The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed :
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
- CVE-2019-19462: relay_open in kernel/relay.c allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2019-20806: Fixed a NULL pointer dereference in tw5864_handle_frame() which may had lead to denial of service (bsc#1172199).
- CVE-2019-20812: The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-11608: An issue was discovered in drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d (bnc#1168829).
- CVE-2020-11609: An issue was discovered in the stv06xx subsystem in drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93 (bnc#1168854).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
The following non-security bugs were fixed :
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add br_netfilter to kernel-default-base (bsc#1169020)
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: hda: Add driver blacklist (bsc#1051510).
- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).
- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).
- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).
- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).
- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).
- ALSA: hda: Skip controller resume if not needed (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).
- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).
- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).
- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).
- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).
- blk-mq: simplify blk_mq_make_request() (bsc#1165478).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in
__drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).
- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).
- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).
- brcmfmac: abort and release host after error (bsc#1051510).
- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).
- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).
- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).
- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).
- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).
- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- btrfs: setup a nofs context for memory allocation at
__btrfs_set_acl (bsc#1172127).
- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: check if file lock exists before sending unlock request (bsc#1168789).
- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- cifs: Allocate encryption header through kmalloc (bsc#1144333).
- cifs: allow unlock flock and OFD lock across fork (bsc#1144333).
- cifs: check new file size when extending file by fallocate (bsc#1144333).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- cifs: do not share tcons with DFS (bsc#1144333).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- cifs: ensure correct super block for DFS reconnect (bsc#1144333).
- cifs: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- cifs: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- cifs: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- cifs: protect updating server->dstaddr with a spinlock (bsc#1144333).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- cifs: smbd: Check send queue size before posting a send (bsc#1144333).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- cifs: smbd: Merge code to track pending packets (bsc#1144333).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1144333).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- cifs: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).
- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- devlink: fix return value after hitting end in region read (bsc#1109837).
- devlink: validate length of param values (bsc#1109837).
- devlink: validate length of region addr/len (bsc#1109837).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: w1: add hwmon support structures (jsc#SLE-11048).
- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).
- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).
- drm: amd/acp: fix broken menu structure (bsc#1114279)
- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).
- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).
- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)
- drm/atomic: Take the atomic toys away from X (bsc#1112178) 	* context changes
- drm/crc: Actually allow to change the crc source (bsc#1114279) 	* offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm/etnaviv: fix perfmon domain interation (bsc#1113956)
- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)
- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178)
- drm/i915: properly sanity check batch_start_offset (bsc#1114279)
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279)
- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)
- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)
- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956)
- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956)
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279)
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- Fix a backport bug, where btrfs_put_root() -> btrfs_put_fs_root() modification is not needed due to missing dependency
- Following two patches needs to be combined as one commit (one adds context, later removes which affects existing patch) else commit series cannot be sequenced.
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_(list/status)() (networking-stable-20_03_28).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).
- input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).
- ipmi: fix hung processes in __get_guid() (git-fixes).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).
- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).
- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- ixgbe: do not check firmware errors (bsc#1170284).
- kABI fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third-party.
- kABI workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- keys: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).
- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: core: Check request type before completing the request (git-fixes).
- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).
- mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not open-coding timeout loop (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci: Update the tuning failed messages to pr_debug level (git-fixes).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net/ethernet: add Google GVE driver (jsc#SLE-10538)
- net: fec: add phy_reset_after_clk_enable() support (git-fixes).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net: hns3: fix 'tc qdisc del' failed issue (bsc#1109837).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).
- NFC: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfp: abm: fix a memory leak bug (bsc#1109837).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- nfs: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- nfs: Fix memory leaks and corruption in readdir (git-fixes).
- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- nfs: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4-Fix-OPEN-CLOSE-race.patch
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- padata: Remove broken queue flushing (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for
->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- pnfs: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- random: always use batched entropy for get_random_u(32,64) (bsc#1164871).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- Redo patch for SLE15-SP1, based on feedback from IBM:
patches.suse/s390-ftrace-fix-potential-crashes-when-swit ching-tracers (bsc#1171244 LTC#185785 git-fixes).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- Revert 'ALSA: hda/realtek: Fix pop noise on ALC225' (git-fixes).
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279) 	* offset changes
- Revert 'HID: i2c-hid: add Trekstor Primebook C11B to descriptor override' Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'HID: i2c-hid: override HID descriptors for certain devices' This broke i2c-hid.ko's build, there is no way around it without a big file rename or renaming the kernel module.
- Revert 'i2c-hid: properly terminate i2c_hid_dmi_desc_override_table' Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (bsc#1103992).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/cio: avoid duplicated 'ADD' uevents (git-fixes).
- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).
- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).
- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).
- s390/diag: fix display of diagnose call statistics (git-fixes).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/gmap: return proper error code on ksm unsharing (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: do not set affinity for floating irqs (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- s390/qeth: cancel RX reclaim work earlier (git-fixes).
- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).
- s390/qeth: do not warn for napi with 0 budget (git-fixes).
- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).
- s390/qeth: fix promiscuous mode after reset (git-fixes).
- s390/qeth: fix qdio teardown after early init error (git-fixes).
- s390/qeth: handle error due to unsupported transport mode (git-fixes).
- s390/qeth: handle error when backing RX buffer (git-fixes).
- s390/qeth: lock the card while changing its hsuid (git-fixes).
- s390/qeth: support net namespaces for L3 devices (git-fixes).
- s390/time: Fix clk type in get_tod_clock (git-fixes).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601)
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi-ibmvfc-Don-t-send-implicit-logouts-prior-to-NPI.pat ch
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi-ibmvscsi-Fix-WARN_ON-during-event-pool-release.patc h
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): NULL pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi-qla2xxx-check-UNLOADING-before-posting-async-wo.pat ch
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi-qla2xxx-set-UNLOADING-before-waiting-for-sessio.pat ch
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- sctp: move the format error check out of
__sctp_sf_do_9_1_abort (networking-stable-20_03_01).
- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Additional compression structures (bsc#1144333).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3-fix-performance-regression-with-setting-mtime.patch
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- sunrpc: expiry_time should be seconds not timeval (git-fixes).
- sunrpc: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- supported.conf: support w1 core and thermometer support
- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).
- svcrdma: Fix leak of transport addresses (git-fixes).
- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: rocket, avoid OOB access (git-fixes).
- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)
- Update config files: re-enable CONFIG_HAMRADIO and co (bsc#1170740)
- Update patches.suse/powerpc-pseries-ddw-Extend-upper-limit-for- huge-DMA-.patch (bsc#1142685 bsc#1167867 ltc#179509 ltc#184616).
- Update patches.suse/x86-mm-split-vmalloc_sync_all.patch (bsc#1165741, bsc#1166969).
- Update references:
patches.suse/s390-pci-do-not-set-affinity-for-floating-i rqs (bsc#1171817 LTC#185819 git-fixes).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- usb: cdc-acm: restore capability check order (git-fixes).
- usb: core: Fix misleading driver bug report (bsc#1051510).
- usb: dwc3: do not set gadget->is_otg flag (git-fixes).
- usb: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- usb: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- usb: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- usb: gadget: composite: Inform controller driver of self-powered (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usb: hub: Fix handling of connect changes during sleep (git-fixes).
- usbnet: silence an unnecessary warning (bsc#1170770).
- usb: serial: garmin_gps: add sanity checking for data length (git-fixes).
- usb: serial: option: add BroadMobi BM806U (git-fixes).
- usb: serial: option: add support for ASKEY WWHC050 (git-fixes).
- usb: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- usb: serial: qcserial: Add DW5816e support (git-fixes).
- usb: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- usb: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- usb: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: Add subsystem kernel public interface (jsc#SLE-11048).
- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).
- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).
- w1: use put_device() if device_register() fail (jsc#SLE-11048).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).
- x86: hyperv: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm(4,6)_output_finish (networking-stable-20_04_27).
- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from
__xfs_dir3_free_read (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
{"id": "OPENSUSE-2020-801.NASL", "vendorId": null, "type": "nessus", "bulletinFamily": "scanner", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2020-801)", "description": "The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\n - CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n\n - CVE-2019-20806: Fixed a NULL pointer dereference in tw5864_handle_frame() which may had lead to denial of service (bsc#1172199).\n\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\n - CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n\n - CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n\n - CVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n\n - CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n\n - CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n\n - CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n\n - CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n\n - CVE-2020-11608: An issue was discovered in drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d (bnc#1168829).\n\n - CVE-2020-11609: An issue was discovered in the stv06xx subsystem in drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93 (bnc#1168854).\n\n - CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n\n - CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n\n - CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n\n - CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n\n - CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n\n - CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n\n - CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n\n - CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n\n - CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n\n - CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n\n - CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n\nThe following non-security bugs were fixed :\n\n - ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n\n - ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n\n - acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n\n - Add br_netfilter to kernel-default-base (bsc#1169020)\n\n - agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n\n - ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n\n - ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).\n\n - ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n\n - ALSA: hda: Add driver blacklist (bsc#1051510).\n\n - ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).\n\n - ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n\n - ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n\n - ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).\n\n - ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n\n - ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n\n - ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).\n\n - ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n\n - ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n\n - ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n\n - ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).\n\n - ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n\n - ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n\n - ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n\n - ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n\n - ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n\n - ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n\n - ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).\n\n - ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).\n\n - ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).\n\n - ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n\n - ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n\n - ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).\n\n - ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n\n - ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n\n - ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n\n - ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n\n - ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n\n - ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n\n - ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n\n - ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n\n - ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n\n - ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n\n - ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n\n - ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n\n - ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n\n - ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n\n - ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n\n - ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n\n - ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n\n - ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).\n\n - ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).\n\n - ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).\n\n - ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n\n - ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).\n\n - ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n\n - ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n\n - ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n\n - ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n\n - ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n\n - ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n\n - ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n\n - ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n\n - ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n\n - ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n\n - ASoC: fix regwmask (bsc#1051510).\n\n - ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n\n - ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n\n - ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n\n - ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n\n - b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n\n - batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n\n - batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n\n - batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n\n - batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n\n - bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n\n - bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n\n - bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).\n\n - blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n\n - blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n\n - block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n\n - block: drbd: remove a stray unlock in\n __drbd_send_protocol() (bsc#1171599).\n\n - block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n\n - block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n\n - block: fix memleak of bio integrity data (git fixes (block drivers)).\n\n - block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n\n - bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n\n - bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).\n\n - bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n\n - bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n\n - bnxt_en: Return error when allocating zero size context memory (bsc#1104745).\n\n - bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n\n - bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n\n - bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).\n\n - brcmfmac: abort and release host after error (bsc#1051510).\n\n - btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n\n - btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n\n - btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n\n - btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).\n\n - btrfs: relocation: Check cancel request after each data page read (bsc#1171417).\n\n - btrfs: relocation: Check cancel request after each extent found (bsc#1171417).\n\n - btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).\n\n - btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).\n\n - btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n\n - btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n\n - btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n\n - btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n\n - btrfs: setup a nofs context for memory allocation at\n __btrfs_set_acl (bsc#1172127).\n\n - btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n\n - can: add missing attribute validation for termination (networking-stable-20_03_14).\n\n - cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n\n - cdc-acm: introduce a cool down (git-fixes).\n\n - ceph: check if file lock exists before sending unlock request (bsc#1168789).\n\n - ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n\n - ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n\n - ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n\n - cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n\n - cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n\n - cifs: Allocate encryption header through kmalloc (bsc#1144333).\n\n - cifs: allow unlock flock and OFD lock across fork (bsc#1144333).\n\n - cifs: check new file size when extending file by fallocate (bsc#1144333).\n\n - cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n\n - cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n\n - cifs: do not share tcons with DFS (bsc#1144333).\n\n - cifs: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n\n - cifs: ensure correct super block for DFS reconnect (bsc#1144333).\n\n - cifs: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n\n - cifs: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n\n - cifs: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).\n\n - cifs: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n\n - cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n\n - cifs: protect updating server->dstaddr with a spinlock (bsc#1144333).\n\n - cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n\n - cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n\n - cifs: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n\n - cifs: smbd: Check send queue size before posting a send (bsc#1144333).\n\n - cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n\n - cifs: smbd: Merge code to track pending packets (bsc#1144333).\n\n - cifs: smbd: Properly process errors on ib_post_send (bsc#1144333).\n\n - cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n\n - cifs: Warn less noisily on default mount (bsc#1144333).\n\n - clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n\n - clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n\n - clk: imx: make mux parent strings const (bsc#1051510).\n\n - clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n\n - clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n\n - clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).\n\n - clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n\n - component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n\n - coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n\n - cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n\n - crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n\n - crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n\n - crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n\n - crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n\n - cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n\n - cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).\n\n - debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n\n - debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n\n - devlink: fix return value after hitting end in region read (bsc#1109837).\n\n - devlink: validate length of param values (bsc#1109837).\n\n - devlink: validate length of region addr/len (bsc#1109837).\n\n - dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n\n - dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n\n - dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n\n - dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n\n - dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n\n - dm writecache: verify watermark during resume (git fixes (block drivers)).\n\n - dm zoned: fix invalid memory access (git fixes (block drivers)).\n\n - dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n\n - dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n\n - dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n\n - dp83640: reverse arguments to list_add_tail (git-fixes).\n\n - drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).\n\n - drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n\n - drivers: w1: add hwmon support structures (jsc#SLE-11048).\n\n - drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n\n - drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).\n\n - drm: amd/acp: fix broken menu structure (bsc#1114279)\n\n - drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n\n - drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n\n - drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)\n\n - drm/atomic: Take the atomic toys away from X (bsc#1112178) 	* context changes\n\n - drm/crc: Actually allow to change the crc source (bsc#1114279) 	* offset changes\n\n - drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n\n - drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n\n - drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n\n - drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n\n - drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n\n - drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178)\n\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n\n - drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178)\n\n - drm/i915: properly sanity check batch_start_offset (bsc#1114279)\n\n - drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n\n - drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n\n - drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n\n - drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n\n - drm/qxl: qxl_release use after free (bsc#1051510).\n\n - drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279)\n\n - drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n\n - drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n\n - drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956)\n\n - drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956)\n\n - dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n\n - EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n\n - ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n\n - ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n\n - ext4: use non-movable memory for superblock readahead (bsc#1171952).\n\n - fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n\n - fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279)\n\n - fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n\n - firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n\n - Fix a backport bug, where btrfs_put_root() -> btrfs_put_fs_root() modification is not needed due to missing dependency\n\n - Following two patches needs to be combined as one commit (one adds context, later removes which affects existing patch) else commit series cannot be sequenced.\n\n - fpga: dfl: afu: Corrected error handling levels (git-fixes).\n\n - fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n\n - fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n\n - gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n\n - gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n\n - HID: hid-input: clear unmapped usages (git-fixes).\n\n - HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n\n - HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n\n - HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n\n - HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n\n - HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n\n - hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).\n\n - hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n\n - hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n\n - hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n\n - hsr: set .netnsok flag (networking-stable-20_03_28).\n\n - hsr: use rcu_read_lock() in hsr_get_node_(list/status)() (networking-stable-20_03_28).\n\n - i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n\n - i2c: acpi: put device when verifying client fails (git-fixes).\n\n - i2c: brcmstb: remove unused struct member (git-fixes).\n\n - i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n\n - i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n\n - i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n\n - i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n\n - i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n\n - i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n\n - i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n\n - i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n\n - i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).\n\n - i2c: st: fix missing struct parameter description (bsc#1051510).\n\n - IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).\n\n - ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n\n - iio:ad7797: Use correct attribute_group (bsc#1051510).\n\n - iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n\n - iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n\n - iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n\n - iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).\n\n - iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).\n\n - iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n\n - iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n\n - iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n\n - ima: Fix return value of ima_write_policy() (git-fixes).\n\n - input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n\n - input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).\n\n - input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n\n - input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n\n - input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n\n - input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n\n - input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n\n - input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n\n - input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n\n - iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n\n - iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n\n - iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n\n - iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n\n - iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n\n - iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n\n - iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n\n - iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n\n - ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).\n\n - ipmi: fix hung processes in __get_guid() (git-fixes).\n\n - ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n\n - ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n\n - ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n\n - ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n\n - ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).\n\n - ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n\n - ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).\n\n - ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n\n - ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).\n\n - ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n\n - iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n\n - ixgbe: do not check firmware errors (bsc#1170284).\n\n - kABI fix for early XHCI debug (git-fixes).\n\n - kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n\n - kabi/severities: Do not track KVM internal symbols.\n\n - kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third-party.\n\n - kABI workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n\n - keys: reaching the keys quotas correctly (bsc#1051510).\n\n - KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n\n - KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n\n - KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n\n - KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n\n - KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).\n\n - KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).\n\n - KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n\n - KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n\n - l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n\n - libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n\n - libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n\n - lib: raid6: fix awk build warnings (git fixes (block drivers)).\n\n - lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n\n - lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n\n - locks: print unsigned ino in /proc/locks (bsc#1171951).\n\n - mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n\n - mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n\n - mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n\n - macsec: avoid to set wrong mtu (bsc#1051510).\n\n - macsec: restrict to ethernet devices (networking-stable-20_03_28).