid attempt at removing the default\n resource group (bsc#1152489).\n\n - x86/resctrl: Preserve CDP enable over CPU hotplug\n (bsc#1152489).\n\n - x86/unwind/orc: Fix unwind_get_return_address_ptr() for\n inactive tasks (bsc#1058115).\n\n - xfrm: Always set XFRM_TRANSFORMED in\n xfrm(4,6)_output_finish (networking-stable-20_04_27).\n\n - xfrm: fix error in comment (git fixes (block drivers)).\n\n - xfs: clean up the error handling in xfs_swap_extents\n (git-fixes).\n\n - xfs: do not commit sunit/swidth updates to disk if that\n would cause repair failures (bsc#1172169).\n\n - xfs: do not fail unwritten extent conversion on\n writeback due to edquot (bsc#1158242).\n\n - xfs: fix duplicate verification from xfs_qm_dqflush()\n (git-fixes).\n\n - xfs: force writes to delalloc regions to unwritten\n (bsc#1158242).\n\n - xfs: measure all contiguous previous extents for\n prealloc size (bsc#1158242).\n\n - xfs: preserve default grace interval during quotacheck\n (bsc#1172170).\n\n - xfs: refactor agfl length computation function\n (bsc#1172169).\n\n - xfs: split the sunit parameter update into two parts\n (bsc#1172169).\n\n - wireguard: selftests: initalize ipv6 members to NULL to\n squelch clang warning (git-fixes).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1058115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1148868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152472\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152489\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1153274\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1154353\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1154492\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1155518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1155798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1156395\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1157169\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158050\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158242\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158748\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158765\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1159781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1159867\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1160947\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1161495\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1162063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1162400\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1164648\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1164777\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1164780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1165211\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1165975\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1166985\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167651\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168230\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168779\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169194\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169681\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170442\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170774\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170879\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170891\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170895\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171191\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171219\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171220\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171246\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171513\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171662\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171688\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171699\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171828\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171915\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171982\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172017\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172046\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172061\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172064\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172065\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172067\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172068\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172069\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172073\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172095\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172169\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172170\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172208\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172223\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172342\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172365\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172366\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172374\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172391\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172453\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172467\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172537\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172814\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172823\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172938\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172939\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172940\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172984\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172985\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172986\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172987\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172989\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172990\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173068\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173085\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173139\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173206\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173271\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173461\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-rebuild\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-debugsource-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-devel-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-devel-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-debugsource-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-devel-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-devel-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-devel-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-docs-html-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-debugsource-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-devel-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-devel-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-macros-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-build-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-build-debugsource-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-qa-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-debugsource-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-devel-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-source-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-source-vanilla-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-syms-5.3.18-lp152.26.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-debuginfo / kernel-debug-debugsource / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-26T14:21:16", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:3041 advisory.\n\n - kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n - kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)\n\n - kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)\n\n - kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\n - kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n - kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n - Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-07-21T00:00:00", "type": "nessus", "title": "RHEL 8 : kernel (RHSA-2020:3041)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12888"], "modified": "2023-05-25T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-core", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-tools", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:python3-perf", "cpe:/o:redhat:rhel_e4s:8.0", "p-cpe:/a:redhat:enterprise_linux:bpftool", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-core", "p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers"], "id": "REDHAT-RHSA-2020-3041.NASL", "href": "https://www.tenable.com/plugins/nessus/138798", "sourceData": "##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:3041. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(138798);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/05/25\");\n\n script_cve_id(\n \"CVE-2020-10757\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-12653\",\n \"CVE-2020-12654\",\n \"CVE-2020-12888\"\n );\n script_xref(name:\"RHSA\", value:\"2020:3041\");\n\n script_name(english:\"RHEL 8 : kernel (RHSA-2020:3041)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the RHSA-2020:3041 advisory.\n\n - kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n - kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the\n SSBD protection. (CVE-2020-10766)\n\n - kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is\n available. (CVE-2020-10767)\n\n - kernel: Indirect branch speculation can be enabled after it was force-disabled by the\n PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\n - kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in\n drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n - kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in\n drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n - Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10757\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10766\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10767\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10768\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12653\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12654\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12888\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:3041\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1831868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1832530\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1836244\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1842525\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1845840\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1845867\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1845868\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-10757\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119, 120, 122, 248, 440);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/04/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python3-perf\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'eq', os_version: os_ver, rhel_version: '8.0')) audit(AUDIT_OS_NOT, 'Red Hat 8.0', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n rm_kb_item(name:'Host/uptrack-uname-r');\n var cve_list = make_list('CVE-2020-10757', 'CVE-2020-10766', 'CVE-2020-10767', 'CVE-2020-10768', 'CVE-2020-12653', 'CVE-2020-12654', 'CVE-2020-12888');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2020:3041');\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nvar constraints = [\n {\n 'repo_relative_urls': [\n 'content/e4s/rhel8/8.0/ppc64le/appstream/debug',\n 'content/e4s/rhel8/8.0/ppc64le/appstream/os',\n 'content/e4s/rhel8/8.0/ppc64le/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.0/ppc64le/baseos/debug',\n 'content/e4s/rhel8/8.0/ppc64le/baseos/os',\n 'content/e4s/rhel8/8.0/ppc64le/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.0/ppc64le/highavailability/debug',\n 'content/e4s/rhel8/8.0/ppc64le/highavailability/os',\n 'content/e4s/rhel8/8.0/ppc64le/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.0/ppc64le/sap-solutions/debug',\n 'content/e4s/rhel8/8.0/ppc64le/sap-solutions/os',\n 'content/e4s/rhel8/8.0/ppc64le/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.0/ppc64le/sap/debug',\n 'content/e4s/rhel8/8.0/ppc64le/sap/os',\n 'content/e4s/rhel8/8.0/ppc64le/sap/source/SRPMS',\n 'content/e4s/rhel8/8.0/x86_64/appstream/debug',\n 'content/e4s/rhel8/8.0/x86_64/appstream/os',\n 'content/e4s/rhel8/8.0/x86_64/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.0/x86_64/baseos/debug',\n 'content/e4s/rhel8/8.0/x86_64/baseos/os',\n 'content/e4s/rhel8/8.0/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.0/x86_64/highavailability/debug',\n 'content/e4s/rhel8/8.0/x86_64/highavailability/os',\n 'content/e4s/rhel8/8.0/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.0/x86_64/sap-solutions/debug',\n 'content/e4s/rhel8/8.0/x86_64/sap-solutions/os',\n 'content/e4s/rhel8/8.0/x86_64/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.0/x86_64/sap/debug',\n 'content/e4s/rhel8/8.0/x86_64/sap/os',\n 'content/e4s/rhel8/8.0/x86_64/sap/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'bpftool-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'bpftool-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-abi-whitelists-4.18.0-80.27.1.el8_0', 'sp':'0', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-core-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-core-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-cross-headers-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-cross-headers-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-core-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-core-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-devel-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-devel-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-modules-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-modules-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-modules-extra-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debug-modules-extra-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-devel-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-devel-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-headers-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-headers-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-modules-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-modules-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-modules-extra-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-modules-extra-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-libs-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-libs-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'perf-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'perf-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python3-perf-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python3-perf-4.18.0-80.27.1.el8_0', 'sp':'0', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nforeach var constraint_array ( constraints ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];\n foreach var pkg ( constraint_array['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp'])) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n var subscription_caveat = '\\n' +\n 'NOTE: This vulnerability check contains fixes that apply to\\n' +\n 'packages only available in the Red Hat Enterprise Linux\\n' +\n 'Update Services for SAP Solutions repository.\\n' +\n 'Access to this repository requires a paid RHEL subscription.\\n';\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = subscription_caveat + rpm_report_get() + redhat_report_repo_caveat();\n else extra = subscription_caveat + rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'bpftool / kernel / kernel-abi-whitelists / kernel-core / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:03:59", "description": "An update of the linux package has been released.", "cvss3": {}, "published": "2020-07-07T00:00:00", "type": "nessus", "title": "Photon OS 3.0: Linux PHSA-2020-3.0-0108", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20810", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-12888", "CVE-2020-13974"], "modified": "2020-07-09T00:00:00", "cpe": ["p-cpe:/a:vmware:photonos:linux", "cpe:/o:vmware:photonos:3.0"], "id": "PHOTONOS_PHSA-2020-3_0-0108_LINUX.NASL", "href": "https://www.tenable.com/plugins/nessus/138181", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from VMware Security Advisory PHSA-2020-3.0-0108. The text\n# itself is copyright (C) VMware, Inc.\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(138181);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/09\");\n\n script_cve_id(\n \"CVE-2019-20810\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-12888\",\n \"CVE-2020-13974\"\n );\n\n script_name(english:\"Photon OS 3.0: Linux PHSA-2020-3.0-0108\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote PhotonOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update of the linux package has been released.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/vmware/photon/wiki/Security-Updates-3.0-108.md\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected Linux packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-13974\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:vmware:photonos:linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:photonos:3.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"PhotonOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/PhotonOS/release\", \"Host/PhotonOS/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/PhotonOS/release\");\nif (isnull(release) || release !~ \"^VMware Photon\") audit(AUDIT_OS_NOT, \"PhotonOS\");\nif (release !~ \"^VMware Photon (?:Linux|OS) 3\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"PhotonOS 3.0\");\n\nif (!get_kb_item(\"Host/PhotonOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"PhotonOS\", cpu);\n\nflag = 0;\n\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", reference:\"linux-api-headers-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-devel-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-docs-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-drivers-gpu-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-hmacgen-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-oprofile-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-sound-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-devel-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-docs-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-drivers-gpu-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-drivers-intel-sgx-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-drivers-sound-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-devel-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-docs-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-hmacgen-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-hmacgen-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-oprofile-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-python3-perf-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-devel-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-docs-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-hmacgen-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-lkcm-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-tools-4.19.129-1.ph3\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:22:29", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932(CVE-2020-0009)\n\n - A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.(CVE-2020-10732)\n\n - An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.(CVE-2019-20811)\n\n - go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.(CVE-2019-20810)\n\n - A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.(CVE-2020-10751)\n\n - A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2.\n Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.(CVE-2020-12826)\n\n - A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.(CVE-2020-10711)\n\n - gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel through 5.6.13 relies on kstrdup without considering the possibility of an internal '\\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.(CVE-2020-13143)\n\n - An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.(CVE-2020-12770)\n\n - __btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because '1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel\n - something which clearly is not the case.'(CVE-2019-19039)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-02T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP5 : kernel (EulerOS-SA-2020-1920)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19039", "CVE-2019-20810", "CVE-2019-20811", "CVE-2020-0009", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-12770", "CVE-2020-12826", "CVE-2020-13143"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2020-1920.NASL", "href": "https://www.tenable.com/plugins/nessus/140141", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140141);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2019-19039\",\n \"CVE-2019-20810\",\n \"CVE-2019-20811\",\n \"CVE-2020-0009\",\n \"CVE-2020-10711\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-12770\",\n \"CVE-2020-12826\",\n \"CVE-2020-13143\"\n );\n\n script_name(english:\"EulerOS 2.0 SP5 : kernel (EulerOS-SA-2020-1920)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - In calc_vm_may_flags of ashmem.c, there is a possible\n arbitrary write to shared memory due to a permissions\n bypass. This could lead to local escalation of\n privilege by corrupting memory shared between\n processes, with no additional execution privileges\n needed. User interaction is not needed for\n exploitation. Product: Android Versions: Android kernel\n Android ID: A-142938932(CVE-2020-0009)\n\n - A flaw was found in the Linux kernel's implementation\n of Userspace core dumps. This flaw allows an attacker\n with a local account to crash a trivial program and\n exfiltrate private kernel data.(CVE-2020-10732)\n\n - An issue was discovered in the Linux kernel before\n 5.0.6. In rx_queue_add_kobject() and\n netdev_queue_add_kobject() in net/core/net-sysfs.c, a\n reference count is mishandled, aka\n CID-a3e23f719f5c.(CVE-2019-20811)\n\n - go7007_snd_init in\n drivers/media/usb/go7007/snd-go7007.c in the Linux\n kernel before 5.6 does not call snd_card_free for a\n failure path, which causes a memory leak, aka\n CID-9453264ef586.(CVE-2019-20810)\n\n - A flaw was found in the Linux kernels SELinux LSM hook\n implementation before version 5.7, where it incorrectly\n assumed that an skb would only contain a single netlink\n message. The hook would incorrectly only validate the\n first netlink message in the skb and allow or deny the\n rest of the messages within the skb with the granted\n permission without further processing.(CVE-2020-10751)\n\n - A signal access-control issue was discovered in the\n Linux kernel before 5.6.5, aka CID-7395ea4e65c2.\n Because exec_id in include/linux/sched.h is only 32\n bits, an integer overflow can interfere with a\n do_notify_parent protection mechanism. A child process\n can send an arbitrary signal to a parent process in a\n different security domain. Exploitation limitations\n include the amount of elapsed time before an integer\n overflow occurs, and the lack of scenarios where\n signals to a parent process present a substantial\n operational threat.(CVE-2020-12826)\n\n - A NULL pointer dereference flaw was found in the Linux\n kernel's SELinux subsystem in versions before 5.7. This\n flaw occurs while importing the Commercial IP Security\n Option (CIPSO) protocol's category bitmap into the\n SELinux extensible bitmap via the'\n ebitmap_netlbl_import' routine. While processing the\n CIPSO restricted bitmap tag in the\n 'cipso_v4_parsetag_rbm' routine, it sets the security\n attribute to indicate that the category bitmap is\n present, even if it has not been allocated. This issue\n leads to a NULL pointer dereference issue while\n importing the same category bitmap into SELinux. This\n flaw allows a remote network user to crash the system\n kernel, resulting in a denial of\n service.(CVE-2020-10711)\n\n - gadget_dev_desc_UDC_store in\n drivers/usb/gadget/configfs.c in the Linux kernel\n through 5.6.13 relies on kstrdup without considering\n the possibility of an internal '\\0' value, which allows\n attackers to trigger an out-of-bounds read, aka\n CID-15753588bcd4.(CVE-2020-13143)\n\n - An issue was discovered in the Linux kernel through\n 5.6.11. sg_write lacks an sg_remove_request call in a\n certain failure case, aka\n CID-83c6f2390040.(CVE-2020-12770)\n\n - __btrfs_free_extent in fs/btrfs/extent-tree.c in the\n Linux kernel through 5.3.12 calls btrfs_print_leaf in a\n certain ENOENT case, which allows local users to obtain\n potentially sensitive information about register values\n via the dmesg program. NOTE: The BTRFS development team\n disputes this issues as not being a vulnerability\n because '1) The kernel provide facilities to restrict\n access to dmesg - dmesg_restrict=1 sysctl option. So\n it's really up to the system administrator to judge\n whether dmesg access shall be disallowed or not. 2)\n WARN/WARN_ON are widely used macros in the linux\n kernel. If this CVE is considered valid this would mean\n there are literally thousands CVE lurking in the kernel\n - something which clearly is not the\n case.'(CVE-2019-19039)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1920\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b3e29a06\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-12770\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-862.14.1.5.h458.eulerosv2r7\",\n \"kernel-devel-3.10.0-862.14.1.5.h458.eulerosv2r7\",\n \"kernel-headers-3.10.0-862.14.1.5.h458.eulerosv2r7\",\n \"kernel-tools-3.10.0-862.14.1.5.h458.eulerosv2r7\",\n \"kernel-tools-libs-3.10.0-862.14.1.5.h458.eulerosv2r7\",\n \"perf-3.10.0-862.14.1.5.h458.eulerosv2r7\",\n \"python-perf-3.10.0-862.14.1.5.h458.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:05:59", "description": "The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c where it did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107 1173659).\n\n - CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\n - CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\n - CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth® BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown.\n Linux scheduler logical bug allowed an attacker to turn off the SSBD protection. (bnc#1172781).\n\n - CVE-2020-10767: Fixed indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).\n\n - CVE-2020-10768: Fixed indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\n - CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\n - CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x. (bnc#1172999).\n\n - CVE-2020-10781: A zram sysfs resource consumption was fixed. (bnc#1173074).\n\n - CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\n - CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row, aka CID-b86dab054059. (bnc#1172775).\n\n - CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).\n\n - CVE-2020-14331: Fixed an out of bounds write to the vgacon scrollback buffer (bsc#1174205).\n\n - CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\n - CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\n - CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\n - CVE-2020-16166: The Linux kernel allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n\nThe following non-security bugs were fixed :\n\n - ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n\n - ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n\n - ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n\n - ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n\n - ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n\n - ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n\n - ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n\n - ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n\n - ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n\n - ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n\n - ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n\n - ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n\n - ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n\n - ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n\n - ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n\n - ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n\n - ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n\n - ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n\n - ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n\n - ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (bsc#1111666).\n\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n\n - ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n\n - ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n\n - ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n\n - ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n\n - ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n\n - ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n\n - ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n\n - ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n\n - ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n\n - ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n\n - ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n\n - ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n\n - ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n\n - ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n\n - ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n\n - ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n\n - ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n\n - ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n\n - amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).\n\n - arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n\n - ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n\n - ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n\n - b43: Fix connection problem with WPA3 (bsc#1111666).\n\n - b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n\n - bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n\n - be2net: fix link failure after ethtool offline test (git-fixes).\n\n - block: Fix use-after-free in blkdev_get() (bsc#1174843).\n\n - block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n\n - block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n\n - block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n\n - Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n\n - bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n\n - bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n\n - bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n\n - bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n\n - bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n\n - bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n\n - bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n\n - bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n\n - brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n\n - brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n\n - btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).\n\n - btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n\n - btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n\n - btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n\n - btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n\n - btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n\n - btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n\n - btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n\n - btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n\n - btrfs: qgroup: try to flush qgroup space when we get\n -EDQUOT (bsc#1120163).\n\n - btrfs: Return EAGAIN if we can't start no snpashot write in check_can_nocow (bsc#1174438).\n\n - btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n\n - btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n\n - bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n\n - bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n\n - bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n\n - bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n\n - carl9170: remove P2P_GO support (bsc#1111666).\n\n - cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).\n\n - ceph: request expedited service on session's last cap flush (bsc#1167104).\n\n - cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n\n - char/random: Add a newline at the end of the file (jsc#SLE-12423).\n\n - cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n\n - cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n\n - cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n\n - clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n\n - clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n\n - clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n\n - clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n\n - compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n\n - compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549\n\n - copy_(to,from)_user(): consolidate object size checks (git fixes).\n\n - crypto: algboss - do not wait during notifier callback (bsc#1111666).\n\n - crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).\n\n - crypto: caam - update xts sector size for large input length (bsc#1111666).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).\n\n - crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n\n - crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).\n\n - crypto: rockchip - fix scatterlist nents error (git-fixes).\n\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n\n - crypto: talitos - check AES key size (git-fixes).\n\n - crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n\n - crypto: talitos - fix IPsec cipher in length (git-fixes).\n\n - crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n\n - crypto: virtio: Fix src/dst scatterlist calculation in\n __virtio_crypto_skcipher_do_req() (git-fixes).\n\n - debugfs: Check module state before warning in (full/open)_proxy_open() (bsc#1173746).\n\n - devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n\n - /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n\n - /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n\n - dlm: remove BUG() before panic() (bsc#1174844).\n\n - dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).\n\n - dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n\n - dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n\n - dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n\n - dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).\n\n - dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).\n\n - dm: various cleanups to md->queue initialization code (git fixes).\n\n - dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n\n - dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n\n - dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n\n - driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753)\n\n - Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n\n - drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n\n - drm: amd/display: fix Kconfig help text (bsc#1113956) 	* only fix DEBUG_KERNEL_DC\n\n - drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n\n - drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n\n - drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n\n - drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n\n - drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n\n - drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n\n - drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n\n - drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n\n - drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n\n - drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n\n - drm/radeon: fix double free (bsc#1113956)\n\n - drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n\n - drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n\n - drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n\n - drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n\n - e1000: Distribute switch variables for initialization (bsc#1111666).\n\n - e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n\n - e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n\n - e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n\n - EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n\n - efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n\n - efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n\n - efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n\n - efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n\n - evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n\n - evm: Fix a small race in init_desc() (bsc#1051510).\n\n - ext4: fix a data race at inode->i_blocks (bsc#1171835).\n\n - ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n\n - ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n\n - ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n\n - ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n\n - extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).\n\n - fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n\n - fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n\n - fdt: add support for rng-seed (jsc#SLE-12423).\n\n - fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n\n - firmware: imx: scu: Fix corruption of header (git-fixes).\n\n - firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n\n - fix multiplication overflow in copy_fdtable() (bsc#1173825).\n\n - Fix Patch-mainline tag in the previous zram fix patch\n\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n\n - fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n\n - gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n\n - gpu: host1x: Detach driver on unregister (bsc#1111666).\n\n - gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n\n - HID: hiddev: fix mess in hiddev_open() (git-fixes).\n\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n\n - HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n\n - HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n\n - HISI LPC: Stop using MFD APIs (bsc#1174658).\n\n - hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).\n\n - hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n\n - hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n\n - hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n\n - i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n\n - i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n\n - i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n\n - i40e: reduce stack usage in i40e_set_fc (git-fixes).\n\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n\n - IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n\n - ibmvnic: Flush existing work items before device removal (bsc#1065729).\n\n - ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n\n - iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n\n - iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n\n - iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n\n - iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n\n - iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n\n - iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n\n - iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n\n - iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n\n - ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n\n - ima: Fix ima digest hash table key calculation (bsc#1051510).\n\n - include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n\n - input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n\n - input: i8042 - Remove special PowerPC handling (git-fixes).\n\n - input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n\n - intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n\n - intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n\n - io-mapping: indicate mapping failure (git-fixes).\n\n - ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n\n - ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n\n - jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n\n - jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n\n - kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n\n - kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n\n - kABI: protect struct mlx5_cmd_work_ent (kabi).\n\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n\n - kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n\n - kvm: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n\n - kvm: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n\n - kvm: x86: Fix APIC page invalidation race (bsc#1174122).\n\n - kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n\n - kvm: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).\n\n - kvm: x86: only do L1TF workaround on affected processors (bsc#1171904).\n\n - l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n\n - l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n\n - libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n\n - libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n\n - lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n\n - lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n\n - lib: logic_pio: Fix RCU usage (bsc#1174658).\n\n - libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n\n - libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n\n - libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over\n __nd_ioctl() (bsc#1171753).\n\n - libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n\n - libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n\n - libnvdimm/label: Remove the dpa align check (bsc#1171759).\n\n - libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n\n - libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n\n - libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n\n - libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n\n - libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n\n - libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).\n\n - libnvdimm/region: Rewrite _probe_success() to\n _advance_seeds() (bsc#1171743).\n\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n\n - livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n\n - livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n\n - livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n\n - livepatch: Remove .klp.arch (bsc#1071995).\n\n - loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n\n - lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n\n - lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n\n - mac80211: add option for setting control flags (bsc#1111666).\n\n - mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n\n - mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n\n - md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n\n - md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n\n - media: cec: silence shift wrapping warning in\n __cec_s_log_addrs() (git-fixes).\n\n - media: si2157: Better check for running tuner in init (bsc#1111666).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n\n - mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n\n - mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n\n - mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n\n - mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n\n - mlxsw: spectrum: Prevent force of 56G (git-fixes).\n\n - mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n\n - mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n\n - mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n\n - mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n\n - mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n\n - mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n\n - mmc: fix compilation of user API (bsc#1051510).\n\n - mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n\n - mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n\n - Move kabi patch into the right place\n\n - Move upstreamed lpfc patches into sorted section\n\n - mvpp2: remove misleading comment (git-fixes).\n\n - net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n\n - net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n\n - net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n\n - net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n\n - net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n\n - net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n\n - net: ena: add missing ethtool TX timestamping indication (git-fixes).\n\n - net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n\n - net: ena: do not wake up tx queue when down (git-fixes).\n\n - net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n\n - net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n\n - net: ena: fix continuous keep-alive resets (git-fixes).\n\n - net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n\n - net: ena: fix default tx interrupt moderation interval (git-fixes).\n\n - net: ena: fix incorrect default RSS key (git-fixes).\n\n - net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n\n - net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n\n - net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n\n - net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n\n - net: ena: fix uses of round_jiffies() (git-fixes).\n\n - net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n\n - net: ena: reimplement set/get_coalesce() (git-fixes).\n\n - net: ena: rss: do not allocate key when not supported (git-fixes).\n\n - net: ena: rss: fix failure to get indirection table (git-fixes).\n\n - net: ena: rss: store hash function as values and not bits (git-fixes).\n\n - netfilter: connlabels: prefer static lock initialiser (git-fixes).\n\n - netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n\n - netfilter: not mark a spinlock as __read_mostly (git-fixes).\n\n - net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n\n - net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n\n - net: hns3: add support for FEC encoding control (bsc#1174070).\n\n - net: hns3: add support for multiple media type (bsc#1174070).\n\n - net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n\n - net: hns3: fix for FEC configuration (bsc#1174070).\n\n - net: hns3: fix port capbility updating issue (bsc#1174070).\n\n - net: hns3: fix port setting handle for fibre port (bsc#1174070).\n\n - net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n\n - net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n\n - net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).\n\n - net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n\n - net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n\n - net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n\n - net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n\n - net/mlx4_core: fix a memory leak bug (git-fixes).\n\n - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n\n - net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n\n - net/mlx5: Avoid panic when setting vport rate (git-fixes).\n\n - net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n\n - net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n\n - net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n\n - net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n\n - net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n\n - net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n\n - net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n\n - net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n\n - net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n\n - net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n\n - net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n\n - netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n\n - net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n\n - net: qed: fix excessive QM ILT lines consumption (git-fixes).\n\n - net: qed: fix NVMe login fails over VFs (git-fixes).\n\n - net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n\n - net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).