\n\n - macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n\n - macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n\n - md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n\n - md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n\n - md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n\n - media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n\n - media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n\n - media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n\n - mei: release me_cl object reference (bsc#1051510).\n\n - mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n\n - mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n\n - mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n\n - mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n\n - mmc: core: Check request type before completing the request (git-fixes).\n\n - mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n\n - mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not open-coding timeout loop (git-fixes).\n\n - mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n\n - mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n\n - mmc: meson-gx: simplify interrupt handler (git-fixes).\n\n - mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n\n - mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n\n - mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n\n - mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n\n - mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n\n - mmc: sdhci: Update the tuning failed messages to pr_debug level (git-fixes).\n\n - mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n\n - mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n\n - mmc: tmio: fix access width of Block Count Register (git-fixes).\n\n - mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n\n - mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n\n - mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n\n - mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n\n - mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n\n - mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n\n - mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n\n - mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n\n - net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n\n - net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n\n - net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n\n - net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n\n - net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n\n - net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n\n - net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n\n - net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n\n - net/ethernet: add Google GVE driver (jsc#SLE-10538)\n\n - net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n\n - net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n\n - net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).\n\n - net: fix race condition in __inet_lookup_established() (bsc#1151794).\n\n - net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n\n - net: hns3: fix 'tc qdisc del' failed issue (bsc#1109837).\n\n - net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n\n - net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n\n - net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n\n - netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n\n - net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).\n\n - net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n\n - net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n\n - net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n\n - net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n\n - net/mlx5: Expose link speed directly (bsc#1171118).\n\n - net/mlx5: Expose port speed when possible (bsc#1171118).\n\n - net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n\n - net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n\n - net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n\n - net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n\n - net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).\n\n - net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n\n - net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n\n - net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n\n - net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).\n\n - net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n\n - nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n\n - nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n\n - nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).\n\n - NFC: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n\n - nfp: abm: fix a memory leak bug (bsc#1109837).\n\n - nfsd4: fix up replay_matches_cache() (git-fixes).\n\n - nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n\n - nfsd: fix delay timer on 32-bit architectures (git-fixes).\n\n - nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n\n - nfs: Directory page cache pages need to be locked when read (git-fixes).\n\n - nfsd: memory corruption in nfsd4_lock() (git-fixes).\n\n - nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n\n - nfs: Fix memory leaks and corruption in readdir (git-fixes).\n\n - nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n\n - nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n\n - nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n\n - NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n\n - NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n\n - nfs: Revalidate the file size on a fatal write error (git-fixes).\n\n - NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n\n - NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n\n - NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).\n\n - NFSv4-Fix-OPEN-CLOSE-race.patch\n\n - NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n\n - NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n\n - NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n\n - nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n\n - nl802154: add missing attribute validation (networking-stable-20_03_14).\n\n - nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n\n - objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n\n - objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n\n - objtool: Make BP scratch register warning more robust (bsc#1169514).\n\n - padata: Remove broken queue flushing (git-fixes).\n\n - Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).\n\n - PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).\n\n - PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).\n\n - PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n\n - perf: Allocate context task_ctx_data for child event (git-fixes).\n\n - perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n\n - perf: Copy parent's address filter offsets on clone (git-fixes).\n\n - perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n\n - perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n\n - perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n\n - perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n\n - perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n\n - perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n\n - perf/core: Fix exclusive events' grouping (git-fixes).\n\n - perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n\n - perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n\n - perf/core: Fix locking for children siblings group read (git-fixes).\n\n - perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).\n\n - perf/core: Fix perf_event_read_value() locking (git-fixes).\n\n - perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n\n - perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).\n\n - perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n\n - perf/core: Fix possible Spectre-v1 indexing for\n ->aux_pages (git-fixes).\n\n - perf/core: Fix race between close() and fork() (git-fixes).\n\n - perf/core: Fix the address filtering fix (git-fixes).\n\n - perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n\n - perf/core: Force USER_DS when recording user stack data (git-fixes).\n\n - perf/core: Restore mmap record type correctly (git-fixes).\n\n - perf: Fix header.size for namespace events (git-fixes).\n\n - perf/ioctl: Add check for the sample_period value (git-fixes).\n\n - perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n\n - perf: Return proper values for user stack errors (git-fixes).\n\n - pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n\n - pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n\n - pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).\n\n - platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n\n - pnfs: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n\n - powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n\n - powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n\n - powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n\n - powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n\n - qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).\n\n - r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n\n - raid6/ppc: Fix build for clang (git fixes (block drivers)).\n\n - random: always use batched entropy for get_random_u(32,64) (bsc#1164871).\n\n - rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n\n - Redo patch for SLE15-SP1, based on feedback from IBM:\n patches.suse/s390-ftrace-fix-potential-crashes-when-swit ching-tracers (bsc#1171244 LTC#185785 git-fixes).\n\n - resolve KABI warning for perf-pt-coresight (git-fixes).\n\n - Revert 'ALSA: hda/realtek: Fix pop noise on ALC225' (git-fixes).\n\n - Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279) 	* offset changes\n\n - Revert 'HID: i2c-hid: add Trekstor Primebook C11B to descriptor override' Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n\n - Revert 'HID: i2c-hid: override HID descriptors for certain devices' This broke i2c-hid.ko's build, there is no way around it without a big file rename or renaming the kernel module.\n\n - Revert 'i2c-hid: properly terminate i2c_hid_dmi_desc_override_table' Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n\n - Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).\n\n - Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (bsc#1103992).\n\n - rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n\n - s390/cio: avoid duplicated 'ADD' uevents (git-fixes).\n\n - s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n\n - s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n\n - s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).\n\n - s390/diag: fix display of diagnose call statistics (git-fixes).\n\n - s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n\n - s390/gmap: return proper error code on ksm unsharing (git-fixes).\n\n - s390/ism: fix error return code in ism_probe() (git-fixes).\n\n - s390/pci: do not set affinity for floating irqs (git-fixes).\n\n - s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n\n - s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n\n - s390/qeth: cancel RX reclaim work earlier (git-fixes).\n\n - s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n\n - s390/qeth: do not warn for napi with 0 budget (git-fixes).\n\n - s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n\n - s390/qeth: fix promiscuous mode after reset (git-fixes).\n\n - s390/qeth: fix qdio teardown after early init error (git-fixes).\n\n - s390/qeth: handle error due to unsupported transport mode (git-fixes).\n\n - s390/qeth: handle error when backing RX buffer (git-fixes).\n\n - s390/qeth: lock the card while changing its hsuid (git-fixes).\n\n - s390/qeth: support net namespaces for L3 devices (git-fixes).\n\n - s390/time: Fix clk type in get_tod_clock (git-fixes).\n\n - scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n\n - scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n\n - scsi: bnx2i: fix potential use after free (bsc#1171600).\n\n - scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601)\n\n - scsi: core: save/restore command resid for error handling (bsc#1171602).\n\n - scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n\n - scsi: core: try to get module before removing device (bsc#1171605).\n\n - scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n\n - scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n\n - scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n\n - scsi: fnic: fix invalid stack access (bsc#1171609).\n\n - scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n\n - scsi-ibmvfc-Don-t-send-implicit-logouts-prior-to-NPI.pat ch\n\n - scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n\n - scsi-ibmvscsi-Fix-WARN_ON-during-event-pool-release.patc h\n\n - scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n\n - scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n\n - scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n\n - scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).\n\n - scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): NULL pointer dereferences (bsc#1171614).\n\n - scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n\n - scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).\n\n - scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n\n - scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).\n\n - scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n\n - scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).\n\n - scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n\n - scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).\n\n - scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n\n - scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n\n - scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n\n - scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n\n - scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n\n - scsi-qla2xxx-check-UNLOADING-before-posting-async-wo.pat ch\n\n - scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n\n - scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n\n - scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n\n - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n\n - scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n\n - scsi: qla2xxx: Remove non functional code (bsc#1157169).\n\n - scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n\n - scsi-qla2xxx-set-UNLOADING-before-waiting-for-sessio.pat ch\n\n - scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n\n - scsi: qla4xxx: fix double free bug (bsc#1171618).\n\n - scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).\n\n - scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n\n - scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n\n - scsi: ufs: change msleep to usleep_range (bsc#1171622).\n\n - scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n\n - scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n\n - scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n\n - scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n\n - scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).\n\n - sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n\n - sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n\n - sctp: move the format error check out of\n __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n\n - selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).\n\n - seq_file: fix problem when seeking mid-record (bsc#1170125).\n\n - serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n\n - sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n\n - signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n\n - slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n\n - slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n\n - smb3: Additional compression structures (bsc#1144333).\n\n - smb3: Add new compression flags (bsc#1144333).\n\n - smb3: change noisy error message to FYI (bsc#1144333).\n\n - smb3: enable swap on SMB3 mounts (bsc#1144333).\n\n - smb3-fix-performance-regression-with-setting-mtime.patch\n\n - smb3: Minor cleanup of protocol definitions (bsc#1144333).\n\n - smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n\n - smb3: smbdirect support can be configured by default (bsc#1144333).\n\n - smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n\n - spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n\n - spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n\n - spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n\n - spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n\n - spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n\n - spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n\n - spi: fsl: do not map irq during probe (git-fixes).\n\n - spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n\n - spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n\n - spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n\n - spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n\n - spi: spi-s3c64xx: Fix system resume support (git-fixes).\n\n - spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n\n - staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n\n - staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n\n - staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n\n - staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n\n - staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n\n - staging: vt6656: Fix pairwise key entry save (git-fixes).\n\n - sunrpc: expiry_time should be seconds not timeval (git-fixes).\n\n - sunrpc: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).\n\n - supported.conf: Add br_netfilter to base (bsc#1169020).\n\n - supported.conf: support w1 core and thermometer support\n\n - svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).\n\n - svcrdma: Fix leak of transport addresses (git-fixes).\n\n - svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n\n - taskstats: fix data-race (bsc#1172188).\n\n - tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n\n - tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n\n - team: add missing attribute validation for array index (networking-stable-20_03_14).\n\n - team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n\n - team: fix hang in team_mode_get() (networking-stable-20_04_27).\n\n - tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n\n - tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n\n - tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n\n - tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n\n - tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n\n - tracing: Disable trace_printk() on post poned tests (git-fixes).\n\n - tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).\n\n - tty: rocket, avoid OOB access (git-fixes).\n\n - tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).\n\n - UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n\n - UAS: no use logging any details in case of ENODEV (git-fixes).\n\n - Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n\n - Update config files: re-enable CONFIG_HAMRADIO and co (bsc#1170740)\n\n - Update patches.suse/powerpc-pseries-ddw-Extend-upper-limit-for- huge-DMA-.patch (bsc#1142685 bsc#1167867 ltc#179509 ltc#184616).\n\n - Update patches.suse/x86-mm-split-vmalloc_sync_all.patch (bsc#1165741, bsc#1166969).\n\n - Update references:\n patches.suse/s390-pci-do-not-set-affinity-for-floating-i rqs (bsc#1171817 LTC#185819 git-fixes).\n\n - usb: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n\n - usb: cdc-acm: restore capability check order (git-fixes).\n\n - usb: core: Fix misleading driver bug report (bsc#1051510).\n\n - usb: dwc3: do not set gadget->is_otg flag (git-fixes).\n\n - usb: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n\n - usb: early: Handle AMD's spec-compliant identifiers, too (git-fixes).\n\n - usb: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n\n - usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n\n - usb: gadget: composite: Inform controller driver of self-powered (git-fixes).\n\n - usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n\n - usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n\n - usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n\n - usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).\n\n - usb: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n\n - usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n\n - usb: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n\n - usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n\n - usb: hub: Fix handling of connect changes during sleep (git-fixes).\n\n - usbnet: silence an unnecessary warning (bsc#1170770).\n\n - usb: serial: garmin_gps: add sanity checking for data length (git-fixes).\n\n - usb: serial: option: add BroadMobi BM806U (git-fixes).\n\n - usb: serial: option: add support for ASKEY WWHC050 (git-fixes).\n\n - usb: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n\n - usb: serial: qcserial: Add DW5816e support (git-fixes).\n\n - usb: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n\n - usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n\n - usb: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n\n - usb: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n\n - video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n\n - video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n\n - vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n\n - vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n\n - vt: selection, introduce vc_is_sel (git-fixes).\n\n - vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n\n - vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n\n - vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n\n - vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n\n - w1: Add subsystem kernel public interface (jsc#SLE-11048).\n\n - w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n\n - w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n\n - w1: use put_device() if device_register() fail (jsc#SLE-11048).\n\n - watchdog: reset last_hw_keepalive time at start (git-fixes).\n\n - wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).\n\n - wil6210: remove reset file from debugfs (git-fixes).\n\n - wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n\n - workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n\n - x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n\n - x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n\n - x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n\n - x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n\n - x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).\n\n - x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).\n\n - x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).\n\n - x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).\n\n - x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).\n\n - x86: hyperv: report value of misc_features (git fixes).\n\n - x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).\n\n - x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).\n\n - x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n\n - x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n\n - x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n\n - x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n\n - x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n\n - x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n\n - x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n\n - x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n\n - x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n\n - x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n\n - x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n\n - x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n\n - xen/pci: reserve MCFG areas earlier (bsc#1170145).\n\n - xfrm: Always set XFRM_TRANSFORMED in xfrm(4,6)_output_finish (networking-stable-20_04_27).\n\n - xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n\n - xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n\n - xfs: do not ever return a stale pointer from\n __xfs_dir3_free_read (git-fixes).\n\n - xprtrdma: Fix completion wait during device removal (git-fixes).", "published": "2020-07-20T00:00:00", "modified": "2022-05-13T00:00:00", "epss": [], "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.tenable.com/plugins/nessus/138679", "reporter": "This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://bugzilla.opensuse.org/show_bug.cgi?id=1171601", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170056", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171614", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172130", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170770", "https://bugzilla.opensuse.org/show_bug.cgi?id=1103992", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172202", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170145", "https://bugzilla.opensuse.org/show_bug.cgi?id=1169514", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171979", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171600", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171613", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171191", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172188", "https://bugzilla.opensuse.org/show_bug.cgi?id=1111666", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171604", "https://bugzilla.opensuse.org/show_bug.cgi?id=1167867", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171252", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171612", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171609", "https://bugzilla.opensuse.org/show_bug.cgi?id=1103990", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172317", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12656", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171951", "https://bugzilla.opensuse.org/show_bug.cgi?id=1158265", "https://bugzilla.opensuse.org/show_bug.cgi?id=1166969", "https://bugzilla.opensuse.org/show_bug.cgi?id=1090036", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172251", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171679", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171619", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171620", "https://bugzilla.opensuse.org/show_bug.cgi?id=1168854", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172185", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172199", "https://bugzilla.opensuse.org/show_bug.cgi?id=1113956", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171621", "https://bugzilla.opensuse.org/show_bug.cgi?id=1157169", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171214", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171606", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172366", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171078", "https://bugzilla.opensuse.org/show_bug.cgi?id=1168332", "https://bugzilla.opensuse.org/show_bug.cgi?id=1165183", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171610", "https://bugzilla.opensuse.org/show_bug.cgi?id=1166978", "https://bugzilla.opensuse.org/show_bug.cgi?id=1127371", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172017", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171949", "https://bugzilla.opensuse.org/show_bug.cgi?id=1167574", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171218", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171611", "https://bugzilla.opensuse.org/show_bug.cgi?id=1168789", "https://bugzilla.opensuse.org/show_bug.cgi?id=1112178", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171662", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171217", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170778", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171948", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171607", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171692", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171626", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171202", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171118", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171616", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171625", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170901", "https://bugzilla.opensuse.org/show_bug.cgi?id=1083647", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170457", "https://bugzilla.opensuse.org/show_bug.cgi?id=1065729", "https://bugzilla.opensuse.org/show_bug.cgi?id=1133021", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171602", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172391", "https://bugzilla.opensuse.org/show_bug.cgi?id=1103991", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171691", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171622", "https://bugzilla.opensuse.org/show_bug.cgi?id=1168670", "https://bugzilla.opensuse.org/show_bug.cgi?id=1127354", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170522", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171736", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171695", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171220", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171599", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170284", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172221", "https://bugzilla.opensuse.org/show_bug.cgi?id=1142685", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171618", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172127", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12657", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170621", "https://bugzilla.opensuse.org/show_bug.cgi?id=1104745", "https://bugzilla.opensuse.org/show_bug.cgi?id=1160947", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172104", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171195", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12659", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143", "https://bugzilla.opensuse.org/show_bug.cgi?id=1152489", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171098", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171623", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171982", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172102", "https://bugzilla.opensuse.org/show_bug.cgi?id=1165478", "https://bugzilla.opensuse.org/show_bug.cgi?id=1160388", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172101", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171617", "https://bugzilla.opensuse.org/show_bug.cgi?id=1144333", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170618", "https://bugzilla.opensuse.org/show_bug.cgi?id=1114279", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170345", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172099", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171952", "https://bugzilla.opensuse.org/show_bug.cgi?id=1109837", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172453", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9455", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608", "https://bugzilla.opensuse.org/show_bug.cgi?id=1151794", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812", "https://bugzilla.opensuse.org/show_bug.cgi?id=1169762", "https://bugzilla.opensuse.org/show_bug.cgi?id=1082555", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170791", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171694", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172342", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171293", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171605", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172201", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171983", "https://bugzilla.opensuse.org/show_bug.cgi?id=1169020", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172397", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170592", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172249", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654", "https://bugzilla.opensuse.org/show_bug.cgi?id=1127355", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171219", "https://bugzilla.opensuse.org/show_bug.cgi?id=1058115", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172344", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171244", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171615", "https://bugzilla.opensuse.org/show_bug.cgi?id=1154824", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10720", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170740", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171417", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172096", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172103", "https://bugzilla.opensuse.org/show_bug.cgi?id=1164780", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172378", "https://bugzilla.opensuse.org/show_bug.cgi?id=1112374", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172343", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172098", "https://bugzilla.opensuse.org/show_bug.cgi?id=1165741", "https://bugzilla.opensuse.org/show_bug.cgi?id=1169525", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12769", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171624", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171817", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170617", "https://bugzilla.opensuse.org/show_bug.cgi?id=1071995", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170125", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171527", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12655", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751", "https://bugzilla.opensuse.org/show_bug.cgi?id=1172097", "https://bugzilla.opensuse.org/show_bug.cgi?id=1124278", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171608", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732", "https://bugzilla.opensuse.org/show_bug.cgi?id=1168829", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171254", "https://bugzilla.opensuse.org/show_bug.cgi?id=1051510", "https://bugzilla.opensuse.org/show_bug.cgi?id=1170620", "https://bugzilla.opensuse.org/show_bug.cgi?id=1089895", "https://bugzilla.opensuse.org/show_bug.cgi?id=1164871", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171189", "https://bugzilla.opensuse.org/show_bug.cgi?id=1171205", "https://bugzilla.opensuse.org/show_bug.cgi?id=1167851"], "cvelist": ["CVE-2018-1000199", "CVE-2019-19462", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-0543", "CVE-2020-10690", "CVE-2020-10711", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-11608", "CVE-2020-11609", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12656", "CVE-2020-12657", "CVE-2020-12659", "CVE-2020-12769", "CVE-2020-13143"], "immutableFields": [], "lastseen": "2023-05-18T15:03:50", "viewCount": 