\n\n - net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n\n - net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n\n - net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n\n - net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n\n - net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n\n - net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n\n - net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n\n - nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n\n - NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n\n - NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n\n - nilfs2: fix NULL pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n\n - nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n\n - nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n\n - nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n\n - nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n\n - nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n\n - nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n\n - nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n\n - objtool: Clean instruction state before each function validation (bsc#1169514).\n\n - objtool: Ignore empty alternatives (bsc#1169514).\n\n - ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n\n - overflow: Fix -Wtype-limits compilation warnings (git fixes).\n\n - overflow.h: Add arithmetic shift helper (git fixes).\n\n - p54usb: add AirVasT USB stick device-id (bsc#1051510).\n\n - padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n\n - padata: reorder work kABI fixup (git-fixes).\n\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n\n - PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n\n - PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n\n - PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n\n - PCI: Fix 'try' semantics of bus and slot reset (git-fixes).\n\n - PCI: Generalize multi-function power dependency device links (bsc#1111666).\n\n - PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n\n - PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n\n - PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n\n - PCI: Program MPS for RCiEP devices (bsc#1051510).\n\n - PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n\n - pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n\n - pcm_native: result of put_user() needs to be checked (bsc#1111666).\n\n - perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n\n - perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n\n - perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n\n - perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n\n - perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).\n\n - perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).\n\n - perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n\n - perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n\n - perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n\n - perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n\n - perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n\n - perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n\n - perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n\n - perf/x86/intel: Fix PT PMI handling (git-fixes).\n\n - perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n\n - perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n\n - perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n\n - perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n\n - perf/x86/uncore: Fix event group support (git-fixes).\n\n - pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n\n - pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).\n\n - pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).\n\n - pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n\n - platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n\n - platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n\n - PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n\n - pnp: Use list_for_each_entry() instead of open coding (git fixes).\n\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n\n - powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n\n - powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n\n - powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n\n - powerpc-mm-Remove-kvm-radix-prefetch-workaround-for-.pat ch\n\n - powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n\n - powerpc-xmon-don-t-access-ASDR-in-VMs.patch\n\n - powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n\n - power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n\n - power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).\n\n - power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n\n - power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n\n - pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n\n - propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n\n - qed: reduce maximum stack frame size (git-fixes).\n\n - qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n\n - r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n\n - raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n\n - RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n\n - RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n\n - RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n\n - RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n\n - README.BRANCH: Add Takashi Iwai as primary maintainer.\n\n - regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n\n - Revert 'bcache: ignore pending signals when creating gc and allocator thread' (git fixes (block drivers)).\n\n - Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (bsc#1111666).\n\n - Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues' (git fixes (block drivers)).\n\n - Revert 'ipv6: add mtu lock check in\n __ip6_rt_update_pmtu' (networking-stable-20_05_16).\n\n - Revert pciehp patches that broke booting (bsc#1174887)\n\n - Revert 'thermal: mediatek: fix register index error' (bsc#1111666).\n\n - Revert 'tools lib traceevent: Remove unneeded qsort and uses memmove'\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).\n\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n\n - s390: fix syscall_get_error for compat processes (git-fixes).\n\n - s390/qdio: consistently restore the IRQ handler (git-fixes).\n\n - s390/qdio: lock device while installing IRQ handler (git-fixes).\n\n - s390/qdio: put thinint indicator after early error (git-fixes).\n\n - s390/qdio: tear down thinint indicator after early error (git-fixes).\n\n - s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n\n - sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n\n - sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n\n - scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n\n - scsi: aacraid: fix a signedness bug (bsc#1174296).\n\n - scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n\n - scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n\n - scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n\n - scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n\n - scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n\n - scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n\n - scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n\n - scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n\n - scsi: qedf: Add port_id getter (bsc#1150660).\n\n - scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n\n - scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n\n - sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n\n - sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n\n - spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).\n\n - spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n\n - spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n\n - spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n\n - staging: comedi: verify array index is correct before using it (bsc#1111666).\n\n - staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n\n - staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n\n - SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).\n\n - tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n\n - timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n\n - tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (bsc#1111666).\n\n - tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n\n - tracing: Fix event trigger to accept redundant spaces (git-fixes).\n\n - tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n\n - tty: n_gsm: Fix SOF skipping (bsc#1051510).\n\n - tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n\n - tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n\n - ubifs: remove broken lazytime support (bsc#1173826).\n\n - usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n\n - usb: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n\n - usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n\n - usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n\n - usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n\n - usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n\n - usb: dwc3: gadget: never call ->complete() from\n ->ep_queue() (git-fixes).\n\n - usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n\n - usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n\n - usb: ehci: reopen solution for Synopsys HC bug (git-fixes).\n\n - usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n\n - usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n\n - usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n\n - usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n\n - usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n\n - usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n\n - usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n\n - usb: musb: start session in resume for host port (bsc#1051510).\n\n - usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n\n - usb: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n\n - usb: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n\n - usb: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n\n - usb: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n\n - usb: serial: option: add GosunCn GM500 series (bsc#1111666).\n\n - usb: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n\n - usb: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n\n - usb: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n\n - vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n\n - virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n\n - virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n\n - vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n\n - vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n\n - vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n\n - vmxnet3: avoid format strint overflow warning (bsc#1172484).\n\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n\n - vmxnet3: Remove always false conditional statement (bsc#1172484).\n\n - vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).\n\n - vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).\n\n - vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n\n - vmxnet3: update to version 4 (bsc#1172484).\n\n - vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n\n - vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n\n - vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n\n - vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n\n - w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n\n - watchdog: sp805: fix restart handler (bsc#1111666).\n\n - wil6210: add general initialization/size checks (bsc#1111666).\n\n - wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n\n - wil6210: ignore HALP ICR if already handled (bsc#1111666).\n\n - wil6210: make sure Rx ring sizes are correlated (git-fixes).\n\n - work around mvfs bug (bsc#1162063).\n\n - x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n\n - x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n\n - x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n\n - x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n\n - x86/(mce,mm): Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n\n - xfrm: fix error in comment (git fixes).\n\n - xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n\n - xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n\n - vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).", "cvss3": {}, "published": "2020-08-07T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2020-1153)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20810", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13974", "CVE-2020-14331", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780", "CVE-2020-16166"], "modified": "2020-08-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "cpe:/o:novell:opensuse:15.1", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource"], "id": "OPENSUSE-2020-1153.NASL", "href": "https://www.tenable.com/plugins/nessus/139401", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2020-1153.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139401);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20810\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-10781\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-13974\", \"CVE-2020-14331\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\", \"CVE-2020-16166\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2020-1153)\");\n script_summary(english:\"Check for the openSUSE-2020-1153 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The openSUSE Leap 15.1 kernel was updated to receive various security\nand bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-16746: An issue was discovered in\n net/wireless/nl80211.c where it did not check the length\n of variable elements in a beacon head, leading to a\n buffer overflow (bnc#1152107 1173659).\n\n - CVE-2019-20810: go7007_snd_init in\n drivers/media/usb/go7007/snd-go7007.c did not call\n snd_card_free for a failure path, which causes a memory\n leak, aka CID-9453264ef586 (bnc#1172458).\n\n - CVE-2019-20908: An issue was discovered in\n drivers/firmware/efi/efi.c where Incorrect access\n permissions for the efivar_ssdt ACPI variable could be\n used by attackers to bypass lockdown or secure boot\n restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a\n possible use-after-free due to a race condition. This\n could lead to local escalation of privilege with System\n execution privileges needed. User interaction is not\n needed for exploitation (bnc#1174462).\n\n - CVE-2020-10135: Legacy pairing and secure-connections\n pairing authentication in Bluetooth® BR/EDR Core\n Specification v5.2 and earlier may have allowed an\n unauthenticated user to complete authentication without\n pairing credentials via adjacent access. An\n unauthenticated, adjacent attacker could impersonate a\n Bluetooth BR/EDR master or slave to pair with a\n previously paired remote device to successfully complete\n the authentication procedure without knowing the link\n key (bnc#1171988).\n\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown.\n Linux scheduler logical bug allowed an attacker to turn\n off the SSBD protection. (bnc#1172781).\n\n - CVE-2020-10767: Fixed indirect Branch Prediction Barrier\n is force-disabled when STIBP is unavailable or enhanced\n IBRS is available. (bnc#1172782).\n\n - CVE-2020-10768: Fixed indirect branch speculation can be\n enabled after it was force-disabled by the\n PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\n - CVE-2020-10769: A buffer over-read flaw was found in\n crypto_authenc_extractkeys in crypto/authenc.c in the\n IPsec Cryptographic algorithm's module, authenc. When a\n payload longer than 4 bytes, and is not following 4-byte\n alignment boundary guidelines, it causes a buffer\n over-read threat, leading to a system crash. This flaw\n allowed a local attacker with user privileges to cause a\n denial of service (bnc#1173265).\n\n - CVE-2020-10773: Fixed a kernel stack information leak on\n s390/s390x. (bnc#1172999).\n\n - CVE-2020-10781: A zram sysfs resource consumption was\n fixed. (bnc#1173074).\n\n - CVE-2020-12771: btree_gc_coalesce in\n drivers/md/bcache/btree.c has a deadlock if a coalescing\n operation fails (bnc#1171732).\n\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts\n to access disabled memory space (bnc#1171868).\n\n - CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer\n overflow if k_ascii was called several times in a row,\n aka CID-b86dab054059. (bnc#1172775).\n\n - CVE-2020-14331: Fixed a buffer over write in\n vgacon_scroll (bnc#1174205).\n\n - CVE-2020-14331: Fixed an out of bounds write to the\n vgacon scrollback buffer (bsc#1174205).\n\n - CVE-2020-14416: A race condition in tty->disc_data\n handling in the slip and slcan line discipline could\n lead to a use-after-free, aka CID-0ace17d56824. This\n affects drivers/net/slip/slip.c and\n drivers/net/can/slcan.c (bnc#1162002).\n\n - CVE-2020-15393: usbtest_disconnect in\n drivers/usb/misc/usbtest.c has a memory leak, aka\n CID-28ebeb8db770 (bnc#1173514).\n\n - CVE-2020-15780: An issue was discovered in\n drivers/acpi/acpi_configfs.c where injection of\n malicious ACPI tables via configfs could be used by\n attackers to bypass lockdown and secure boot\n restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\n - CVE-2020-16166: The Linux kernel allowed remote\n attackers to make observations that help to obtain\n sensitive information about the internal state of the\n network RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and kernel/time/timer.c\n (bnc#1174757).\n\nThe following non-security bugs were fixed :\n\n - ACPI: GED: add support for _Exx / _Lxx handler methods\n (bsc#1111666).\n\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx\n handling (bsc#1111666).\n\n - ACPI: NFIT: Fix unlock on error in scrub_show()\n (bsc#1171753).\n\n - ACPI: PM: Avoid using power resources if there are none\n for D0 (bsc#1051510).\n\n - ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n\n - ACPI: video: Use native backlight on Acer Aspire 5783z\n (bsc#1111666).\n\n - ACPI: video: Use native backlight on Acer TravelMate\n 5735Z (bsc#1111666).\n\n - ALSA: es1688: Add the missed snd_card_free()\n (bsc#1051510).\n\n - ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n\n - ALSA: hda: add sienna_cichlid audio asic id for\n sienna_cichlid up (bsc#1111666).\n\n - ALSA: hda: fix NULL pointer dereference during suspend\n (git-fixes).\n\n - ALSA: hda/hdmi - enable runtime pm for newer AMD display\n audio (bsc#1111666).\n\n - ALSA: hda - let hs_mic be picked ahead of hp_mic\n (bsc#1111666).\n\n - ALSA: hda/realtek - add a pintbl quirk for several\n Lenovo machines (bsc#1111666).\n\n - ALSA: hda/realtek - Add LED class support for micmute\n LED (bsc#1111666).\n\n - ALSA: hda/realtek: Add mute LED and micmute LED support\n for HP systems (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th\n gen (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for MSI GE63 laptop\n (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for MSI GL63\n (bsc#1111666).\n\n - ALSA: hda/realtek - change to suitable link model for\n ASUS platform (bsc#1111666).\n\n - ALSA: hda/realtek - Check headset type by unplug and\n resume (bsc#1111666).\n\n - ALSA: hda/realtek - Enable audio jacks of Acer\n vCopperbox with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer C20-820\n with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate\n B311R-31 with ALC256 (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer Veriton\n N4660G with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG\n Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG\n Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n\n - ALSA: hda/realtek - Enable micmute LED on and HP system\n (bsc#1111666).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and\n UX534 (bsc#1111666).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563\n (bsc#1111666).\n\n - ALSA: hda/realtek: Fix add a 'ultra_low_power' function\n for intel reference board (alc256) (bsc#1111666).\n\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding\n quirk for Samsung Notebook Pen S (bsc#1111666).\n\n - ALSA: hda/realtek - Fixed HP right speaker no sound\n (bsc#1111666).\n\n - ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th\n quirk subdevice id (bsc#1111666).\n\n - ALSA: hda/realtek - Fix unused variable warning w/o\n CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n\n - ALSA: hda/realtek - Introduce polarity for micmute LED\n GPIO (bsc#1111666).\n\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS\n ROG Zephyrus G14(GA401) series with ALC289\n (bsc#1111666).\n\n - ALSA: hda: Workaround for spurious wakeups on some Intel\n platforms (git-fixes).\n\n - ALSA: lx6464es - add support for LX6464ESe pci express\n variant (bsc#1111666).\n\n - ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n\n - ALSA: pcm: disallow linking stream to itself\n (bsc#1111666).\n\n - ALSA: usb-audio: Add duplex sound support for USB\n devices using implicit feedback (bsc#1111666).\n\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support\n (bsc#1111666).\n\n - ALSA: usb-audio: add quirk for MacroSilicon MS2109\n (bsc#1111666).\n\n - ALSA: usb-audio: Add vendor, product and profile name\n for HP Thunderbolt Dock (bsc#1111666).\n\n - ALSA: usb-audio: Clean up quirk entries with macros\n (bsc#1111666).\n\n - ALSA: usb-audio: Fix inconsistent card PM state after\n resume (bsc#1111666).\n\n - ALSA: usb-audio: Fix packet size calculation\n (bsc#1111666).\n\n - ALSA: usb-audio: Fix racy list management in output\n queue (bsc#1111666).\n\n - ALSA: usb-audio: Improve frames size computation\n (bsc#1111666).\n\n - ALSA: usb-audio: Manage auto-pm of all bundled\n interfaces (bsc#1111666).\n\n - ALSA: usb-audio: Use the new macro for HP Dock rename\n quirks (bsc#1111666).\n\n - amdgpu: a NULL ->mm does not mean a thread is a kthread\n (git-fixes).\n\n - arm64: map FDT as RW for early_init_dt_scan()\n (jsc#SLE-12423).\n\n - ath9k: Fix general protection fault in\n ath9k_hif_usb_rx_cb (bsc#1111666).\n\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx\n (bsc#1111666).\n\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg\n (bsc#1111666).\n\n - ath9x: Fix stack-out-of-bounds Write in\n ath9k_hif_usb_rx_cb (bsc#1111666).\n\n - ax25: fix setsockopt(SO_BINDTODEVICE)\n (networking-stable-20_05_27).\n\n - b43: Fix connection problem with WPA3 (bsc#1111666).\n\n - b43_legacy: Fix connection problem with WPA3\n (bsc#1111666).\n\n - bcache: Fix an error code in bch_dump_read() (git fixes\n (block drivers)).\n\n - be2net: fix link failure after ethtool offline test\n (git-fixes).\n\n - block: Fix use-after-free in blkdev_get() (bsc#1174843).\n\n - block: nr_sects_write(): Disable preemption on seqcount\n write (bsc#1173818).\n\n - block: remove QUEUE_FLAG_STACKABLE (git fixes (block\n drivers)).\n\n - block: sed-opal: fix sparse warning: convert __be64 data\n (git fixes (block drivers)).\n\n - Bluetooth: Add SCO fallback for invalid LMP parameters\n error (bsc#1111666).\n\n - bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n\n - bnxt_en: Fix ethtool selftest crash under error\n conditions (git-fixes).\n\n - bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE\n cmd fails (git-fixes).\n\n - bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n\n - bnxt_en: fix NULL dereference in case SR-IOV\n configuration fails (git-fixes).\n\n - bnxt_en: Fix VF anti-spoof filter setup\n (networking-stable-20_05_12).\n\n - bnxt_en: Fix VLAN acceleration handling in\n bnxt_fix_features() (networking-stable-20_05_12).\n\n - bnxt_en: Improve AER slot reset\n (networking-stable-20_05_12).\n\n - brcmfmac: fix wrong location to get firmware feature\n (bsc#1111666).\n\n - brcmfmac: Transform compatible string for FW loading\n (bsc#1169771).\n\n - btrfs: add assertions for tree == inode->io_tree to\n extent IO helpers (bsc#1174438).\n\n - btrfs: add new helper btrfs_lock_and_flush_ordered_range\n (bsc#1174438).\n\n - btrfs: Always use a cached extent_state in\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: change timing for qgroup reserved space for\n ordered extents to fix reserved space leak\n (bsc#1172247).\n\n - btrfs: do not zero f_bavail if we have available space\n (bsc#1168081).\n\n - btrfs: drop argument tree from\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: file: reserve qgroup space after the hole punch\n range is locked (bsc#1172247).\n\n - btrfs: fix extent_state leak in\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: fix failure of RWF_NOWAIT write into prealloc\n extent beyond eof (bsc#1174438).\n\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT\n write (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT write not failling when we need to\n cow (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks\n and waiting for IO (bsc#1174438).\n\n - btrfs: inode: move qgroup reserved space release to the\n callers of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: inode: refactor the parameters of\n insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: make btrfs_ordered_extent naming consistent with\n btrfs_file_extent_item (bsc#1172247).\n\n - btrfs: qgroup: allow to unreserve range without\n releasing other ranges (bsc#1120163).\n\n - btrfs: qgroup: Fix a bug that prevents qgroup to be\n re-enabled after disable (bsc#1172247).\n\n - btrfs: qgroup: fix data leak caused by race between\n writeback and truncate (bsc#1172247).\n\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of\n reserve retry-after-EDQUOT (bsc#1120163).\n\n - btrfs: qgroup: try to flush qgroup space when we get\n -EDQUOT (bsc#1120163).\n\n - btrfs: Return EAGAIN if we can't start no snpashot write\n in check_can_nocow (bsc#1174438).\n\n - btrfs: use correct count in btrfs_file_write_iter()\n (bsc#1174438).\n\n - btrfs: Use newly introduced\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate()\n (bsc#1171124).\n\n - bus: hisi_lpc: Add .remove method to avoid driver unbind\n crash (bsc#1174658).\n\n - bus: hisi_lpc: Do not fail probe for unrecognised child\n devices (bsc#1174658).\n\n - bus: hisi_lpc: Unregister logical PIO range to avoid\n potential use-after-free (bsc#1174658).\n\n - bus: sunxi-rsb: Return correct data when mixing 16-bit\n and 8-bit reads (bsc#1111666).\n\n - carl9170: remove P2P_GO support (bsc#1111666).\n\n - cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip\n (git-fixes).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - ceph: convert mdsc->cap_dirty to a per-session list\n (bsc#1167104).\n\n - ceph: request expedited service on session's last cap\n flush (bsc#1167104).\n\n - cgroup, blkcg: Prepare some symbols for module and\n !CONFIG_CGROUP usages (bsc#1173857).\n\n - char/random: Add a newline at the end of the file\n (jsc#SLE-12423).\n\n - cifs: get rid of unused parameter in\n reconn_setup_dfs_targets() (bsc#1144333).\n\n - cifs: handle hostnames that resolve to same ip in\n failover (bsc#1144333 bsc#1161016).\n\n - cifs: set up next DFS target before generic_ip_connect()\n (bsc#1144333 bsc#1161016).\n\n - clk: bcm2835: Fix return type of bcm2835_register_gate\n (bsc#1051510).\n\n - clk: clk-flexgen: fix clock-critical handling\n (bsc#1051510).\n\n - clk: sunxi: Fix incorrect usage of round_down()\n (bsc#1051510).\n\n - clocksource: dw_apb_timer: Make CPU-affiliation being\n optional (bsc#1111666).\n\n - compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE\n (git fixes (block drivers)).\n\n - compat_ioctl: block: handle Persistent Reservations (git\n fixes (block drivers)).\n\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH\n References: bsc#1174549\n\n - copy_(to,from)_user(): consolidate object size checks\n (git fixes).\n\n - crypto: algboss - do not wait during notifier callback\n (bsc#1111666).\n\n - crypto: algif_skcipher - Cap recv SG list at ctx->used\n (bsc#1111666).\n\n - crypto: caam - update xts sector size for large input\n length (bsc#1111666).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()'\n when ndevlist is fully iterated (bsc#1111666).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()'\n when ndevlist is fully iterated (git-fixes).\n\n - crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n\n - crypto: chelsio/chtls: properly set tp->lsndtime\n (bsc#1111666).\n\n - crypto: rockchip - fix scatterlist nents error\n (git-fixes).\n\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON()\n (git-fixes).\n\n - crypto: talitos - check AES key size (git-fixes).\n\n - crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK\n (git-fixes).\n\n - crypto: talitos - fix IPsec cipher in length\n (git-fixes).\n\n - crypto: talitos - reorder code in talitos_edesc_alloc()\n (git-fixes).\n\n - crypto: virtio: Fix src/dst scatterlist calculation in\n __virtio_crypto_skcipher_do_req() (git-fixes).\n\n - debugfs: Check module state before warning in\n (full/open)_proxy_open() (bsc#1173746).\n\n - devinet: fix memleak in inetdev_init()\n (networking-stable-20_06_07).\n\n - /dev/mem: Add missing memory barriers for devmem_inode\n (git-fixes).\n\n - /dev/mem: Revoke mappings when a driver claims the\n region (git-fixes).\n\n - dlm: remove BUG() before panic() (bsc#1174844).\n\n - dmaengine: tegra210-adma: Fix an error handling path in\n 'tegra_adma_probe()' (bsc#1111666).\n\n - dm btree: increase rebalance threshold in __rebalance2()\n (git fixes (block drivers)).\n\n - dm cache: fix a crash due to incorrect work item\n cancelling (git fixes (block drivers)).\n\n - dm crypt: fix benbi IV constructor crash if used in\n authenticated mode (git fixes (block drivers)).\n\n - dm: fix potential for q->make_request_fn NULL pointer\n (git fixes (block drivers)).\n\n - dm space map common: fix to ensure new block isn't\n already in use (git fixes (block drivers)).\n\n - dm: various cleanups to md->queue initialization code\n (git fixes).\n\n - dm verity fec: fix hash block number in\n verity_fec_decode (git fixes (block drivers)).\n\n - dm verity fec: fix memory leak in verity_fec_dtr (git\n fixes (block drivers)).\n\n - dpaa_eth: fix usage as DSA master, try 3\n (networking-stable-20_05_27).\n\n - driver-core, libnvdimm: Let device subsystems add local\n lockdep coverage (bsc#1171753)\n\n - Drivers: hv: Change flag to write log level in panic msg\n to false (bsc#1170617, bsc#1170618).\n\n - drivers: soc: ti: knav_qmss_queue: Make\n knav_gp_range_ops static (bsc#1051510).\n\n - drm: amd/display: fix Kconfig help text (bsc#1113956)\n 	* only fix DEBUG_KERNEL_DC\n\n - drm: bridge: adv7511: Extend list of audio sample rates\n (bsc#1111666).\n\n - drm/dp_mst: Increase ACT retry timeout to 3s\n (bsc#1113956) * context changes\n\n - drm: encoder_slave: fix refcouting error for modules\n (bsc#1111666).\n\n - drm: encoder_slave: fix refcouting error for modules\n (bsc#1114279)\n\n - drm/i915/icl+: Fix hotplug interrupt disabling after\n storm detection (bsc#1112178)\n\n - drm/i915: Whitelist context-local timestamp in the gen9\n cmdparser (bsc#1111666).\n\n - drm/mediatek: Check plane visibility in atomic_update\n (bsc#1113956) * context changes\n\n - drm/msm/dpu: fix error return code in dpu_encoder_init\n (bsc#1111666).\n\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA\n panel (bsc#1111666).\n\n - drm: panel-orientation-quirks: Use generic\n orientation-data for Acer S1003 (bsc#1111666).\n\n - drm/qxl: Use correct notify port address when creating\n cursor ring (bsc#1113956)\n\n - drm/radeon: fix double free (bsc#1113956)\n\n - drm/radeon: fix fb_div check in ni_init_smc_spll_table()\n (bsc#1113956)\n\n - drm/sun4i: hdmi ddc clk: Fix size of m divider\n (bsc#1111666).\n\n - drm/tegra: hub: Do not enable orphaned window group\n (bsc#1111666).\n\n - drm/vkms: Hold gem object while still in-use\n (bsc#1113956) * context changes\n\n - e1000: Distribute switch variables for initialization\n (bsc#1111666).\n\n - e1000e: Disable TSO for buffer overrun workaround\n (bsc#1051510).\n\n - e1000e: Do not wake up the system via WOL if device\n wakeup is disabled (bsc#1051510).\n\n - e1000e: Relax condition to trigger reset for ME\n workaround (bsc#1111666).\n\n - EDAC/amd64: Read back the scrub rate PCI register on\n F15h (bsc#1114279).\n\n - efi/memreserve: deal with memreserve entries in unmapped\n memory (bsc#1174685).\n\n - efi/random: Increase size of firmware supplied\n randomness (jsc#SLE-12423).\n\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader\n randomness (jsc#SLE-12423).\n\n - efi: READ_ONCE rng seed size before munmap\n (jsc#SLE-12423).\n\n - efi: Reorder pr_notice() with add_device_randomness()\n call (jsc#SLE-12423).\n\n - evm: Check also if *tfm is an error pointer in\n init_desc() (bsc#1051510).\n\n - evm: Fix a small race in init_desc() (bsc#1051510).\n\n - ext4: fix a data race at inode->i_blocks (bsc#1171835).\n\n - ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed\n eh_max (bsc#1174840).\n\n - ext4: fix partial cluster initialization when splitting\n extent (bsc#1173839).\n\n - ext4: fix race between ext4_sync_parent() and rename()\n (bsc#1173838).\n\n - ext4, jbd2: ensure panic by fix a race between jbd2\n abort and ext4 error handlers (bsc#1173833).\n\n - extcon: adc-jack: Fix an error handling path in\n 'adc_jack_probe()' (bsc#1051510).\n\n - fanotify: fix ignore mask logic for events on child and\n on dir (bsc#1172719).\n\n - fat: do not allow to mount if the FAT length == 0\n (bsc#1174845).\n\n - fdt: add support for rng-seed (jsc#SLE-12423).\n\n - fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n\n - firmware: imx: scu: Fix corruption of header\n (git-fixes).\n\n - firmware: imx: scu: Fix possible memory leak in\n imx_scu_probe() (bsc#1111666).\n\n - fix multiplication overflow in copy_fdtable()\n (bsc#1173825).\n\n - Fix Patch-mainline tag in the previous zram fix patch\n\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n\n - fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks\n (networking-stable-20_05_12).\n\n - gpiolib: Document that GPIO line names are not globally\n unique (bsc#1051510).\n\n - gpu: host1x: Detach driver on unregister (bsc#1111666).\n\n - gpu: ipu-v3: pre: do not trigger update if buffer\n address does not change (bsc#1111666).\n\n - HID: hiddev: fix mess in hiddev_open() (git-fixes).\n\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n\n - HID: sony: Fix for broken buttons on DS3 USB dongles\n (bsc#1051510).\n\n - HISI LPC: Re-Add ACPI child enumeration support\n (bsc#1174658).\n\n - HISI LPC: Stop using MFD APIs (bsc#1174658).\n\n - hv_netvsc: Fix netvsc_start_xmit's return type\n (git-fixes).\n\n - hwmon: (acpi_power_meter) Fix potential memory leak in\n acpi_power_meter_add() (bsc#1111666).\n\n - hwmon: (emc2103) fix unable to change fan pwm1_enable\n attribute (bsc#1111666).\n\n - hwmon: (max6697) Make sure the OVERT mask is set\n correctly (bsc#1111666).\n\n - i2c: algo-pca: Add 0x78 as SCL stuck low status for\n PCA9665 (bsc#1111666).\n\n - i2c: eg20t: Load module automatically if ID matches\n (bsc#1111666).\n\n - i2c: mlxcpld: check correct size of maximum RECV_LEN\n packet (bsc#1111666).\n\n - i40e: reduce stack usage in i40e_set_fc (git-fixes).\n\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut\n down (bsc#1174409).\n\n - IB/hfi1: Do not destroy link_wq when the device is shut\n down (bsc#1174409).\n\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED\n (bsc#1173280 ltc#185369).\n\n - ibmvnic: Flush existing work items before device removal\n (bsc#1065729).\n\n - ibmvnic: Harden device login requests (bsc#1170011\n ltc#183538).\n\n - iio: buffer: Do not allow buffers without any channels\n enabled to be activated (bsc#1051510).\n\n - iio:health:afe4404 Fix timestamp alignment and prevent\n data leak (bsc#1111666).\n\n - iio:humidity:hdc100x Fix alignment and data leak issues\n (bsc#1111666).\n\n - iio:magnetometer:ak8974: Fix alignment and data leak\n issues (bsc#1111666).\n\n - iio: mma8452: Add missed iio_device_unregister() call in\n mma8452_probe() (bsc#1111666).\n\n - iio: pressure: bmp280: Tolerate IRQ before registering\n (bsc#1051510).\n\n - iio:pressure:ms5611 Fix buffer element alignment\n (bsc#1111666).\n\n - iio: pressure: zpa2326: handle pm_runtime_get_sync\n failure (bsc#1111666).\n\n - ima: Directly assign the ima_default_policy pointer to\n ima_rules (bsc#1051510).\n\n - ima: Fix ima digest hash table key calculation\n (bsc#1051510).\n\n - include/asm-generic/topology.h: guard cpumask_of_node()\n macro argument (bsc#1148868).\n\n - input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux\n list (bsc#1111666).\n\n - input: i8042 - Remove special PowerPC handling\n (git-fixes).\n\n - input: synaptics - add a second working PNP_ID for\n Lenovo T470s (bsc#1111666).\n\n - intel_idle: Graceful probe failure when MWAIT is\n disabled (bsc#1174115).\n\n - intel_th: Fix a NULL dereference when hub driver is not\n loaded (bsc#1111666).\n\n - io-mapping: indicate mapping failure (git-fixes).\n\n - ipvlan: call dev_change_flags when ipvlan mode is reset\n (git-fixes).\n\n - ixgbevf: Remove limit of 10 entries for unicast filter\n list (git-fixes).\n\n - jbd2: avoid leaking transaction credits when unreserving\n handle (bsc#1173845).\n\n - jbd2: Preserve kABI when adding j_abort_mutex\n (bsc#1173833).\n\n - kabi: hv: prevent struct device_node to become defined\n (bsc#1172871).\n\n - kabi: ppc64le: prevent struct dma_map_ops to become\n defined (jsc#SLE-12423).\n\n - kABI: protect struct mlx5_cmd_work_ent (kabi).\n\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip\n (kabi).\n\n - kernfs: fix barrier usage in __kernfs_new_node()\n (bsc#1111666).\n\n - kvm: nVMX: Do not reread VMCS-agnostic state when\n switching VMCS (bsc#1114279).\n\n - kvm: nVMX: Skip IBPB when switching between vmcs01 and\n vmcs02 (bsc#1114279).\n\n - kvm: x86: Fix APIC page invalidation race (bsc#1174122).\n\n - kvm: x86: Fix L1TF mitigation for shadow MMU\n (bsc#1171904).\n\n - kvm: x86/mmu: Set mmio_value to '0' if reserved #PF\n can't be generated (bsc#1171904).\n\n - kvm: x86: only do L1TF workaround on affected processors\n (bsc#1171904).\n\n - l2tp: add sk_family checks to l2tp_validate_socket\n (networking-stable-20_06_07).\n\n - l2tp: do not use inet_hash()/inet_unhash()\n (networking-stable-20_06_07).\n\n - libceph: do not omit recovery_deletes in target_copy()\n (bsc#1174113).\n\n - libceph: ignore pool overlay and cache logic on\n redirects (bsc#1173146).\n\n - lib: logic_pio: Add logic_pio_unregister_range()\n (bsc#1174658).\n\n - lib: logic_pio: Avoid possible overlap for unregistering\n regions (bsc#1174658).\n\n - lib: logic_pio: Fix RCU usage (bsc#1174658).\n\n - libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA\n deadlock (bsc#1171753).\n\n - libnvdimm/bus: Prepare the nd_ioctl() path to be\n re-entrant (bsc#1171753).\n\n - libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over\n __nd_ioctl() (bsc#1171753).\n\n - libnvdimm: cover up changes in struct nvdimm_bus\n (bsc#1171753).\n\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n\n - libnvdimm/dax: Pick the right alignment default when\n creating dax devices (bsc#1171759).\n\n - libnvdimm/label: Remove the dpa align check\n (bsc#1171759).\n\n - libnvdimm/of_pmem: Provide a unique name for bus\n provider (bsc#1171739).\n\n - libnvdimm/pfn_dev: Add a build check to make sure we\n notice when struct page size change (bsc#1171743).\n\n - libnvdimm/pfn_dev: Add page size and struct page size to\n pfn superblock (bsc#1171759).\n\n - libnvdimm/pfn: Prevent raw mode fallback if\n pfn-infoblock valid (bsc#1171743).\n\n - libnvdimm/pmem: Advance namespace seed for specific\n probe errors (bsc#1171743).\n\n - libnvdimm/region: Initialize bad block for volatile\n namespaces (bnc#1151927 5.3.6).\n\n - libnvdimm/region: Rewrite _probe_success() to\n _advance_seeds() (bsc#1171743).\n\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align\n check (bsc#1171759).\n\n - livepatch: Apply vmlinux-specific KLP relocations early\n (bsc#1071995).\n\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n\n - livepatch: Make klp_apply_object_relocs static\n (bsc#1071995).\n\n - livepatch: Prevent module-specific KLP rela sections\n from referencing vmlinux symbols (bsc#1071995).\n\n - livepatch: Remove .klp.arch (bsc#1071995).\n\n - loop: replace kill_bdev with invalidate_bdev\n (bsc#1173820).\n\n - lpfc_debugfs: get rid of pointless access_ok()\n (bsc#1172687 bsc#1171530).\n\n - lpfc: Synchronize NVME transport and lpfc driver\n devloss_tmo (bcs#1173060).\n\n - mac80211: add option for setting control flags\n (bsc#1111666).\n\n - mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for\n nl80211 TX (bsc#1111666).\n\n - mailbox: imx: Disable the clock on\n devm_mbox_controller_register() failure (git-fixes).\n\n - md: Avoid namespace collision with bitmap API (git fixes\n (block drivers)).\n\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n\n - md: use memalloc scope APIs in\n mddev_suspend()/mddev_resume() (bsc#1166985)).\n\n - media: cec: silence shift wrapping warning in\n __cec_s_log_addrs() (git-fixes).\n\n - media: si2157: Better check for running tuner in init\n (bsc#1111666).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered\n workqueue (git-fixes).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw\n workqueue (git-fixes).\n\n - mlxsw: pci: Return error on PCI reset timeout\n (git-fixes).\n\n - mlxsw: spectrum_acl_tcam: Position vchunk in a vregion\n list properly (networking-stable-20_05_12).\n\n - mlxsw: spectrum: Disallow prio-tagged packets when PVID\n is removed (git-fixes).\n\n - mlxsw: spectrum_dpipe: Add missing error path\n (git-fixes).\n\n - mlxsw: spectrum: Prevent force of 56G (git-fixes).\n\n - mlxsw: spectrum_router: Refresh nexthop neighbour when\n it becomes dead (git-fixes).\n\n - mlxsw: spectrum_router: Remove inappropriate usage of\n WARN_ON() (git-fixes).\n\n - mlxsw: spectrum_switchdev: Add MDB entries in prepare\n phase (git-fixes).\n\n - mlxsw: spectrum_switchdev: Do not treat static FDB\n entries as sticky (git-fixes).\n\n - mmc: block: Fix request completion in the CQE timeout\n path (bsc#1111666).\n\n - mmc: block: Fix use-after-free issue for rpmb\n (bsc#1111666).\n\n - mmc: fix compilation of user API (bsc#1051510).\n\n - mmc: sdhci: do not enable card detect interrupt for gpio\n cd type (bsc#1111666).\n\n - mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12\n quirk (bsc#1111666).\n\n - Move kabi patch into the right place\n\n - Move upstreamed lpfc patches into sorted section\n\n - mvpp2: remove misleading comment (git-fixes).\n\n - net: be more gentle about silly gso requests coming from\n user (networking-stable-20_06_07).\n\n - net: check untrusted gso_size at kernel entry\n (networking-stable-20_06_07).\n\n - net/cxgb4: Check the return from t4_query_params\n properly (git-fixes).\n\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n\n - net: dsa: loop: Add module soft dependency\n (networking-stable-20_05_16).\n\n - net: dsa: mt7530: fix roaming from DSA user ports\n (networking-stable-20_05_27).\n\n - net: ena: add intr_moder_rx_interval to struct\n ena_com_dev and use it (git-fixes).\n\n - net: ena: add missing ethtool TX timestamping indication\n (git-fixes).\n\n - net: ena: avoid memory access violation by validating\n req_id properly (git-fixes).\n\n - net: ena: do not wake up tx queue when down (git-fixes).\n\n - net: ena: ena-com.c: prevent NULL pointer dereference\n (git-fixes).\n\n - net: ena: ethtool: use correct value for crc32 hash\n (git-fixes).\n\n - net: ena: fix continuous keep-alive resets (git-fixes).\n\n - net: ena: fix corruption of dev_idx_to_host_tbl\n (git-fixes).\n\n - net: ena: fix default tx interrupt moderation interval\n (git-fixes).\n\n - net: ena: fix incorrect default RSS key (git-fixes).\n\n - net: ena: fix incorrectly saving queue numbers when\n setting RSS indirection table (git-fixes).\n\n - net: ena: fix issues in setting interrupt moderation\n params in ethtool (git-fixes).\n\n - net: ena: fix potential crash when rxfh key is NULL\n (git-fixes).\n\n - net: ena: fix retrieval of nonadaptive interrupt\n moderation intervals (git-fixes).\n\n - net: ena: fix uses of round_jiffies() (git-fixes).\n\n - net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE\n (git-fixes).\n\n - net: ena: reimplement set/get_coalesce() (git-fixes).\n\n - net: ena: rss: do not allocate key when not supported\n (git-fixes).\n\n - net: ena: rss: fix failure to get indirection table\n (git-fixes).\n\n - net: ena: rss: store hash function as values and not\n bits (git-fixes).\n\n - netfilter: connlabels: prefer static lock initialiser\n (git-fixes).\n\n - netfilter: ctnetlink: netns exit must wait for callbacks\n (bsc#1169795).\n\n - netfilter: not mark a spinlock as __read_mostly\n (git-fixes).\n\n - net: fix a potential recursive NETDEV_FEAT_CHANGE\n (networking-stable-20_05_16).\n\n - net: hns3: add autoneg and change speed support for\n fibre port (bsc#1174070).\n\n - net: hns3: add support for FEC encoding control\n (bsc#1174070).\n\n - net: hns3: add support for multiple media type\n (bsc#1174070).\n\n - net: hns3: fix a not link up issue when fibre port\n supports autoneg (bsc#1174070).\n\n - net: hns3: fix for FEC configuration (bsc#1174070).\n\n - net: hns3: fix port capbility updating issue\n (bsc#1174070).\n\n - net: hns3: fix port setting handle for fibre port\n (bsc#1174070).\n\n - net: hns3: fix selftest fail issue for fibre port with\n autoneg on (bsc#1174070).\n\n - net: hns3: restore the MAC autoneg state after reset\n (bsc#1174070).\n\n - net: inet_csk: Fix so_reuseport bind-address cache in\n tb->fast* (networking-stable-20_05_27).\n\n - net: ipip: fix wrong address family in init error path\n (networking-stable-20_05_27).\n\n - net: ipvlan: Fix ipvlan device tso disabled while\n NETIF_F_IP_CSUM is set (git-fixes).\n\n - net: macsec: preserve ingress frame ordering\n (networking-stable-20_05_12).\n\n - net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n\n - net/mlx4_core: fix a memory leak bug (git-fixes).\n\n - net/mlx4_core: Fix use of ENOSPC around\n mlx4_counter_alloc() (networking-stable-20_05_12).\n\n - net/mlx5: Add command entry handling completion\n (networking-stable-20_05_27).\n\n - net/mlx5: Avoid panic when setting vport rate\n (git-fixes).\n\n - net/mlx5: Continue driver initialization despite debugfs\n failure (git-fixes).\n\n - net/mlx5e: ethtool, Fix a typo in WOL function names\n (git-fixes).\n\n - net/mlx5e: Fix traffic duplication in ethtool steering\n (git-fixes).\n\n - net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n\n - net/mlx5e: Update netdev txq on completions during\n closure (networking-stable-20_05_27).\n\n - net/mlx5: Fix command entry leak in Internal Error State\n (networking-stable-20_05_12).\n\n - net/mlx5: Fix crash upon suspend/resume\n (networking-stable-20_06_07).\n\n - net/mlx5: Fix forced completion access non initialized\n command entry (networking-stable-20_05_12).\n\n - net: mvmdio: allow up to four clocks to be specified for\n orion-mdio (git-fixes).\n\n - net: mvpp2: prs: Do not override the sign bit in SRAM\n parser shift (git-fixes).\n\n - net: phy: fix aneg restart in phy_ethtool_set_eee\n (networking-stable-20_05_16).\n\n - netprio_cgroup: Fix unlimited memory leak of v2 cgroups\n (networking-stable-20_05_16).\n\n - net: qede: stop adding events on an already destroyed\n workqueue (git-fixes).\n\n - net: qed: fix excessive QM ILT lines consumption\n (git-fixes).\n\n - net: qed: fix NVMe login fails over VFs (git-fixes).\n\n - net: qrtr: Fix passing invalid reference to\n qrtr_local_enqueue() (networking-stable-20_05_27).\n\n - net: revert 'net: get rid of an signed integer overflow\n in ip_idents_reserve()' (networking-stable-20_05_27).\n\n - net sched: fix reporting the first-time use timestamp\n (networking-stable-20_05_27).\n\n - net: stricter validation of untrusted gso packets\n (networking-stable-20_05_12).\n\n - net/tls: Fix sk_psock refcnt leak in\n bpf_exec_tx_verdict() (networking-stable-20_05_12).\n\n - net/tls: Fix sk_psock refcnt leak when in\n tls_data_ready() (networking-stable-20_05_12).\n\n - net: usb: qmi_wwan: add support for DW5816e\n (networking-stable-20_05_12).\n\n - net: usb: qmi_wwan: add Telit 0x1050 composition\n (networking-stable-20_06_07).\n\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition\n (networking-stable-20_06_07).\n\n - net: vmxnet3: fix possible buffer overflow caused by bad\n DMA value in vmxnet3_get_rss() (bsc#1172484).\n\n - nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K\n (git-fixes).\n\n - NFS: Fix an RCU lock leak in\n nfs4_refresh_delegation_stateid() (bsc#1170592).\n\n - NFSv4: Retry CLOSE and DELEGRETURN on\n NFS4ERR_OLD_STATEID (bsc#1170592).\n\n - nilfs2: fix NULL pointer dereference at\n nilfs_segctor_do_construct() (bsc#1173857).\n\n - nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type\n (bsc#1111666).\n\n - nvdimm: Avoid race between probe and reading device\n attributes (bsc#1170442).\n\n - nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids()\n (bcs#1171558 bsc#1159058).\n\n - nvme: do not update multipath disk information if the\n controller is down (bcs#1171558 bsc#1159058).\n\n - nvme: fail cancelled commands with\n NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n\n - nvme-fc: Fail transport errors with NVME_SC_HOST_PATH\n (bsc#1158983 bsc#1172538).\n\n - nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send\n failed (bsc#1158983 bsc#1172538).\n\n - objtool: Clean instruction state before each function\n validation (bsc#1169514).\n\n - objtool: Ignore empty alternatives (bsc#1169514).\n\n - ocfs2: avoid inode removal while nfsd is accessing it\n (bsc#1172963).