26, "enchantments": {"dependencies": {"references": [{"type": "almalinux", "idList": ["ALSA-2020:4431", "ALSA-2021:1578", "ALSA-2021:3027"]}, {"type": "amazon", "idList": ["ALAS-2018-1023", "ALAS-2020-1366", "ALAS-2020-1377", "ALAS-2020-1382", "ALAS-2020-1396", "ALAS-2020-1401", "ALAS-2020-1465", "ALAS2-2018-1023", "ALAS2-2020-1425", "ALAS2-2020-1431", "ALAS2-2020-1440", "ALAS2-2020-1444", "ALAS2-2020-1465", "ALAS2-2020-1480"]}, {"type": "androidsecurity", "idList": ["ANDROID:2019-09-01", "ANDROID:2020-09-01", "ANDROID:2020-12-01"]}, {"type": "archlinux", "idList": ["ASA-202006-10"]}, {"type": "attackerkb", "idList": ["AKB:555EF2E1-269F-4133-8D13-B67EA80F8CC3"]}, {"type": "centos", "idList": ["CESA-2018:1318", "CESA-2020:2103", "CESA-2020:2430", "CESA-2020:2432", "CESA-2020:2433", "CESA-2020:2664", "CESA-2020:3220", "CESA-2020:4060", "CESA-2021:3028"]}, {"type": "citrix", "idList": ["CTX275165"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:0835B914E665F771DA10821B3BDE2D9F", "CFOUNDRY:27F5DB3AFDCF54F32837F9CE39245DE1", "CFOUNDRY:2B547AA94018245E71F37CB94BA4EEBC", "CFOUNDRY:5D359B30C62666D917EB31596D1BFDE4", "CFOUNDRY:873D4C50CDC37566272A2CA3925ADB7A", "CFOUNDRY:9BF498B2FAF35AA57F2C51B7E395428D", "CFOUNDRY:A5CCCF4486FE273FEA953C57B224799B", "CFOUNDRY:AC693D367392F4AE1E35E167BAADA484"]}, {"type": "cve", "idList": ["CVE-2018-1000199", "CVE-2019-19462", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-0255", "CVE-2020-0543", "CVE-2020-10690", "CVE-2020-10711", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-11608", "CVE-2020-11609", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12656", "CVE-2020-12657", "CVE-2020-12659", "CVE-2020-12769", "CVE-2020-13143"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1369-1:33F82", "DEBIAN:DLA-2241-1:DE3AB", "DEBIAN:DLA-2241-2:3E557", "DEBIAN:DLA-2242-1:573AF", "DEBIAN:DLA-2248-1:806E4", "DEBIAN:DLA-2248-1:D7645", "DEBIAN:DLA-2323-1:C146F", "DEBIAN:DLA-2420-1:692E7", "DEBIAN:DLA-2420-2:175D1", "DEBIAN:DSA-4187-1:481CA", "DEBIAN:DSA-4187-1:E8170", "DEBIAN:DSA-4188-1:B3909", "DEBIAN:DSA-4188-1:E4177", "DEBIAN:DSA-4698-1:66813", "DEBIAN:DSA-4698-1:E1A7D", "DEBIAN:DSA-4699-1:122C4", "DEBIAN:DSA-4699-1:D5D43", "DEBIAN:DSA-4701-1:768E4", "DEBIAN:DSA-4701-1:BB3B8"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2018-1000199", "DEBIANCVE:CVE-2019-19462", "DEBIANCVE:CVE-2019-20806", "DEBIANCVE:CVE-2019-20812", "DEBIANCVE:CVE-2019-9455", "DEBIANCVE:CVE-2020-0543", "DEBIANCVE:CVE-2020-10690", "DEBIANCVE:CVE-2020-10711", "DEBIANCVE:CVE-2020-10720", "DEBIANCVE:CVE-2020-10732", "DEBIANCVE:CVE-2020-10751", "DEBIANCVE:CVE-2020-10757", "DEBIANCVE:CVE-2020-11608", "DEBIANCVE:CVE-2020-11609", "DEBIANCVE:CVE-2020-12114", "DEBIANCVE:CVE-2020-12464", "DEBIANCVE:CVE-2020-12652", "DEBIANCVE:CVE-2020-12653", "DEBIANCVE:CVE-2020-12654", "DEBIANCVE:CVE-2020-12655", "DEBIANCVE:CVE-2020-12656", "DEBIANCVE:CVE-2020-12657", "DEBIANCVE:CVE-2020-12659", "DEBIANCVE:CVE-2020-12769", "DEBIANCVE:CVE-2020-13143"]}, {"type": "f5", "idList": ["F5:K02354867", "F5:K05617914", "F5:K25370250", "F5:K25920352", "F5:K44435547", "F5:K50928877", "F5:K96414292"]}, {"type": "fedora", "idList": ["FEDORA:055473124314", "FEDORA:15484608781D", "FEDORA:1E93431CA0AD", "FEDORA:29E8B30D1A9E", "FEDORA:2A755608EC25", "FEDORA:2AE7F3118C24", "FEDORA:3A4183118C44", "FEDORA:3C5D13124326", "FEDORA:62D0460BC99C", "FEDORA:803AE30C6416", "FEDORA:AAD0A60B6998", "FEDORA:AEC7F30A071F"]}, {"type": "freebsd", "idList": ["FBCBA194-AC7D-11EA-8B5E-B42E99A1B9C3"]}, {"type": "hp", "idList": ["HP:C06655648"]}, {"type": "ibm", "idList": ["056E8E90DE65417DDBD317AECA59E4BA53529394DA5008F22A756C161156DBF1", "11A6D2D3E2F465B16C8FA5A033A65600813397804613FDB0328399EEA7561293", "1879325E67264056B58E8AD7F16855960BE3D80A459CF04AA2C576744065C438", "1FDB55812AD3D9AB018A402C76AD1A7D7977943CA45EE64E54E9B459FD5AD0BA", "22DFDD1FF1BBF70D9C813ACA916818103631328A11AEED7718476AD8FD37F722", "36F5A24A0FE05876D471A20F32BE0669E453AF841B04CDD94792F8F80EF7F4D4", "3E3AF8AC7BA63076BEE8FFB670B3A3F27E0903C83526E54496E50EB2DF74B875", "3EAEDBE0E30513BE7769DF8783660E3102FA1E55B812C2C0193B4C7C36DD66CA", "570AF6CDC4F7E864E6852EBD03923041C13A884B424AC254820AD0EEB73694DF", "64ADFD088203597B59C398AB3DEF28DC4F72D37A4C48C7FA81C6531EDA6A9877", "65AC1B828E41A5505E1A8E4F6E7E2E7A2BE86DE58C539C97379A40C7ED8BBD9F", "74EB94293C5F397767E62C9F6D734DE973B44B9B7EC427A98C99E92C3C3D6590", "7BEBE6C769A16D13746B813CF456C36F85AE1B1A1CBD26E71A53BD6E5B34E2F4", "80799E3E1D58D5BC3B23A7FC96F082F8850107986619123365F56948D8AA7250", "89705B406BC34CFDE34239974351BBFD8507A55179356911F33A32F43F42DBB9", "8B24753FF8758BF51E7C6001AC39E0EF90B14323A9756CCEF8AC68E99EF03367", "9148A44BD9A1C1A13CCEBD8F0346557CF005830103920CDDC01519240525CB58", "93800CB903FCF930D2442012C501177682436E51AEBEA85D7632953A9A31B533", "B208854B100603393ABFE63FA8975A55F6379CCD86BE9A76E5EA76BC92BEB365", "C4826F6BCD3E1EC358C895C9FCA1260EC7609135ED81CBE00F22A388F6B09D6C", "CD8271F1E3A620207AA3EAC35F944E1453EFEBC4728A88B9C3D9D0DA7F511F56", "CF6E536B8BF01E2B0096F9F1D4C7911DD105359E60689B78C9199DE25B362636", "D860B85F49895E0D8CF0AC6A066F6902558B044E03F0320678E24399C41C6135", "ED8A3D1B7861E9FADE2E56F3710C2F426BD0F046968D24A2807B0DBC778A1AA1", "EDC4C5C80C00EE4AC9AA2C2F8FC5CF316B401A50DA42A577EE4FA380D4A47809", "F0AFFAB5446BEF6A6B346CA7237A1583252E55B1EA002352E7DFDFFB5796363C", "FA4B683BEB9B49C87C8F293AD46CC6FEDB68A76B71FDD62413EE14D604E1FE34"]}, {"type": "ics", "idList": ["ICSA-20-252-07"]}, {"type": "intel", "idList": ["INTEL:INTEL-SA-00320"]}, {"type": "lenovo", "idList": ["LENOVO:PS500327-INTEL-SPECIAL-REGISTER-BUFFER-DATA-SAMPLING-ADVISORY-NOSID", "LENOVO:PS500327-NOSID"]}, {"type": "mageia", "idList": ["MGASA-2020-0183", "MGASA-2020-0184", "MGASA-2020-0201", "MGASA-2020-0227", "MGASA-2020-0228", "MGASA-2020-0298", "MGASA-2020-0333"]}, {"type": "nessus", "idList": ["AL2_ALAS-2018-1023.NASL", "AL2_ALAS-2020-1425.NASL", "AL2_ALAS-2020-1431.NASL", "AL2_ALAS-2020-1440.NASL", "AL2_ALAS-2020-1444.NASL", "AL2_ALAS-2020-1465.NASL", "AL2_ALAS-2020-1480.NASL", "AL2_ALASKERNEL-5_4-2022-011.NASL", "AL2_ALASKERNEL-5_4-2022-012.NASL", "AL2_ALASKERNEL-5_4-2022-014.NASL", "ALA_ALAS-2018-1023.NASL", "ALA_ALAS-2020-1366.NASL", "ALA_ALAS-2020-1377.NASL", "ALA_ALAS-2020-1382.NASL", "ALA_ALAS-2020-1396.NASL", "ALA_ALAS-2020-1401.NASL", "ALMA_LINUX_ALSA-2020-4431.NASL", "ALMA_LINUX_ALSA-2021-1578.NASL", "ALMA_LINUX_ALSA-2021-3027.NASL", "CENTOS8_RHSA-2019-3517.NASL", "CENTOS8_RHSA-2020-1769.NASL", "CENTOS8_RHSA-2020-2102.NASL", "CENTOS8_RHSA-2020-2427.NASL", "CENTOS8_RHSA-2020-2431.NASL", "CENTOS8_RHSA-2020-4431.NASL", "CENTOS8_RHSA-2021-1578.NASL", "CENTOS8_RHSA-2021-3027.NASL", "CENTOS_RHSA-2018-1318.NASL", "CENTOS_RHSA-2020-2103.NASL", "CENTOS_RHSA-2020-2432.NASL", "CENTOS_RHSA-2020-2433.NASL", "CENTOS_RHSA-2020-3220.NASL", "CENTOS_RHSA-2020-4060.NASL", "CENTOS_RHSA-2021-3028.NASL", "DEBIAN_DLA-1369.NASL", "DEBIAN_DLA-2241.NASL", "DEBIAN_DLA-2242.NASL", "DEBIAN_DLA-2248.NASL", "DEBIAN_DLA-2323.NASL", "DEBIAN_DLA-2420.NASL", "DEBIAN_DSA-4187.NASL", "DEBIAN_DSA-4188.NASL", "DEBIAN_DSA-4698.NASL", "DEBIAN_DSA-4699.NASL", "DEBIAN_DSA-4701.NASL", "EULEROS_SA-2018-1132.NASL", "EULEROS_SA-2018-1196.NASL", "EULEROS_SA-2018-1263.NASL", "EULEROS_SA-2018-1266.NASL", "EULEROS_SA-2020-1186.NASL", "EULEROS_SA-2020-1508.NASL", "EULEROS_SA-2020-1536.NASL", "EULEROS_SA-2020-1592.NASL", "EULEROS_SA-2020-1606.NASL", "EULEROS_SA-2020-1674.NASL", "EULEROS_SA-2020-1698.NASL", "EULEROS_SA-2020-1713.NASL", "EULEROS_SA-2020-1807.NASL", "EULEROS_SA-2020-1892.NASL", "EULEROS_SA-2020-1920.NASL", "EULEROS_SA-2020-1938.NASL", "EULEROS_SA-2020-1958.NASL", "EULEROS_SA-2020-2150.NASL", "EULEROS_SA-2020-2222.NASL", "EULEROS_SA-2020-2353.NASL", "EULEROS_SA-2020-2443.NASL", "EULEROS_SA-2020-2514.NASL", "EULEROS_SA-2021-1039.NASL", "EULEROS_SA-2021-1056.NASL", "EULEROS_SA-2021-1079.NASL", "EULEROS_SA-2021-1311.NASL", "EULEROS_SA-2021-1684.NASL", "EULEROS_SA-2021-2040.NASL", "EULEROS_SA-2021-2140.NASL", "FEDORA_2020-07F0BE216F.NASL", "FEDORA_2020-11DDBFBDF0.NASL", "FEDORA_2020-1AFBE7BA2D.NASL", "FEDORA_2020-203FFEDEB5.NASL", "FEDORA_2020-3364913ACE.NASL", "FEDORA_2020-5A69DECC0C.NASL", "FEDORA_2020-C6B9FFF7F8.NASL", "FEDORA_2020-E47D28BC2B.NASL", "FEDORA_2020-E8835A5F8E.NASL", "FREEBSD_PKG_FBCBA194AC7D11EA8B5EB42E99A1B9C3.NASL", "NEWSTART_CGSL_NS-SA-2019-0025_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0028_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2020-0030_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0071_MICROCODE_CTL.NASL", "NEWSTART_CGSL_NS-SA-2020-0073_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0108_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0001_MICROCODE_CTL.NASL", "NEWSTART_CGSL_NS-SA-2021-0008_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0078_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0139_MICROCODE_CTL.NASL", "NEWSTART_CGSL_NS-SA-2021-0140_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0169_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0001_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0011_MICROCODE_CTL.NASL", "NEWSTART_CGSL_NS-SA-2022-0046_MICROCODE_CTL.NASL", "NEWSTART_CGSL_NS-SA-2022-0060_MICROCODE_CTL.NASL", "NEWSTART_CGSL_NS-SA-2022-0075_KERNEL.NASL", "NUTANIX_NXSA-AOS-5_15_3.NASL", "NUTANIX_NXSA-AOS-5_15_5.NASL", "NUTANIX_NXSA-AOS-5_17_1_3.NASL", "NUTANIX_NXSA-AOS-5_17_1_5.NASL", "NUTANIX_NXSA-AOS-5_18.NASL", "NUTANIX_NXSA-AOS-5_18_0_5.NASL", "NUTANIX_NXSA-AOS-5_18_1.NASL", "NUTANIX_NXSA-AOS-5_19_0_5.NASL", "NUTANIX_NXSA-AOS-5_19_1.NASL", "OPENSUSE-2018-514.NASL", "OPENSUSE-2020-791.NASL", "OPENSUSE-2020-818.NASL", "OPENSUSE-2020-935.NASL", "OPENSUSE-2020-965.NASL", "OPENSUSE-2020-985.NASL", "OPENSUSE-2021-242.NASL", "ORACLELINUX_ELSA-2018-1318.NASL", "ORACLELINUX_ELSA-2018-4126.NASL", "ORACLELINUX_ELSA-2018-4134.NASL", "ORACLELINUX_ELSA-2018-4145.NASL", "ORACLELINUX_ELSA-2018-4164.NASL", "ORACLELINUX_ELSA-2020-2082.NASL", "ORACLELINUX_ELSA-2020-2102.NASL", "ORACLELINUX_ELSA-2020-2103.NASL", "ORACLELINUX_ELSA-2020-2427.NASL", "ORACLELINUX_ELSA-2020-2431.NASL", "ORACLELINUX_ELSA-2020-2432.NASL", "ORACLELINUX_ELSA-2020-2433.NASL", "ORACLELINUX_ELSA-2020-3220.NASL", "ORACLELINUX_ELSA-2020-5676.NASL", "ORACLELINUX_ELSA-2020-5691.NASL", "ORACLELINUX_ELSA-2020-5708.NASL", "ORACLELINUX_ELSA-2020-5714.NASL", "ORACLELINUX_ELSA-2020-5715.NASL", "ORACLELINUX_ELSA-2020-5722.NASL", "ORACLELINUX_ELSA-2020-5732.NASL", "ORACLELINUX_ELSA-2020-5750.NASL", "ORACLELINUX_ELSA-2020-5755.NASL", "ORACLELINUX_ELSA-2020-5756.NASL", "ORACLELINUX_ELSA-2020-5804.NASL", "ORACLELINUX_ELSA-2020-5805.NASL", "ORACLELINUX_ELSA-2020-5837.NASL", "ORACLELINUX_ELSA-2020-5841.NASL", "ORACLELINUX_ELSA-2020-5845.NASL", "ORACLELINUX_ELSA-2020-5848.NASL", "ORACLELINUX_ELSA-2020-5866.NASL", "ORACLELINUX_ELSA-2021-1578.NASL", "ORACLELINUX_ELSA-2021-3027.NASL", "ORACLELINUX_ELSA-2021-3028.NASL", "ORACLELINUX_ELSA-2021-9002.NASL", "ORACLELINUX_ELSA-2021-9030.NASL", "ORACLELINUX_ELSA-2021-9459.NASL", "ORACLELINUX_ELSA-2022-9969.NASL", "ORACLEVM_OVMSA-2018-0228.NASL", "ORACLEVM_OVMSA-2018-0231.NASL", "ORACLEVM_OVMSA-2018-0237.NASL", "ORACLEVM_OVMSA-2020-0020.NASL", "ORACLEVM_OVMSA-2020-0026.NASL", "ORACLEVM_OVMSA-2020-0027.NASL", "ORACLEVM_OVMSA-2020-0028.NASL", "ORACLEVM_OVMSA-2020-0039.NASL", "ORACLEVM_OVMSA-2020-0041.NASL", "ORACLEVM_OVMSA-2020-0044.NASL", "ORACLEVM_OVMSA-2021-0001.NASL", "ORACLEVM_OVMSA-2021-0005.NASL", "ORACLEVM_OVMSA-2021-0031.NASL", "ORACLEVM_OVMSA-2021-0035.NASL", "PHOTONOS_PHSA-2020-1_0-0290_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0292_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0293_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0297_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0303_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0230_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0242_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0246_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0251_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0089_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0100_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0102_LINUX.NASL", "REDHAT-RHSA-2018-1318.NASL", "REDHAT-RHSA-2018-1345.NASL", "REDHAT-RHSA-2018-1347.NASL", "REDHAT-RHSA-2018-1348.NASL", "REDHAT-RHSA-2018-1354.NASL", "REDHAT-RHSA-2018-1355.NASL", "REDHAT-RHSA-2018-1374.NASL", "REDHAT-RHSA-2020-1567.NASL", "REDHAT-RHSA-2020-1769.NASL", "REDHAT-RHSA-2020-2082.NASL", "REDHAT-RHSA-2020-2085.NASL", "REDHAT-RHSA-2020-2102.NASL", "REDHAT-RHSA-2020-2103.NASL", "REDHAT-RHSA-2020-2104.NASL", "REDHAT-RHSA-2020-2125.NASL", "REDHAT-RHSA-2020-2171.NASL", "REDHAT-RHSA-2020-2199.NASL", "REDHAT-RHSA-2020-2203.NASL", "REDHAT-RHSA-2020-2214.NASL", "REDHAT-RHSA-2020-2242.NASL", "REDHAT-RHSA-2020-2277.NASL", "REDHAT-RHSA-2020-2285.NASL", "REDHAT-RHSA-2020-2289.NASL", "REDHAT-RHSA-2020-2291.NASL", "REDHAT-RHSA-2020-2427.NASL", "REDHAT-RHSA-2020-2428.NASL", "REDHAT-RHSA-2020-2429.NASL", "REDHAT-RHSA-2020-2431.NASL", "REDHAT-RHSA-2020-2432.NASL", "REDHAT-RHSA-2020-2433.NASL", "REDHAT-RHSA-2020-2519.NASL", "REDHAT-RHSA-2020-2522.NASL", "REDHAT-RHSA-2020-2567.NASL", "REDHAT-RHSA-2020-2667.NASL", "REDHAT-RHSA-2020-2669.NASL", "REDHAT-RHSA-2020-2677.NASL", "REDHAT-RHSA-2020-2679.NASL", "REDHAT-RHSA-2020-2680.NASL", "REDHAT-RHSA-2020-2706.NASL", "REDHAT-RHSA-2020-2707.NASL", "REDHAT-RHSA-2020-2757.NASL", "REDHAT-RHSA-2020-2758.NASL", "REDHAT-RHSA-2020-2771.NASL", "REDHAT-RHSA-2020-2832.NASL", "REDHAT-RHSA-2020-2842.NASL", "REDHAT-RHSA-2020-2854.NASL", "REDHAT-RHSA-2020-3010.NASL", "REDHAT-RHSA-2020-3016.NASL", "REDHAT-RHSA-2020-3041.NASL", "REDHAT-RHSA-2020-3220.NASL", "REDHAT-RHSA-2020-3221.NASL", "REDHAT-RHSA-2020-3222.NASL", "REDHAT-RHSA-2020-3224.NASL", "REDHAT-RHSA-2020-3226.NASL", "REDHAT-RHSA-2020-3232.NASL", "REDHAT-RHSA-2020-3389.NASL", "REDHAT-RHSA-2020-3432.NASL", "REDHAT-RHSA-2020-3545.NASL", "REDHAT-RHSA-2020-3598.NASL", "REDHAT-RHSA-2020-4060.NASL", "REDHAT-RHSA-2020-4062.NASL", "REDHAT-RHSA-2020-4431.NASL", "REDHAT-RHSA-2020-4609.NASL", "REDHAT-RHSA-2021-1578.NASL", "REDHAT-RHSA-2021-1739.NASL", "REDHAT-RHSA-2021-2185.NASL", "REDHAT-RHSA-2021-2190.NASL", "REDHAT-RHSA-2021-3027.NASL", "REDHAT-RHSA-2021-3028.NASL", "REDHAT-RHSA-2021-3029.NASL", "REDHAT-RHSA-2021-3176.NASL", "REDHAT-RHSA-2021-3255.NASL", "REDHAT-RHSA-2021-3317.NASL", "REDHAT-RHSA-2021-3322.NASL", "REDHAT-RHSA-2021-3323.NASL", "REDHAT-RHSA-2021-3364.NASL", "SLACKWARE_SSA_2020-163-01.NASL", "SL_20180508_KERNEL_ON_SL7_X.NASL", "SL_20200512_KERNEL_ON_SL6_X.NASL", "SL_20200512_KERNEL_ON_SL7_X.NASL", "SL_20200610_MICROCODE_CTL_ON_SL6_X.NASL", "SL_20201001_KERNEL_ON_SL7_X.NASL", "SL_20210809_MICROCODE_CTL_ON_SL7_X.NASL", "SUSE_SU-2018-1222-1.NASL", "SUSE_SU-2018-1223-1.NASL", "SUSE_SU-2018-1224-1.NASL", "SUSE_SU-2018-1226-1.NASL", "SUSE_SU-2018-1227-1.NASL", "SUSE_SU-2018-1229-1.NASL", "SUSE_SU-2018-1230-1.NASL", "SUSE_SU-2018-1231-1.NASL", "SUSE_SU-2018-1232-1.NASL", "SUSE_SU-2018-1233-1.NASL", "SUSE_SU-2018-1234-1.NASL", "SUSE_SU-2018-1235-1.NASL", "SUSE_SU-2018-1236-1.NASL", "SUSE_SU-2018-1237-1.NASL", "SUSE_SU-2018-1239-1.NASL", "SUSE_SU-2018-1241-1.NASL", "SUSE_SU-2018-1242-1.NASL", "SUSE_SU-2018-1243-1.NASL", "SUSE_SU-2018-1244-1.NASL", "SUSE_SU-2018-1245-1.NASL", "SUSE_SU-2018-1247-1.NASL", "SUSE_SU-2018-1250-1.NASL", "SUSE_SU-2018-1251-1.NASL", "SUSE_SU-2018-1253-1.NASL", "SUSE_SU-2018-1254-1.NASL", "SUSE_SU-2018-1255-1.NASL", "SUSE_SU-2018-1256-1.NASL", "SUSE_SU-2018-1257-1.NASL", "SUSE_SU-2018-1258-1.NASL", "SUSE_SU-2018-1259-1.NASL", "SUSE_SU-2018-1261-1.NASL", "SUSE_SU-2018-1262-1.NASL", "SUSE_SU-2018-1264-1.NASL", "SUSE_SU-2018-1266-1.NASL", "SUSE_SU-2018-1267-1.NASL", "SUSE_SU-2018-1268-1.NASL", "SUSE_SU-2018-1269-1.NASL", "SUSE_SU-2018-1272-1.NASL", "SUSE_SU-2018-1273-1.NASL", "SUSE_SU-2018-1366-1.NASL", "SUSE_SU-2018-1368-1.NASL", "SUSE_SU-2018-1374-1.NASL", "SUSE_SU-2018-1375-1.NASL", "SUSE_SU-2018-1376-1.NASL", "SUSE_SU-2018-1508-1.NASL", "SUSE_SU-2018-1525-1.NASL", "SUSE_SU-2018-1550-1.NASL", "SUSE_SU-2018-1551-1.NASL", "SUSE_SU-2018-1855-1.NASL", "SUSE_SU-2018-1855-2.NASL", "SUSE_SU-2020-1255-1.NASL", "SUSE_SU-2020-1275-1.NASL", "SUSE_SU-2020-14354-1.NASL", "SUSE_SU-2020-14393-1.NASL", "SUSE_SU-2020-14394-1.NASL", "SUSE_SU-2020-14442-1.NASL", "SUSE_SU-2020-14521-1.NASL", "SUSE_SU-2020-1475-1.NASL", "SUSE_SU-2020-1486-1.NASL", "SUSE_SU-2020-1587-1.NASL", "SUSE_SU-2020-1589-1.NASL", "SUSE_SU-2020-1595-1.NASL", "SUSE_SU-2020-1596-1.NASL", "SUSE_SU-2020-1597-1.NASL", "SUSE_SU-2020-1599-1.NASL", "SUSE_SU-2020-1601-1.NASL", "SUSE_SU-2020-1602-1.NASL", "SUSE_SU-2020-1603-1.NASL", "SUSE_SU-2020-1605-1.NASL", "SUSE_SU-2020-1609-1.NASL", "SUSE_SU-2020-1630-1.NASL", "SUSE_SU-2020-1632-1.NASL", "SUSE_SU-2020-1633-1.NASL", "SUSE_SU-2020-1663-1.NASL", "SUSE_SU-2020-1764-1.NASL", "SUSE_SU-2020-1767-1.NASL", "SUSE_SU-2020-1779-1.NASL", "SUSE_SU-2020-1781-1.NASL", "SUSE_SU-2020-1784-1.NASL", "SUSE_SU-2020-1887-1.NASL", "SUSE_SU-2020-1889-1.NASL", "SUSE_SU-2020-1902-1.NASL", "SUSE_SU-2020-2105-1.NASL", "SUSE_SU-2020-2134-1.NASL", "SUSE_SU-2020-2152-1.NASL", "SUSE_SU-2020-2487-1.NASL", "SUSE_SU-2020-2822-1.NASL", "SUSE_SU-2021-0438-1.NASL", "SUSE_SU-2021-3929-1.NASL", "SUSE_SU-2021-3935-1.NASL", "UBUNTU_USN-3641-1.NASL", "UBUNTU_USN-4345-1.NASL", "UBUNTU_USN-4363-1.NASL", "UBUNTU_USN-4364-1.NASL", "UBUNTU_USN-4367-1.NASL", "UBUNTU_USN-4367-2.NASL", "UBUNTU_USN-4368-1.NASL", "UBUNTU_USN-4369-1.NASL", "UBUNTU_USN-4369-2.NASL", "UBUNTU_USN-4385-1.NASL", "UBUNTU_USN-4385-2.NASL", "UBUNTU_USN-4387-1.NASL", "UBUNTU_USN-4388-1.NASL", "UBUNTU_USN-4389-1.NASL", "UBUNTU_USN-4390-1.NASL", "UBUNTU_USN-4391-1.NASL", "UBUNTU_USN-4411-1.NASL", "UBUNTU_USN-4412-1.NASL", "UBUNTU_USN-4413-1.NASL", "UBUNTU_USN-4414-1.NASL", "UBUNTU_USN-4419-1.NASL", "UBUNTU_USN-4425-1.NASL", "UBUNTU_USN-4426-1.NASL", "UBUNTU_USN-4427-1.NASL", "UBUNTU_USN-4439-1.NASL", "UBUNTU_USN-4440-1.NASL", "UBUNTU_USN-4465-1.NASL", "UBUNTU_USN-4483-1.NASL", "UBUNTU_USN-4485-1.NASL", "UBUNTU_USN-5343-1.NASL", "UBUNTU_USN-5617-1.NASL", "VIRTUOZZO_VZA-2018-030.NASL", "VIRTUOZZO_VZA-2020-037.NASL", "VIRTUOZZO_VZA-2020-038.NASL", "VIRTUOZZO_VZA-2020-045.NASL", "XEN_SERVER_XSA-320.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310108766", "OPENVAS:1361412562310108812", "OPENVAS:1361412562310704187", "OPENVAS:1361412562310704188", "OPENVAS:1361412562310704698", "OPENVAS:1361412562310704699", "OPENVAS:1361412562310704701", "OPENVAS:1361412562310843518", "OPENVAS:1361412562310844406", "OPENVAS:1361412562310844433", "OPENVAS:1361412562310844434", "OPENVAS:1361412562310844438", "OPENVAS:1361412562310844439", "OPENVAS:1361412562310844443", "OPENVAS:1361412562310844448", "OPENVAS:1361412562310844451", "OPENVAS:1361412562310844461", "OPENVAS:1361412562310844462", "OPENVAS:1361412562310844463", "OPENVAS:1361412562310844464", "OPENVAS:1361412562310844465", "OPENVAS:1361412562310844466", "OPENVAS:1361412562310844468", "OPENVAS:1361412562310844482", "OPENVAS:1361412562310844483", "OPENVAS:1361412562310844484", "OPENVAS:1361412562310844485", "OPENVAS:1361412562310844496", "OPENVAS:1361412562310851762", "OPENVAS:1361412562310853200", "OPENVAS:1361412562310853206", "OPENVAS:1361412562310853214", "OPENVAS:1361412562310853260", "OPENVAS:1361412562310877859", "OPENVAS:1361412562310877862", "OPENVAS:1361412562310877884", "OPENVAS:1361412562310877951", "OPENVAS:1361412562310877952", "OPENVAS:1361412562310877958", "OPENVAS:1361412562310877968", "OPENVAS:1361412562310877977", "OPENVAS:1361412562310877980", "OPENVAS:1361412562310877999", "OPENVAS:1361412562310878006", "OPENVAS:1361412562310882900", "OPENVAS:1361412562310883236", "OPENVAS:1361412562310883249", "OPENVAS:1361412562310883250", "OPENVAS:1361412562310883251", "OPENVAS:1361412562310883257", "OPENVAS:1361412562310891369", "OPENVAS:1361412562310892241", "OPENVAS:1361412562310892242", "OPENVAS:1361412562310892248", "OPENVAS:1361412562311220181132", "OPENVAS:1361412562311220181196", "OPENVAS:1361412562311220181263", "OPENVAS:1361412562311220181266", "OPENVAS:1361412562311220201186", "OPENVAS:1361412562311220201508", "OPENVAS:1361412562311220201536", "OPENVAS:1361412562311220201592", "OPENVAS:1361412562311220201606", "OPENVAS:1361412562311220201674", "OPENVAS:1361412562311220201698", "OPENVAS:1361412562311220201713"]}, {"type": "oracle", "idList": ["ORACLE:CPUAPR2021"]}, {"type": "oraclelinux", "idList": ["ELSA-2018-1318", "ELSA-2018-1629", "ELSA-2018-4126", "ELSA-2018-4134", "ELSA-2018-4145", "ELSA-2018-4164", "ELSA-2020-2082", "ELSA-2020-2102", "ELSA-2020-2103", "ELSA-2020-2427", "ELSA-2020-2430", "ELSA-2020-2431", "ELSA-2020-2432", "ELSA-2020-2433", "ELSA-2020-2664", "ELSA-2020-2933", "ELSA-2020-3010", "ELSA-2020-3220", "ELSA-2020-4060", "ELSA-2020-4431", "ELSA-2020-5676", "ELSA-2020-5691", "ELSA-2020-5708", "ELSA-2020-5714", "ELSA-2020-5715", "ELSA-2020-5722", "ELSA-2020-5732", "ELSA-2020-5750", "ELSA-2020-5755", "ELSA-2020-5756", "ELSA-2020-5765", "ELSA-2020-5766", "ELSA-2020-5804", "ELSA-2020-5805", "ELSA-2020-5837", "ELSA-2020-5841", "ELSA-2020-5845", "ELSA-2020-5848", "ELSA-2020-5866", "ELSA-2021-1578", "ELSA-2021-3027", "ELSA-2021-3028", "ELSA-2021-9002", "ELSA-2021-9030", "ELSA-2021-9459", "ELSA-2022-9969"]}, {"type": "osv", "idList": ["OSV:ASB-A-156071259", "OSV:ASB-A-170658976", "OSV:DLA-1369-1", "OSV:DLA-2241-1", "OSV:DLA-2242-1", "OSV:DLA-2248-1", "OSV:DLA-2323-1", "OSV:DLA-2420-1", "OSV:DSA-4187-1", "OSV:DSA-4188-1", "OSV:DSA-4698-1", "OSV:DSA-4699-1", "OSV:DSA-4701-1"]}, {"type": "photon", "idList": ["PHSA-2019-0021", "PHSA-2019-0165", "PHSA-2019-1.0-0238", "PHSA-2019-3.0-0021", "PHSA-2020-0052", "PHSA-2020-0069", "PHSA-2020-0082", "PHSA-2020-0089", "PHSA-2020-0100", "PHSA-2020-0102", "PHSA-2020-0108", "PHSA-2020-0153", "PHSA-2020-0212", "PHSA-2020-0219", "PHSA-2020-0230", "PHSA-2020-0238", "PHSA-2020-0239", "PHSA-2020-0242", "PHSA-2020-0246", "PHSA-2020-0251", "PHSA-2020-0254", "PHSA-2020-0256", "PHSA-2020-0274", "PHSA-2020-0279", "PHSA-2020-0287", "PHSA-2020-0290", "PHSA-2020-0292", "PHSA-2020-0293", "PHSA-2020-0297", "PHSA-2020-0303", "PHSA-2020-1.0-0274", "PHSA-2020-1.0-0279", "PHSA-2020-1.0-0287", "PHSA-2020-1.0-0290", "PHSA-2020-1.0-0292", "PHSA-2020-1.0-0293", "PHSA-2020-1.0-0297", "PHSA-2020-1.0-0303", "PHSA-2020-2.0-0230", "PHSA-2020-2.0-0242", "PHSA-2020-2.0-0246", "PHSA-2020-2.0-0251", "PHSA-2020-3.0-0052", "PHSA-2020-3.0-0069", "PHSA-2020-3.0-0082", "PHSA-2020-3.0-0089", "PHSA-2020-3.0-0100", "PHSA-2020-3.0-0102", "PHSA-2020-3.0-0108", "PHSA-2020-3.0-0118", "PHSA-2020-3.0-0153"]}, {"type": "redhat", "idList": ["RHSA-2018:1318", "RHSA-2018:1345", "RHSA-2018:1347", "RHSA-2018:1348", "RHSA-2018:1354", "RHSA-2018:1355", "RHSA-2018:1374", "RHSA-2019:3309", "RHSA-2019:3517", "RHSA-2020:1567", "RHSA-2020:1769", "RHSA-2020:2082", "RHSA-2020:2085", "RHSA-2020:2102", "RHSA-2020:2103", "RHSA-2020:2104", "RHSA-2020:2125", "RHSA-2020:2171", "RHSA-2020:2199", "RHSA-2020:2203", "RHSA-2020:2214", "RHSA-2020:2242", "RHSA-2020:2277", "RHSA-2020:2285", "RHSA-2020:2289", "RHSA-2020:2291", "RHSA-2020:2427", "RHSA-2020:2428", "RHSA-2020:2429", "RHSA-2020:2430", "RHSA-2020:2431", "RHSA-2020:2432", "RHSA-2020:2433", "RHSA-2020:2519", "RHSA-2020:2522", "RHSA-2020:2567", "RHSA-2020:2664", "RHSA-2020:2665", "RHSA-2020:2667", "RHSA-2020:2669", "RHSA-2020:2677", "RHSA-2020:2679", "RHSA-2020:2680", "RHSA-2020:2706", "RHSA-2020:2707", "RHSA-2020:2757", "RHSA-2020:2758", "RHSA-2020:2770", "RHSA-2020:2771", "RHSA-2020:2777", "RHSA-2020:2831", "RHSA-2020:2832", "RHSA-2020:2842", "RHSA-2020:2851", "RHSA-2020:2854", "RHSA-2020:3010", "RHSA-2020:3016", "RHSA-2020:3019", "RHSA-2020:3041", "RHSA-2020:3194", "RHSA-2020:3220", "RHSA-2020:3221", "RHSA-2020:3222", "RHSA-2020:3224", "RHSA-2020:3226", "RHSA-2020:3232", "RHSA-2020:3389", "RHSA-2020:3432", "RHSA-2020:3545", "RHSA-2020:3598", "RHSA-2020:4060", "RHSA-2020:4062", "RHSA-2020:4431", "RHSA-2020:4609", "RHSA-2020:5633", "RHSA-2020:5635", "RHSA-2021:1578", "RHSA-2021:1739", "RHSA-2021:2121", "RHSA-2021:2136", "RHSA-2021:2185", "RHSA-2021:2190", "RHSA-2021:3027", "RHSA-2021:3028", "RHSA-2021:3029", "RHSA-2021:3176", "RHSA-2021:3255", "RHSA-2021:3317", "RHSA-2021:3322", "RHSA-2021:3323", "RHSA-2021:3364"]}, {"type": "redhatcve", "idList": ["RH:CVE-2018-1000199", "RH:CVE-2019-19462", "RH:CVE-2019-20806", "RH:CVE-2019-20812", "RH:CVE-2019-9455", "RH:CVE-2020-0543", "RH:CVE-2020-10690", "RH:CVE-2020-10711", "RH:CVE-2020-10720", "RH:CVE-2020-10732", "RH:CVE-2020-10751", "RH:CVE-2020-10757", "RH:CVE-2020-11608", "RH:CVE-2020-11609", "RH:CVE-2020-12114", "RH:CVE-2020-12464", "RH:CVE-2020-12652", "RH:CVE-2020-12653", "RH:CVE-2020-12654", "RH:CVE-2020-12655", "RH:CVE-2020-12656", "RH:CVE-2020-12657", "RH:CVE-2020-12659", "RH:CVE-2020-12769", "RH:CVE-2020-13143"]}, {"type": "rocky", "idList": ["RLSA-2021:3027"]}, {"type": "slackware", "idList": ["SSA-2020-163-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:1418-1", "OPENSUSE-SU-2020:0791-1", "OPENSUSE-SU-2020:0801-1", "OPENSUSE-SU-2020:0818-1", "OPENSUSE-SU-2020:0935-1", "OPENSUSE-SU-2020:0965-1", "OPENSUSE-SU-2020:0985-1", "OPENSUSE-SU-2021:0242-1", "SUSE-SU-2018:1222-1", "SUSE-SU-2018:1223-1", "SUSE-SU-2018:1224-1", "SUSE-SU-2018:1225-1", "SUSE-SU-2018:1226-1", "SUSE-SU-2018:1227-1", "SUSE-SU-2018:1228-1", "SUSE-SU-2018:1229-1", "SUSE-SU-2018:1230-1", "SUSE-SU-2018:1231-1", "SUSE-SU-2018:1232-1", "SUSE-SU-2018:1233-1", "SUSE-SU-2018:1234-1", "SUSE-SU-2018:1235-1", "SUSE-SU-2018:1236-1", "SUSE-SU-2018:1237-1", "SUSE-SU-2018:1238-1", "SUSE-SU-2018:1239-1", "SUSE-SU-2018:1240-1", "SUSE-SU-2018:1241-1", "SUSE-SU-2018:1242-1", "SUSE-SU-2018:1243-1", "SUSE-SU-2018:1244-1", "SUSE-SU-2018:1245-1", "SUSE-SU-2018:1246-1", "SUSE-SU-2018:1247-1", "SUSE-SU-2018:1248-1", "SUSE-SU-2018:1249-1", "SUSE-SU-2018:1250-1", "SUSE-SU-2018:1251-1", "SUSE-SU-2018:1252-1", "SUSE-SU-2018:1253-1", "SUSE-SU-2018:1254-1", "SUSE-SU-2018:1255-1", "SUSE-SU-2018:1256-1", "SUSE-SU-2018:1257-1", "SUSE-SU-2018:1258-1", "SUSE-SU-2018:1259-1", "SUSE-SU-2018:1260-1", "SUSE-SU-2018:1261-1", "SUSE-SU-2018:1262-1", "SUSE-SU-2018:1263-1", "SUSE-SU-2018:1264-1", "SUSE-SU-2018:1266-1", "SUSE-SU-2018:1267-1", "SUSE-SU-2018:1268-1", "SUSE-SU-2018:1269-1", "SUSE-SU-2018:1270-1", "SUSE-SU-2018:1272-1", "SUSE-SU-2018:1273-1"]}, {"type": "thn", "idList": ["THN:8841D27BD6D8D04E9583E7E0F20898D5"]}, {"type": "threatpost", "idList": ["THREATPOST:17E00AD621A0ECD9F90FE97E083BF4AC", "THREATPOST:7016E3D2F3480C9399BCD12F9CE0D562", "THREATPOST:EF0075FFF210E542FF3ECB996DDA02A3"]}, {"type": "ubuntu", "idList": ["LSN-0068-1", "LSN-0069-1", "LSN-0072-1", "USN-3641-1", "USN-3641-2", "USN-4345-1", "USN-4363-1", "USN-4364-1", "USN-4367-1", "USN-4367-2", "USN-4368-1", "USN-4369-1", "USN-4369-2", "USN-4385-1", "USN-4385-2", "USN-4387-1", "USN-4388-1", "USN-4389-1", "USN-4390-1", "USN-4391-1", "USN-4392-1", "USN-4393-1", "USN-4411-1", "USN-4412-1", "USN-4413-1", "USN-4414-1", "USN-4419-1", "USN-4425-1", "USN-4426-1", "USN-4427-1", "USN-4439-1", "USN-4440-1", "USN-4465-1", "USN-4483-1", "USN-4485-1", "USN-5343-1", "USN-5617-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-1000199", "UB:CVE-2019-19462", "UB:CVE-2019-20806", "UB:CVE-2019-20812", "UB:CVE-2019-9455", "UB:CVE-2020-0543", "UB:CVE-2020-10690", "UB:CVE-2020-10711", "UB:CVE-2020-10720", "UB:CVE-2020-10732", "UB:CVE-2020-10751", "UB:CVE-2020-10757", "UB:CVE-2020-11608", "UB:CVE-2020-11609", "UB:CVE-2020-12114", "UB:CVE-2020-12464", "UB:CVE-2020-12652", "UB:CVE-2020-12653", "UB:CVE-2020-12654", "UB:CVE-2020-12655", "UB:CVE-2020-12656", "UB:CVE-2020-12657", "UB:CVE-2020-12659", "UB:CVE-2020-12769", "UB:CVE-2020-13143"]}, {"type": "veracode", "idList": ["VERACODE:12879", "VERACODE:25398", "VERACODE:25645", "VERACODE:25648", "VERACODE:25824", "VERACODE:25825", "VERACODE:25934", "VERACODE:26853", "VERACODE:26876", "VERACODE:26927", "VERACODE:27775", "VERACODE:27776", "VERACODE:27781", "VERACODE:27782", "VERACODE:29336", "VERACODE:30569", "VERACODE:30571", "VERACODE:30572"]}, {"type": "virtuozzo", "idList": ["VZA-2018-030", "VZA-2020-036", "VZA-2020-037", "VZA-2020-038", "VZA-2020-044", "VZA-2020-045", "VZA-2020-046", "VZA-2020-048"]}, {"type": "xen", "idList": ["XSA-320"]}]}, "score": {"value": -0.1, "vector": "NONE"}, "backreferences": {"references": [{"type": "almalinux", "idList": ["ALSA-2020:4431"]}, {"type": "amazon", "idList": ["ALAS-2018-1023", "ALAS-2020-1377", "ALAS2-2018-1023", "ALAS2-2020-1425", "ALAS2-2020-1431", "ALAS2-2020-1440", "ALAS2-2020-1444", "ALAS2-2020-1465", "ALAS2-2020-1480"]}, {"type": "androidsecurity", "idList": ["ANDROID:2020-08-01", "ANDROID:2021-01-01"]}, {"type": "archlinux", "idList": ["ASA-202006-10"]}, {"type": "attackerkb", "idList": ["AKB:555EF2E1-269F-4133-8D13-B67EA80F8CC3"]}, {"type": "centos", "idList": ["CESA-2018:1318", "CESA-2020:2103", "CESA-2020:2430", "CESA-2020:2432", "CESA-2020:2433"]}, {"type": "citrix", "idList": ["CTX275165"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:0835B914E665F771DA10821B3BDE2D9F", "CFOUNDRY:9BF498B2FAF35AA57F2C51B7E395428D", "CFOUNDRY:A5CCCF4486FE273FEA953C57B224799B", "CFOUNDRY:AC693D367392F4AE1E35E167BAADA484"]}, {"type": "cve", "idList": ["CVE-2018-1000199", "CVE-2019-20806", "CVE-2019-20812", "CVE-2020-10711", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-13143"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1369-1:33F82", "DEBIAN:DLA-2242-1:573AF", "DEBIAN:DSA-4187-1:481CA", "DEBIAN:DSA-4188-1:E4177", "DEBIAN:DSA-4698-1:66813", "DEBIAN:DSA-4699-1:122C4", "DEBIAN:DSA-4701-1:BB3B8"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2020-0543"]}, {"type": "f5", "idList": ["F5:K02354867", "F5:K05617914", "F5:K25920352", "F5:K44435547", "F5:K50928877", "F5:K96414292"]}, {"type": "fedora", "idList": ["FEDORA:055473124314", "FEDORA:15484608781D", "FEDORA:1E93431CA0AD", "FEDORA:29E8B30D1A9E", "FEDORA:2A755608EC25", "FEDORA:2AE7F3118C24", "FEDORA:3A4183118C44", "FEDORA:3C5D13124326", "FEDORA:62D0460BC99C", "FEDORA:803AE30C6416", "FEDORA:AAD0A60B6998", "FEDORA:AEC7F30A071F"]}, {"type": "freebsd", "idList": ["FBCBA194-AC7D-11EA-8B5E-B42E99A1B9C3"]}, {"type": "hp", "idList": ["HP:C06655648"]}, {"type": "ibm", "idList": ["22DFDD1FF1BBF70D9C813ACA916818103631328A11AEED7718476AD8FD37F722", "74EB94293C5F397767E62C9F6D734DE973B44B9B7EC427A98C99E92C3C3D6590", "7BEBE6C769A16D13746B813CF456C36F85AE1B1A1CBD26E71A53BD6E5B34E2F4"]}, {"type": "ics", "idList": ["ICSA-20-252-07"]}, {"type": "lenovo", "idList": ["LENOVO:PS500327-NOSID"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/ORACLE_LINUX-CVE-2020-10742/"]}, {"type": "nessus", "idList": ["AL2_ALAS-2018-1023.NASL", "AL2_ALAS-2020-1431.NASL", "ALA_ALAS-2018-1023.NASL", "ALA_ALAS-2020-1366.NASL", "ALA_ALAS-2020-1377.NASL", "CENTOS8_RHSA-2021-1578.NASL", "CENTOS_RHSA-2018-1318.NASL", "CENTOS_RHSA-2020-2103.NASL", "DEBIAN_DLA-1369.NASL", "DEBIAN_DSA-4187.NASL", "DEBIAN_DSA-4188.NASL", "EULEROS_SA-2018-1132.NASL", "EULEROS_SA-2020-1592.NASL", "EULEROS_SA-2020-1606.NASL", "FEDORA_2020-07F0BE216F.NASL", "FEDORA_2020-1AFBE7BA2D.NASL", "FEDORA_2020-5A69DECC0C.NASL", "FEDORA_2020-C6B9FFF7F8.NASL", "FREEBSD_PKG_FBCBA194AC7D11EA8B5EB42E99A1B9C3.NASL", "OPENSUSE-2018-514.NASL", "ORACLELINUX_ELSA-2018-1318.NASL", "ORACLELINUX_ELSA-2020-2082.NASL", "ORACLELINUX_ELSA-2020-2102.NASL", "ORACLELINUX_ELSA-2020-5691.NASL", "ORACLELINUX_ELSA-2020-5708.NASL", "ORACLELINUX_ELSA-2020-5714.NASL", "ORACLELINUX_ELSA-2020-5715.NASL", "ORACLELINUX_ELSA-2021-1578.NASL", "ORACLELINUX_ELSA-2021-9459.NASL", "ORACLEVM_OVMSA-2020-0020.NASL", "ORACLEVM_OVMSA-2021-0031.NASL", "PHOTONOS_PHSA-2020-2_0-0251_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0100_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0102_LINUX.NASL", "REDHAT-RHSA-2018-1318.NASL", "REDHAT-RHSA-2018-1345.NASL", "REDHAT-RHSA-2018-1347.NASL", "REDHAT-RHSA-2018-1348.NASL", "REDHAT-RHSA-2018-1354.NASL", "REDHAT-RHSA-2018-1355.NASL", "REDHAT-RHSA-2018-1374.NASL", "REDHAT-RHSA-2020-2199.NASL", "REDHAT-RHSA-2020-2214.NASL", "REDHAT-RHSA-2020-2242.NASL", "REDHAT-RHSA-2020-2277.NASL", "REDHAT-RHSA-2020-2285.NASL", "REDHAT-RHSA-2020-2289.NASL", "REDHAT-RHSA-2020-2427.NASL", "REDHAT-RHSA-2020-2428.NASL", "REDHAT-RHSA-2020-2429.NASL", "REDHAT-RHSA-2020-2431.NASL", "REDHAT-RHSA-2020-2433.NASL", "REDHAT-RHSA-2020-2679.NASL", "REDHAT-RHSA-2020-2707.NASL", "REDHAT-RHSA-2020-2854.NASL", "REDHAT-RHSA-2021-1578.NASL", "REDHAT-RHSA-2021-1739.NASL", "REDHAT-RHSA-2021-2185.NASL", "REDHAT-RHSA-2021-2190.NASL", "REDHAT-RHSA-2021-3255.NASL", "SL_20180508_KERNEL_ON_SL7_X.NASL", "SL_20200512_KERNEL_ON_SL7_X.NASL", "SUSE_SU-2018-1222-1.NASL", "SUSE_SU-2018-1223-1.NASL", "SUSE_SU-2018-1224-1.NASL", "SUSE_SU-2018-1226-1.NASL", "SUSE_SU-2018-1227-1.NASL", "SUSE_SU-2018-1229-1.NASL", "SUSE_SU-2018-1230-1.NASL", "SUSE_SU-2018-1231-1.NASL", "SUSE_SU-2018-1232-1.NASL", "SUSE_SU-2018-1233-1.NASL", "SUSE_SU-2018-1234-1.NASL", "SUSE_SU-2018-1235-1.NASL", "SUSE_SU-2018-1236-1.NASL", "SUSE_SU-2018-1237-1.NASL", "SUSE_SU-2018-1239-1.NASL", "SUSE_SU-2018-1241-1.NASL", "SUSE_SU-2018-1242-1.NASL", "SUSE_SU-2018-1243-1.NASL", "SUSE_SU-2018-1244-1.NASL", "SUSE_SU-2018-1245-1.NASL", "SUSE_SU-2018-1247-1.NASL", "SUSE_SU-2018-1250-1.NASL", "SUSE_SU-2018-1251-1.NASL", "SUSE_SU-2018-1253-1.NASL", "SUSE_SU-2018-1254-1.NASL", "SUSE_SU-2018-1255-1.NASL", "SUSE_SU-2018-1256-1.NASL", "SUSE_SU-2018-1257-1.NASL", "SUSE_SU-2018-1258-1.NASL", "SUSE_SU-2018-1259-1.NASL", "SUSE_SU-2018-1261-1.NASL", "SUSE_SU-2018-1262-1.NASL", "SUSE_SU-2018-1264-1.NASL", "SUSE_SU-2018-1266-1.NASL", "SUSE_SU-2018-1267-1.NASL", "SUSE_SU-2018-1268-1.NASL", "SUSE_SU-2018-1269-1.NASL", "SUSE_SU-2018-1272-1.NASL", "SUSE_SU-2018-1273-1.NASL", "SUSE_SU-2018-1366-1.NASL", "SUSE_SU-2018-1368-1.NASL", "SUSE_SU-2018-1374-1.NASL", "SUSE_SU-2018-1375-1.NASL", "SUSE_SU-2018-1376-1.NASL", "SUSE_SU-2020-1255-1.NASL", "SUSE_SU-2020-1275-1.NASL", "UBUNTU_USN-3641-1.NASL", "UBUNTU_USN-4363-1.NASL", "UBUNTU_USN-4364-1.NASL", "UBUNTU_USN-4367-1.NASL", "UBUNTU_USN-4367-2.NASL", "UBUNTU_USN-4368-1.NASL", "UBUNTU_USN-4369-1.NASL", "UBUNTU_USN-4369-2.NASL", "UBUNTU_USN-4385-1.NASL", "UBUNTU_USN-4387-1.NASL", "UBUNTU_USN-4388-1.NASL", "UBUNTU_USN-4389-1.NASL", "VIRTUOZZO_VZA-2018-030.NASL", "VIRTUOZZO_VZA-2020-037.NASL", "VIRTUOZZO_VZA-2020-038.