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - ocfs2: no need try to truncate file beyond i_size\n (bsc#1171841).\n\n - overflow: Fix -Wtype-limits compilation warnings (git\n fixes).\n\n - overflow.h: Add arithmetic shift helper (git fixes).\n\n - p54usb: add AirVasT USB stick device-id (bsc#1051510).\n\n - padata: ensure the reorder timer callback runs on the\n correct CPU (git-fixes).\n\n - padata: reorder work kABI fixup (git-fixes).\n\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER\n ownership (bsc#1174356).\n\n - PCI/AER: Use only _OSC to determine AER ownership\n (bsc#1174356).\n\n - PCI: Allow pci_resize_resource() for devices on root bus\n (bsc#1051510).\n\n - PCI: Fix pci_register_host_bridge() device_register()\n error handling (bsc#1051510).\n\n - PCI: Fix 'try' semantics of bus and slot reset\n (git-fixes).\n\n - PCI: Generalize multi-function power dependency device\n links (bsc#1111666).\n\n - PCI: hv: Change pci_protocol_version to per-hbus\n (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Fix the PCI HyperV probe failure path to\n release resource properly (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Introduce hv_msi_entry (bsc#1172871,\n bsc#1172872).\n\n - PCI: hv: Move hypercall related definitions into tlfs\n header (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Move retarget related structures into tlfs\n header (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Reorganize the code in preparation of\n hibernation (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Retry PCI bus D0 entry on invalid device state\n (bsc#1172871, bsc#1172872).\n\n - PCI: pciehp: Fix indefinite wait on sysfs requests\n (git-fixes).\n\n - PCI: pciehp: Support interrupts sent from D3hot\n (git-fixes).\n\n - PCI: Program MPS for RCiEP devices (bsc#1051510).\n\n - PCI/PTM: Inherit Switch Downstream Port PTM settings\n from Upstream Port (bsc#1051510).\n\n - pci: Revive pci_dev __aer_firmware_first* fields for\n kABI (bsc#1174356).\n\n - pcm_native: result of put_user() needs to be checked\n (bsc#1111666).\n\n - perf/x86/amd: Constrain Large Increment per Cycle events\n (git-fixes).\n\n - perf/x86/amd/ibs: Fix reading of the IBS OpData register\n and thus precise RIP validity (git-fixes).\n\n - perf/x86/amd/ibs: Fix sample bias for dispatched\n micro-ops (git-fixes).\n\n - perf/x86/amd/ibs: Handle erratum #420 only on the\n affected CPU family (10h) (git-fixes).\n\n - perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups'\n symbol static (git-fixes).\n\n - perf/x86/amd/uncore: Do not set 'ThreadMask' and\n 'SliceMask' for non-L3 PMCs (git-fixes stable).\n\n - perf/x86/amd/uncore: Set the thread mask for F17h L3\n PMCs (git-fixes).\n\n - perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3\n Cache perf events (git-fixes stable).\n\n - perf/x86: Enable free running PEBS for REGS_USER/INTR\n (git-fixes).\n\n - perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n\n - perf/x86/intel: Add generic branch tracing check to\n intel_pmu_has_bts() (git-fixes).\n\n - perf/x86/intel: Add proper condition to run sched_task\n callbacks (git-fixes).\n\n - perf/x86/intel/bts: Fix the use of page_private()\n (git-fixes).\n\n - perf/x86/intel: Fix PT PMI handling (git-fixes).\n\n - perf/x86/intel: Move branch tracing setup to the\n Intel-specific source file (git-fixes).\n\n - perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n\n - perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on\n SKX (git-fixes).\n\n - perf/x86/intel/uncore: Handle invalid event coding for\n free-running counter (git-fixes).\n\n - perf/x86/uncore: Fix event group support (git-fixes).\n\n - pid: Improve the comment about waiting in\n zap_pid_ns_processes (git fixes)).\n\n - pinctrl: freescale: imx: Fix an error handling path in\n 'imx_pinctrl_probe()' (bsc#1051510).\n\n - pinctrl: imxl: Fix an error handling path in\n 'imx1_pinctrl_core_probe()' (bsc#1051510).\n\n - pinctrl: samsung: Save/restore eint_mask over suspend\n for EINT_TYPE GPIOs (bsc#1051510).\n\n - platform/x86: dell-laptop: do not register micmute LED\n if there is no token (bsc#1111666).\n\n - platform/x86: hp-wmi: Convert simple_strtoul() to\n kstrtou32() (bsc#1111666).\n\n - PM / Domains: Allow genpd users to specify default\n active wakeup behavior (git-fixes).\n\n - pnp: Use list_for_each_entry() instead of open coding\n (git fixes).\n\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR\n (bsc#1065729).\n\n - powerpc/64s: Save FSCR to init_task.thread.fscr after\n feature init (bsc#1065729).\n\n - powerpc/book3s64: Export has_transparent_hugepage()\n related functions (bsc#1171759).\n\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for\n execute disable pkey (bsc#1065729).\n\n - powerpc/fadump: fix race between pstore write and fadump\n crash trigger (bsc#1168959 ltc#185010).\n\n -\n powerpc-mm-Remove-kvm-radix-prefetch-workaround-for-.pat\n ch\n\n - powerpc/xive: Clear the page tables for the ESB IO\n mapping (bsc#1085030).\n\n - powerpc-xmon-don-t-access-ASDR-in-VMs.patch\n\n - powerpc/xmon: Reset RCU and soft lockup watchdogs\n (bsc#1065729).\n\n - power: supply: bq24257_charger: Replace depends on\n REGMAP_I2C with select (bsc#1051510).\n\n - power: supply: lp8788: Fix an error handling path in\n 'lp8788_charger_probe()' (bsc#1051510).\n\n - power: supply: smb347-charger: IRQSTAT_D is volatile\n (bsc#1051510).\n\n - power: vexpress: add suppress_bind_attrs to true\n (bsc#1111666).\n\n - pppoe: only process PADT targeted at local interfaces\n (networking-stable-20_05_16).\n\n - propagate_one(): mnt_set_mountpoint() needs mount_lock\n (bsc#1174841).\n\n - qed: reduce maximum stack frame size (git-fixes).\n\n - qlcnic: fix missing release in\n qlcnic_83xx_interrupt_test (git-fixes).\n\n - r8152: support additional Microsoft Surface Ethernet\n Adapter variant (networking-stable-20_05_27).\n\n - raid5: remove gfp flags from scribble_alloc()\n (bsc#1166985).\n\n - RDMA/efa: Fix setting of wrong bit in get/set_feature\n commands (bsc#1111666)\n\n - RDMA/efa: Set maximum pkeys device attribute\n (bsc#1111666)\n\n - RDMA/efa: Support remote read access in MR registration\n (bsc#1111666)\n\n - RDMA/efa: Unified getters/setters for device structs\n bitmask access (bsc#1111666)\n\n - README.BRANCH: Add Takashi Iwai as primary maintainer.\n\n - regmap: debugfs: Do not sleep while atomic for fast_io\n regmaps (bsc#1111666).\n\n - Revert 'bcache: ignore pending signals when creating gc\n and allocator thread' (git fixes (block drivers)).\n\n - Revert commit e918e570415c ('tpm_tis: Remove the HID\n IFX0102') (bsc#1111666).\n\n - Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt\n workqueues' (git fixes (block drivers)).\n\n - Revert 'ipv6: add mtu lock check in\n __ip6_rt_update_pmtu' (networking-stable-20_05_16).\n\n - Revert pciehp patches that broke booting (bsc#1174887)\n\n - Revert 'thermal: mediatek: fix register index error'\n (bsc#1111666).\n\n - Revert 'tools lib traceevent: Remove unneeded qsort and\n uses memmove'\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink\n fails (git-fixes).\n\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n\n - s390: fix syscall_get_error for compat processes\n (git-fixes).\n\n - s390/qdio: consistently restore the IRQ handler\n (git-fixes).\n\n - s390/qdio: lock device while installing IRQ handler\n (git-fixes).\n\n - s390/qdio: put thinint indicator after early error\n (git-fixes).\n\n - s390/qdio: tear down thinint indicator after early error\n (git-fixes).\n\n - s390/qeth: fix error handling for isolation mode cmds\n (git-fixes).\n\n - sch_choke: avoid potential panic in choke_reset()\n (networking-stable-20_05_12).\n\n - sch_sfq: validate silly quantum values\n (networking-stable-20_05_12).\n\n - scripts/git_sort/git_sort.py: add\n bluetooth/bluetooth-next.git repository\n\n - scsi: aacraid: fix a signedness bug (bsc#1174296).\n\n - scsi: hisi_sas: fix calls to dma_set_mask_and_coherent()\n (bsc#1174296).\n\n - scsi: ibmvscsi: Do not send host info in adapter info\n MAD after LPM (bsc#1172759 ltc#184814).\n\n - scsi: lpfc: Add an internal trace log buffer\n (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Add blk_io_poll support for latency\n improvment (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Add support to display if adapter dumps are\n available (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Allow applications to issue Common Set\n Features mailbox command (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Avoid another null dereference in\n lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n\n - scsi: lpfc: Fix interrupt assignments when multiple\n vectors are supported on same CPU (bsc#1158983).\n\n - scsi: lpfc: Fix kdump hang on PPC (bsc#1172687\n bsc#1171530).\n\n - scsi: lpfc: Fix language in 0373 message to reflect\n non-error message (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix less-than-zero comparison of unsigned\n value (bsc#1158983).\n\n - scsi: lpfc: Fix missing MDS functionality (bsc#1172687\n bsc#1171530).\n\n - scsi: lpfc: Fix NVMe rport deregister and registration\n during ADISC (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix oops due to overrun when reading SLI3\n data (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix shost refcount mismatch when deleting\n vport (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix stack trace seen while setting rrq\n active (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix unused assignment in\n lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Update lpfc version to 12.8.0.2\n (bsc#1158983).\n\n - scsi: megaraid_sas: Fix a compilation warning\n (bsc#1174296).\n\n - scsi: mpt3sas: Fix double free in attach error handling\n (bsc#1174296).\n\n - scsi: qedf: Add port_id getter (bsc#1150660).\n\n - scsi: qla2xxx: Fix a condition in\n qla2x00_find_all_fabric_devs() (bsc#1174296).\n\n - scsi: qla2xxx: Set NVMe status code for failed NVMe FCP\n request (bsc#1158983).\n\n - sctp: Do not add the shutdown timer if its already been\n added (networking-stable-20_05_27).\n\n - sctp: Start shutdown on association restart if in\n SHUTDOWN-SENT state and socket is closed\n (networking-stable-20_05_27).\n\n - spi: dw: use 'smp_mb()' to avoid sending spi data error\n (bsc#1051510).\n\n - spi: fix initial SPI_SR value in spi-fsl-dspi\n (bsc#1111666).\n\n - spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n\n - spi: spidev: fix a race between spidev_release and\n spidev_remove (bsc#1111666).\n\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable\n devices (bsc#1111666).\n\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of\n clock rate (bsc#1111666).\n\n - staging: comedi: verify array index is correct before\n using it (bsc#1111666).\n\n - staging: rtl8712: Fix\n IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n\n - staging: sm750fb: add missing case while setting\n FB_VISUAL (bsc#1051510).\n\n - SUNRPC: The TCP back channel mustn't disappear while\n requests are outstanding (bsc#1152624).\n\n - tg3: driver sleeps indefinitely when EEH errors exceed\n eeh_max_freezes (bsc#1173284).\n\n - timers: Add a function to start/reduce a timer\n (networking-stable-20_05_27).\n\n - tpm_tis: extra chip->ops check on error path in\n tpm_tis_core_init (bsc#1111666).\n\n - tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n\n - tracing: Fix event trigger to accept redundant spaces\n (git-fixes).\n\n - tty: hvc_console, fix crashes on parallel open/close\n (git-fixes).\n\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick\n (bsc#1051510).\n\n - tty: n_gsm: Fix SOF skipping (bsc#1051510).\n\n - tty: n_gsm: Fix waking up upper tty layer when room\n available (bsc#1051510).\n\n - tunnel: Propagate ECT(1) when decapsulating as\n recommended by RFC6040 (networking-stable-20_05_12).\n\n - ubifs: remove broken lazytime support (bsc#1173826).\n\n - usb: add USB_QUIRK_DELAY_INIT for Logitech C922\n (git-fixes).\n\n - usb: c67x00: fix use after free in c67x00_giveback_urb\n (bsc#1111666).\n\n - usb: chipidea: core: add wakeup support for extcon\n (bsc#1111666).\n\n - usb: dwc2: Fix shutdown callback in platform\n (bsc#1111666).\n\n - usb: dwc2: gadget: move gadget resume after the core is\n in L0 state (bsc#1051510).\n\n - usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n\n - usb: dwc3: gadget: never call ->complete() from\n ->ep_queue() (git-fixes).\n\n - usb: dwc3: gadget: Properly handle ClearFeature(halt)\n (git-fixes).\n\n - usb: dwc3: gadget: Properly handle failed kick_transfer\n (git-fixes).\n\n - usb: ehci: reopen solution for Synopsys HC bug\n (git-fixes).\n\n - usb: gadget: fix potential double-free in m66592_probe\n (bsc#1111666).\n\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer\n before null check (bsc#1051510).\n\n - usb: gadget: udc: atmel: fix uninitialized read in debug\n printk (bsc#1111666).\n\n - usb: gadget: udc: atmel: remove outdated comment in\n usba_ep_disable() (bsc#1111666).\n\n - usb: gadget: udc: Potential Oops in error handling code\n (bsc#1111666).\n\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL\n check in s3c2410_udc_nuke (bsc#1051510).\n\n - usb: host: ehci-exynos: Fix error check in\n exynos_ehci_probe() (bsc#1111666).\n\n - usb: host: ehci-mxc: Add error handling in\n ehci_mxc_drv_probe() (bsc#1051510).\n\n - usb: musb: Fix runtime PM imbalance on error\n (bsc#1051510).\n\n - usb: musb: start session in resume for host port\n (bsc#1051510).\n\n - usbnet: smsc95xx: Fix use-after-free after removal\n (bsc#1111666).\n\n - usb: ohci-sm501: Add missed iounmap() in remove\n (bsc#1111666).\n\n - usb: serial: ch341: add new Product ID for CH340\n (bsc#1111666).\n\n - usb: serial: cypress_m8: enable Simply Automated UPB PIM\n (bsc#1111666).\n\n - usb: serial: iuu_phoenix: fix memory corruption\n (bsc#1111666).\n\n - usb: serial: option: add GosunCn GM500 series\n (bsc#1111666).\n\n - usb: serial: option: add Quectel EG95 LTE modem\n (bsc#1111666).\n\n - usb: serial: option: add Telit LE910C1-EUX compositions\n (bsc#1051510).\n\n - usb: serial: qcserial: add DW5816e QDL support\n (bsc#1051510).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal\n errors (bsc#1051510).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal\n errors (git-fixes).\n\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking\n (bsc#1174123).\n\n - vfs: Fix EOVERFLOW testing in put_compat_statfs64\n (bnc#1151927 5.3.6).\n\n - virtio-blk: handle block_device_operations callbacks\n after hot unplug (git fixes (block drivers)).\n\n - virtio: virtio_console: add missing\n MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n\n - vmxnet3: add geneve and vxlan tunnel offload support\n (bsc#1172484).\n\n - vmxnet3: add support to get/set rx flow hash\n (bsc#1172484).\n\n - vmxnet3: allow rx flow hash ops only when rss is enabled\n (bsc#1172484).\n\n - vmxnet3: avoid format strint overflow warning\n (bsc#1172484).\n\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n\n - vmxnet3: Remove always false conditional statement\n (bsc#1172484).\n\n - vmxnet3: remove redundant initialization of pointer 'rq'\n (bsc#1172484).\n\n - vmxnet3: remove unused flag 'rxcsum' from struct\n vmxnet3_adapter (bsc#1172484).\n\n - vmxnet3: Replace msleep(1) with usleep_range()\n (bsc#1172484).\n\n - vmxnet3: update to version 4 (bsc#1172484).\n\n - vmxnet3: use correct hdr reference when packet is\n encapsulated (bsc#1172484).\n\n - vsock: fix timeout in vsock_accept()\n (networking-stable-20_06_07).\n\n - vt_compat_ioctl(): clean up, use compat_ptr() properly\n (git-fixes).\n\n - vxlan: Avoid infinite loop when suppressing NS messages\n with invalid options (git-fixes).\n\n - w1: omap-hdq: cleanup to add missing newline for some\n dev_dbg (bsc#1051510).\n\n - watchdog: sp805: fix restart handler (bsc#1111666).\n\n - wil6210: add general initialization/size checks\n (bsc#1111666).\n\n - wil6210: check rx_buff_mgmt before accessing it\n (bsc#1111666).\n\n - wil6210: ignore HALP ICR if already handled\n (bsc#1111666).\n\n - wil6210: make sure Rx ring sizes are correlated\n (git-fixes).\n\n - work around mvfs bug (bsc#1162063).\n\n - x86/apic: Install an empty physflat_init_apic_ldr\n (bsc#1163309).\n\n - x86/cpu/amd: Make erratum #1054 a legacy erratum\n (bsc#1114279).\n\n - x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into\n PEBS_FREERUNNING_FLAGS (git-fixes).\n\n - x86: Fix early boot crash on gcc-10, third try\n (bsc#1114279).\n\n - x86/(mce,mm): Unmap the entire page if the whole page is\n affected and poisoned (bsc#1172257).\n\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk\n (bsc#1114279).\n\n - xfrm: fix error in comment (git fixes).\n\n - xhci: Fix enumeration issue when setting max packet size\n for FS devices (git-fixes).\n\n - xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n\n - vt: vt_ioctl: remove unnecessary console allocation\n checks (git-fixes).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1148868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1150660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1151927\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1161016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1162063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1163309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1166985\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168081\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169194\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170442\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171529\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172537\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172538\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173146\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173820\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174070\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174123\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174685\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174844\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174887\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-docs-html-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-macros-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-qa-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-vanilla-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-syms-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:22:35", "description": "The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n\nCVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\nCVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n\nCVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n\nCVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n\nCVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n\nCVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n\nCVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n\nCVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n\nCVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n\nCVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n\nCVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n\nCVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n\nCVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).\n\nCVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n\nCVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n\nCVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n\nCVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n\nCVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n\nCVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n\nCVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n\nCVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n\nCVE-2019-20806: Fixed a NULL pointer dereference which may had lead to denial of service (bsc#1172199).\n\nCVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n\nCVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\nCVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-08T00:00:00", "type": "nessus", "title": "SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2487-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-1000199", "CVE-2019-19462", "CVE-2019-20806", "CVE-2019-20810", "CVE-2019-20812", "CVE-2019-20908", "CVE-2019-9455", "CVE-2020-0305", "CVE-2020-0543", "CVE-2020-10135", "CVE-2020-10690", "CVE-2020-10711", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-11669", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12656", "CVE-2020-12657", "CVE-2020-12659", "CVE-2020-12769", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2022-05-12T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt", "p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt-debuginfo", "p-cpe:/a:novell:suse_linux:dlm-kmp-rt", "p-cpe:/a:novell:suse_linux:dlm-kmp-rt-debuginfo", "p-cpe:/a:novell:suse_linux:gfs2-kmp-rt", "p-cpe:/a:novell:suse_linux:gfs2-kmp-rt-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt", "p-cpe:/a:novell:suse_linux:kernel-rt-base", "p-cpe:/a:novell:suse_linux:kernel-rt-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt-debugsource", "p-cpe:/a:novell:suse_linux:kernel-rt-devel", "p-cpe:/a:novell:suse_linux:kernel-rt-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-debugsource", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-syms-rt", "p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt", "p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2487-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140378", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2487-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140378);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/12\");\n\n script_cve_id(\n \"CVE-2018-1000199\",\n \"CVE-2019-9455\",\n \"CVE-2019-19462\",\n \"CVE-2019-20806\",\n \"CVE-2019-20810\",\n \"CVE-2019-20812\",\n \"CVE-2019-20908\",\n \"CVE-2020-0305\",\n \"CVE-2020-0543\",\n \"CVE-2020-10135\",\n \"CVE-2020-10690\",\n \"CVE-2020-10711\",\n \"CVE-2020-10720\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-10757\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-10769\",\n \"CVE-2020-10773\",\n \"CVE-2020-10781\",\n \"CVE-2020-11669\",\n \"CVE-2020-12114\",\n \"CVE-2020-12464\",\n \"CVE-2020-12652\",\n \"CVE-2020-12653\",\n \"CVE-2020-12654\",\n \"CVE-2020-12655\",\n \"CVE-2020-12656\",\n \"CVE-2020-12657\",\n \"CVE-2020-12659\",\n \"CVE-2020-12769\",\n \"CVE-2020-12771\",\n \"CVE-2020-12888\",\n \"CVE-2020-13143\",\n \"CVE-2020-13974\",\n \"CVE-2020-14416\",\n \"CVE-2020-15393\",\n \"CVE-2020-15780\"\n );\n\n script_name(english:\"SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2487-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth BR/EDR Core Specification v5.2 and earlier\nmay have allowed an unauthenticated user to complete authentication\nwithout pairing credentials via adjacent access. An unauthenticated,\nadjacent attacker could impersonate a Bluetooth BR/EDR master or slave\nto pair with a previously paired remote device to successfully\ncomplete the authentication procedure without knowing the link key\n(bnc#1171988).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c\nwhere incorrect access permissions for the efivar_ssdt ACPI variable\ncould be used by attackers to bypass lockdown or secure boot\nrestrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-10781: zram sysfs resource consumption was fixed\n(bnc#1173074).\n\nCVE-2020-15780: An issue was discovered in\ndrivers/acpi/acpi_configfs.c where injection of malicious ACPI tables\nvia configfs could be used by attackers to bypass lockdown and secure\nboot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a\nmemory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a\ndeadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in\ncrypto_authenc_extractkeys in crypto/authenc.c in the IPsec\nCryptographic algorithm's module, authenc. When a payload longer than\n4 bytes, and is not following 4-byte alignment boundary guidelines, it\ncauses a buffer over-read threat, leading to a system crash. This flaw\nallowed a local attacker with user privileges to cause a denial of\nservice (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was\nfixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the\nslip and slcan line discipline could lead to a use-after-free, aka\nCID-0ace17d56824. This affects drivers/net/slip/slip.c and\ndrivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local\naccount to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction\nBarrier was disabled in certain circumstances, leaving the system open\nto a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where\nindirect branch speculation could be enabled even though it was\ndiabled before (bnc#1172783).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c,\nif k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-0543: Fixed a side channel attack against special registers\nwhich could have resulted in leaking of read values to cores other\nthan the one which called it. This attack is known as Special Register\nBuffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\nCVE-2020-13143: Fixed an out-of-bounds read in\ngadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c\n(bsc#1171982).\n\nCVE-2020-12769: Fixed an issue which could have allowed attackers to\ncause a panic via concurrent calls to dw_spi_irq and\ndw_spi_transfer_one (bsc#1171983).\n\nCVE-2020-12659: Fixed an out-of-bounds write (by a user with the\nCAP_NET_ADMIN capability) due to improper headroom validation\n(bsc#1171214).\n\nCVE-2020-12657: An a use-after-free in block/bfq-iosched.c\n(bsc#1171205).\n\nCVE-2020-12656: Fixed an improper handling of certain domain_release\ncalls leadingch could have led to a memory leak (bsc#1171219).\n\nCVE-2020-12655: Fixed an issue which could have allowed attackers to\ntrigger a sync of excessive duration via an XFS v5 image with crafted\nmetadata (bsc#1171217).\n\nCVE-2020-12654: Fixed an issue in he wifi driver which could have\nallowed a remote AP to trigger a heap-based buffer overflow\n(bsc#1171202).\n\nCVE-2020-12653: Fixed an issue in the wifi driver which could have\nallowed local users to gain privileges or cause a denial of service\n(bsc#1171195).\n\nCVE-2020-12652: Fixed an issue which could have allowed local users to\nhold an incorrect lock during the ioctl operation and trigger a race\ncondition (bsc#1171218).\n\nCVE-2020-12464: Fixed a use-after-free due to a transfer without a\nreference (bsc#1170901).\n\nCVE-2020-12114: Fixed a pivot_root race condition which could have\nallowed local users to cause a denial of service (panic) by corrupting\na mountpoint reference counter (bsc#1171098).\n\nCVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S\ndid not have save/restore functionality for PNV_POWERSAVE_AMR,\nPNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).\n\nCVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon\nmmap could have caused user PTE access (bsc#1172317).\n\nCVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\nwhere it was assumed that an skb would only contain a single netlink\nmessage (bsc#1171189).\n\nCVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\nuninitialized data (bsc#1171220).\n\nCVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n(bsc#1170778).\n\nCVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem\nwhich could have allowed a remote network user to crash the kernel\nresulting in a denial of service (bsc#1171191).\n\nCVE-2020-10690: Fixed the race between the release of ptp_clock and\ncdev (bsc#1170056).\n\nCVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\nvideo driver. This could lead to local information disclosure with\nSystem execution privileges needed (bsc#1170345).\n\nCVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which\ncould have resulted in a denial of service (bsc#1172453).\n\nCVE-2019-20806: Fixed a NULL pointer dereference which may had lead to\ndenial of service (bsc#1172199).\n\nCVE-2019-19462: Fixed an issue which could have allowed local user to\ncause denial of service (bsc#1158265).\n\nCVE-2019-20810: go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a\nfailure path, which caused a memory leak, aka CID-9453264ef586\n(bnc#1172458).\n\nCVE-2018-1000199: Fixed a potential local code execution via ptrace\n(bsc#1089895).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1082555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083647\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1089895\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1090036\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103990\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103991\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103992\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104745\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109837\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124278\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127354\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127355\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127371\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137325\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1142685\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1145929\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1150660\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151794\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151927\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152489\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152624\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154824\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1157169\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158265\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159037\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159058\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159199\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160388\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160947\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1161016\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162063\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163309\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163403\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163897\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164871\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165183\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165478\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165741\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166860\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166861\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166862\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166864\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166866\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166867\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166870\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166940\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166969\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166978\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166985\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167104\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167288\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167574\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167851\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167867\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168081\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168202\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168332\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168486\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168670\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168760\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168762\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168763\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168764\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168765\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168789\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168881\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168884\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168952\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168959\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169020\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169057\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169194\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169390\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169525\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169762\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169771\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169795\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170056\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170125\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170145\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170345\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170442\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170457\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170522\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170592\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170620\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170621\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170770\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170778\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170791\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170901\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171078\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171098\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171118\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171124\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171195\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171202\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171205\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171214\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171217\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171218\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171244\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171417\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171424\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171527\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171529\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171530\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171599\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171601\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171602\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171604\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171605\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171606\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171607\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171608\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171609\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171610\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171611\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171612\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171613\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171614\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171615\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171618\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171619\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171620\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171621\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171622\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171623\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171624\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171626\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171662\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171679\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171691\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171692\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171694\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171695\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171736\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171743\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171753\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171759\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171817\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171835\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171841\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171904\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171948\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171949\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171951\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171952\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171979\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171982\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172096\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172097\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172098\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172099\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172101\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172102\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172103\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172104\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172127\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172130\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172185\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172188\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172199\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172201\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172202\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172221\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172249\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172251\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172257\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172317\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172342\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172366\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172378\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172391\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172397\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172453\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172537\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172538\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172687\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172719\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172759\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173074\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173146\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173265\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173567\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173746\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173818\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173820\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173825\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173826\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173833\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173838\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173839\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173845\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173857\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174113\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174122\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174123\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174186\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174187\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174296\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174356\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174409\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174438\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-1000199/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19462/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20806/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20810/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20812/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20908/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-9455/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-0305/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-0543/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10135/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10690/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10711/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10720/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10732/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10751/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10757/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10766/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10767/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10768/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10769/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10773/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10781/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-11669/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12114/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12464/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12652/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12653/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12654/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12655/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12656/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12657/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12659/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12769/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12771/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12888/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13143/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13974/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-14416/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-15393/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-15780/\");\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202487-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7934daea\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Realtime 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-RT-15-SP1-2020-2487=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-13974\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:dlm-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:dlm-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gfs2-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gfs2-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cluster-md-kmp-rt-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cluster-md-kmp-rt-debuginfo-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"dlm-kmp-rt-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"dlm-kmp-rt-debuginfo-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"gfs2-kmp-rt-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"gfs2-kmp-rt-debuginfo-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-base-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-base-debuginfo-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-debuginfo-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-debugsource-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-devel-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-devel-debuginfo-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt_debug-debuginfo-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt_debug-debugsource-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt_debug-devel-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt_debug-devel-debuginfo-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-syms-rt-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"ocfs2-kmp-rt-4.12.14-14.28.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"ocfs2-kmp-rt-debuginfo-4.12.14-14.28.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-12-01T15:15:24", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - A flaw was found in the Linux kernel's implementation of GRO. This flaw allows an attacker with local access to crash the system.(CVE-2020-10720)\n\n - A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.(CVE-2020-10711)\n\n - A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2.\n Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.(CVE-2020-12826)\n\n - An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.(CVE-2020-12769)\n\n - An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.(CVE-2020-12770)\n\n - An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.(CVE-2020-12771)\n\n - The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a 'double fetch' vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states 'The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.'(CVE-2020-12652)\n\n - An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.(CVE-2020-12655)\n\n - A pivot_root race condition in fs amespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.(CVE-2020-12114)\n\n - An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.(CVE-2020-12657)\n\n - usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.(CVE-2020-12464)\n\n - An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers et/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.(CVE-2020-12653)\n\n - gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak.(CVE-2020-12656)\n\n - An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.(CVE-2020-12659)\n\n - An array overflow was discovered in mt76_add_fragment in drivers et/wireless/mediatek/mt76/dma.c in the Linux kernel before 5.5.10, aka CID-b102f0c522cf. An oversized packet with too many rx fragments can corrupt memory of adjacent pages.(CVE-2020-12465)\n\n - An issue was found in Linux kernel before 5.5.4.\n mwifiex_ret_wmm_get_status() in drivers et/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.(CVE-2020-12654)\n\n - In the Linux kernel through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade, aka CID-3f777e19d171. A crash could also occur.(CVE-2020-11884)\n\n - relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.(CVE-2019-19462)\n\n - In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.(CVE-2019-19377)\n\n - In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost et.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.(CVE-2020-10942)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-05-26T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP8 : kernel (EulerOS-SA-2020-1592)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19377", "CVE-2019-19462", "CVE-2020-10711", "CVE-2020-10720", "CVE-2020-10942", "CVE-2020-11884", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12465", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12656", "CVE-2020-12657", "CVE-2020-12659", "CVE-2020-12769", "CVE-2020-12770", "CVE-2020-12771", "CVE-2020-12826"], "modified": "2022-05-13T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:bpftool", "p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-source", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "p-cpe:/a:huawei:euleros:python3-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2020-1592.NASL", "href": "https://www.tenable.com/plugins/nessus/136870", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(136870);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/13\");\n\n script_cve_id(\n \"CVE-2019-19377\",\n \"CVE-2019-19462\",\n \"CVE-2020-10711\",\n \"CVE-2020-10720\",\n \"CVE-2020-10942\",\n \"CVE-2020-11884\",\n \"CVE-2020-12114\",\n \"CVE-2020-12464\",\n \"CVE-2020-12465\",\n \"CVE-2020-12652\",\n \"CVE-2020-12653\",\n \"CVE-2020-12654\",\n \"CVE-2020-12655\",\n \"CVE-2020-12656\",\n \"CVE-2020-12657\",\n \"CVE-2020-12659\",\n \"CVE-2020-12769\",\n \"CVE-2020-12770\",\n \"CVE-2020-12771\",\n \"CVE-2020-12826\"\n );\n\n script_name(english:\"EulerOS 2.0 SP8 : kernel (EulerOS-SA-2020-1592)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - A flaw was found in the Linux kernel's implementation\n of GRO. This flaw allows an attacker with local access\n to crash the system.(CVE-2020-10720)\n\n - A NULL pointer dereference flaw was found in the Linux\n kernel's SELinux subsystem. This flaw occurs while\n importing the Commercial IP Security Option (CIPSO)\n protocol's category bitmap into the SELinux extensible\n bitmap via the' ebitmap_netlbl_import' routine. While\n processing the CIPSO restricted bitmap tag in the\n 'cipso_v4_parsetag_rbm' routine, it sets the security\n attribute to indicate that the category bitmap is\n present, even if it has not been allocated. This issue\n leads to a NULL pointer dereference issue while\n importing the same category bitmap into SELinux. This\n flaw allows a remote network user to crash the system\n kernel, resulting in a denial of\n service.