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310108766", "OPENVAS:1361412562310704187", "OPENVAS:1361412562310704188", "OPENVAS:1361412562310843518", "OPENVAS:1361412562310844433", "OPENVAS:1361412562310844434", "OPENVAS:1361412562310844438", "OPENVAS:1361412562310844439", "OPENVAS:1361412562310844443", "OPENVAS:1361412562310844448", "OPENVAS:1361412562310844451", "OPENVAS:1361412562310851762", "OPENVAS:1361412562310877859", "OPENVAS:1361412562310877862", "OPENVAS:1361412562310877884", "OPENVAS:1361412562310877951", "OPENVAS:1361412562310882900", "OPENVAS:1361412562310883236", "OPENVAS:1361412562310891369", "OPENVAS:1361412562311220201592", "OPENVAS:1361412562311220201606"]}, {"type": "oraclelinux", "idList": ["ELSA-2018-1318", "ELSA-2018-1629", "ELSA-2020-2427", "ELSA-2020-2430", "ELSA-2020-2431", "ELSA-2020-5691", "ELSA-2020-5708", "ELSA-2020-5714", "ELSA-2020-5715", "ELSA-2020-5722", "ELSA-2021-1578", "ELSA-2021-9459"]}, {"type": "photon", "idList": ["PHSA-2019-1.0-0238", "PHSA-2020-1.0-0274", "PHSA-2020-1.0-0279", "PHSA-2020-1.0-0287", "PHSA-2020-1.0-0290", "PHSA-2020-1.0-0292", "PHSA-2020-1.0-0293", "PHSA-2020-1.0-0297", "PHSA-2020-1.0-0303", "PHSA-2020-2.0-0230", "PHSA-2020-2.0-0242", "PHSA-2020-2.0-0246", "PHSA-2020-2.0-0251", "PHSA-2020-3.0-0069", "PHSA-2020-3.0-0089", "PHSA-2020-3.0-0100", "PHSA-2020-3.0-0102", "PHSA-2020-3.0-0153"]}, {"type": "redhat", "idList": ["RHSA-2018:1345", "RHSA-2018:1348", "RHSA-2018:1354", "RHSA-2020:2427", "RHSA-2020:2428", "RHSA-2020:2429", "RHSA-2020:2430", "RHSA-2020:2433"]}, {"type": "redhatcve", "idList": ["RH:CVE-2019-20806", "RH:CVE-2019-20812", "RH:CVE-2020-0543", "RH:CVE-2020-10690", "RH:CVE-2020-10711", "RH:CVE-2020-10720", "RH:CVE-2020-10732", "RH:CVE-2020-10751", "RH:CVE-2020-10757", "RH:CVE-2020-11608", "RH:CVE-2020-11609", "RH:CVE-2020-12114", "RH:CVE-2020-12464", "RH:CVE-2020-12652", "RH:CVE-2020-12654", "RH:CVE-2020-12655", "RH:CVE-2020-12656", "RH:CVE-2020-12657", "RH:CVE-2020-12659", "RH:CVE-2020-12769", "RH:CVE-2020-13143"]}, {"type": "slackware", "idList": ["SSA-2020-163-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:1418-1", "OPENSUSE-SU-2020:0791-1", "SUSE-SU-2018:1222-1", "SUSE-SU-2018:1223-1", "SUSE-SU-2018:1224-1", "SUSE-SU-2018:1225-1", "SUSE-SU-2018:1226-1", "SUSE-SU-2018:1227-1", "SUSE-SU-2018:1228-1", "SUSE-SU-2018:1229-1", "SUSE-SU-2018:1230-1", "SUSE-SU-2018:1231-1", "SUSE-SU-2018:1232-1", "SUSE-SU-2018:1233-1", "SUSE-SU-2018:1234-1", "SUSE-SU-2018:1235-1", "SUSE-SU-2018:1236-1", "SUSE-SU-2018:1237-1", "SUSE-SU-2018:1238-1", "SUSE-SU-2018:1239-1", "SUSE-SU-2018:1240-1", "SUSE-SU-2018:1241-1", "SUSE-SU-2018:1242-1", "SUSE-SU-2018:1243-1", "SUSE-SU-2018:1244-1", "SUSE-SU-2018:1245-1", "SUSE-SU-2018:1246-1", "SUSE-SU-2018:1247-1", "SUSE-SU-2018:1248-1", "SUSE-SU-2018:1249-1", "SUSE-SU-2018:1250-1", "SUSE-SU-2018:1251-1", "SUSE-SU-2018:1252-1", "SUSE-SU-2018:1253-1", "SUSE-SU-2018:1254-1", "SUSE-SU-2018:1255-1", "SUSE-SU-2018:1256-1", "SUSE-SU-2018:1257-1", "SUSE-SU-2018:1258-1", "SUSE-SU-2018:1259-1", "SUSE-SU-2018:1260-1", "SUSE-SU-2018:1261-1", "SUSE-SU-2018:1262-1", "SUSE-SU-2018:1263-1", "SUSE-SU-2018:1264-1", "SUSE-SU-2018:1266-1", "SUSE-SU-2018:1267-1", "SUSE-SU-2018:1268-1", "SUSE-SU-2018:1269-1", "SUSE-SU-2018:1270-1", "SUSE-SU-2018:1272-1", "SUSE-SU-2018:1273-1"]}, {"type": "thn", "idList": ["THN:8841D27BD6D8D04E9583E7E0F20898D5"]}, {"type": "threatpost", "idList": ["THREATPOST:17E00AD621A0ECD9F90FE97E083BF4AC", "THREATPOST:EF0075FFF210E542FF3ECB996DDA02A3"]}, {"type": "ubuntu", "idList": ["LSN-0068-1", "USN-3641-1", "USN-3641-2", "USN-4363-1", "USN-4364-1", "USN-4367-1", "USN-4367-2", "USN-4368-1", "USN-4369-1", "USN-4369-2", "USN-4385-1", "USN-4385-2", "USN-4387-1", "USN-4389-1", "USN-4392-1", "USN-4393-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2019-19462", "UB:CVE-2019-20806", "UB:CVE-2019-20812", "UB:CVE-2019-9455", "UB:CVE-2020-0543", "UB:CVE-2020-10690", "UB:CVE-2020-10711", "UB:CVE-2020-10720", "UB:CVE-2020-10732", "UB:CVE-2020-10751", "UB:CVE-2020-10757", "UB:CVE-2020-11608", "UB:CVE-2020-11609", "UB:CVE-2020-12114", "UB:CVE-2020-12464", "UB:CVE-2020-12652", "UB:CVE-2020-12653", "UB:CVE-2020-12654", "UB:CVE-2020-12655", "UB:CVE-2020-12656", "UB:CVE-2020-12657", "UB:CVE-2020-12659", "UB:CVE-2020-12769", "UB:CVE-2020-13143"]}, {"type": "virtuozzo", "idList": ["VZA-2018-030", "VZA-2020-036", "VZA-2020-037", "VZA-2020-038", "VZA-2020-044", "VZA-2020-045"]}, {"type": "xen", "idList": ["XSA-320"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2018-1000199", "epss": 0.00044, "percentile": 0.0825, "modified": "2023-05-07"}, {"cve": "CVE-2019-19462", "epss": 0.00044, "percentile": 0.0825, "modified": "2023-05-07"}, {"cve": "CVE-2019-20806", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2019-20812", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2019-9455", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-0543", "epss": 0.0005, "percentile": 0.16922, "modified": "2023-05-07"}, {"cve": "CVE-2020-10690", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2020-10711", "epss": 0.00437, "percentile": 0.70958, "modified": "2023-05-07"}, {"cve": "CVE-2020-10720", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-10732", "epss": 0.0005, "percentile": 0.16969, "modified": "2023-05-07"}, {"cve": "CVE-2020-10751", "epss": 0.0005, "percentile": 0.16969, "modified": "2023-05-07"}, {"cve": "CVE-2020-10757", "epss": 0.00044, "percentile": 0.0825, "modified": "2023-05-07"}, {"cve": "CVE-2020-11608", "epss": 0.00046, "percentile": 0.14002, "modified": "2023-05-07"}, {"cve": "CVE-2020-11609", "epss": 0.00046, "percentile": 0.14002, "modified": "2023-05-07"}, {"cve": "CVE-2020-12114", "epss": 0.00044, "percentile": 0.0825, "modified": "2023-05-07"}, {"cve": "CVE-2020-12464", "epss": 0.00093, "percentile": 0.38184, "modified": "2023-05-07"}, {"cve": "CVE-2020-12652", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-12653", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-12654", "epss": 0.00135, "percentile": 0.47515, "modified": "2023-05-07"}, {"cve": "CVE-2020-12655", "epss": 0.00046, "percentile": 0.14002, "modified": "2023-05-07"}, {"cve": "CVE-2020-12656", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2020-12657", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2020-12659", "epss": 0.0008, "percentile": 0.32762, "modified": "2023-05-07"}, {"cve": "CVE-2020-12769", "epss": 0.00042, "percentile": 0.05739, "modified": "2023-05-07"}, {"cve": "CVE-2020-13143", "epss": 0.00663, "percentile": 0.76665, "modified": "2023-05-07"}], "vulnersScore": -0.1}, "_state": {"dependencies": 1684442002, "score": 1698839776, "epss": 0}, "_internal": {"score_hash": "4c7cdecdf6ec9d20e82d327ebf243dcf"}, "pluginID": "138679", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2020-801.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(138679);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/13\");\n\n script_cve_id(\"CVE-2018-1000199\", \"CVE-2019-19462\", \"CVE-2019-20806\", \"CVE-2019-20812\", \"CVE-2019-9455\", \"CVE-2020-0543\", \"CVE-2020-10690\", \"CVE-2020-10711\", \"CVE-2020-10720\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10757\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12655\", \"CVE-2020-12656\", \"CVE-2020-12657\", \"CVE-2020-12659\", \"CVE-2020-12769\", \"CVE-2020-13143\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2020-801)\");\n script_summary(english:\"Check for the openSUSE-2020-801 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The openSUSE Leap 15.1 kernel was updated to receive various security\nand bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2020-0543: Fixed a side channel attack against\n special registers which could have resulted in leaking\n of read values to cores other than the one which called\n it. This attack is known as Special Register Buffer Data\n Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\n - CVE-2018-1000199: Fixed a potential local code execution\n via ptrace (bsc#1089895).\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed\n local users to cause a denial of service (such as relay\n blockage) by triggering a NULL alloc_percpu result\n (bnc#1158265).\n\n - CVE-2019-20806: Fixed a NULL pointer dereference in\n tw5864_handle_frame() which may had lead to denial of\n service (bsc#1172199).\n\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function\n in net/packet/af_packet.c can result in a denial of\n service (CPU consumption and soft lockup) in a certain\n failure case involving TPACKET_V3, aka CID-b43d1f9f7067\n (bnc#1172453).\n\n - CVE-2019-9455: Fixed a pointer leak due to a WARN_ON\n statement in a video driver. This could lead to local\n information disclosure with System execution privileges\n needed (bsc#1170345).\n\n - CVE-2020-10690: Fixed the race between the release of\n ptp_clock and cdev (bsc#1170056).\n\n - CVE-2020-10711: Fixed a NULL pointer dereference in\n SELinux subsystem which could have allowed a remote\n network user to crash the kernel resulting in a denial\n of service (bsc#1171191).\n\n - CVE-2020-10720: Fixed a use-after-free read in\n napi_gro_frags() (bsc#1170778).\n\n - CVE-2020-10732: Fixed kernel data leak in userspace\n coredumps due to uninitialized data (bsc#1171220).\n\n - CVE-2020-10751: Fixed an improper implementation in\n SELinux LSM hook where it was assumed that an skb would\n only contain a single netlink message (bsc#1171189).\n\n - CVE-2020-10757: Fixed an issue where remaping hugepage\n DAX to anon mmap could have caused user PTE access\n (bsc#1172317).\n\n - CVE-2020-11608: An issue was discovered in\n drivers/media/usb/gspca/ov519.c that allowed NULL\n pointer dereferences in ov511_mode_init_regs and\n ov518_mode_init_regs when there are zero endpoints, aka\n CID-998912346c0d (bnc#1168829).\n\n - CVE-2020-11609: An issue was discovered in the stv06xx\n subsystem in drivers/media/usb/gspca/stv06xx/stv06xx.c\n and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c\n mishandle invalid descriptors, as demonstrated by a NULL\n pointer dereference, aka CID-485b06aadb93 (bnc#1168854).\n\n - CVE-2020-12114: Fixed a pivot_root race condition which\n could have allowed local users to cause a denial of\n service (panic) by corrupting a mountpoint reference\n counter (bsc#1171098).\n\n - CVE-2020-12464: Fixed a use-after-free due to a transfer\n without a reference (bsc#1170901).\n\n - CVE-2020-12652: Fixed an issue which could have allowed\n local users to hold an incorrect lock during the ioctl\n operation and trigger a race condition (bsc#1171218).\n\n - CVE-2020-12653: Fixed an issue in the wifi driver which\n could have allowed local users to gain privileges or\n cause a denial of service (bsc#1171195).\n\n - CVE-2020-12654: Fixed an issue in he wifi driver which\n could have allowed a remote AP to trigger a heap-based\n buffer overflow (bsc#1171202).\n\n - CVE-2020-12655: Fixed an issue which could have allowed\n attackers to trigger a sync of excessive duration via an\n XFS v5 image with crafted metadata (bsc#1171217).\n\n - CVE-2020-12656: Fixed an improper handling of certain\n domain_release calls leadingch could have led to a\n memory leak (bsc#1171219).\n\n - CVE-2020-12657: An a use-after-free in\n block/bfq-iosched.c (bsc#1171205).\n\n - CVE-2020-12659: Fixed an out-of-bounds write (by a user\n with the CAP_NET_ADMIN capability) due to improper\n headroom validation (bsc#1171214).\n\n - CVE-2020-12769: Fixed an issue which could have allowed\n attackers to cause a panic via concurrent calls to\n dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n\n - CVE-2020-13143: Fixed an out-of-bounds read in\n gadget_dev_desc_UDC_store in\n drivers/usb/gadget/configfs.c (bsc#1171982).\n\nThe following non-security bugs were fixed :\n\n - ACPI: CPPC: Fix reference count leak in\n acpi_cppc_processor_probe() (bsc#1051510).\n\n - ACPI: sysfs: Fix reference count leak in\n acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n\n - acpi/x86: ignore unspecified bit positions in the ACPI\n global lock field (bsc#1051510).\n\n - Add br_netfilter to kernel-default-base (bsc#1169020)\n\n - agp/intel: Reinforce the barrier after GTT updates\n (bsc#1051510).\n\n - ALSA: ctxfi: Remove unnecessary cast in kfree\n (bsc#1051510).\n\n - ALSA: doc: Document PC Beep Hidden Register on Realtek\n ALC256 (bsc#1051510).\n\n - ALSA: dummy: Fix PCM format loop in proc output\n (bsc#1111666).\n\n - ALSA: hda: Add driver blacklist (bsc#1051510).\n\n - ALSA: hda: Always use jackpoll helper for jack update\n after resume (bsc#1051510).\n\n - ALSA: hda: call runtime_allow() for all hda controllers\n (bsc#1051510).\n\n - ALSA: hda: Do not release card at firmware loading error\n (bsc#1051510).\n\n - ALSA: hda: Explicitly permit using autosuspend if\n runtime PM is supported (bsc#1051510).\n\n - ALSA: hda/hdmi: fix race in monitor detection during\n probe (bsc#1051510).\n\n - ALSA: hda/hdmi: fix without unlocked before return\n (bsc#1051510).\n\n - ALSA: hda: Honor PM disablement in PM freeze and\n thaw_noirq ops (bsc#1051510).\n\n - ALSA: hda: Keep the controller initialization even if no\n codecs found (bsc#1051510).\n\n - ALSA: hda: Match both PCI ID and SSID for driver\n blacklist (bsc#1111666).\n\n - ALSA: hda/realtek - Add a model for Thinkpad T570\n without DAC workaround (bsc#1172017).\n\n - ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook\n UX431DA (git-fixes).\n\n - ALSA: hda/realtek - Add HP new mute led supported for\n ALC236 (git-fixes).\n\n - ALSA: hda/realtek - Add more fixup entries for Clevo\n machines (git-fixes).\n\n - ALSA: hda/realtek - Add new codec supported for ALC245\n (bsc#1051510).\n\n - ALSA: hda/realtek - Add new codec supported for ALC287\n (git-fixes).\n\n - ALSA: hda/realtek: Add quirk for Samsung Notebook\n (git-fixes).\n\n - ALSA: hda/realtek - Add supported new mute Led for HP\n (git-fixes).\n\n - ALSA: hda/realtek - Enable headset mic of ASUS GL503VM\n with ALC295 (git-fixes).\n\n - ALSA: hda/realtek - Enable headset mic of ASUS UX550GE\n with ALC295 (git-fixes).\n\n - ALSA: hda/realtek: Enable headset mic of ASUS UX581LV\n with ALC295 (git-fixes).\n\n - ALSA: hda/realtek - Enable the headset mic on Asus\n FX505DT (bsc#1051510).\n\n - ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse\n (git-fixes).\n\n - ALSA: hda/realtek - Fix silent output on Gigabyte X570\n Aorus Xtreme (bsc#1111666).\n\n - ALSA: hda/realtek - Fix unexpected init_amp override\n (bsc#1051510).\n\n - ALSA: hda/realtek - Limit int mic boost for Thinkpad\n T530 (git-fixes bsc#1171293).\n\n - ALSA: hda/realtek - Two front mics on a Lenovo\n ThinkCenter (bsc#1051510).\n\n - ALSA: hda: Release resources at error in delayed probe\n (bsc#1051510).\n\n - ALSA: hda: Remove ASUS ROG Zenith from the blacklist\n (bsc#1051510).\n\n - ALSA: hda: Skip controller resume if not needed\n (bsc#1051510).\n\n - ALSA: hwdep: fix a left shifting 1 by 31 UB bug\n (git-fixes).\n\n - ALSA: iec1712: Initialize STDSP24 properly when using\n the model=staudio option (git-fixes).\n\n - ALSA: opti9xx: shut up gcc-10 range warning\n (bsc#1051510).\n\n - ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n\n - ALSA: pcm: oss: Place the plugin buffer overflow checks\n correctly (bsc#1170522).\n\n - ALSA: rawmidi: Fix racy buffer resize under concurrent\n accesses (git-fixes).\n\n - ALSA: usb-audio: Add connector notifier delegation\n (bsc#1051510).\n\n - ALSA: usb-audio: Add control message quirk delay for\n Kingston HyperX headset (git-fixes).\n\n - ALSA: usb-audio: add mapping for ASRock TRX40 Creator\n (git-fixes).\n\n - ALSA: usb-audio: Add mixer workaround for TRX40 and co\n (bsc#1051510).\n\n - ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2\n (bsc#1051510).\n\n - ALSA: usb-audio: Add static mapping table for\n ALC1220-VB-based mobos (bsc#1051510).\n\n - ALSA: usb-audio: Apply async workaround for Scarlett 2i4\n 2nd gen (bsc#1051510).\n\n - ALSA: usb-audio: Check mapping at creating connector\n controls, too (bsc#1051510).\n\n - ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID\n (bsc#1051510).\n\n - ALSA: usb-audio: Do not create jack controls for PCM\n terminals (bsc#1051510).\n\n - ALSA: usb-audio: Do not override ignore_ctl_error value\n from the map (bsc#1051510).\n\n - ALSA: usb-audio: Filter error from connector kctl ops,\n too (bsc#1051510).\n\n - ALSA: usb-audio: Fix usb audio refcnt leak when getting\n spdif (bsc#1051510).\n\n - ALSA: usb-audio: mixer: volume quirk for ESS Technology\n Asus USB DAC (git-fixes).\n\n - ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master\n onboard audio (git-fixes).\n\n - ALSA: usx2y: Fix potential NULL dereference\n (bsc#1051510).\n\n - ASoC: codecs: hdac_hdmi: Fix incorrect use of\n list_for_each_entry (bsc#1051510).\n\n - ASoC: dapm: connect virtual mux with default value\n (bsc#1051510).\n\n - ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n\n - ASoC: dpcm: allow start or stop during pause for backend\n (bsc#1051510).\n\n - ASoC: fix regwmask (bsc#1051510).\n\n - ASoC: msm8916-wcd-digital: Reset RX interpolation path\n after use (bsc#1051510).\n\n - ASoC: samsung: Prevent clk_get_rate() calls in atomic\n context (bsc#1111666).\n\n - ASoC: topology: Check return value of pcm_new_ver\n (bsc#1051510).\n\n - ASoC: topology: use name_prefix for new kcontrol\n (bsc#1051510).\n\n - b43legacy: Fix case where channel status is corrupted\n (bsc#1051510).\n\n - batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n\n - batman-adv: Fix refcnt leak in\n batadv_show_throughput_override (git-fixes).\n\n - batman-adv: Fix refcnt leak in\n batadv_store_throughput_override (git-fixes).\n\n - batman-adv: Fix refcnt leak in batadv_v_ogm_process\n (git-fixes).\n\n - bcache: avoid unnecessary btree nodes flushing in\n btree_flush_write() (git fixes (block drivers)).\n\n - bcache: fix incorrect data type usage in\n btree_flush_write() (git fixes (block drivers)).\n\n - bcache: Revert 'bcache: shrink btree node cache after\n bch_btree_check()' (git fixes (block drivers)).\n\n - blk-mq: honor IO scheduler for multiqueue devices\n (bsc#1165478).\n\n - blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n\n - block/drbd: delete invalid function drbd_md_mark_dirty_\n (bsc#1171527).\n\n - block: drbd: remove a stray unlock in\n __drbd_send_protocol() (bsc#1171599).\n\n - block: fix busy device checking in blk_drop_partitions\n again (bsc#1171948).\n\n - block: fix busy device checking in blk_drop_partitions\n (bsc#1171948).\n\n - block: fix memleak of bio integrity data (git fixes\n (block drivers)).\n\n - block: remove the bd_openers checks in\n blk_drop_partitions (bsc#1171948).\n\n - bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets()\n (networking-stable-20_03_28).\n\n - bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs\n per PF (bsc#1104745).\n\n - bnxt_en: reinitialize IRQs when MTU is modified\n (networking-stable-20_03_14).\n\n - bnxt_en: Return error if bnxt_alloc_ctx_mem() fails\n (bsc#1104745 ).\n\n - bnxt_en: Return error when allocating zero size context\n memory (bsc#1104745).\n\n - bonding/alb: make sure arp header is pulled before\n accessing it (networking-stable-20_03_14).\n\n - bpf: Fix sk_psock refcnt leak when receiving message\n (bsc#1083647).\n\n - bpf: Forbid XADD on spilled pointers for unprivileged\n users (bsc#1083647).\n\n - brcmfmac: abort and release host after error\n (bsc#1051510).\n\n - btrfs: fix deadlock with memory reclaim during scrub\n (bsc#1172127).\n\n - btrfs: fix log context list corruption after rename\n whiteout error (bsc#1172342).\n\n - btrfs: fix partial loss of prealloc extent past i_size\n after fsync (bsc#1172343).\n\n - btrfs: relocation: add error injection points for\n cancelling balance (bsc#1171417).\n\n - btrfs: relocation: Check cancel request after each data\n page read (bsc#1171417).\n\n - btrfs: relocation: Check cancel request after each\n extent found (bsc#1171417).\n\n - btrfs: relocation: Clear the DEAD_RELOC_TREE bit for\n orphan roots to prevent runaway balance (bsc#1171417).\n\n - btrfs: relocation: Fix reloc root leakage and the NULL\n pointer reference caused by the leakage (bsc#1171417).\n\n - btrfs: relocation: Work around dead relocation stage\n loop (bsc#1171417).\n\n - btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots\n to prevent runaway balance (bsc#1171417 bsc#1160947\n bsc#1172366).\n\n - btrfs: reloc: fix reloc root leak and NULL pointer\n dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n\n - btrfs: setup a nofs context for memory allocation at\n btrfs_create_tree() (bsc#1172127).\n\n - btrfs: setup a nofs context for memory allocation at\n __btrfs_set_acl (bsc#1172127).\n\n - btrfs: use nofs context when initializing security\n xattrs to avoid deadlock (bsc#1172127).\n\n - can: add missing attribute validation for termination\n (networking-stable-20_03_14).\n\n - cdc-acm: close race betrween suspend() and acm_softint\n (git-fixes).\n\n - cdc-acm: introduce a cool down (git-fixes).\n\n - ceph: check if file lock exists before sending unlock\n request (bsc#1168789).\n\n - ceph: demote quotarealm lookup warning to a debug\n message (bsc#1171692).\n\n - ceph: fix double unlock in handle_cap_export()\n (bsc#1171694).\n\n - ceph: fix endianness bug when handling MDS session\n feature bits (bsc#1171695).\n\n - cgroup, netclassid: periodically release file_lock on\n classid updating (networking-stable-20_03_14).\n\n - cifs: Allocate crypto structures on the fly for\n calculating signatures of incoming packets\n (bsc#1144333).\n\n - cifs: Allocate encryption header through kmalloc\n (bsc#1144333).\n\n - cifs: allow unlock flock and OFD lock across fork\n (bsc#1144333).\n\n - cifs: check new file size when extending file by\n fallocate (bsc#1144333).\n\n - cifs: cifspdu.h: Replace zero-length array with\n flexible-array member (bsc#1144333).\n\n - cifs: clear PF_MEMALLOC before exiting demultiplex\n thread (bsc#1144333).\n\n - cifs: do not share tcons with DFS (bsc#1144333).\n\n - cifs: dump the session id and keys also for SMB2\n sessions (bsc#1144333).\n\n - cifs: ensure correct super block for DFS reconnect\n (bsc#1144333).\n\n - cifs: Fix bug which the return value by asynchronous\n read is error (bsc#1144333).\n\n - cifs: fix uninitialised lease_key in open_shroot()\n (bsc#1144333).\n\n - cifs: improve read performance for page size 64KB &\n cache=strict & vers=2.1+ (bsc#1144333).\n\n - cifs: Increment num_remote_opens stats counter even in\n case of smb2_query_dir_first (bsc#1144333).\n\n - cifs: minor update to comments around the\n cifs_tcp_ses_lock mutex (bsc#1144333).\n\n - cifs: protect updating server->dstaddr with a spinlock\n (bsc#1144333).\n\n - cifs: smb2pdu.h: Replace zero-length array with\n flexible-array member (bsc#1144333).\n\n - cifs: smbd: Calculate the correct maximum packet size\n for segmented SMBDirect send/receive (bsc#1144333).\n\n - cifs: smbd: Check and extend sender credits in interrupt\n context (bsc#1144333).\n\n - cifs: smbd: Check send queue size before posting a send\n (bsc#1144333).\n\n - cifs: smbd: Do not schedule work to send immediate\n packet on every receive (bsc#1144333).\n\n - cifs: smbd: Merge code to track pending packets\n (bsc#1144333).\n\n - cifs: smbd: Properly process errors on ib_post_send\n (bsc#1144333).\n\n - cifs: smbd: Update receive credits before sending and\n deal with credits roll back on failure before sending\n (bsc#1144333).\n\n - cifs: Warn less noisily on default mount (bsc#1144333).\n\n - clk: Add clk_hw_unregister_composite helper function\n definition (bsc#1051510).\n\n - clk: imx6ull: use OSC clock during AXI rate change\n (bsc#1051510).\n\n - clk: imx: make mux parent strings const (bsc#1051510).\n\n - clk: mediatek: correct the clocks for MT2701 HDMI PHY\n module (bsc#1051510).\n\n - clk: sunxi-ng: a64: Fix gate bit of DSI DPHY\n (bsc#1051510).\n\n - clocksource/drivers/hyper-v: Set TSC clocksource as\n default w/ InvariantTSC (bsc#1170620, bsc#1170621).\n\n - clocksource: dw_apb_timer_of: Fix missing clockevent\n timers (bsc#1051510).\n\n - component: Silence bind error on -EPROBE_DEFER\n (bsc#1051510).\n\n - coresight: do not use the BIT() macro in the UAPI header\n (git fixes (block drivers)).\n\n - cpufreq: s3c64xx: Remove pointless NULL check in\n s3c64xx_cpufreq_driver_init (bsc#1051510).\n\n - crypto: ccp - AES CFB mode is a stream cipher\n (git-fixes).\n\n - crypto: ccp - Clean up and exit correctly on allocation\n failure (git-fixes).\n\n - crypto: ccp - Cleanup misc_dev on sev_exit()\n (bsc#1114279).\n\n - crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy()\n (bsc#1114279).\n\n - cxgb4: fix MPS index overwrite when setting MAC address\n (bsc#1127355).\n\n - cxgb4: fix Txq restart check during backpressure\n (bsc#1127354 bsc#1127371).\n\n - debugfs: Add debugfs_create_xul() for hexadecimal\n unsigned long (git-fixes).\n\n - debugfs_lookup(): switch to lookup_one_len_unlocked()\n (bsc#1171979).\n\n - devlink: fix return value after hitting end in region\n read (bsc#1109837).\n\n - devlink: validate length of param values (bsc#1109837).\n\n - devlink: validate length of region addr/len\n (bsc#1109837).\n\n - dmaengine: dmatest: Fix iteration non-stop logic\n (bsc#1051510).\n\n - dm mpath: switch paths in dm_blk_ioctl() code path\n (bsc#1167574).\n\n - dm-raid1: fix invalid return value from dm_mirror\n (bsc#1172378).\n\n - dm writecache: fix data corruption when reloading the\n target (git fixes (block drivers)).\n\n - dm writecache: fix incorrect flush sequence when doing\n SSD mode commit (git fixes (block drivers)).\n\n - dm writecache: verify watermark during resume (git fixes\n (block drivers)).\n\n - dm zoned: fix invalid memory access (git fixes (block\n drivers)).\n\n - dm zoned: reduce overhead of backing device checks (git\n fixes (block drivers)).\n\n - dm zoned: remove duplicate nr_rnd_zones increase in\n dmz_init_zone() (git fixes (block drivers)).\n\n - dm zoned: support zone sizes smaller than 128MiB (git\n fixes (block drivers)).\n\n - dp83640: reverse arguments to list_add_tail (git-fixes).\n\n - drivers: hv: Add a module description line to the\n hv_vmbus driver (bsc#1172249, bsc#1172251).\n\n - drivers/net/ibmvnic: Update VNIC protocol version\n reporting (bsc#1065729).\n\n - drivers: w1: add hwmon support structures\n (jsc#SLE-11048).\n\n - drivers: w1: add hwmon temp support for w1_therm\n (jsc#SLE-11048).\n\n - drivers: w1: refactor w1_slave_show to make the temp\n reading functionality separate (jsc#SLE-11048).\n\n - drm: amd/acp: fix broken menu structure (bsc#1114279)\n\n - drm/amdgpu: Correctly initialize thermal controller for\n GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n\n - drm/amdgpu: Fix oops when pp_funcs is unset in ACPI\n event (bsc#1111666).\n\n - drm/amd/powerplay: force the trim of the mclk dpm_levels\n if OD is (bsc#1113956)\n\n - drm/atomic: Take the atomic toys away from X\n (bsc#1112178) 	* context changes\n\n - drm/crc: Actually allow to change the crc source\n (bsc#1114279) 	* offset changes\n\n - drm/dp_mst: Fix clearing payload state on topology\n disable (bsc#1051510).\n\n - drm/dp_mst: Reformat drm_dp_check_act_status() a bit\n (bsc#1051510).\n\n - drm/edid: Fix off-by-one in DispID DTD pixel clock\n (bsc#1114279)\n\n - drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n\n - drm/etnaviv: rework perfmon query infrastructure\n (bsc#1112178)\n\n - drm/i915: Apply Wa_1406680159:icl,ehl as an engine\n workaround (bsc#1112178)\n\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display\n instead of (bsc#1114279)\n\n - drm/i915: HDCP: fix Ri prime check done during link\n check (bsc#1112178)\n\n - drm/i915: properly sanity check batch_start_offset\n (bsc#1114279)\n\n - drm/meson: Delete an error message in\n meson_dw_hdmi_bind() (bsc#1051510).\n\n - drm: NULL pointer dereference [null-pointer-deref] (CWE\n 476) problem (bsc#1114279)\n\n - drm/qxl: qxl_release leak in qxl_draw_dirty_fb()\n (bsc#1051510).\n\n - drm/qxl: qxl_release leak in qxl_hw_surface_alloc()\n (bsc#1051510).\n\n - drm/qxl: qxl_release use after free (bsc#1051510).\n\n - drm: Remove PageReserved manipulation from drm_pci_alloc\n (bsc#1114279)\n\n - drm/sun4i: dsi: Allow binding the host without a panel\n (bsc#1113956)\n\n - drm/sun4i: dsi: Avoid hotplug race with DRM driver bind\n (bsc#1113956)\n\n - drm/sun4i: dsi: Remove incorrect use of runtime PM\n (bsc#1113956)\n\n - drm/sun4i: dsi: Remove unused drv from driver context\n (bsc#1113956)\n\n - dump_stack: avoid the livelock of the dump_lock (git\n fixes (block drivers)).\n\n - EDAC, sb_edac: Add support for systems with segmented\n PCI buses (bsc#1169525).\n\n - ext4: do not zeroout extents beyond i_disksize\n (bsc#1167851).\n\n - ext4: fix extent_status fragmentation for plain files\n (bsc#1171949).\n\n - ext4: use non-movable memory for superblock readahead\n (bsc#1171952).\n\n - fanotify: fix merging marks masks with FAN_ONDIR\n (bsc#1171679).\n\n - fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279)\n\n - fib: add missing attribute validation for tun_id\n (networking-stable-20_03_14).\n\n - firmware: qcom: scm: fix compilation error when disabled\n (bsc#1051510).\n\n - Fix a backport bug, where btrfs_put_root() ->\n btrfs_put_fs_root() modification is not needed due to\n missing dependency\n\n - Following two patches needs to be combined as one commit\n (one adds context, later removes which affects existing\n patch) else commit series cannot be sequenced.\n\n - fpga: dfl: afu: Corrected error handling levels\n (git-fixes).\n\n - fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n\n - fs/seq_file.c: simplify seq_file iteration code and\n interface (bsc#1170125).\n\n - gpio: tegra: mask GPIO IRQs during IRQ shutdown\n (bsc#1051510).\n\n - gre: fix uninit-value in __iptunnel_pull_header\n (networking-stable-20_03_14).\n\n - HID: hid-input: clear unmapped usages (git-fixes).\n\n - HID: hyperv: Add a module description line (bsc#1172249,\n bsc#1172251).\n\n - HID: i2c-hid: add Trekstor Primebook C11B to descriptor\n override (git-fixes).\n\n - HID: i2c-hid: override HID descriptors for certain\n devices (git-fixes).\n\n - HID: multitouch: add eGalaxTouch P80H84 support\n (bsc#1051510).\n\n - HID: wacom: Read HID_DG_CONTACTMAX directly for\n non-generic devices (git-fixes).\n\n - hrtimer: Annotate lockless access to timer->state (git\n fixes (block drivers)).\n\n - hsr: add restart routine into hsr_get_node_list()\n (networking-stable-20_03_28).\n\n - hsr: check protocol version in hsr_newlink()\n (networking-stable-20_04_17).\n\n - hsr: fix general protection fault in hsr_addr_is_self()\n (networking-stable-20_03_28).\n\n - hsr: set .netnsok flag (networking-stable-20_03_28).\n\n - hsr: use rcu_read_lock() in hsr_get_node_(list/status)()\n (networking-stable-20_03_28).\n\n - i2c: acpi: Force bus speed to 400KHz if a Silead\n touchscreen is present (git-fixes).\n\n - i2c: acpi: put device when verifying client fails\n (git-fixes).\n\n - i2c: brcmstb: remove unused struct member (git-fixes).\n\n - i2c: core: Allow empty id_table in ACPI case as well\n (git-fixes).\n\n - i2c: core: decrease reference count of device node in\n i2c_unregister_device (git-fixes).\n\n - i2c: dev: Fix the race between the release of i2c_dev\n and cdev (bsc#1051510).\n\n - i2c: fix missing pm_runtime_put_sync in i2c_device_probe\n (git-fixes).\n\n - i2c-hid: properly terminate\n i2c_hid_dmi_desc_override_table array (git-fixes).\n\n - i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt\n device (git-fixes).\n\n - i2c: iproc: Stop advertising support of SMBUS quick cmd\n (git-fixes).\n\n - i2c: isch: Remove unnecessary acpi.h include\n (git-fixes).\n\n - i2c: mux: demux-pinctrl: Fix an error handling path in\n 'i2c_demux_pinctrl_probe()' (bsc#1051510).\n\n - i2c: st: fix missing struct parameter description\n (bsc#1051510).\n\n - IB/mlx5: Fix missing congestion control debugfs on rep\n rdma device (bsc#1103991).\n\n - ibmvnic: Skip fatal error reset after passive init\n (bsc#1171078 ltc#184239).\n\n - iio:ad7797: Use correct attribute_group (bsc#1051510).\n\n - iio: adc: stm32-adc: fix device used to request dma\n (bsc#1051510).\n\n - iio: adc: stm32-adc: fix sleep in atomic context\n (git-fixes).\n\n - iio: adc: stm32-adc: Use dma_request_chan() instead\n dma_request_slave_channel() (bsc#1051510).\n\n - iio: dac: vf610: Fix an error handling path in\n 'vf610_dac_probe()' (bsc#1051510).\n\n - iio: sca3000: Remove an erroneous 'get_device()'\n (bsc#1051510).\n\n - iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n\n - iio: xilinx-xadc: Fix clearing interrupt when enabling\n trigger (bsc#1051510).\n\n - iio: xilinx-xadc: Fix sequencer configuration for aux\n channels in simultaneous mode (bsc#1051510).\n\n - ima: Fix return value of ima_write_policy() (git-fixes).\n\n - input: evdev - call input_flush_device() on release(),\n not flush() (bsc#1051510).\n\n - input: hyperv-keyboard - add module description\n (bsc#1172249, bsc#1172251).\n\n - input: i8042 - add Acer Aspire 5738z to nomux list\n (bsc#1051510).\n\n - input: i8042 - add ThinkPad S230u to i8042 reset list\n (bsc#1051510).\n\n - input: raydium_i2c_ts - use true and false for boolean\n values (bsc#1051510).\n\n - input: synaptics-rmi4 - fix error return code in\n rmi_driver_probe() (bsc#1051510).\n\n - input: synaptics-rmi4 - really fix attn_data\n use-after-free (git-fixes).\n\n - input: usbtouchscreen - add support for BonXeon TP\n (bsc#1051510).\n\n - input: xpad - add custom init packet for Xbox One S\n controllers (bsc#1051510).\n\n - iommu/amd: Call domain_flush_complete() in\n update_domain() (bsc#1172096).\n\n - iommu/amd: Do not flush Device Table in iommu_map_page()\n (bsc#1172097).\n\n - iommu/amd: Do not loop forever when trying to increase\n address space (bsc#1172098).\n\n - iommu/amd: Fix legacy interrupt remapping for\n x2APIC-enabled system (bsc#1172099).\n\n - iommu/amd: Fix over-read of ACPI UID from IVRS table\n (bsc#1172101).\n\n - iommu/amd: Fix race in\n increase_address_space()/fetch_pte() (bsc#1172102).\n\n - iommu/amd: Update Device Table in\n increase_address_space() (bsc#1172103).\n\n - iommu: Fix reference count leak in iommu_group_alloc\n (bsc#1172397).\n\n - ip6_tunnel: Allow rcv/xmit even if remote address is a\n local address (bsc#1166978).\n\n - ipmi: fix hung processes in __get_guid() (git-fixes).\n\n - ipv4: fix a RCU-list lock in fib_triestat_seq_show\n (networking-stable-20_04_02).\n\n - ipv6/addrconf: call ipv6_mc_up() for non-Ethernet\n interface (networking-stable-20_03_14).\n\n - ipv6: do not auto-add link-local address to lag ports\n (networking-stable-20_04_09).\n\n - ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n\n - ipv6: Fix nlmsg_flags when splitting a multipath route\n (networking-stable-20_03_01).\n\n - ipv6: fix restrict IPV6_ADDRFORM operation\n (bsc#1171662).\n\n - ipv6: Fix route replacement with dev-only route\n (networking-stable-20_03_01).\n\n - ipvlan: add cond_resched_rcu() while processing muticast\n backlog (networking-stable-20_03_14).\n\n - ipvlan: do not deref eth hdr before checking it's set\n (networking-stable-20_03_14).\n\n - ipvlan: do not use cond_resched_rcu() in\n ipvlan_process_multicast() (networking-stable-20_03_14).\n\n - iwlwifi: pcie: actually release queue memory in TVQM\n (bsc#1051510).\n\n - ixgbe: do not check firmware errors (bsc#1170284).