(CVE-2020-10711)\n\n - A signal access-control issue was discovered in the\n Linux kernel before 5.6.5, aka CID-7395ea4e65c2.\n Because exec_id in include/linux/sched.h is only 32\n bits, an integer overflow can interfere with a\n do_notify_parent protection mechanism. A child process\n can send an arbitrary signal to a parent process in a\n different security domain. Exploitation limitations\n include the amount of elapsed time before an integer\n overflow occurs, and the lack of scenarios where\n signals to a parent process present a substantial\n operational threat.(CVE-2020-12826)\n\n - An issue was discovered in the Linux kernel before\n 5.4.17. drivers/spi/spi-dw.c allows attackers to cause\n a panic via concurrent calls to dw_spi_irq and\n dw_spi_transfer_one, aka\n CID-19b61392c5a8.(CVE-2020-12769)\n\n - An issue was discovered in the Linux kernel through\n 5.6.11. sg_write lacks an sg_remove_request call in a\n certain failure case, aka\n CID-83c6f2390040.(CVE-2020-12770)\n\n - An issue was discovered in the Linux kernel through\n 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c\n has a deadlock if a coalescing operation\n fails.(CVE-2020-12771)\n\n - The __mptctl_ioctl function in\n drivers/message/fusion/mptctl.c in the Linux kernel\n before 5.4.14 allows local users to hold an incorrect\n lock during the ioctl operation and trigger a race\n condition, i.e., a 'double fetch' vulnerability, aka\n CID-28d76df18f0a. NOTE: the vendor states 'The security\n impact of this bug is not as bad as it could have been\n because these operations are all privileged and root\n already has enormous destructive\n power.'(CVE-2020-12652)\n\n - An issue was discovered in xfs_agf_verify in\n fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through\n 5.6.10. Attackers may trigger a sync of excessive\n duration via an XFS v5 image with crafted metadata, aka\n CID-d0c7feaf8767.(CVE-2020-12655)\n\n - A pivot_root race condition in fs amespace.c in the\n Linux kernel 4.4.x before 4.4.221, 4.9.x before\n 4.9.221, 4.14.x before 4.14.178, 4.19.x before\n 4.19.119, and 5.x before 5.3 allows local users to\n cause a denial of service (panic) by corrupting a\n mountpoint reference counter.(CVE-2020-12114)\n\n - An issue was discovered in the Linux kernel before\n 5.6.5. There is a use-after-free in block/bfq-iosched.c\n related to bfq_idle_slice_timer_body.(CVE-2020-12657)\n\n - usb_sg_cancel in drivers/usb/core/message.c in the\n Linux kernel before 5.6.8 has a use-after-free because\n a transfer occurs without a reference, aka\n CID-056ad39ee925.(CVE-2020-12464)\n\n - An issue was found in Linux kernel before 5.5.4. The\n mwifiex_cmd_append_vsie_tlv() function in drivers\n et/wireless/marvell/mwifiex/scan.c allows local users\n to gain privileges or cause a denial of service because\n of an incorrect memcpy and buffer overflow, aka\n CID-b70261a288ea.(CVE-2020-12653)\n\n - gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c\n in the rpcsec_gss_krb5 implementation in the Linux\n kernel through 5.6.10 lacks certain domain_release\n calls, leading to a memory leak.(CVE-2020-12656)\n\n - An issue was discovered in the Linux kernel before\n 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an\n out-of-bounds write (by a user with the CAP_NET_ADMIN\n capability) because of a lack of headroom\n validation.(CVE-2020-12659)\n\n - An array overflow was discovered in mt76_add_fragment\n in drivers et/wireless/mediatek/mt76/dma.c in the Linux\n kernel before 5.5.10, aka CID-b102f0c522cf. An\n oversized packet with too many rx fragments can corrupt\n memory of adjacent pages.(CVE-2020-12465)\n\n - An issue was found in Linux kernel before 5.5.4.\n mwifiex_ret_wmm_get_status() in drivers\n et/wireless/marvell/mwifiex/wmm.c allows a remote AP to\n trigger a heap-based buffer overflow because of an\n incorrect memcpy, aka CID-3a9b153c5591.(CVE-2020-12654)\n\n - In the Linux kernel through 5.6.7 on the s390 platform,\n code execution may occur because of a race condition,\n as demonstrated by code in enable_sacf_uaccess in\n arch/s390/lib/uaccess.c that fails to protect against a\n concurrent page table upgrade, aka CID-3f777e19d171. A\n crash could also occur.(CVE-2020-11884)\n\n - relay_open in kernel/relay.c in the Linux kernel\n through 5.4.1 allows local users to cause a denial of\n service (such as relay blockage) by triggering a NULL\n alloc_percpu result.(CVE-2019-19462)\n\n - In the Linux kernel 5.0.21, mounting a crafted btrfs\n filesystem image, performing some operations, and\n unmounting can lead to a use-after-free in\n btrfs_queue_work in\n fs/btrfs/async-thread.c.(CVE-2019-19377)\n\n - In the Linux kernel before 5.5.8, get_raw_socket in\n drivers/vhost et.c lacks validation of an sk_family\n field, which might allow attackers to trigger kernel\n stack corruption via crafted system\n calls.(CVE-2020-10942)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1592\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?966bca8a\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-12659\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-12657\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/05/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/26\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python3-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(8)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"bpftool-4.19.36-vhulk1907.1.0.h748.eulerosv2r8\",\n \"kernel-4.19.36-vhulk1907.1.0.h748.eulerosv2r8\",\n \"kernel-devel-4.19.36-vhulk1907.1.0.h748.eulerosv2r8\",\n \"kernel-headers-4.19.36-vhulk1907.1.0.h748.eulerosv2r8\",\n \"kernel-source-4.19.36-vhulk1907.1.0.h748.eulerosv2r8\",\n \"kernel-tools-4.19.36-vhulk1907.1.0.h748.eulerosv2r8\",\n \"kernel-tools-libs-4.19.36-vhulk1907.1.0.h748.eulerosv2r8\",\n \"perf-4.19.36-vhulk1907.1.0.h748.eulerosv2r8\",\n \"python-perf-4.19.36-vhulk1907.1.0.h748.eulerosv2r8\",\n \"python3-perf-4.19.36-vhulk1907.1.0.h748.eulerosv2r8\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"8\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:29", "description": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-15780: A lockdown bypass for loading unsigned modules using ACPI table injection was fixed. (bsc#1173573)\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-0305: Fixed a possible use-after-free due to a race condition incdev_get of char_dev.c. This could lead to local escalation of privilege. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bnc#1173074).\n\nCVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt ACPI variable, which could be used by attackers to bypass lockdown or secure boot restrictions (bnc#1173567).\n\nCVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).\n\nCVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c, related to invalid length checks for variable elements in a beacon head (bnc#1152107).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-04T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2107-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20810", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2107-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139310", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2107-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139310);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20810\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-10781\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-13974\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2107-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-15780: A lockdown bypass for loading unsigned modules using\nACPI table injection was fixed. (bsc#1173573)\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect\n(bnc#1173514).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in\ndrivers/md/bcache/btree.c has a deadlock if a coalescing operation\nfails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the\ncmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in\nthe slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c\n(bnc#1162002).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where\nindirect branch speculation could be enabled even though it was\ndiabled before (bnc#1172783).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local\naccount to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction\nBarrier was disabled in certain circumstances, leaving the system open\nto a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c,\nif k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-0305: Fixed a possible use-after-free due to a race condition\nincdev_get of char_dev.c. This could lead to local escalation of\nprivilege. User interaction is not needed for exploitation\n(bnc#1174462).\n\nCVE-2020-10769: A buffer over-read flaw was found in\ncrypto_authenc_extractkeys in crypto/authenc.c in the IPsec\nCryptographic algorithm's module, authenc. This flaw allowed a local\nattacker with user privileges to cause a denial of service\n(bnc#1173265).\n\nCVE-2020-10781: Fixed a denial of service issue in the ZRAM\nimplementation (bnc#1173074).\n\nCVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt\nACPI variable, which could be used by attackers to bypass lockdown or\nsecure boot restrictions (bnc#1173567).\n\nCVE-2019-20810: Fixed a memory leak in go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c because it did not call\nsnd_card_free for a failure path (bnc#1172458).\n\nCVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c,\nrelated to invalid length checks for variable elements in a beacon\nhead (bnc#1152107).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1150660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151927\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1161016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166985\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168081\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169194\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170442\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171529\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172537\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172538\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173146\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173820\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174123\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174186\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174187\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20810/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20908/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10766/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10767/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10768/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10769/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12888/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-13974/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15393/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15780/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202107-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f8d3e199\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Product-WE-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise Module for Live Patching 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP1 :\n\nzypper in -t patch\nSUSE-SLE-Module-Development-Tools-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise High Availability 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Product-HA-15-SP1-2020-2107=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-16746\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-base-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-base-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-devel-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-devel-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-obs-build-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-obs-build-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-syms-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"reiserfs-kmp-default-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"reiserfs-kmp-default-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-base-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-base-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-devel-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-devel-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-obs-build-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-obs-build-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-syms-4.12.14-197.48.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:04:10", "description": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation. (CVE-2018-20669)\n\nA flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality. (CVE-2020-10768)\n\nA new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both. Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. (CVE-2020-0543)\n\nrelay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result. (CVE-2019-19462)\n\nA logic bug flaw was found in the Linux kernel's implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. (CVE-2019-19462)\n\nA flaw was found in the Linux kernel's implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality. (CVE-2019-19462)\n\nAn issue was discovered in the Linux kernel through 5.6.11.\nbtree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails. (CVE-2020-12771)\n\nA flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data. (CVE-2020-10732)\n\nA flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system. (CVE-2020-10757)", "cvss3": {}, "published": "2020-07-20T00:00:00", "type": "nessus", "title": "Amazon Linux AMI : kernel (ALAS-2020-1401)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-20669", "CVE-2019-19462", "CVE-2020-0543", "CVE-2020-10732", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-12771"], "modified": "2020-07-22T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:kernel", "p-cpe:/a:amazon:linux:kernel-debuginfo", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-i686", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:amazon:linux:kernel-devel", "p-cpe:/a:amazon:linux:kernel-headers", "p-cpe:/a:amazon:linux:kernel-tools", "p-cpe:/a:amazon:linux:kernel-tools-debuginfo", "p-cpe:/a:amazon:linux:kernel-tools-devel", "p-cpe:/a:amazon:linux:perf", "p-cpe:/a:amazon:linux:perf-debuginfo", "cpe:/o:amazon:linux"], "id": "ALA_ALAS-2020-1401.NASL", "href": "https://www.tenable.com/plugins/nessus/138643", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2020-1401.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(138643);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/22\");\n\n script_cve_id(\"CVE-2018-20669\", \"CVE-2019-19462\", \"CVE-2020-0543\", \"CVE-2020-10732\", \"CVE-2020-10757\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-12771\");\n script_xref(name:\"ALAS\", value:\"2020-1401\");\n\n script_name(english:\"Amazon Linux AMI : kernel (ALAS-2020-1401)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"An issue where a provided address with access_ok() is not checked was\ndiscovered in i915_gem_execbuffer2_ioctl in\ndrivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through\n4.19.13. A local attacker can craft a malicious IOCTL function call to\noverwrite arbitrary kernel memory, resulting in a Denial of Service or\nprivilege escalation. (CVE-2018-20669)\n\nA flaw was found in the prctl() function, where it can be used to\nenable indirect branch speculation after it has been disabled. This\ncall incorrectly reports it as being 'force disabled' when it is not\nand opens the system to Spectre v2 attacks. The highest threat from\nthis vulnerability is to confidentiality. (CVE-2020-10768)\n\nA new domain bypass transient execution attack known as Special\nRegister Buffer Data Sampling (SRBDS) has been found. This flaw allows\ndata values from special internal registers to be leaked by an\nattacker able to execute code on any core of the CPU. An unprivileged,\nlocal attacker can use this flaw to infer values returned by affected\ninstructions known to be commonly used during cryptographic operations\nthat rely on uniqueness, secrecy, or both. Incomplete cleanup from\nspecific special register read operations in some Intel(R) Processors\nmay allow an authenticated user to potentially enable information\ndisclosure via local access. (CVE-2020-0543)\n\nrelay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows\nlocal users to cause a denial of service (such as relay blockage) by\ntriggering a NULL alloc_percpu result. (CVE-2019-19462)\n\nA logic bug flaw was found in the Linux kernel's implementation of\nSSBD. A bug in the logic handling allows an attacker with a local\naccount to disable SSBD protection during a context switch when\nadditional speculative execution mitigations are in place. This issue\nwas introduced when the per task/process conditional STIPB switching\nwas added on top of the existing SSBD switching. The highest threat\nfrom this vulnerability is to confidentiality. (CVE-2019-19462)\n\nA flaw was found in the Linux kernel's implementation of the Enhanced\nIBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be\ndisabled when STIBP is not available or when the Enhanced Indirect\nBranch Restricted Speculation (IBRS) is available. This flaw allows a\nlocal attacker to perform a Spectre V2 style attack when this\nconfiguration is active. The highest threat from this vulnerability is\nto confidentiality. (CVE-2019-19462)\n\nAn issue was discovered in the Linux kernel through 5.6.11.\nbtree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a\ncoalescing operation fails. (CVE-2020-12771)\n\nA flaw was found in the Linux kernel's implementation of Userspace\ncore dumps. This flaw allows an attacker with a local account to crash\na trivial program and exfiltrate private kernel data. (CVE-2020-10732)\n\nA flaw was found in the Linux Kernel in versions after 4.5-rc1 in the\nway mremap handled DAX Huge Pages. This flaw allows a local attacker\nwith access to a DAX enabled storage to escalate their privileges on\nthe system. (CVE-2020-10757)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2020-1401.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Run 'yum update kernel' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-i686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"kernel-4.14.186-110.268.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-debuginfo-4.14.186-110.268.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", cpu:\"i686\", reference:\"kernel-debuginfo-common-i686-4.14.186-110.268.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-4.14.186-110.268.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-devel-4.14.186-110.268.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-headers-4.14.186-110.268.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-4.14.186-110.268.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-debuginfo-4.14.186-110.268.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-devel-4.14.186-110.268.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"perf-4.14.186-110.268.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"perf-debuginfo-4.14.186-110.268.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debuginfo / kernel-debuginfo-common-i686 / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:05:11", "description": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation. (CVE-2018-20669)\n\nA flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality. (CVE-2020-10768)\n\nrelay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result. (CVE-2019-19462)\n\nA logic bug flaw was found in the Linux kernel's implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. (CVE-2020-10766)\n\nA flaw was found in the Linux kernel's implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality. ( CVE-2020-10767)\n\nAn issue was discovered in the Linux kernel through 5.6.11.\nbtree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails. (CVE-2020-12771)\n\nA flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data. (CVE-2020-10732)\n\nA flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system. (CVE-2020-10757)", "cvss3": {}, "published": "2020-07-23T00:00:00", "type": "nessus", "title": "Amazon Linux 2 : kernel (ALAS-2020-1465)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-20669", "CVE-2019-19462", "CVE-2020-0543", "CVE-2020-10732", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-12771"], "modified": "2023-02-20T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:kernel", "p-cpe:/a:amazon:linux:kernel-debuginfo", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:amazon:linux:kernel-devel", "p-cpe:/a:amazon:linux:kernel-headers", "p-cpe:/a:amazon:linux:kernel-livepatch-4.14.186-146.268", "p-cpe:/a:amazon:linux:kernel-tools", "p-cpe:/a:amazon:linux:kernel-tools-debuginfo", "p-cpe:/a:amazon:linux:kernel-tools-devel", "p-cpe:/a:amazon:linux:perf", "p-cpe:/a:amazon:linux:perf-debuginfo", "p-cpe:/a:amazon:linux:python-perf", "p-cpe:/a:amazon:linux:python-perf-debuginfo", "cpe:/o:amazon:linux:2"], "id": "AL2_ALAS-2020-1465.NASL", "href": "https://www.tenable.com/plugins/nessus/138854", "sourceData": "##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux 2 Security Advisory ALAS-2020-1465.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(138854);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/02/20\");\n\n script_cve_id(\n \"CVE-2018-20669\",\n \"CVE-2019-19462\",\n \"CVE-2020-0543\",\n \"CVE-2020-10732\",\n \"CVE-2020-10757\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-12771\"\n );\n script_xref(name:\"ALAS\", value:\"2020-1465\");\n\n script_name(english:\"Amazon Linux 2 : kernel (ALAS-2020-1465)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Amazon Linux 2 host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"An issue where a provided address with access_ok() is not checked was\ndiscovered in i915_gem_execbuffer2_ioctl in\ndrivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through\n4.19.13. A local attacker can craft a malicious IOCTL function call to\noverwrite arbitrary kernel memory, resulting in a Denial of Service or\nprivilege escalation. (CVE-2018-20669)\n\nA flaw was found in the prctl() function, where it can be used to\nenable indirect branch speculation after it has been disabled. This\ncall incorrectly reports it as being 'force disabled' when it is not\nand opens the system to Spectre v2 attacks. The highest threat from\nthis vulnerability is to confidentiality. (CVE-2020-10768)\n\nrelay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows\nlocal users to cause a denial of service (such as relay blockage) by\ntriggering a NULL alloc_percpu result. (CVE-2019-19462)\n\nA logic bug flaw was found in the Linux kernel's implementation of\nSSBD. A bug in the logic handling allows an attacker with a local\naccount to disable SSBD protection during a context switch when\nadditional speculative execution mitigations are in place. This issue\nwas introduced when the per task/process conditional STIPB switching\nwas added on top of the existing SSBD switching. The highest threat\nfrom this vulnerability is to confidentiality. (CVE-2020-10766)\n\nA flaw was found in the Linux kernel's implementation of the Enhanced\nIBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be\ndisabled when STIBP is not available or when the Enhanced Indirect\nBranch Restricted Speculation (IBRS) is available. This flaw allows a\nlocal attacker to perform a Spectre V2 style attack when this\nconfiguration is active. The highest threat from this vulnerability is\nto confidentiality. ( CVE-2020-10767)\n\nAn issue was discovered in the Linux kernel through 5.6.11.\nbtree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a\ncoalescing operation fails. (CVE-2020-12771)\n\nA flaw was found in the Linux kernel's implementation of Userspace\ncore dumps. This flaw allows an attacker with a local account to crash\na trivial program and exfiltrate private kernel data. (CVE-2020-10732)\n\nA flaw was found in the Linux Kernel in versions after 4.5-rc1 in the\nway mremap handled DAX Huge Pages. This flaw allows a local attacker\nwith access to a DAX enabled storage to escalate their privileges on\nthe system. (CVE-2020-10757)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/AL2/ALAS-2020-1465.