\n\n - kABI fix for early XHCI debug (git-fixes).\n\n - kabi for for md: improve handling of bio with\n REQ_PREFLUSH in md_flush_request() (git-fixes).\n\n - kabi/severities: Do not track KVM internal symbols.\n\n - kabi/severities: Ingnore get_dev_data() The function is\n internal to the AMD IOMMU driver and must not be called\n by any third-party.\n\n - kABI workaround for snd_rawmidi buffer_ref field\n addition (git-fixes).\n\n - keys: reaching the keys quotas correctly (bsc#1051510).\n\n - KVM: arm64: Change hyp_panic()s dependency on tpidr_el2\n (bsc#1133021).\n\n - KVM: arm64: Stop save/restoring host tpidr_el1 on VHE\n (bsc#1133021).\n\n - KVM: Check validity of resolved slot when searching\n memslots (bsc#1172104).\n\n - KVM: s390: vsie: Fix delivery of addressing exceptions\n (git-fixes).\n\n - KVM: s390: vsie: Fix possible race when shadowing region\n 3 tables (git-fixes).\n\n - KVM: s390: vsie: Fix region 1 ASCE sanity shadow address\n checks (git-fixes).\n\n - KVM: SVM: Fix potential memory leak in svm_cpu_init()\n (bsc#1171736).\n\n - KVM x86: Extend AMD specific guest behavior to Hygon\n virtual CPUs (bsc#1152489).\n\n - l2tp: Allow management of tunnels and session in user\n namespace (networking-stable-20_04_17).\n\n - libata: Remove extra scsi_host_put() in\n ata_scsi_add_hosts() (bsc#1051510).\n\n - libata: Return correct status in\n sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set\n (bsc#1051510).\n\n - lib: raid6: fix awk build warnings (git fixes (block\n drivers)).\n\n - lib/raid6/test: fix build on distros whose /bin/sh is\n not bash (git fixes (block drivers)).\n\n - lib/stackdepot.c: fix global out-of-bounds in\n stack_slabs (git fixes (block drivers)).\n\n - locks: print unsigned ino in /proc/locks (bsc#1171951).\n\n - mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n\n - mac80211_hwsim: Use kstrndup() in place of kasprintf()\n (bsc#1051510).\n\n - mac80211: mesh: fix discovery timer re-arming issue /\n crash (bsc#1051510).\n\n - macsec: avoid to set wrong mtu (bsc#1051510).\n\n - macsec: restrict to ethernet devices\n (networking-stable-20_03_28).\n\n - macvlan: add cond_resched() during multicast processing\n (networking-stable-20_03_14).\n\n - macvlan: fix null dereference in macvlan_device_event()\n (bsc#1051510).\n\n - md: improve handling of bio with REQ_PREFLUSH in\n md_flush_request() (git-fixes).\n\n - md/raid0: Fix an error message in raid0_make_request()\n (git fixes (block drivers)).\n\n - md/raid10: prevent access of uninitialized resync_pages\n offset (git-fixes).\n\n - media: dvb: return -EREMOTEIO on i2c transfer failure\n (bsc#1051510).\n\n - media: platform: fcp: Set appropriate DMA parameters\n (bsc#1051510).\n\n - media: ti-vpe: cal: fix disable_irqs to only the\n intended target (git-fixes).\n\n - mei: release me_cl object reference (bsc#1051510).\n\n - mlxsw: Fix some IS_ERR() vs NULL bugs\n (networking-stable-20_04_27).\n\n - mlxsw: spectrum_flower: Do not stop at\n FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n\n - mlxsw: spectrum_mr: Fix list iteration in error path\n (bsc#1112374).\n\n - mmc: atmel-mci: Fix debugfs on 64-bit platforms\n (git-fixes).\n\n - mmc: core: Check request type before completing the\n request (git-fixes).\n\n - mmc: core: Fix recursive locking issue in CQE recovery\n path (git-fixes).\n\n - mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not\n open-coding timeout loop (git-fixes).\n\n - mmc: dw_mmc: Fix debugfs on 64-bit platforms\n (git-fixes).\n\n - mmc: meson-gx: make sure the descriptor is stopped on\n errors (git-fixes).\n\n - mmc: meson-gx: simplify interrupt handler (git-fixes).\n\n - mmc: renesas_sdhi: limit block count to 16 bit for old\n revisions (git-fixes).\n\n - mmc: sdhci-esdhc-imx: fix the mask for tuning start\n point (bsc#1051510).\n\n - mmc: sdhci-msm: Clear tuning done flag while hs400\n tuning (bsc#1051510).\n\n - mmc: sdhci-of-at91: fix memleak on clk_get failure\n (git-fixes).\n\n - mmc: sdhci-pci: Fix eMMC driver strength for BYT-based\n controllers (bsc#1051510).\n\n - mmc: sdhci: Update the tuning failed messages to\n pr_debug level (git-fixes).\n\n - mmc: sdhci-xenon: fix annoying 1.8V regulator warning\n (bsc#1051510).\n\n - mmc: sdio: Fix potential NULL pointer error in\n mmc_sdio_init_card() (bsc#1051510).\n\n - mmc: tmio: fix access width of Block Count Register\n (git-fixes).\n\n - mm: limit boost_watermark on small zones (git fixes\n (mm/pgalloc)).\n\n - mm: thp: handle page cache THP correctly in\n PageTransCompoundMap (git fixes (block drivers)).\n\n - mtd: cfi: fix deadloop in cfi_cmdset_0002.c\n do_write_buffer (bsc#1051510).\n\n - mtd: spi-nor: cadence-quadspi: add a delay in write\n sequence (git-fixes).\n\n - mtd: spi-nor: enable 4B opcodes for mx66l51235l\n (git-fixes).\n\n - mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus\n (git-fixes).\n\n - mwifiex: avoid -Wstringop-overflow warning\n (bsc#1051510).\n\n - mwifiex: Fix memory corruption in dump_station\n (bsc#1051510).\n\n - net: bcmgenet: correct per TX/RX ring statistics\n (networking-stable-20_04_27).\n\n - net: dsa: b53: Fix ARL register definitions\n (networking-stable-20_04_27).\n\n - net: dsa: b53: Rework ARL bin logic\n (networking-stable-20_04_27).\n\n - net: dsa: bcm_sf2: Do not register slave MDIO bus with\n OF (networking-stable-20_04_09).\n\n - net: dsa: bcm_sf2: Ensure correct sub-node is parsed\n (networking-stable-20_04_09).\n\n - net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n\n - net: dsa: Fix duplicate frames flooded by learning\n (networking-stable-20_03_28).\n\n - net: dsa: mv88e6xxx: fix lockup on warm boot\n (networking-stable-20_03_14).\n\n - net/ethernet: add Google GVE driver (jsc#SLE-10538)\n\n - net: fec: add phy_reset_after_clk_enable() support\n (git-fixes).\n\n - net: fec: validate the new settings in\n fec_enet_set_coalesce() (networking-stable-20_03_14).\n\n - net: fib_rules: Correctly set table field when table\n number exceeds 8 bits (networking-stable-20_03_01).\n\n - net: fix race condition in __inet_lookup_established()\n (bsc#1151794).\n\n - net: fq: add missing attribute validation for orphan\n mask (networking-stable-20_03_14).\n\n - net: hns3: fix 'tc qdisc del' failed issue\n (bsc#1109837).\n\n - net, ip_tunnel: fix interface lookup with no key\n (networking-stable-20_04_02).\n\n - net: ipv4: devinet: Fix crash when add/del multicast IP\n with autojoin (networking-stable-20_04_17).\n\n - net: ipv6: do not consider routes via gateways for\n anycast address check (networking-stable-20_04_17).\n\n - netlink: Use netlink header as base to calculate bad\n attribute offset (networking-stable-20_03_14).\n\n - net: macsec: update SCI upon MAC address change\n (networking-stable-20_03_14).\n\n - net: memcg: fix lockdep splat in inet_csk_accept()\n (networking-stable-20_03_14).\n\n - net: memcg: late association of sock to memcg\n (networking-stable-20_03_14).\n\n - net/mlx4_en: avoid indirect call in TX completion\n (networking-stable-20_04_27).\n\n - net/mlx5: Add new fields to Port Type and Speed register\n (bsc#1171118).\n\n - net/mlx5: Expose link speed directly (bsc#1171118).\n\n - net/mlx5: Expose port speed when possible (bsc#1171118).\n\n - net/mlx5: Fix failing fw tracer allocation on s390\n (bsc#1103990 ).\n\n - net: mvneta: Fix the case where the last poll did not\n process all rx (networking-stable-20_03_28).\n\n - net: netrom: Fix potential nr_neigh refcnt leak in\n nr_add_node (networking-stable-20_04_27).\n\n - net/packet: tpacket_rcv: do not increment ring index on\n drop (networking-stable-20_03_14).\n\n - net: phy: restore mdio regs in the iproc mdio driver\n (networking-stable-20_03_01).\n\n - net: qmi_wwan: add support for ASKEY WWHC050\n (networking-stable-20_03_28).\n\n - net: revert default NAPI poll timeout to 2 jiffies\n (networking-stable-20_04_17).\n\n - net_sched: cls_route: remove the right filter from\n hashtable (networking-stable-20_03_28).\n\n - net_sched: sch_skbprio: add message validation to\n skbprio_change() (bsc#1109837).\n\n - net/x25: Fix x25_neigh refcnt leak when receiving frame\n (networking-stable-20_04_27).\n\n - nfc: add missing attribute validation for SE API\n (networking-stable-20_03_14).\n\n - nfc: add missing attribute validation for vendor\n subcommand (networking-stable-20_03_14).\n\n - nfc: pn544: Fix occasional HW initialization failure\n (networking-stable-20_03_01).\n\n - NFC: st21nfca: add missed kfree_skb() in an error path\n (bsc#1051510).\n\n - nfp: abm: fix a memory leak bug (bsc#1109837).\n\n - nfsd4: fix up replay_matches_cache() (git-fixes).\n\n - nfsd: Ensure CLONE persists data and metadata changes to\n the target file (git-fixes).\n\n - nfsd: fix delay timer on 32-bit architectures\n (git-fixes).\n\n - nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n\n - nfs: Directory page cache pages need to be locked when\n read (git-fixes).\n\n - nfsd: memory corruption in nfsd4_lock() (git-fixes).\n\n - nfs: Do not call generic_error_remove_page() while\n holding locks (bsc#1170457).\n\n - nfs: Fix memory leaks and corruption in readdir\n (git-fixes).\n\n - nfs: Fix O_DIRECT accounting of number of bytes\n read/written (git-fixes).\n\n - nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl\n (git-fixes).\n\n - nfs: fix racey wait in nfs_set_open_stateid_locked\n (bsc#1170592).\n\n - NFS/flexfiles: Use the correct TCP timeout for flexfiles\n I/O (git-fixes).\n\n - NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes()\n (git-fixes).\n\n - nfs: Revalidate the file size on a fatal write error\n (git-fixes).\n\n - NFSv4.0: nfs4_do_fsinfo() should not do implicit lease\n renewals (git-fixes).\n\n - NFSv4: Do not allow a cached open with a revoked\n delegation (git-fixes).\n\n - NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).\n\n - NFSv4-Fix-OPEN-CLOSE-race.patch\n\n - NFSv4/pnfs: Return valid stateids in\n nfs_layout_find_inode_by_stateid() (git-fixes).\n\n - NFSv4: try lease recovery on NFS4ERR_EXPIRED\n (git-fixes).\n\n - NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits\n for layoutreturn (git-fixes).\n\n - nl802154: add missing attribute validation for dev_type\n (networking-stable-20_03_14).\n\n - nl802154: add missing attribute validation\n (networking-stable-20_03_14).\n\n - nvme-fc: print proper nvme-fc devloss_tmo value\n (bsc#1172391).\n\n - objtool: Fix stack offset tracking for indirect CFAs\n (bsc#1169514).\n\n - objtool: Fix switch table detection in .text.unlikely\n (bsc#1169514).\n\n - objtool: Make BP scratch register warning more robust\n (bsc#1169514).\n\n - padata: Remove broken queue flushing (git-fixes).\n\n - Partially revert 'kfifo: fix kfifo_alloc() and\n kfifo_init()' (git fixes (block drivers)).\n\n - PCI: hv: Add support for protocol 1.3 and support\n PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).\n\n - PCI: hv: Decouple the func definition in hv_dr_state\n from VSP message (bsc#1172201, bsc#1172202).\n\n - PCI/PM: Call .bridge_d3() hook only if non-NULL\n (git-fixes).\n\n - perf: Allocate context task_ctx_data for child event\n (git-fixes).\n\n - perf/cgroup: Fix perf cgroup hierarchy support\n (git-fixes).\n\n - perf: Copy parent's address filter offsets on clone\n (git-fixes).\n\n - perf/core: Add sanity check to deal with pinned event\n failure (git-fixes).\n\n - perf/core: Avoid freeing static PMU contexts when PMU is\n unregistered (git-fixes).\n\n - perf/core: Correct event creation with PERF_FORMAT_GROUP\n (git-fixes).\n\n - perf/core: Do not WARN() for impossible ring-buffer\n sizes (git-fixes).\n\n - perf/core: Fix ctx_event_type in ctx_resched()\n (git-fixes).\n\n - perf/core: Fix error handling in perf_event_alloc()\n (git-fixes).\n\n - perf/core: Fix exclusive events' grouping (git-fixes).\n\n - perf/core: Fix group scheduling with mixed hw and sw\n events (git-fixes).\n\n - perf/core: Fix impossible ring-buffer sizes warning\n (git-fixes).\n\n - perf/core: Fix locking for children siblings group read\n (git-fixes).\n\n - perf/core: Fix lock inversion between perf,trace,cpuhp\n (git-fixes (dependent patch for 18736eef1213)).\n\n - perf/core: Fix perf_event_read_value() locking\n (git-fixes).\n\n - perf/core: Fix perf_pmu_unregister() locking\n (git-fixes).\n\n - perf/core: Fix __perf_read_group_add() locking\n (git-fixes (dependent patch)).\n\n - perf/core: Fix perf_sample_regs_user() mm check\n (git-fixes).\n\n - perf/core: Fix possible Spectre-v1 indexing for\n ->aux_pages (git-fixes).\n\n - perf/core: Fix race between close() and fork()\n (git-fixes).\n\n - perf/core: Fix the address filtering fix (git-fixes).\n\n - perf/core: Fix use-after-free in uprobe_perf_close()\n (git-fixes).\n\n - perf/core: Force USER_DS when recording user stack data\n (git-fixes).\n\n - perf/core: Restore mmap record type correctly\n (git-fixes).\n\n - perf: Fix header.size for namespace events (git-fixes).\n\n - perf/ioctl: Add check for the sample_period value\n (git-fixes).\n\n - perf, pt, coresight: Fix address filters for vmas with\n non-zero offset (git-fixes).\n\n - perf: Return proper values for user stack errors\n (git-fixes).\n\n - pinctrl: baytrail: Enable pin configuration setting for\n GPIO chip (git-fixes).\n\n - pinctrl: cherryview: Add missing spinlock usage in\n chv_gpio_irq_handler (git-fixes).\n\n - pinctrl: sunrisepoint: Fix PAD lock register offset for\n SPT-H (git-fixes).\n\n - platform/x86: asus-nb-wmi: Do not load on Asus T100TA\n and T200TA (bsc#1051510).\n\n - pnfs: Ensure we do clear the return-on-close layout\n stateid on fatal errors (git-fixes).\n\n - powerpc: Add attributes for setjmp/longjmp\n (bsc#1065729).\n\n - powerpc/pci/of: Parse unassigned resources\n (bsc#1065729).\n\n - powerpc/setup_64: Set cache-line-size based on\n cache-block-size (bsc#1065729).\n\n - powerpc/sstep: Fix DS operand in ld encoding to\n appropriate value (bsc#1065729).\n\n - qede: Fix race between rdma destroy workqueue and link\n change event (networking-stable-20_03_01).\n\n - r8152: check disconnect status after long sleep\n (networking-stable-20_03_14).\n\n - raid6/ppc: Fix build for clang (git fixes (block\n drivers)).\n\n - random: always use batched entropy for\n get_random_u(32,64) (bsc#1164871).\n\n - rcu: locking and unlocking need to always be at least\n barriers (git fixes (block drivers)).\n\n - Redo patch for SLE15-SP1, based on feedback from IBM:\n patches.suse/s390-ftrace-fix-potential-crashes-when-swit\n ching-tracers (bsc#1171244 LTC#185785 git-fixes).\n\n - resolve KABI warning for perf-pt-coresight (git-fixes).\n\n - Revert 'ALSA: hda/realtek: Fix pop noise on ALC225'\n (git-fixes).\n\n - Revert 'drm/panel: simple: Add support for Sharp\n LQ150X1LG11 panels' (bsc#1114279) 	* offset changes\n\n - Revert 'HID: i2c-hid: add Trekstor Primebook C11B to\n descriptor override' Depends on\n 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also\n reverted.\n\n - Revert 'HID: i2c-hid: override HID descriptors for\n certain devices' This broke i2c-hid.ko's build, there is\n no way around it without a big file rename or renaming\n the kernel module.\n\n - Revert 'i2c-hid: properly terminate\n i2c_hid_dmi_desc_override_table' Fixed\n 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also\n reverted.\n\n - Revert 'ipc,sem: remove uneeded sem_undo_list lock usage\n in exit_sem()' (bsc#1172221).\n\n - Revert 'RDMA/cma: Simplify rdma_resolve_addr() error\n flow' (bsc#1103992).\n\n - rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup()\n (bsc#1051510).\n\n - s390/cio: avoid duplicated 'ADD' uevents (git-fixes).\n\n - s390/cio: generate delayed uevent for vfio-ccw\n subchannels (git-fixes).\n\n - s390/cpuinfo: fix wrong output when CPU0 is offline\n (git-fixes).\n\n - s390/cpum_cf: Add new extended counters for IBM z15\n (bsc#1169762 LTC#185291).\n\n - s390/diag: fix display of diagnose call statistics\n (git-fixes).\n\n - s390/ftrace: fix potential crashes when switching\n tracers (git-fixes).\n\n - s390/gmap: return proper error code on ksm unsharing\n (git-fixes).\n\n - s390/ism: fix error return code in ism_probe()\n (git-fixes).\n\n - s390/pci: do not set affinity for floating irqs\n (git-fixes).\n\n - s390/pci: Fix possible deadlock in recover_store()\n (bsc#1165183 LTC#184103).\n\n - s390/pci: Recover handle in clp_set_pci_fn()\n (bsc#1165183 LTC#184103).\n\n - s390/qeth: cancel RX reclaim work earlier (git-fixes).\n\n - s390/qeth: do not return -ENOTSUPP to userspace\n (git-fixes).\n\n - s390/qeth: do not warn for napi with 0 budget\n (git-fixes).\n\n - s390/qeth: fix off-by-one in RX copybreak check\n (git-fixes).\n\n - s390/qeth: fix promiscuous mode after reset (git-fixes).\n\n - s390/qeth: fix qdio teardown after early init error\n (git-fixes).\n\n - s390/qeth: handle error due to unsupported transport\n mode (git-fixes).\n\n - s390/qeth: handle error when backing RX buffer\n (git-fixes).\n\n - s390/qeth: lock the card while changing its hsuid\n (git-fixes).\n\n - s390/qeth: support net namespaces for L3 devices\n (git-fixes).\n\n - s390/time: Fix clk type in get_tod_clock (git-fixes).\n\n - scripts/decodecode: fix trapping instruction formatting\n (bsc#1065729).\n\n - scripts/dtc: Remove redundant YYLOC global declaration\n (bsc#1160388).\n\n - scsi: bnx2i: fix potential use after free (bsc#1171600).\n\n - scsi: core: Handle drivers which set sg_tablesize to\n zero (bsc#1171601)\n\n - scsi: core: save/restore command resid for error\n handling (bsc#1171602).\n\n - scsi: core: scsi_trace: Use get_unaligned_be*()\n (bsc#1171604).\n\n - scsi: core: try to get module before removing device\n (bsc#1171605).\n\n - scsi: csiostor: Adjust indentation in csio_device_reset\n (bsc#1171606).\n\n - scsi: csiostor: Do not enable IRQs too early\n (bsc#1171607).\n\n - scsi: esas2r: unlock on error in\n esas2r_nvram_read_direct() (bsc#1171608).\n\n - scsi: fnic: fix invalid stack access (bsc#1171609).\n\n - scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n\n -\n scsi-ibmvfc-Don-t-send-implicit-logouts-prior-to-NPI.pat\n ch\n\n - scsi: ibmvscsi: Fix WARN_ON during event pool release\n (bsc#1170791 ltc#185128).\n\n -\n scsi-ibmvscsi-Fix-WARN_ON-during-event-pool-release.patc\n h\n\n - scsi: iscsi: Avoid potential deadlock in iscsi_if_rx\n func (bsc#1171611).\n\n - scsi: iscsi: Fix a potential deadlock in the timeout\n handler (bsc#1171612).\n\n - scsi: iscsi: qla4xxx: fix double free in probe\n (bsc#1171613).\n\n - scsi: lpfc: Change default queue allocation for reduced\n memory consumption (bsc#1164780).\n\n - scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): NULL\n pointer dereferences (bsc#1171614).\n\n - scsi: lpfc: Fix crash in target side cable pulls hitting\n WAIT_FOR_UNREG (bsc#1171615).\n\n - scsi: lpfc: Fix lpfc_nodelist leak when processing\n unsolicited event (bsc#1164780).\n\n - scsi: lpfc: Fix MDS Diagnostic Enablement definition\n (bsc#1164780).\n\n - scsi: lpfc: Fix negation of else clause in\n lpfc_prep_node_fc4type (bsc#1164780).\n\n - scsi: lpfc: Fix noderef and address space warnings\n (bsc#1164780).\n\n - scsi: lpfc: Maintain atomic consistency of queue_claimed\n flag (bsc#1164780).\n\n - scsi: lpfc: remove duplicate unloading checks\n (bsc#1164780).\n\n - scsi: lpfc: Remove re-binding of nvme rport during\n registration (bsc#1164780).\n\n - scsi: lpfc: Remove redundant initialization to variable\n rc (bsc#1164780).\n\n - scsi: lpfc: Remove unnecessary lockdep_assert_held calls\n (bsc#1164780).\n\n - scsi: lpfc: Update lpfc version to 12.8.0.1\n (bsc#1164780).\n\n - scsi: megaraid_sas: Do not initiate OCR if controller is\n not in ready state (bsc#1171616).\n\n - scsi: qla2xxx: add ring buffer for tracing debug logs\n (bsc#1157169).\n\n -\n scsi-qla2xxx-check-UNLOADING-before-posting-async-wo.pat\n ch\n\n - scsi: qla2xxx: check UNLOADING before posting async work\n (bsc#1157169).\n\n - scsi: qla2xxx: Delete all sessions before unregister\n local nvme port (bsc#1157169).\n\n - scsi: qla2xxx: Do not log message when reading port\n speed via sysfs (bsc#1157169).\n\n - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all\n in NPIV (bsc#1157169).\n\n - scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n\n - scsi: qla2xxx: Remove non functional code (bsc#1157169).\n\n - scsi: qla2xxx: set UNLOADING before waiting for session\n deletion (bsc#1157169).\n\n -\n scsi-qla2xxx-set-UNLOADING-before-waiting-for-sessio.pat\n ch\n\n - scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free\n (bsc#1171617).\n\n - scsi: qla4xxx: fix double free bug (bsc#1171618).\n\n - scsi: sd: Clear sdkp->protection_type if disk is\n reformatted without PI (bsc#1171619).\n\n - scsi: sg: add sg_remove_request in sg_common_write\n (bsc#1171620).\n\n - scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for\n READ(6) and WRITE(6) (bsc#1171621).\n\n - scsi: ufs: change msleep to usleep_range (bsc#1171622).\n\n - scsi: ufs: Clean up ufshcd_scale_clks() and clock\n scaling error out path (bsc#1171623).\n\n - scsi: ufs: Fix ufshcd_hold() caused scheduling while\n atomic (bsc#1171624).\n\n - scsi: ufs: Fix ufshcd_probe_hba() reture value in case\n ufshcd_scsi_add_wlus() fails (bsc#1171625).\n\n - scsi: ufs: Recheck bkops level if bkops is disabled\n (bsc#1171626).\n\n - scsi: zfcp: fix missing erp_lock in port recovery\n trigger for point-to-point (git-fixes).\n\n - sctp: fix possibly using a bad saddr with a given dst\n (networking-stable-20_04_02).\n\n - sctp: fix refcount bug in sctp_wfree\n (networking-stable-20_04_02).\n\n - sctp: move the format error check out of\n __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n\n - selftests/powerpc: Fix build errors in powerpc ptrace\n selftests (boo#1124278).\n\n - seq_file: fix problem when seeking mid-record\n (bsc#1170125).\n\n - serial: uartps: Move the spinlock after the read of the\n tx empty (git-fixes).\n\n - sfc: detach from cb_page in efx_copy_channel()\n (networking-stable-20_03_14).\n\n - signal/pid_namespace: Fix reboot_pid_ns to use send_sig\n not force_sig (bsc#1172185).\n\n - slcan: not call free_netdev before rtnl_unlock in\n slcan_open (networking-stable-20_03_28).\n\n - slip: make slhc_compress() more robust against malicious\n packets (networking-stable-20_03_14).\n\n - smb3: Additional compression structures (bsc#1144333).\n\n - smb3: Add new compression flags (bsc#1144333).\n\n - smb3: change noisy error message to FYI (bsc#1144333).\n\n - smb3: enable swap on SMB3 mounts (bsc#1144333).\n\n - smb3-fix-performance-regression-with-setting-mtime.patch\n\n - smb3: Minor cleanup of protocol definitions\n (bsc#1144333).\n\n - smb3: remove overly noisy debug line in signing errors\n (bsc#1144333).\n\n - smb3: smbdirect support can be configured by default\n (bsc#1144333).\n\n - smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n\n - spi: bcm2835: Fix 3-wire mode if DMA is enabled\n (git-fixes).\n\n - spi: bcm63xx-hsspi: Really keep pll clk enabled\n (bsc#1051510).\n\n - spi: bcm-qspi: when tx/rx buffer is NULL set to 0\n (bsc#1051510).\n\n - spi: dw: Add SPI Rx-done wait method to DMA-based\n transfer (bsc#1051510).\n\n - spi: dw: Add SPI Tx-done wait method to DMA-based\n transfer (bsc#1051510).\n\n - spi: dw: Zero DMA Tx and Rx configurations on stack\n (bsc#1051510).\n\n - spi: fsl: do not map irq during probe (git-fixes).\n\n - spi: fsl: use platform_get_irq() instead of\n of_irq_to_resource() (git-fixes).\n\n - spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n\n - spi: qup: call spi_qup_pm_resume_runtime before\n suspending (bsc#1051510).\n\n - spi: spi-fsl-dspi: Replace interruptible wait queue with\n a simple completion (git-fixes).\n\n - spi: spi-s3c64xx: Fix system resume support (git-fixes).\n\n - spi/zynqmp: remove entry that causes a cs glitch\n (bsc#1051510).\n\n - staging: comedi: dt2815: fix writing hi byte of analog\n output (bsc#1051510).\n\n - staging: comedi: Fix comedi_device refcnt leak in\n comedi_open (bsc#1051510).\n\n - staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n\n - staging: vt6656: Do not set RCR_MULTICAST or\n RCR_BROADCAST by default (git-fixes).\n\n - staging: vt6656: Fix drivers TBTT timing counter\n (git-fixes).\n\n - staging: vt6656: Fix pairwise key entry save\n (git-fixes).\n\n - sunrpc: expiry_time should be seconds not timeval\n (git-fixes).\n\n - sunrpc: Fix a potential buffer overflow in\n 'svc_print_xprts()' (git-fixes).\n\n - supported.conf: Add br_netfilter to base (bsc#1169020).\n\n - supported.conf: support w1 core and thermometer support\n\n - svcrdma: Fix double svc_rdma_send_ctxt_put() in an error\n path (bsc#1103992).\n\n - svcrdma: Fix leak of transport addresses (git-fixes).\n\n - svcrdma: Fix trace point use-after-free race\n (bsc#1103992 ).\n\n - taskstats: fix data-race (bsc#1172188).\n\n - tcp: cache line align MAX_TCP_HEADER\n (networking-stable-20_04_27).\n\n - tcp: repair: fix TCP_QUEUE_SEQ implementation\n (networking-stable-20_03_28).\n\n - team: add missing attribute validation for array index\n (networking-stable-20_03_14).\n\n - team: add missing attribute validation for port ifindex\n (networking-stable-20_03_14).\n\n - team: fix hang in team_mode_get()\n (networking-stable-20_04_27).\n\n - tools lib traceevent: Remove unneeded qsort and uses\n memmove instead (git-fixes).\n\n - tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()\n (bsc#1065729).\n\n - tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n\n - tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n\n - tracing: Add a vmalloc_sync_mappings() for safe measure\n (git-fixes).\n\n - tracing: Disable trace_printk() on post poned tests\n (git-fixes).\n\n - tracing: Fix the race between registering 'snapshot'\n event trigger and triggering 'snapshot' operation\n (git-fixes).\n\n - tty: rocket, avoid OOB access (git-fixes).\n\n - tun: Do not put_page() for all negative return values\n from XDP program (bsc#1109837).\n\n - UAS: fix deadlock in error handling and PM flushing work\n (git-fixes).\n\n - UAS: no use logging any details in case of ENODEV\n (git-fixes).\n\n - Update config files: Build w1 bus on arm64\n (jsc#SLE-11048)\n\n - Update config files: re-enable CONFIG_HAMRADIO and co\n (bsc#1170740)\n\n - Update\n patches.suse/powerpc-pseries-ddw-Extend-upper-limit-for-\n huge-DMA-.patch (bsc#1142685 bsc#1167867 ltc#179509\n ltc#184616).\n\n - Update patches.suse/x86-mm-split-vmalloc_sync_all.patch\n (bsc#1165741, bsc#1166969).\n\n - Update references:\n patches.suse/s390-pci-do-not-set-affinity-for-floating-i\n rqs (bsc#1171817 LTC#185819 git-fixes).\n\n - usb: Add USB_QUIRK_DELAY_CTRL_MSG and\n USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE\n (git-fixes).\n\n - usb: cdc-acm: restore capability check order\n (git-fixes).\n\n - usb: core: Fix misleading driver bug report\n (bsc#1051510).\n\n - usb: dwc3: do not set gadget->is_otg flag (git-fixes).\n\n - usb: dwc3: gadget: Do link recovery for SS and SSP\n (git-fixes).\n\n - usb: early: Handle AMD's spec-compliant identifiers, too\n (git-fixes).\n\n - usb: f_fs: Clear OS Extended descriptor counts to zero\n in ffs_data_reset() (git-fixes).\n\n - usb: gadget: audio: Fix a missing error return value in\n audio_bind() (git-fixes).\n\n - usb: gadget: composite: Inform controller driver of\n self-powered (git-fixes).\n\n - usb: gadget: legacy: fix error return code in cdc_bind()\n (git-fixes).\n\n - usb: gadget: legacy: fix error return code in\n gncm_bind() (git-fixes).\n\n - usb: gadget: legacy: fix redundant initialization\n warnings (bsc#1051510).\n\n - usb: gadget: net2272: Fix a memory leak in an error\n handling path in 'net2272_plat_probe()' (git-fixes).\n\n - usb: gadget: udc: atmel: Fix vbus disconnect handling\n (git-fixes).\n\n - usb: gadget: udc: atmel: Make some symbols static\n (git-fixes).\n\n - usb: gadget: udc: bdc: Remove unnecessary NULL checks in\n bdc_req_complete (git-fixes).\n\n - usb: host: xhci-plat: keep runtime active when removing\n host (git-fixes).\n\n - usb: hub: Fix handling of connect changes during sleep\n (git-fixes).\n\n - usbnet: silence an unnecessary warning (bsc#1170770).\n\n - usb: serial: garmin_gps: add sanity checking for data\n length (git-fixes).\n\n - usb: serial: option: add BroadMobi BM806U (git-fixes).\n\n - usb: serial: option: add support for ASKEY WWHC050\n (git-fixes).\n\n - usb: serial: option: add Wistron Neweb D19Q1\n (git-fixes).\n\n - usb: serial: qcserial: Add DW5816e support (git-fixes).\n\n - usb: sisusbvga: Change port variable from signed to\n unsigned (git-fixes).\n\n - usb-storage: Add unusual_devs entry for JMicron JMS566\n (git-fixes).\n\n - usb: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n\n - usb: xhci: Fix NULL pointer dereference when enqueuing\n trbs from urb sg list (git-fixes).\n\n - video: fbdev: sis: Remove unnecessary parentheses and\n commented code (bsc#1114279)\n\n - video: fbdev: w100fb: Fix a potential double free\n (bsc#1051510).\n\n - vrf: Check skb for XFRM_TRANSFORMED flag\n (networking-stable-20_04_27).\n\n - vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines\n (git-fixes).\n\n - vt: selection, introduce vc_is_sel (git-fixes).\n\n - vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n\n - vt: vt_ioctl: fix use-after-free in vt_in_use()\n (git-fixes).\n\n - vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual\n console (git-fixes).\n\n - vxlan: check return value of gro_cells_init()\n (networking-stable-20_03_28).\n\n - w1: Add subsystem kernel public interface\n (jsc#SLE-11048).\n\n - w1: Fix slave count on 1-Wire bus (resend)\n (jsc#SLE-11048).\n\n - w1: keep balance of mutex locks and refcnts\n (jsc#SLE-11048).\n\n - w1: use put_device() if device_register() fail\n (jsc#SLE-11048).\n\n - watchdog: reset last_hw_keepalive time at start\n (git-fixes).\n\n - wcn36xx: Fix error handling path in 'wcn36xx_probe()'\n (bsc#1051510).\n\n - wil6210: remove reset file from debugfs (git-fixes).\n\n - wimax/i2400m: Fix potential urb refcnt leak\n (bsc#1051510).\n\n - workqueue: do not use wq_select_unbound_cpu() for bound\n works (bsc#1172130).\n\n - x86/entry/64: Fix unwind hints in kernel exit path\n (bsc#1058115).\n\n - x86/entry/64: Fix unwind hints in register clearing code\n (bsc#1058115).\n\n - x86/entry/64: Fix unwind hints in rewind_stack_do_exit()\n (bsc#1058115).\n\n - x86/entry/64: Fix unwind hints in __switch_to_asm()\n (bsc#1058115).\n\n - x86/hyperv: Allow guests to enable InvariantTSC\n (bsc#1170621, bsc#1170620).\n\n - x86/Hyper-V: Free hv_panic_page when fail to register\n kmsg dump (bsc#1170617, bsc#1170618).\n\n - x86/Hyper-V: Report crash data in die() when\n panic_on_oops is set (bsc#1170617, bsc#1170618).\n\n - x86/Hyper-V: Report crash register data or kmsg before\n running crash kernel (bsc#1170617, bsc#1170618).\n\n - x86/Hyper-V: Report crash register data when\n sysctl_record_panic_msg is not set (bsc#1170617,\n bsc#1170618).\n\n - x86: hyperv: report value of misc_features (git fixes).\n\n - x86/Hyper-V: Trigger crash enlightenment only once\n during system crash (bsc#1170617, bsc#1170618).\n\n - x86/Hyper-V: Unload vmbus channel in hv panic callback\n (bsc#1170617, bsc#1170618).\n\n - x86/kprobes: Avoid kretprobe recursion bug\n (bsc#1114279).\n\n - x86/resctrl: Fix invalid attempt at removing the default\n resource group (git-fixes).\n\n - x86/resctrl: Preserve CDP enable over CPU hotplug\n (bsc#1114279).\n\n - x86/unwind/orc: Do not skip the first frame for inactive\n tasks (bsc#1058115).\n\n - x86/unwind/orc: Fix error handling in __unwind_start()\n (bsc#1058115).\n\n - x86/unwind/orc: Fix error path for bad ORC entry type\n (bsc#1058115).\n\n - x86/unwind/orc: Fix unwind_get_return_address_ptr() for\n inactive tasks (bsc#1058115).\n\n - x86/unwind/orc: Prevent unwinding before ORC\n initialization (bsc#1058115).\n\n - x86/unwind: Prevent false warnings for non-current tasks\n (bsc#1058115).\n\n - x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n\n - x86/xen: Make the boot CPU idle task reliable\n (bsc#1071995).\n\n - x86/xen: Make the secondary CPU idle tasks reliable\n (bsc#1071995).\n\n - xen/pci: reserve MCFG areas earlier (bsc#1170145).\n\n - xfrm: Always set XFRM_TRANSFORMED in\n xfrm(4,6)_output_finish (networking-stable-20_04_27).\n\n - xfs: clear PF_MEMALLOC before exiting xfsaild thread\n (git-fixes).\n\n - xfs: Correctly invert xfs_buftarg LRU isolation logic\n (git-fixes).\n\n - xfs: do not ever return a stale pointer from\n __xfs_dir3_free_read (git-fixes).\n\n - xprtrdma: Fix completion wait during device removal\n (git-fixes).