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/../../faqs.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2018-20669.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2019-19462.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2020-0543.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2020-10732.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2020-10757.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2020-10766.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2020-10767.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2020-10768.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2020-12771.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Run 'yum update kernel' to update your system.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-20669\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-10757\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/23\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-livepatch-4.14.186-146.268\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux:2\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"kpatch.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"rpm.inc\");\ninclude(\"hotfixes.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nvar alas_release = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(alas_release) || !strlen(alas_release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nvar os_ver = pregmatch(pattern: \"^AL(A|\\d+|-\\d+)\", string:alas_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"2\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux 2\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (get_one_kb_item(\"Host/kpatch/kernel-cves\"))\n{\n set_hotfix_type(\"kpatch\");\n var cve_list = make_list(\"CVE-2018-20669\", \"CVE-2019-19462\", \"CVE-2020-0543\", \"CVE-2020-10732\", \"CVE-2020-10757\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-12771\");\n if (hotfix_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"kpatch hotfix for ALAS-2020-1465\");\n }\n else\n {\n __rpm_report = hotfix_reporting_text();\n }\n}\nvar pkgs = [\n {'reference':'kernel-4.14.186-146.268.amzn2', 'cpu':'aarch64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-4.14.186-146.268.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debuginfo-4.14.186-146.268.amzn2', 'cpu':'aarch64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debuginfo-4.14.186-146.268.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debuginfo-common-aarch64-4.14.186-146.268.amzn2', 'cpu':'aarch64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-debuginfo-common-x86_64-4.14.186-146.268.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-devel-4.14.186-146.268.amzn2', 'cpu':'aarch64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-devel-4.14.186-146.268.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-headers-4.14.186-146.268.amzn2', 'cpu':'aarch64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-headers-4.14.186-146.268.amzn2', 'cpu':'i686', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-headers-4.14.186-146.268.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-livepatch-4.14.186-146.268-1.0-0.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-4.14.186-146.268.amzn2', 'cpu':'aarch64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-4.14.186-146.268.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-debuginfo-4.14.186-146.268.amzn2', 'cpu':'aarch64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-debuginfo-4.14.186-146.268.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-devel-4.14.186-146.268.amzn2', 'cpu':'aarch64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-tools-devel-4.14.186-146.268.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'perf-4.14.186-146.268.amzn2', 'cpu':'aarch64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'perf-4.14.186-146.268.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'perf-debuginfo-4.14.186-146.268.amzn2', 'cpu':'aarch64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'perf-debuginfo-4.14.186-146.268.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python-perf-4.14.186-146.268.amzn2', 'cpu':'aarch64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python-perf-4.14.186-146.268.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python-perf-debuginfo-4.14.186-146.268.amzn2', 'cpu':'aarch64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python-perf-debuginfo-4.14.186-146.268.amzn2', 'cpu':'x86_64', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && _release && (!exists_check || rpm_exists(release:_release, rpm:exists_check))) {\n if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debuginfo / kernel-debuginfo-common-x86_64 / etc\");\n}", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:01:55", "description": "Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.\n\n - CVE-2019-3016 It was discovered that the KVM implementation for x86 did not always perform TLB flushes when needed, if the paravirtualised TLB flush feature was enabled. This could lead to disclosure of sensitive information within a guest VM.\n\n - CVE-2019-19462 The syzkaller tool found a missing error check in the 'relay' library used to implement various files under debugfs. A local user permitted to access debugfs could use this to cause a denial of service (crash) or possibly for privilege escalation.\n\n - CVE-2020-0543 Researchers at VU Amsterdam discovered that on some Intel CPUs supporting the RDRAND and RDSEED instructions, part of a random value generated by these instructions may be used in a later speculative execution on any core of the same physical CPU.\n Depending on how these instructions are used by applications, a local user or VM guest could use this to obtain sensitive information such as cryptographic keys from other users or VMs.\n\n This vulnerability can be mitigated by a microcode update, either as part of system firmware (BIOS) or through the intel-microcode package in Debian's non-free archive section. This kernel update only provides reporting of the vulnerability and the option to disable the mitigation if it is not needed.\n\n - CVE-2020-10711 Matthew Sheets reported NULL pointer dereference issues in the SELinux subsystem while receiving CIPSO packet with null category. A remote attacker can take advantage of this flaw to cause a denial of service (crash). Note that this issue does not affect the binary packages distributed in Debian as CONFIG_NETLABEL is not enabled.\n\n - CVE-2020-10732 An information leak of kernel private memory to userspace was found in the kernel's implementation of core dumping userspace processes.\n\n - CVE-2020-10751 Dmitry Vyukov reported that the SELinux subsystem did not properly handle validating multiple messages, which could allow a privileged attacker to bypass SELinux netlink restrictions.\n\n - CVE-2020-10757 Fan Yang reported a flaw in the way mremap handled DAX hugepages, allowing a local user to escalate their privileges.\n\n - CVE-2020-12114 Piotr Krysiuk discovered a race condition between the umount and pivot_root operations in the filesystem core (vfs). A local user with the CAP_SYS_ADMIN capability in any user namespace could use this to cause a denial of service (crash).\n\n - CVE-2020-12464 Kyungtae Kim reported a race condition in the USB core that can result in a use-after-free. It is not clear how this can be exploited, but it could result in a denial of service (crash or memory corruption) or privilege escalation.\n\n - CVE-2020-12768 A bug was discovered in the KVM implementation for AMD processors, which could result in a memory leak. The security impact of this is unclear.\n\n - CVE-2020-12770 It was discovered that the sg (SCSI generic) driver did not correctly release internal resources in a particular error case. A local user permitted to access an sg device could possibly use this to cause a denial of service (resource exhaustion).\n\n - CVE-2020-13143 Kyungtae Kim reported a potential heap out-of-bounds write in the USB gadget subsystem. A local user permitted to write to the gadget configuration filesystem could use this to cause a denial of service (crash or memory corruption) or potentially for privilege escalation.", "cvss3": {}, "published": "2020-06-11T00:00:00", "type": "nessus", "title": "Debian DSA-4699-1 : linux - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19462", "CVE-2019-3016", "CVE-2020-0543", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12768", "CVE-2020-12770", "CVE-2020-13143"], "modified": "2022-05-16T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:linux", "cpe:/o:debian:debian_linux:10.0"], "id": "DEBIAN_DSA-4699.NASL", "href": "https://www.tenable.com/plugins/nessus/137341", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4699. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(137341);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/16\");\n\n script_cve_id(\"CVE-2019-19462\", \"CVE-2019-3016\", \"CVE-2020-0543\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10757\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12768\", \"CVE-2020-12770\", \"CVE-2020-13143\");\n script_xref(name:\"DSA\", value:\"4699\");\n\n script_name(english:\"Debian DSA-4699-1 : linux - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks.\n\n - CVE-2019-3016\n It was discovered that the KVM implementation for x86\n did not always perform TLB flushes when needed, if the\n paravirtualised TLB flush feature was enabled. This\n could lead to disclosure of sensitive information within\n a guest VM.\n\n - CVE-2019-19462\n The syzkaller tool found a missing error check in the\n 'relay' library used to implement various files under\n debugfs. A local user permitted to access debugfs could\n use this to cause a denial of service (crash) or\n possibly for privilege escalation.\n\n - CVE-2020-0543\n Researchers at VU Amsterdam discovered that on some\n Intel CPUs supporting the RDRAND and RDSEED\n instructions, part of a random value generated by these\n instructions may be used in a later speculative\n execution on any core of the same physical CPU.\n Depending on how these instructions are used by\n applications, a local user or VM guest could use this to\n obtain sensitive information such as cryptographic keys\n from other users or VMs.\n\n This vulnerability can be mitigated by a microcode update, either as\n part of system firmware (BIOS) or through the intel-microcode\n package in Debian's non-free archive section. This kernel update\n only provides reporting of the vulnerability and the option to\n disable the mitigation if it is not needed.\n\n - CVE-2020-10711\n Matthew Sheets reported NULL pointer dereference issues\n in the SELinux subsystem while receiving CIPSO packet\n with null category. A remote attacker can take advantage\n of this flaw to cause a denial of service (crash). Note\n that this issue does not affect the binary packages\n distributed in Debian as CONFIG_NETLABEL is not enabled.\n\n - CVE-2020-10732\n An information leak of kernel private memory to\n userspace was found in the kernel's implementation of\n core dumping userspace processes.\n\n - CVE-2020-10751\n Dmitry Vyukov reported that the SELinux subsystem did\n not properly handle validating multiple messages, which\n could allow a privileged attacker to bypass SELinux\n netlink restrictions.\n\n - CVE-2020-10757\n Fan Yang reported a flaw in the way mremap handled DAX\n hugepages, allowing a local user to escalate their\n privileges.\n\n - CVE-2020-12114\n Piotr Krysiuk discovered a race condition between the\n umount and pivot_root operations in the filesystem core\n (vfs). A local user with the CAP_SYS_ADMIN capability in\n any user namespace could use this to cause a denial of\n service (crash).\n\n - CVE-2020-12464\n Kyungtae Kim reported a race condition in the USB core\n that can result in a use-after-free. It is not clear how\n this can be exploited, but it could result in a denial\n of service (crash or memory corruption) or privilege\n escalation.\n\n - CVE-2020-12768\n A bug was discovered in the KVM implementation for AMD\n processors, which could result in a memory leak. The\n security impact of this is unclear.\n\n - CVE-2020-12770\n It was discovered that the sg (SCSI generic) driver did\n not correctly release internal resources in a particular\n error case. A local user permitted to access an sg\n device could possibly use this to cause a denial of\n service (resource exhaustion).\n\n - CVE-2020-13143\n Kyungtae Kim reported a potential heap out-of-bounds\n write in the USB gadget subsystem. A local user\n permitted to write to the gadget configuration\n filesystem could use this to cause a denial of service\n (crash or memory corruption) or potentially for\n privilege escalation.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960271\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2019-3016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2019-19462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2020-0543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2020-10711\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2020-10732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2020-10751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2020-10757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2020-12114\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2020-12464\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2020-12768\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2020-12770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2020-13143\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/linux\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/buster/linux\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2020/dsa-4699\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Upgrade the linux packages.\n\nFor the stable distribution (buster), these problems have been fixed\nin version 4.19.118-2+deb10u1. This version also fixes some related\nbugs that do not have their own CVE IDs, and a regression in the\n<linux/swab.h> UAPI header introduced in the previous point release\n(bug #960271).\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-12464\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:10.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/11\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"10.0\", prefix:\"affs-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"affs-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"affs-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"affs-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ata-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ata-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ata-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ata-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ata-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"btrfs-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"btrfs-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"btrfs-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"btrfs-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"btrfs-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"btrfs-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"btrfs-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"btrfs-modules-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"cdrom-core-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"cdrom-core-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"cdrom-core-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"cdrom-core-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"cdrom-core-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"cdrom-core-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"cdrom-core-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"cdrom-core-modules-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"compress-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"compress-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"compress-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"compress-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"compress-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"compress-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"compress-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"compress-modules-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crc-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crc-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crc-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crc-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crc-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crc-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crc-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crc-modules-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-dm-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-dm-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-dm-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-dm-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-dm-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-dm-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-dm-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-dm-modules-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"crypto-modules-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"dasd-extra-modules-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"dasd-modules-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"efi-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"event-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"event-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"event-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"event-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"event-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"event-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"event-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ext4-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ext4-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ext4-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ext4-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ext4-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ext4-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ext4-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ext4-modules-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fancontrol-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fat-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fat-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fat-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fat-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fat-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fat-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fat-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fat-modules-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fb-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fb-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fb-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fb-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fb-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fb-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"firewire-core-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"firewire-core-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fuse-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fuse-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fuse-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fuse-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fuse-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fuse-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fuse-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"fuse-modules-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"hfs-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"hfs-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"hfs-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"hfs-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"hyperv-daemons\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"hypervisor-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"i2c-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"i2c-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"i2c-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"i2c-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"input-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"input-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"input-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"input-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"input-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"input-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"input-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"ipv6-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"isofs-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"isofs-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"isofs-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"isofs-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"isofs-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"isofs-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"isofs-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"isofs-modules-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"jffs2-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"jfs-modules-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"jfs-modules-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"jfs-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"jfs-modules-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"jfs-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"jfs-modules-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"jfs-modules-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"kernel-image-4.19.0-5-4kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"kernel-image-4.19.0-5-5kc-malta-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"kernel-image-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"kernel-image-4.19.0-5-loongson-3-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"kernel-image-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"kernel-image-4.19.0-5-octeon-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"kernel-image-4.19.0-5-powerpc64le-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"kernel-image-4.19.0-5-s390x-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"leds-modules-4.19.0-5-armmp-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"leds-modules-4.19.0-5-marvell-di\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libbpf-dev\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libbpf4.19\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libcpupower-dev\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libcpupower1\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"liblockdep-dev\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"liblockdep4.19\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-compiler-gcc-8-arm\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-compiler-gcc-8-s390\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-compiler-gcc-8-x86\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-config-4.19\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-cpupower\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-doc-4.19\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-4kc-malta\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-5kc-malta\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-686\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-686-pae\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-all\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-all-amd64\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-all-arm64\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-all-armel\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-all-armhf\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-all-i386\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-all-mips\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-all-mips64el\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-all-mipsel\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-all-ppc64el\", reference:\"4.19.118-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"linux-headers-4.19.0-5-all-s390x