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1058115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1082555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083647\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1089895\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1090036\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103990\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103991\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103992\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1104745\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109837\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112374\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124278\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127354\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127355\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127371\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1142685\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1151794\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152489\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1154824\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1157169\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1160388\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1160947\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1164780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1164871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1165183\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1165478\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1165741\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1166969\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1166978\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167574\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167851\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167867\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168332\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168789\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168829\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168854\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169525\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170056\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170125\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170345\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170457\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170522\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170620\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170621\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170740\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170778\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170791\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170901\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171098\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171118\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171191\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171195\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171202\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171214\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171217\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171218\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171219\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171220\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171244\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171252\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171254\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171293\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171527\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171599\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171601\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171602\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171604\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171605\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171606\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171607\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171608\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171609\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171610\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171611\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171612\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171613\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171614\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171615\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171616\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171619\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171620\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171621\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171622\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171623\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171626\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171662\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171679\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171691\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171692\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171694\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171695\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171736\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171817\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171948\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171949\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171951\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171952\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171979\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171982\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172017\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172096\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172097\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172098\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172099\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172101\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172102\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172103\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172130\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172188\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172201\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172202\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172221\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172249\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172251\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172317\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172342\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172366\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172378\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172391\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172397\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172453\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-12659\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-debuginfo-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debuginfo-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debugsource-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-debuginfo-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-debuginfo-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debuginfo-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debugsource-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-debuginfo-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-devel-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-docs-html-4.12.14-lp151.28.52.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debugsource-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-macros-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-4.12.14-lp151.28.52.3\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-debugsource-4.12.14-lp151.28.52.3\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-qa-4.12.14-lp151.28.52.3\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-vanilla-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-syms-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debuginfo-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debugsource-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-4.12.14-lp151.28.52.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-lp151.28.52.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc\");\n}\n", "naslFamily": "SuSE Local Security Checks", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "cpe:/o:novell:opensuse:15.1", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel"], "solution": "Update the affected the Linux Kernel packages.", "nessusSeverity": "High", "cvssScoreSource": "CVE-2020-12659", "vendor_cvss2": {"score": 7.2, "vector": "CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "vendor_cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "vpr": {"risk factor": "Medium", "score": "6.7"}, "exploitAvailable": false, "exploitEase": "No known exploits are available", "patchPublicationDate": "2020-06-12T00:00:00", "vulnerabilityPublicationDate": "2018-05-24T00:00:00", "exploitableWith": []}
{"openvas": [{"lastseen": "2020-06-25T13:28:00", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-14T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for the (openSUSE-SU-2020:0801-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12659", "CVE-2019-19462", "CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12656", "CVE-2018-1000199", "CVE-2020-11609", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10690", "CVE-2020-12654", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-12653", "CVE-2020-11608", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-12652", "CVE-2020-10757", "CVE-2020-12655", "CVE-2020-12657"], "modified": "2020-06-24T00:00:00", "id": "OPENVAS:1361412562310853206", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310853206", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.853206\");\n script_version(\"2020-06-24T03:42:18+0000\");\n script_cve_id(\"CVE-2018-1000199\", \"CVE-2019-19462\", \"CVE-2019-20806\", \"CVE-2019-20812\", \"CVE-2019-9455\", \"CVE-2020-0543\", \"CVE-2020-10690\", \"CVE-2020-10711\", \"CVE-2020-10720\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10757\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12655\", \"CVE-2020-12656\", \"CVE-2020-12657\", \"CVE-2020-12659\", \"CVE-2020-12769\", \"CVE-2020-13143\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-24 03:42:18 +0000 (Wed, 24 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-14 03:00:56 +0000 (Sun, 14 Jun 2020)\");\n script_name(\"openSUSE: Security Advisory for the (openSUSE-SU-2020:0801-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.1\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2020:0801-1\");\n script_xref(name:\"URL\", value:\"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'the'\n package(s) announced via the openSUSE-SU-2020:0801-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other than\n the one which called it. This attack is known as Special Register Buffer\n Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\n - CVE-2018-1000199: Fixed a potential local code execution via ptrace\n (bsc#1089895).\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to\n cause a denial of service (such as relay blockage) by triggering a NULL\n alloc_percpu result (bnc#1158265).\n\n - CVE-2019-20806: Fixed a null pointer dereference in\n tw5864_handle_frame() which may had lead to denial of service\n (bsc#1172199).\n\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU\n consumption and soft lockup) in a certain failure case involving\n TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\n - CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\n video driver. This could lead to local information disclosure with\n System execution privileges needed (bsc#1170345).\n\n - CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev\n (bsc#1170056).\n\n - CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem\n which could have allowed a remote network user to crash the kernel\n resulting in a denial of service (bsc#1171191).\n\n - CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n (bsc#1170778).\n\n - CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\n uninitialized data (bsc#1171220).\n\n - CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\n where it was assumed that an skb would only contain a single netlink\n message (bsc#1171189).\n\n - CVE-2020-10757: Fixed an issue where remapping hugepage DAX to anon mmap\n could have caused user PTE access (bsc#1172317).\n\n - CVE-2020-11608: An issue was discovered in\n drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences\n in ov511_mode_init_regs and ov518_mode_init_regs when there are zero\n endpoints, aka CID-998912346c0d (bnc#1168829).\n\n - CVE-2020-11609: An issue was discovered in the stv06xx subsystem in\n drivers/media/usb/gspca/stv06xx/stv06xx.c and\n drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid\n descriptors, as demonstrated by a NULL pointer dereference, aka\n CID-485b06aadb93 (bnc#1168854).\n\n - CVE-2020-12114: Fixed a pivot_root race condition which could have\n allowed ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'the' package(s) on openSUSE Leap 15.1.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.1\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs\", rpm:\"kernel-docs~4.12.14~lp151.28.52.2\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs-html\", rpm:\"kernel-docs-html~4.12.14~lp151.28.52.2\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-macros\", rpm:\"kernel-macros~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source-vanilla\", rpm:\"kernel-source-vanilla~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base\", rpm:\"kernel-debug-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base-debuginfo\", rpm:\"kernel-debug-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debugsource\", rpm:\"kernel-debug-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel-debuginfo\", rpm:\"kernel-debug-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base\", rpm:\"kernel-default-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base-debuginfo\", rpm:\"kernel-default-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debuginfo\", rpm:\"kernel-default-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debugsource\", rpm:\"kernel-default-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel-debuginfo\", rpm:\"kernel-default-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall\", rpm:\"kernel-kvmsmall~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base\", rpm:\"kernel-kvmsmall-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base-debuginfo\", rpm:\"kernel-kvmsmall-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debuginfo\", rpm:\"kernel-kvmsmall-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debugsource\", rpm:\"kernel-kvmsmall-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel\", rpm:\"kernel-kvmsmall-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel-debuginfo\", rpm:\"kernel-kvmsmall-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build\", rpm:\"kernel-obs-build~4.12.14~lp151.28.52.3\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build-debugsource\", rpm:\"kernel-obs-build-debugsource~4.12.14~lp151.28.52.3\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-qa\", rpm:\"kernel-obs-qa~4.12.14~lp151.28.52.3\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla\", rpm:\"kernel-vanilla~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base\", rpm:\"kernel-vanilla-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base-debuginfo\", rpm:\"kernel-vanilla-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debuginfo\", rpm:\"kernel-vanilla-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debugsource\", rpm:\"kernel-vanilla-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel\", rpm:\"kernel-vanilla-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel-debuginfo\", rpm:\"kernel-vanilla-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-15T15:57:27", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-11T00:00:00", "type": "openvas", "title": "Debian: Security Advisory for linux (DSA-4699-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-12768", "CVE-2019-19462", "CVE-2020-12114", "CVE-2019-3016", "CVE-2020-10732", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-10757"], "modified": "2020-06-11T00:00:00", "id": "OPENVAS:1361412562310704699", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704699", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704699\");\n script_version(\"2020-06-11T03:00:17+0000\");\n script_cve_id(\"CVE-2019-19462\", \"CVE-2019-3016\", \"CVE-2020-0543\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10757\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12768\", \"CVE-2020-12770\", \"CVE-2020-13143\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-11 03:00:17 +0000 (Thu, 11 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-11 03:00:17 +0000 (Thu, 11 Jun 2020)\");\n script_name(\"Debian: Security Advisory for linux (DSA-4699-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB10\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2020/dsa-4699.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DSA-4699-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the DSA-4699-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks.\n\nCVE-2019-3016\nIt was discovered that the KVM implementation for x86 did not\nalways perform TLB flushes when needed, if the paravirtualised\nTLB flush feature was enabled. This could lead to disclosure of\nsensitive information within a guest VM.\n\nCVE-2019-19462The syzkaller tool found a missing error check in the relay\n\nlibrary used to implement various files under debugfs. A local\nuser permitted to access debugfs could use this to cause a denial\nof service (crash) or possibly for privilege escalation.\n\nCVE-2020-0543\nResearchers at VU Amsterdam discovered that on some Intel CPUs\nsupporting the RDRAND and RDSEED instructions, part of a random\nvalue generated by these instructions may be used in a later\nspeculative execution on any core of the same physical CPU.\nDepending on how these instructions are used by applications, a\nlocal user or VM guest could use this to obtain sensitive\ninformation such as cryptographic keys from other users or VMs.\n\nThis vulnerability can be mitigated by a microcode update, either\nas part of system firmware (BIOS) or through the intel-microcode\npackage in Debian's non-free archive section. This kernel update\nonly provides reporting of the vulnerability and the option to\ndisable the mitigation if it is not needed.\n\nCVE-2020-10711\nMatthew Sheets reported NULL pointer dereference issues in the\nSELinux subsystem while receiving CIPSO packet with null category. A\nremote attacker can take advantage of this flaw to cause a denial of\nservice (crash). Note that this issue does not affect the binary\npackages distributed in Debian as CONFIG_NETLABEL is not enabled.\n\nCVE-2020-10732\nAn information leak of kernel private memory to userspace was found\nin the kernel's implementation of core dumping userspace processes.\n\nCVE-2020-10751\nDmitry Vyukov reported that the SELinux subsystem did not properly\nhandle validating multiple messages, which could allow a privileged\nattacker to bypass SELinux netlink restrictions.\n\nCVE-2020-10757\nFan Yang reported a flaw in the way mremap handled DAX hugepages,\nallowing a local user to escalate their privileges.\n\nCVE-2020-12114\nPiotr Krysiuk discovered a race condition between the umount and\npivot_root operations in the filesystem core (vfs). A local user\nwith the CAP_SYS_ADMIN capability in any user namespace could use\nthis to cause a denial of service (crash).\n\nCVE-2020-12464\nKyungtae Kim reported a race condition in the USB core that can\nresult in a use-after-free. It is not clear how this can be\nexploited, but i ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For the stable distribution (buster), these problems have been fixed\nin version 4.19.118-2+deb10u1. This version also fixes some related\nbugs that do not have their own CVE IDs, and a regression in the\nUAPI header introduced in the previous point release\n(bug #960271).\n\nWe recommend that you upgrade your linux packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"hyperv-daemons\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libbpf-dev\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libbpf4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcpupower-dev\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcpupower1\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"liblockdep-dev\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"liblockdep4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-8-arm\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-8-s390\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-8-x86\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-config-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-cpupower\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-doc-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-686\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-armel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-armhf\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-i386\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-mips\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-mips64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-mipsel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-ppc64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-cloud-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-common\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-common-rt\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rt-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rt-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rt-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-686\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-armel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-armhf\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-i386\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-mips\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-mips64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-mipsel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-ppc64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-cloud-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-common\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-common-rt\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rt-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rt-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rt-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-686\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-armel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-armhf\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-i386\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-mips\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-mips64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-mipsel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-ppc64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-cloud-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-common\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-common-rt\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rt-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rt-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rt-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-4kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-5kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-686-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-686-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-armmp-lpae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-cloud-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-cloud-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-loongson-3-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-marvell-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-octeon-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-powerpc64le-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rpi-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-s390x-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-4kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-5kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-686-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-686-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-armmp-lpae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-cloud-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-cloud-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-loongson-3-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-marvell-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-octeon-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-powerpc64le-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rpi-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-s390x-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-4kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-5kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-686-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-686-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-armmp-lpae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-cloud-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-cloud-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-loongson-3-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-marvell-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-octeon-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-powerpc64le-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rpi-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-s390x-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-amd64-signed-template\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-arm64-signed-template\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-i386-signed-template\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-kbuild-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-perf-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-source-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.19.0-6\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.19.0-8\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.19.0-9\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"lockdep\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"usbip\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-10T21:45:25", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-05-26T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1592)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-11884", "CVE-2020-12659", "CVE-2020-12465", "CVE-2019-19462", "CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12826", "CVE-2020-12656", "CVE-2020-10942", "CVE-2020-10720", "CVE-2020-12464", "CVE-2020-12654", "CVE-2020-12653", "CVE-2019-19377", "CVE-2020-12652", "CVE-2020-12771", "CVE-2020-12655", "CVE-2020-12657"], "modified": "2020-05-29T00:00:00", "id": "OPENVAS:1361412562311220201592", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201592", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1592\");\n script_version(\"2020-05-29T10:19:35+0000\");\n script_cve_id(\"CVE-2019-19377\", \"CVE-2019-19462\", \"CVE-2020-10711\", \"CVE-2020-10720\", \"CVE-2020-10942\", \"CVE-2020-11884\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12465\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12655\", \"CVE-2020-12656\", \"CVE-2020-12657\", \"CVE-2020-12659\", \"CVE-2020-12769\", \"CVE-2020-12770\", \"CVE-2020-12771\", \"CVE-2020-12826\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-29 10:19:35 +0000 (Fri, 29 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-26 05:46:04 +0000 (Tue, 26 May 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1592)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP8\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1592\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1592\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2020-1592 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"A flaw was found in the Linux kernels implementation of GRO. This flaw allows an attacker with local access to crash the system.(CVE-2020-10720)\n\nA NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.(CVE-2020-10711)\n\nA signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.(CVE-2020-12826)\n\nAn issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.(CVE-2020-12769)\n\nAn issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.(CVE-2020-12770)\n\nAn issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.(CVE-2020-12771)\n\nThe __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a 'double fetch' vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states 'The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.'(CVE-2020-12652)\n\nAn issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.(CVE-2020-126 ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS V2.0SP8.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP8\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"bpftool\", rpm:\"bpftool~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python3-perf\", rpm:\"python3-perf~4.19.36~vhulk1907.1.0.h748.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-15T15:55:16", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-10T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4389-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-12659", "CVE-2020-12114", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10751", "CVE-2020-0067"], "modified": "2020-06-12T00:00:00", "id": "OPENVAS:1361412562310844464", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844464", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844464\");\n script_version(\"2020-06-12T07:11:22+0000\");\n script_cve_id(\"CVE-2020-0067\", \"CVE-2020-0543\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12659\", \"CVE-2020-10751\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-12 07:11:22 +0000 (Fri, 12 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-10 03:01:55 +0000 (Wed, 10 Jun 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4389-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU20\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4389-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-June/005471.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4389-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the F2FS file system implementation in the Linux\nkernel did not properly perform bounds checking on xattrs in some\nsituations. A local attacker could possibly use this to expose sensitive\ninformation (kernel memory). (CVE-2020-0067)\n\nIt was discovered that memory contents previously stored in\nmicroarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY\nread operations on Intel client and Xeon E3 processors may be briefly\nexposed to processes on the same or different processor cores. A local\nattacker could use this to expose sensitive information. (CVE-2020-0543)\n\nPiotr Krysiuk discovered that race conditions existed in the file system\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash). (CVE-2020-12114)\n\nIt was discovered that the USB susbsystem's scatter-gather implementation\nin the Linux kernel did not properly take data references in some\nsituations, leading to a use-after-free. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2020-12464)\n\nBui Quang Minh discovered that the XDP socket implementation in the Linux\nkernel did not properly validate meta-data passed from user space, leading\nto an out-of-bounds write vulnerability. A local attacker with the\nCAP_NET_ADMIN capability could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2020-12659)\n\nDmitry Vyukov discovered that the SELinux netlink security hook in the\nLinux kernel did not validate messages in some situations. A privileged\nattacker could use this to bypass SELinux netlink restrictions.\n(CVE-2020-10751)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 20.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU20.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1015-aws\", ver:\"5.4.0-1015.15\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1015-gcp\", ver:\"5.4.0-1015.15\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1015-kvm\", ver:\"5.4.0-1015.15\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1015-oracle\", ver:\"5.4.0-1015.15\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1016-azure\", ver:\"5.4.0-1016.16\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-37-generic\", ver:\"5.4.0-37.41\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-37-generic-lpae\", ver:\"5.4.0-37.41\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-37-lowlatency\", ver:\"5.4.0-37.41\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.4.0.1015.16\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"5.4.0.1016.16\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.4.0.1015.14\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.4.0.37.40\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-20.04\", ver:\"5.4.0.37.40\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.4.0.37.40\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-20.04\", ver:\"5.4.0.37.40\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.4.0.1015.14\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.4.0.1015.14\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.4.0.37.40\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-20.04\", ver:\"5.4.0.37.40\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"5.4.0.37.40\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem-osp1\", ver:\"5.4.0.37.40\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.4.0.1015.14\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.4.0.37.40\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-20.04\", ver:\"5.4.0.37.40\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"Please\", ver:\"note that the mitigation for CVE-2020-0543 requires a processor\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"or\", ver:\"via the intel-microcode package. The kernel update for this issue\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"vulnerability\", ver:\"status.\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-15T15:55:00", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-10T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4387-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-12659", "CVE-2020-12114", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-0067"], "modified": "2020-06-12T00:00:00", "id": "OPENVAS:1361412562310844466", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844466", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844466\");\n script_version(\"2020-06-12T07:11:22+0000\");\n script_cve_id(\"CVE-2020-0067\", \"CVE-2020-0543\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12659\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-12 07:11:22 +0000 (Fri, 12 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-10 03:02:02 +0000 (Wed, 10 Jun 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4387-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU19\\.10|UBUNTU18\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4387-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-June/005469.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4387-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the F2FS file system implementation in the Linux\nkernel did not properly perform bounds checking on xattrs in some\nsituations. A local attacker could possibly use this to expose sensitive\ninformation (kernel memory). (CVE-2020-0067)\n\nIt was discovered that memory contents previously stored in\nmicroarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY\nread operations on Intel client and Xeon E3 processors may be briefly\nexposed to processes on the same or different processor cores. A local\nattacker could use this to expose sensitive information. (CVE-2020-0543)\n\nPiotr Krysiuk discovered that race conditions existed in the file system\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash). (CVE-2020-12114)\n\nIt was discovered that the USB susbsystem's scatter-gather implementation\nin the Linux kernel did not properly take data references in some\nsituations, leading to a use-after-free. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2020-12464)\n\nBui Quang Minh discovered that the XDP socket implementation in the Linux\nkernel did not properly validate meta-data passed from user space, leading\nto an out-of-bounds write vulnerability. A local attacker with the\nCAP_NET_ADMIN capability could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2020-12659)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 19.10, Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU19.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1023-aws\", ver:\"5.3.0-1023.25\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1023-kvm\", ver:\"5.3.0-1023.25\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1024-oracle\", ver:\"5.3.0-1024.26\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1026-gcp\", ver:\"5.3.0-1026.28\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1028-azure\", ver:\"5.3.0-1028.29\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-59-generic\", ver:\"5.3.0-59.53\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-59-generic-lpae\", ver:\"5.3.0-59.53\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-59-lowlatency\", ver:\"5.3.0-59.53\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-59-snapdragon\", ver:\"5.3.0-59.53\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.3.0.1023.34\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"5.3.0.1028.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1026.37\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.3.0.59.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.3.0.59.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.3.0.1026.37\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.3.0.1023.21\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.3.0.59.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1024.40\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"5.3.0.59.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.3.0.59.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1023-aws\", ver:\"5.3.0-1023.25~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1024-oracle\", ver:\"5.3.0-1024.26~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1026-gcp\", ver:\"5.3.0-1026.28~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1026-gke\", ver:\"5.3.0-1026.28~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1028-azure\", ver:\"5.3.0-1028.29~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-59-generic\", ver:\"5.3.0-59.53~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-59-generic-lpae\", ver:\"5.3.0-59.53~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-59-lowlatency\", ver:\"5.3.0-59.53~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.3.0.1023.23\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"5.3.0.1028.25\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1026.21\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-18.04\", ver:\"5.3.0.59.113\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-18.04\", ver:\"5.3.0.59.113\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.3\", ver:\"5.3.0.1026.13\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gkeop-5.3\", ver:\"5.3.0.59.113\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-18.04\", ver:\"5.3.0.59.113\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1024.22\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon-hwe-18.04\", ver:\"5.3.0.59.113\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-18.04\", ver:\"5.3.0.59.113\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"Please\", ver:\"note that the mitigation for CVE-2020-0543 requires a processor\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"or\", ver:\"via the intel-microcode package. The kernel update for this\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"vulnerability\", ver:\"status.\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-15T15:57:31", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-11T00:00:00", "type": "openvas", "title": "Debian: Security Advisory for linux (DSA-4698-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-11494", "CVE-2019-5108", "CVE-2020-10711", "CVE-2020-8648", "CVE-2020-12770", "CVE-2020-9383", "CVE-2019-19462", "CVE-2019-2182", "CVE-2020-12114", "CVE-2020-10942", "CVE-2020-11609", "CVE-2020-10732", "CVE-2019-19768", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-12654", "CVE-2019-20806", "CVE-2019-19319", "CVE-2020-12653", "CVE-2020-8428", "CVE-2020-11608", "CVE-2020-11668", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-11565", "CVE-2020-8649", "CVE-2020-12652", "CVE-2020-10757", "CVE-2020-8647", "CVE-2019-20811", "CVE-2020-2732"], "modified": "2020-06-11T00:00:00", "id": "OPENVAS:1361412562310704698", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704698", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704698\");\n script_version(\"2020-06-11T03:00:22+0000\");\n script_cve_id(\"CVE-2019-19319\", \"CVE-2019-19462\", \"CVE-2019-19768\", \"CVE-2019-20806\", \"CVE-2019-20811\", \"CVE-2019-2182\", \"CVE-2019-5108\", \"CVE-2020-0543\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10757\", \"CVE-2020-10942\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12770\", \"CVE-2020-13143\", \"CVE-2020-2732\", \"CVE-2020-8428\", \"CVE-2020-8647\", \"CVE-2020-8648\", \"CVE-2020-8649\", \"CVE-2020-9383\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-11 03:00:22 +0000 (Thu, 11 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-11 03:00:22 +0000 (Thu, 11 Jun 2020)\");\n script_name(\"Debian: Security Advisory for linux (DSA-4698-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB9\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2020/dsa-4698.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DSA-4698-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the DSA-4698-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks.\n\nCVE-2019-2182\nHanjun Guo and Lei Li reported a race condition in the arm64\nvirtual memory management code, which could lead to an information\ndisclosure, denial of service (crash), or possibly privilege\nescalation.\n\nCVE-2019-5108\nMitchell Frank of Cisco discovered that when the IEEE 802.11\n(WiFi) stack was used in AP mode with roaming, it would trigger\nroaming for a newly associated station before the station was\nauthenticated. An attacker within range of the AP could use this\nto cause a denial of service, either by filling up a switching\ntable or by redirecting traffic away from other stations.\n\nCVE-2019-19319\nJungyeon discovered that a crafted filesystem can cause the ext4\nimplementation to deallocate or reallocate journal blocks. A user\npermitted to mount filesystems could use this to cause a denial of\nservice (crash), or possibly for privilege escalation.\n\nCVE-2019-19462The syzbot tool found a missing error check in the relay\n\nlibrary used to implement various files under debugfs. A local\nuser permitted to access debugfs could use this to cause a denial\nof service (crash) or possibly for privilege escalation.\n\nCVE-2019-19768\nTristan Madani reported a race condition in the blktrace debug\nfacility that could result in a use-after-free. A local user able\nto trigger removal of block devices could possibly use this to\ncause a denial of service (crash) or for privilege escalation.\n\nCVE-2019-20806\nA potential null pointer dereference was discovered in the tw5864\nmedia driver. The security impact of this is unclear.\n\nCVE-2019-20811\nThe Hulk Robot tool found a reference-counting bug in an error\npath in the network subsystem. The security impact of this is\nunclear.\n\nCVE-2020-0543\nResearchers at VU Amsterdam discovered that on some Intel CPUs\nsupporting the RDRAND and RDSEED instructions, part of a random\nvalue generated by these instructions may be used in a later\nspeculative execution on any core of the same physical CPU.\nDepending on how these instructions are used by applications, a\nlocal user or VM guest could use this to obtain sensitive\ninformation such as cryptographic keys from other users or VMs.\n\nThis vulnerability can be mitigated by a microcode update, either\nas part of system firmware (BIOS) or through the intel-microcode\npackage in Debian's non-free archive section. This kernel update\nonly provides reporting of the vulnerability and the option to\ndisable the mitigation if it is not needed.\n\nCVE-2020-2732\nPaulo Bonzini discovered that the KVM implementa ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For the oldstable distribution (stretch), these problems have been\nfixed in version 4.9.210-1+deb9u1. This version also fixes some\nrelated bugs that do not have their own CVE IDs, and a regression in\nthe macvlan driver introduced in the previous point release (bug\n\nWe recommend that you upgrade your linux packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"hyperv-daemons\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcpupower-dev\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcpupower1\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libusbip-dev\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-6-arm\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-6-s390\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-6-x86\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-cpupower\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-doc-4.9\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-4kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-5kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-686\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-arm64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-armel\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-armhf\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-i386\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-mips\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-mips64el\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-mipsel\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-ppc64el\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-s390x\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-arm64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-armmp\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-armmp-lpae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-common\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-common-rt\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-loongson-3\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-marvell\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-octeon\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-powerpc64le\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-rt-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-rt-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-s390x\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-4kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-5kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-686\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-arm64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-armel\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-armhf\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-i386\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-mips\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-mips64el\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-mipsel\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-ppc64el\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-s390x\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-arm64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-armmp\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-armmp-lpae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-common\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-common-rt\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-loongson-3\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-marvell\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-octeon\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-powerpc64le\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-rt-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-rt-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-s390x\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-4kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-4kc-malta-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-5kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-5kc-malta-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-686\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-686-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-686-pae-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-amd64-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-arm64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-arm64-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-armmp\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-armmp-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-armmp-lpae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-armmp-lpae-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-loongson-3\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-loongson-3-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-marvell\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-marvell-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-octeon\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-octeon-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-powerpc64le\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-powerpc64le-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-rt-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-rt-686-pae-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-rt-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-rt-amd64-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-s390x\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-s390x-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-4kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-4kc-malta-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-5kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-5kc-malta-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-686\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-686-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-686-pae-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-amd64-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-arm64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-arm64-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-armmp\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-armmp-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-armmp-lpae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-armmp-lpae-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-loongson-3\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-loongson-3-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-marvell\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-marvell-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-octeon\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-octeon-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-powerpc64le\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-powerpc64le-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-rt-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-rt-686-pae-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-rt-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-rt-amd64-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-s390x\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-s390x-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-kbuild-4.9\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-manual-4.9\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-perf-4.9\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-source-4.9\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-11\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-12\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"usbip\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-15T15:57:08", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-11T00:00:00", "type": "openvas", "title": "Debian LTS: Security Advisory for linux-4.9 (DLA-2242-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-11494", "CVE-2019-5108", "CVE-2020-10711", "CVE-2020-8648", "CVE-2020-12770", "CVE-2020-9383", "CVE-2019-19462", "CVE-2019-2182", "CVE-2020-12114", "CVE-2020-10942", "CVE-2020-11609", "CVE-2020-10732", "CVE-2019-19768", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-12654", "CVE-2019-20806", "CVE-2019-19319", "CVE-2020-12653", "CVE-2020-8428", "CVE-2020-11608", "CVE-2020-11668", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-11565", "CVE-2020-8649", "CVE-2020-12652", "CVE-2020-10757", "CVE-2020-8647", "CVE-2019-20811", "CVE-2020-2732"], "modified": "2020-06-11T00:00:00", "id": "OPENVAS:1361412562310892242", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310892242", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.892242\");\n script_version(\"2020-06-11T03:00:11+0000\");\n script_cve_id(\"CVE-2019-19319\", \"CVE-2019-19462\", \"CVE-2019-19768\", \"CVE-2019-20806\", \"CVE-2019-20811\", \"CVE-2019-2182\", \"CVE-2019-5108\", \"CVE-2020-0543\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10757\", \"CVE-2020-10942\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12770\", \"CVE-2020-13143\", \"CVE-2020-2732\", \"CVE-2020-8428\", \"CVE-2020-8647\", \"CVE-2020-8648\", \"CVE-2020-8649\", \"CVE-2020-9383\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-11 03:00:11 +0000 (Thu, 11 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-11 03:00:11 +0000 (Thu, 11 Jun 2020)\");\n script_name(\"Debian LTS: Security Advisory for linux-4.9 (DLA-2242-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DLA-2242-1\");\n script_xref(name:\"URL\", value:\"https://bugs.debian.org/952660\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-4.9'\n package(s) announced via the DLA-2242-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks.\n\nCVE-2019-2182\n\nHanjun Guo and Lei Li reported a race condition in the arm64\nvirtual memory management code, which could lead to an information\ndisclosure, denial of service (crash), or possibly privilege\nescalation.\n\nCVE-2019-5108\n\nMitchell Frank of Cisco discovered that when the IEEE 802.11\n(WiFi) stack was used in AP mode with roaming, it would trigger\nroaming for a newly associated station before the station was\nauthenticated. An attacker within range of the AP could use this\nto cause a denial of service, either by filling up a switching\ntable or by redirecting traffic away from other stations.\n\nCVE-2019-19319\n\nJungyeon discovered that a crafted filesystem can cause the ext4\nimplementation to deallocate or reallocate journal blocks. A user\npermitted to mount filesystems could use this to cause a denial of\nservice (crash), or possibly for privilege escalation.\n\nCVE-2019-19462\n\nThe syzbot tool found a missing error check in the 'relay'\nlibrary used to implement various files under debugfs. A local\nuser permitted to access debugfs could use this to cause a denial\nof service (crash) or possibly for privilege escalation.\n\nCVE-2019-19768\n\nTristan Madani reported a race condition in the blktrace debug\nfacility that could result in a use-after-free. A local user able\nto trigger removal of block devices could possibly use this to\ncause a denial of service (crash) or for privilege escalation.\n\nCVE-2019-20806\n\nA potential null pointer dereference was discovered in the tw5864\nmedia driver. The security impact of this is unclear.\n\nCVE-2019-20811\n\nThe Hulk Robot tool found a reference-counting bug in an error\npath in the network subsystem. The security impact of this is\nunclear.\n\nCVE-2020-0543\n\nResearchers at VU Amsterdam discovered that on some Intel CPUs\nsupporting the RDRAND and RDSEED instructions, part of a random\nvalue generated by these instructions may be used in a later\nspeculative execution on any core of the same physical CPU.\nDepending on how these instructions are used by applications, a\nlocal user or VM guest could use this to obtain sensitive\ninformation such as cryptographic keys from other users or VMs.\n\nThis vulnerability can be mitigated by a microcode update, either\nas part of system firmware (BIOS) or through the intel-microcode\npackage in Debian's non-free archive section. This kernel update\nonly provides reporting of the vulnerability and the option to\ndisable the mitigation if it is not needed.\n\nCVE-2020-2732\n\nPaulo Bonzini discovered that the KVM implemen ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux-4.9' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n4.9.210-1+deb9u1~deb8u1. This version also fixes some related bugs\nthat do not have their own CVE IDs, and a regression in the macvlan\ndriver introduced in the previous security update (bug #952660).\n\nWe recommend that you upgrade your linux-4.9 packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-4.9-arm\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-doc-4.9\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-686\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-686-pae\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-all\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-all-amd64\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-all-armel\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-all-armhf\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-all-i386\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-amd64\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-armmp\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-armmp-lpae\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-common\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-common-rt\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-marvell\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-rt-686-pae\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.11-rt-amd64\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-686\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-686-pae\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-all\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-all-amd64\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-all-armel\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-all-armhf\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-all-i386\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-amd64\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-armmp\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-armmp-lpae\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-common\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-common-rt\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-marvell\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-rt-686-pae\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.12-rt-amd64\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-686\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-686-pae\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-686-pae-dbg\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-amd64\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-amd64-dbg\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-armmp\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-armmp-lpae\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-marvell\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-rt-686-pae\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-rt-686-pae-dbg\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-rt-amd64\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.11-rt-amd64-dbg\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-686\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-686-pae\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-686-pae-dbg\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-amd64\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-amd64-dbg\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-armmp\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-armmp-lpae\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-marvell\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-rt-686-pae\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-rt-686-pae-dbg\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-rt-amd64\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.12-rt-amd64-dbg\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-kbuild-4.9\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-manual-4.9\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-perf-4.9\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-source-4.9\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-0.bpo.11\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-0.bpo.12\", ver:\"4.9.210-1+deb9u1~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-15T15:55:41", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-10T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4391-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12826", "CVE-2020-0543", "CVE-2020-12464", "CVE-2019-19319", "CVE-2020-1749", "CVE-2020-10751"], "modified": "2020-06-12T00:00:00", "id": "OPENVAS:1361412562310844461", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844461", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844461\");\n script_version(\"2020-06-12T07:11:22+0000\");\n script_cve_id(\"CVE-2019-19319\", \"CVE-2020-0543\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12769\", \"CVE-2020-12826\", \"CVE-2020-1749\", \"CVE-2020-10751\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-12 07:11:22 +0000 (Fri, 12 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-10 03:01:29 +0000 (Wed, 10 Jun 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4391-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU16\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4391-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-June/005474.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4391-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the ext4 file system implementation in the Linux\nkernel did not properly handle setxattr operations in some situations. A\nlocal attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2019-19319)\n\nIt was discovered that memory contents previously stored in\nmicroarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY\nread operations on Intel client and Xeon E3 processors may be briefly\nexposed to processes on the same or different processor cores. A local\nattacker could use this to expose sensitive information. (CVE-2020-0543)\n\nPiotr Krysiuk discovered that race conditions existed in the file system\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash). (CVE-2020-12114)\n\nIt was discovered that the USB susbsystem's scatter-gather implementation\nin the Linux kernel did not properly take data references in some\nsituations, leading to a use-after-free. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2020-12464)\n\nIt was discovered that the DesignWare SPI controller driver in the Linux\nkernel contained a race condition. A local attacker could possibly use this\nto cause a denial of service (system crash). (CVE-2020-12769)\n\nIt was discovered that the exit signaling implementation in the Linux\nkernel contained an integer overflow. A local attacker could use this to\ncause a denial of service (arbitrary application crash). (CVE-2020-12826)\n\nXiumei Mu discovered that the IPSec implementation in the Linux kernel did\nnot properly encrypt IPv6 traffic in some situations. An attacker could use\nthis to expose sensitive information. (CVE-2020-1749)\n\nDmitry Vyukov discovered that the SELinux netlink security hook in the\nLinux kernel did not validate messages in some situations. A privileged\nattacker could use this to bypass SELinux netlink restrictions.\n(CVE-2020-10751)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1075-kvm\", ver:\"4.4.0-1075.82\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1109-aws\", ver:\"4.4.0-1109.120\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-generic\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-generic-lpae\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-lowlatency\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-powerpc-e500mc\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-powerpc-smp\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-powerpc64-emb\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-184-powerpc64-smp\", ver:\"4.4.0-184.214\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.4.0.1109.113\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.4.0.1075.73\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.4.0.184.190\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-15T15:56:03", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-10T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux-gke-5.0 (USN-4388-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-12659", "CVE-2020-12114", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-1749", "CVE-2020-0067"], "modified": "2020-06-12T00:00:00", "id": "OPENVAS:1361412562310844462", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844462", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844462\");\n script_version(\"2020-06-12T07:11:22+0000\");\n script_cve_id(\"CVE-2020-0067\", \"CVE-2020-0543\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12659\", \"CVE-2020-1749\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-12 07:11:22 +0000 (Fri, 12 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-10 03:01:36 +0000 (Wed, 10 Jun 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux-gke-5.0 (USN-4388-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4388-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-June/005470.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-gke-5.0'\n package(s) announced via the USN-4388-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the F2FS file system implementation in the Linux\nkernel did not properly perform bounds checking on xattrs in some\nsituations. A local attacker could possibly use this to expose sensitive\ninformation (kernel memory). (CVE-2020-0067)\n\nIt was discovered that memory contents previously stored in\nmicroarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY\nread operations on Intel client and Xeon E3 processors may be briefly\nexposed to processes on the same or different processor cores. A local\nattacker could use this to expose sensitive information. (CVE-2020-0543)\n\nPiotr Krysiuk discovered that race conditions existed in the file system\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash). (CVE-2020-12114)\n\nIt was discovered that the USB susbsystem's scatter-gather implementation\nin the Linux kernel did not properly take data references in some\nsituations, leading to a use-after-free. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2020-12464)\n\nBui Quang Minh discovered that the XDP socket implementation in the Linux\nkernel did not properly validate meta-data passed from user space, leading\nto an out-of-bounds write vulnerability. A local attacker with the\nCAP_NET_ADMIN capability could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2020-12659)\n\nXiumei Mu discovered that the IPSec implementation in the Linux kernel did\nnot properly encrypt IPv6 traffic in some situations. An attacker could use\nthis to expose sensitive information. (CVE-2020-1749)\");\n\n script_tag(name:\"affected\", value:\"'linux-gke-5.0' package(s) on Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1042-gke\", ver:\"5.0.0-1042.43\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1059-oem-osp1\", ver:\"5.0.0-1059.64\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.0\", ver:\"5.0.0.1042.27\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem-osp1\", ver:\"5.0.0.1059.58\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"Please\", ver:\"note that the mitigation for CVE-2020-0543 requires a processor\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"or\", ver:\"via the intel-microcode package. The kernel update for this issue\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"vulnerability\", ver:\"status.\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-21T19:32:52", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-07-08T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for the (openSUSE-SU-2020:0935-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12888", "CVE-2019-19462", "CVE-2019-20810", "CVE-2020-12769", "CVE-2020-12656", "CVE-2020-10732", "CVE-2020-10768", "CVE-2019-20812", "CVE-2020-14416", "CVE-2020-10766", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-10773", "CVE-2020-10767"], "modified": "2020-07-09T00:00:00", "id": "OPENVAS:1361412562310853260", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310853260", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.853260\");\n script_version(\"2020-07-09T12:15:58+0000\");\n script_cve_id(\"CVE-2019-19462\", \"CVE-2019-20810\", \"CVE-2019-20812\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10773\", \"CVE-2020-12656\", \"CVE-2020-12769\", \"CVE-2020-12888\", \"CVE-2020-13143\", \"CVE-2020-13974\", \"CVE-2020-14416\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-07-09 12:15:58 +0000 (Thu, 09 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-08 03:04:13 +0000 (Wed, 08 Jul 2020)\");\n script_name(\"openSUSE: Security Advisory for the (openSUSE-SU-2020:0935-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.2\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2020:0935-1\");\n script_xref(name:\"URL\", value:\"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'the'\n package(s) announced via the openSUSE-SU-2020:0935-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The openSUSE Leap 15.2 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to\n cause a denial of service (such as relay blockage) by triggering a NULL\n alloc_percpu result (bnc#1158265).\n\n - CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c\n did not call snd_card_free for a failure path, which causes a memory\n leak, aka CID-9453264ef586 (bnc#1172458).\n\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU\n consumption and soft lockup) in a certain failure case involving\n TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\n - CVE-2020-10711: A NULL pointer dereference flaw was found in the Linux\n kernel's SELinux subsystem. This flaw occurs while importing the\n Commercial IP Security Option (CIPSO) protocol's category bitmap into\n the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine.\n While processing the CIPSO restricted bitmap tag in the\n 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to\n indicate that the category bitmap is present, even if it has not been\n allocated. This issue leads to a NULL pointer dereference issue while\n importing the same category bitmap into SELinux. This flaw allowed a\n remote network user to crash the system kernel, resulting in a denial of\n service (bnc#1171191).\n\n - CVE-2020-10732: A flaw was found in the implementation of Userspace core\n dumps. This flaw allowed an attacker with a local account to crash a\n trivial program and exfiltrate private kernel data (bnc#1171220).\n\n - CVE-2020-10751: SELinux LSM hook implementation before version 5.7,\n where it incorrectly assumed that an skb would only contain a single\n netlink message. The hook would incorrectly only validate the first\n netlink message in the skb and allow or deny the rest of the messages\n within the skb with the granted permission without further processing\n (bnc#1171189).\n\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown. Linux scheduler\n logical bug allowed an attacker to turn off the SSBD protection.\n (bnc#1172781).\n\n - CVE-2020-10767: Fixed that Indirect Branch Prediction Barrier is\n force-disabled when STIBP is unavailable or enhanced IBRS is available.\n (bnc#1172782).\n\n - CVE-2020-10768: Fixed that indirect branch speculation can be enabled\n after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command\n (bnc#1172783).\n\n - CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x.\n (bnc#11729 ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'the' package(s) on openSUSE Leap 15.2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs\", rpm:\"kernel-docs~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs-html\", rpm:\"kernel-docs-html~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-macros\", rpm:\"kernel-macros~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source-vanilla\", rpm:\"kernel-source-vanilla~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debugsource\", rpm:\"kernel-debug-debugsource~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel-debuginfo\", rpm:\"kernel-debug-devel-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debuginfo\", rpm:\"kernel-default-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debugsource\", rpm:\"kernel-default-debugsource~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel-debuginfo\", rpm:\"kernel-default-devel-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall\", rpm:\"kernel-kvmsmall~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debuginfo\", rpm:\"kernel-kvmsmall-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debugsource\", rpm:\"kernel-kvmsmall-debugsource~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel\", rpm:\"kernel-kvmsmall-devel~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel-debuginfo\", rpm:\"kernel-kvmsmall-devel-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build\", rpm:\"kernel-obs-build~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build-debugsource\", rpm:\"kernel-obs-build-debugsource~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-qa\", rpm:\"kernel-obs-qa~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-preempt\", rpm:\"kernel-preempt~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-preempt-debuginfo\", rpm:\"kernel-preempt-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-preempt-debugsource\", rpm:\"kernel-preempt-debugsource~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-preempt-devel\", rpm:\"kernel-preempt-devel~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-preempt-devel-debuginfo\", rpm:\"kernel-preempt-devel-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-29T17:52:15", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-06-26T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1698)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-11494", "CVE-2020-10711", "CVE-2020-12770", "CVE-2019-19770", "CVE-2020-12659", "CVE-2020-12465", "CVE-2019-19462", "CVE-2020-12114", "CVE-2020-12826", "CVE-2020-10942", "CVE-2019-19039", "CVE-2020-11609", "CVE-2019-20636", "CVE-2020-12464", "CVE-2020-12654", "CVE-2019-20806", "CVE-2019-19815", "CVE-2019-19036", "CVE-2020-12653", "CVE-2020-1749", "CVE-2020-11608", "CVE-2020-11668", "CVE-2020-13143", "CVE-2019-19037", "CVE-2019-19377", "CVE-2020-11565", "CVE-2020-11669", "CVE-2020-12652", "CVE-2020-0067", "CVE-2020-12771", "CVE-2020-12655"], "modified": "2020-06-26T00:00:00", "id": "OPENVAS:1361412562311220201698", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201698", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1698\");\n script_version(\"2020-06-26T07:27:06+0000\");\n script_cve_id(\"CVE-2019-19036\", \"CVE-2019-19037\", \"CVE-2019-19039\", \"CVE-2019-19377\", \"CVE-2019-19462\", \"CVE-2019-19770\", \"CVE-2019-19815\", \"CVE-2019-20636\", \"CVE-2019-20806\", \"CVE-2020-0067\", \"CVE-2020-10711\", \"CVE-2020-10942\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-11669\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12465\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12655\", \"CVE-2020-12659\", \"CVE-2020-12770\", \"CVE-2020-12771\", \"CVE-2020-12826\", \"CVE-2020-13143\", \"CVE-2020-1749\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-26 07:27:06 +0000 (Fri, 26 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-26 07:27:06 +0000 (Fri, 26 Jun 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1698)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRTARM64-3\\.0\\.6\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1698\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1698\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2020-1698 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause a NULL pointer dereference in f2fs_recover_fsync_data in fs/f2fs/recovery.c. This is related to F2FS_P_SB in fs/f2fs/f2fs.h.(CVE-2019-19815)\n\n** DISPUTED ** __btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because 1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.(CVE-2019-19039)\n\next4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.(CVE-2019-19037)\n\nbtrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-node) can be zero.(CVE-2019-19036)\n\n** DISPUTED ** In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace.(CVE-2019-19770)\n\nAn issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.(CVE-2020-11494)\n\n** DISPUTED ** An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa. NOTE: Someone in the security community disagrees that this is a vulnerability because the issue is a bug in parsing mount options which can only be specified by a privileged user, so triggering the bug does not grant any powers not already held..(CVE-2020-11565 ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.6.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRTARM64-3.0.6.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.19.36~vhulk1907.1.0.h753.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.19.36~vhulk1907.1.0.h753.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~4.19.36~vhulk1907.1.0.h753.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~4.19.36~vhulk1907.1.0.h753.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~4.19.36~vhulk1907.1.0.h753.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~4.19.36~vhulk1907.1.0.h753.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~4.19.36~vhulk1907.1.0.h753.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~4.19.36~vhulk1907.1.0.h753.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python3-perf\", rpm:\"python3-perf~4.19.36~vhulk1907.1.0.h753.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.6.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-15T15:55:01", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-10T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4390-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-12114", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-1749", "CVE-2020-10751", "CVE-2020-0067"], "modified": "2020-06-12T00:00:00", "id": "OPENVAS:1361412562310844465", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844465", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844465\");\n script_version(\"2020-06-12T07:11:22+0000\");\n script_cve_id(\"CVE-2020-0067\", \"CVE-2020-0543\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-1749\", \"CVE-2020-10751\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-12 07:11:22 +0000 (Fri, 12 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-10 03:01:59 +0000 (Wed, 10 Jun 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4390-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU18\\.04 LTS|UBUNTU16\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4390-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-June/005472.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4390-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the F2FS file system implementation in the Linux\nkernel did not properly perform bounds checking on xattrs in some\nsituations. A local attacker could possibly use this to expose sensitive\ninformation (kernel memory). (CVE-2020-0067)\n\nIt was discovered that memory contents previously stored in\nmicroarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY\nread operations on Intel client and Xeon E3 processors may be briefly\nexposed to processes on the same or different processor cores. A local\nattacker could use this to expose sensitive information. (CVE-2020-0543)\n\nPiotr Krysiuk discovered that race conditions existed in the file system\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash). (CVE-2020-12114)\n\nIt was discovered that the USB susbsystem's scatter-gather implementation\nin the Linux kernel did not properly take data references in some\nsituations, leading to a use-after-free. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2020-12464)\n\nXiumei Mu discovered that the IPSec implementation in the Linux kernel did\nnot properly encrypt IPv6 traffic in some situations. An attacker could use\nthis to expose sensitive information. (CVE-2020-1749)\n\nDmitry Vyukov discovered that the SELinux netlink security hook in the\nLinux kernel did not validate messages in some situations. A privileged\nattacker could use this to bypass SELinux netlink restrictions.\n(CVE-2020-10751)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 18.04 LTS, Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1045-oracle\", ver:\"4.15.0-1045.49\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-106-generic\", ver:\"4.15.0-106.107\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-106-generic-lpae\", ver:\"4.15.0-106.107\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-106-lowlatency\", ver:\"4.15.0-106.107\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1063-gke\", ver:\"4.15.0-1063.66\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1067-kvm\", ver:\"4.15.0-1067.68\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1073-aws\", ver:\"4.15.0-1073.77\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1087-oem\", ver:\"4.15.0-1087.97\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1089-azure\", ver:\"4.15.0-1089.99\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-lts-18.04\", ver:\"4.15.0.1073.76\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure-lts-18.04\", ver:\"4.15.0.1089.60\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.15.0.106.94\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.15.0.106.94\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1063.65\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-4.15\", ver:\"4.15.0.1063.65\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.15.0.1067.63\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.15.0.106.94\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.1087.91\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle-lts-18.04\", ver:\"4.15.0.1045.54\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.15.0.106.94\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.15.0.106.94\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.15.0.106.94\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.15.0.106.94\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.15.0.106.94\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1045-oracle\", ver:\"4.15.0-1045.49~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-106-generic\", ver:\"4.15.0-106.107~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-106-generic-lpae\", ver:\"4.15.0-106.107~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-106-lowlatency\", ver:\"4.15.0-106.107~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1073-aws\", ver:\"4.15.0-1073.77~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1077-gcp\", ver:\"4.15.0-1077.87~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.15.0-1089-azure\", ver:\"4.15.0-1089.99~16.04.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-hwe\", ver:\"4.15.0.1073.73\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"4.15.0.1089.84\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure-edge\", ver:\"4.15.0.1089.84\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"4.15.0.1077.79\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-16.04\", ver:\"4.15.0.106.111\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-16.04\", ver:\"4.15.0.106.111\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1077.79\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-16.04\", ver:\"4.15.0.106.111\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.106.111\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"4.15.0.1045.38\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-16.04\", ver:\"4.15.0.106.111\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-25T13:47:31", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-23T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-e47d28bc2b)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12888", "CVE-2020-11884", "CVE-2020-0543", "CVE-2020-10757", "CVE-2020-12655"], "modified": "2020-06-24T00:00:00", "id": "OPENVAS:1361412562310877977", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877977", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877977\");\n script_version(\"2020-06-24T03:42:18+0000\");\n script_cve_id(\"CVE-2020-10757\", \"CVE-2020-12888\", \"CVE-2020-12655\", \"CVE-2020-10711\", \"CVE-2020-11884\", \"CVE-2020-0543\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-24 03:42:18 +0000 (Wed, 24 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-23 03:19:45 +0000 (Tue, 23 Jun 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-e47d28bc2b)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC32\");\n\n script_xref(name:\"FEDORA\", value:\"2020-e47d28bc2b\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDZRGYFUVQ7QOIFXQU4UWW626LIOFJOA\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-e47d28bc2b advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 32.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC32\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.6.18~300.fc32\", rls:\"FC32\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-17T15:35:43", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-05-29T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-4336d63533)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12655"], "modified": "2020-06-16T00:00:00", "id": "OPENVAS:1361412562310877884", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877884", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877884\");\n script_version(\"2020-06-16T07:17:49+0000\");\n script_cve_id(\"CVE-2020-12655\", \"CVE-2020-10711\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-06-16 07:17:49 +0000 (Tue, 16 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-29 03:29:12 +0000 (Fri, 29 May 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-4336d63533)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC32\");\n\n script_xref(name:\"FEDORA\", value:\"2020-4336d63533\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZ2X3TM6RGRUS3KZAS26IJO5XGU7TBBR\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-4336d63533 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 32.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC32\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.6.13~300.fc32\", rls:\"FC32\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-07-21T20:03:11", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-07-09T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4419-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-8992", "CVE-2020-10711", "CVE-2020-12770", "CVE-2020-10690", "CVE-2020-13143"], "modified": "2020-07-09T00:00:00", "id": "OPENVAS:1361412562310844496", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844496", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844496\");\n script_version(\"2020-07-09T12:15:58+0000\");\n script_cve_id(\"CVE-2020-10690\", \"CVE-2020-10711\", \"CVE-2020-12770\", \"CVE-2020-13143\", \"CVE-2020-8992\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-07-09 12:15:58 +0000 (Thu, 09 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-09 03:00:30 +0000 (Thu, 09 Jul 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4419-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU16\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4419-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-July/005510.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4419-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that a race condition existed in the Precision Time\nProtocol (PTP) implementation in the Linux kernel, leading to a use-after-\nfree vulnerability. A local attacker could possibly use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2020-10690)\n\nMatthew Sheets discovered that the SELinux network label handling\nimplementation in the Linux kernel could be coerced into de-referencing a\nNULL pointer. A remote attacker could use this to cause a denial of service\n(system crash). (CVE-2020-10711)\n\nIt was discovered that the SCSI generic (sg) driver in the Linux kernel did\nnot properly handle certain error conditions correctly. A local privileged\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-12770)\n\nIt was discovered that the USB Gadget device driver in the Linux kernel did\nnot validate arguments passed from configfs in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or possibly expose sensitive information. (CVE-2020-13143)\n\nShijie Luo discovered that the ext4 file system implementation in the Linux\nkernel did not properly check for a too-large journal size. An attacker\ncould use this to construct a malicious ext4 image that, when mounted,\ncould cause a denial of service (soft lockup). (CVE-2020-8992)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1076-kvm\", ver:\"4.4.0-1076.83\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1110-aws\", ver:\"4.4.0-1110.121\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1135-raspi2\", ver:\"4.4.0-1135.144\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1139-snapdragon\", ver:\"4.4.0-1139.147\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-generic\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-generic-lpae\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-lowlatency\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-powerpc-e500mc\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-powerpc-smp\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-powerpc64-emb\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-powerpc64-smp\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.4.0.1110.114\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.4.0.1076.74\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.4.0.1135.135\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.4.0.1139.131\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-21T20:04:32", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-07-03T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4411-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-12768", "CVE-2020-10732", "CVE-2020-13143"], "modified": "2020-07-10T00:00:00", "id": "OPENVAS:1361412562310844483", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844483", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844483\");\n script_version(\"2020-07-10T06:57:28+0000\");\n script_cve_id(\"CVE-2020-10732\", \"CVE-2020-10711\", \"CVE-2020-12770\", \"CVE-2020-13143\", \"CVE-2020-12768\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-10 06:57:28 +0000 (Fri, 10 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-03 03:01:33 +0000 (Fri, 03 Jul 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4411-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU20\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4411-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-July/005500.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4411-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the elf handling code in the Linux kernel did not\ninitialize memory before using it in certain situations. A local attacker\ncould use this to possibly expose sensitive information (kernel memory).\n(CVE-2020-10732)\n\nMatthew Sheets discovered that the SELinux network label handling\nimplementation in the Linux kernel could be coerced into de-referencing a\nNULL pointer. A remote attacker could use this to cause a denial of service\n(system crash). (CVE-2020-10711)\n\nIt was discovered that the SCSI generic (sg) driver in the Linux kernel did\nnot properly handle certain error conditions correctly. A local privileged\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-12770)\n\nIt was discovered that the USB Gadget device driver in the Linux kernel did\nnot validate arguments passed from configfs in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or possibly expose sensitive information. (CVE-2020-13143)\n\nIt was discovered that the KVM implementation in the Linux kernel did not\nproperly deallocate memory on initialization for some processors. A local\nattacker could possibly use this to cause a denial of service.\n(CVE-2020-12768)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 20.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU20.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1018-aws\", ver:\"5.4.0-1018.18\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1019-gcp\", ver:\"5.4.0-1019.19\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1019-oracle\", ver:\"5.4.0-1019.19\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-28-generic\", ver:\"5.4.0-28.32\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-40-generic\", ver:\"5.4.0-40.44\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-40-generic-lpae\", ver:\"5.4.0-40.44\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-40-lowlatency\", ver:\"5.4.0-40.44\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.4.0.1018.19\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.4.0.1019.17\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.4.0.28.35\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.4.0.40.43\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.4.0.1019.17\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.4.0.1018.17\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.4.0.40.43\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"5.4.0.40.43\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem-osp1\", ver:\"5.4.0.40.43\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.4.0.1019.17\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.4.0.28.35\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T20:04:01", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-07-03T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4412-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-12768", "CVE-2020-10751", "CVE-2020-13143"], "modified": "2020-07-10T00:00:00", "id": "OPENVAS:1361412562310844484", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844484", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844484\");\n script_version(\"2020-07-10T06:57:28+0000\");\n script_cve_id(\"CVE-2020-10711\", \"CVE-2020-12770\", \"CVE-2020-13143\", \"CVE-2020-10751\", \"CVE-2020-12768\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-10 06:57:28 +0000 (Fri, 10 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-03 03:01:38 +0000 (Fri, 03 Jul 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4412-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU19\\.10|UBUNTU18\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4412-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-July/005499.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4412-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Matthew Sheets discovered that the SELinux network label handling\nimplementation in the Linux kernel could be coerced into de-referencing a\nNULL pointer. A remote attacker could use this to cause a denial of service\n(system crash). (CVE-2020-10711)\n\nIt was discovered that the SCSI generic (sg) driver in the Linux kernel did\nnot properly handle certain error conditions correctly. A local privileged\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-12770)\n\nIt was discovered that the USB Gadget device driver in the Linux kernel did\nnot validate arguments passed from configfs in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or possibly expose sensitive information. (CVE-2020-13143)\n\nDmitry Vyukov discovered that the SELinux netlink security hook in the\nLinux kernel did not validate messages in some situations. A privileged\nattacker could use this to bypass SELinux netlink restrictions.\n(CVE-2020-10751)\n\nIt was discovered that the KVM implementation in the Linux kernel did not\nproperly deallocate memory on initialization for some processors. A local\nattacker could possibly use this to cause a denial of service.\n(CVE-2020-12768)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 19.10, Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU19.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1024-kvm\", ver:\"5.3.0-1024.26\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1028-oracle\", ver:\"5.3.0-1028.30\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1030-gcp\", ver:\"5.3.0-1030.32\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1031-azure\", ver:\"5.3.0-1031.32\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-generic\", ver:\"5.3.0-62.56\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-generic-lpae\", ver:\"5.3.0-62.56\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-lowlatency\", ver:\"5.3.0-62.56\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-snapdragon\", ver:\"5.3.0-62.56\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"5.3.0.1031.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1030.40\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.3.0.62.52\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.3.0.62.52\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.3.0.1030.40\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.3.0.1024.22\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.3.0.62.52\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1028.43\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"5.3.0.62.52\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.3.0.62.52\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1028-oracle\", ver:\"5.3.0-1028.30~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1030-gcp\", ver:\"5.3.0-1030.32~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-generic\", ver:\"5.3.0-62.56~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-generic-lpae\", ver:\"5.3.0-62.56~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-lowlatency\", ver:\"5.3.0-62.56~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1030.24\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-18.04\", ver:\"5.3.0.62.115\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-18.04\", ver:\"5.3.0.62.115\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gkeop-5.3\", ver:\"5.3.0.62.115\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-18.04\", ver:\"5.3.0.62.115\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1028.25\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon-hwe-18.04\", ver:\"5.3.0.62.115\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-18.04\", ver:\"5.3.0.62.115\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T20:04:04", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-07-03T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux-gke-5.0 (USN-4413-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-12768", "CVE-2020-10751", "CVE-2020-13143"], "modified": "2020-07-10T00:00:00", "id": "OPENVAS:1361412562310844485", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844485", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844485\");\n script_version(\"2020-07-10T06:57:28+0000\");\n script_cve_id(\"CVE-2020-10711\", \"CVE-2020-12770\", \"CVE-2020-13143\", \"CVE-2020-10751\", \"CVE-2020-12768\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-10 06:57:28 +0000 (Fri, 10 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-03 03:01:43 +0000 (Fri, 03 Jul 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux-gke-5.0 (USN-4413-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4413-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-July/005501.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-gke-5.0'\n package(s) announced via the USN-4413-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Matthew Sheets discovered that the SELinux network label handling\nimplementation in the Linux kernel could be coerced into de-referencing a\nNULL pointer. A remote attacker could use this to cause a denial of service\n(system crash). (CVE-2020-10711)\n\nIt was discovered that the SCSI generic (sg) driver in the Linux kernel did\nnot properly handle certain error conditions correctly. A local privileged\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-12770)\n\nIt was discovered that the USB Gadget device driver in the Linux kernel did\nnot validate arguments passed from configfs in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or possibly expose sensitive information. (CVE-2020-13143)\n\nDmitry Vyukov discovered that the SELinux netlink security hook in the\nLinux kernel did not validate messages in some situations. A privileged\nattacker could use this to bypass SELinux netlink restrictions.\n(CVE-2020-10751)\n\nIt was discovered that the KVM implementation in the Linux kernel did not\nproperly deallocate memory on initialization for some processors. A local\nattacker could possibly use this to cause a denial of service.\n(CVE-2020-12768)\");\n\n script_tag(name:\"affected\", value:\"'linux-gke-5.0' package(s) on Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1043-gke\", ver:\"5.0.0-1043.44\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1063-oem-osp1\", ver:\"5.0.0-1063.68\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.0\", ver:\"5.0.0.1043.28\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem-osp1\", ver:\"5.0.0.1063.61\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-11T15:49:34", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-06-03T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1606)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-11494", "CVE-2020-12114", "CVE-2014-8181", "CVE-2020-10942", "CVE-2020-11609", "CVE-2019-9444", "CVE-2019-20636", "CVE-2020-12464", "CVE-2020-12654", "CVE-2020-0066", "CVE-2019-11599", "CVE-2019-19036", "CVE-2020-12653", "CVE-2020-11608", "CVE-2019-16230", "CVE-2019-19377", "CVE-2020-11565", "CVE-2019-14898", "CVE-2020-12652", "CVE-2018-9518", "CVE-2020-12655"], "modified": "2020-06-11T00:00:00", "id": "OPENVAS:1361412562311220201606", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201606", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1606\");\n script_version(\"2020-06-11T08:24:44+0000\");\n script_cve_id(\"CVE-2014-8181\", \"CVE-2018-9518\", \"CVE-2019-14898\", \"CVE-2019-16230\", \"CVE-2019-19036\", \"CVE-2019-19377\", \"CVE-2019-20636\", \"CVE-2019-9444\", \"CVE-2020-0066\", \"CVE-2020-10942\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12655\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-11 08:24:44 +0000 (Thu, 11 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-03 06:05:38 +0000 (Wed, 03 Jun 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1606)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP5\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1606\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1606\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2020-1606 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.(CVE-2019-19377)\n\nThe fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.(CVE-2019-14898)\n\nA pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.(CVE-2020-12114)\n\nusb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.(CVE-2020-12464)\n\nThe __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a 'double fetch' vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states 'The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.'(CVE-2020-12652)\n\nAn issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.(CVE-2020-12653)\n\nAn issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.(CVE-2020-12654)\n\nAn issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.(CVE-2020-12655)\n\nIn nfc_llcp_build_sdreq_tlv of llcp_commands.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-73083945.(CVE-2018-9518)\n\nAn issue was discovered in slc_bump in d ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS V2.0SP5.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP5\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~862.14.1.5.h442.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~862.14.1.5.h442.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~862.14.1.5.h442.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~862.14.1.5.h442.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~862.14.1.5.h442.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~862.14.1.5.h442.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~862.14.1.5.h442.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-17T15:37:13", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-05-29T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-c6b9fff7f8)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-12655"], "modified": "2020-06-16T00:00:00", "id": "OPENVAS:1361412562310877862", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877862", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877862\");\n script_version(\"2020-06-16T07:17:49+0000\");\n script_cve_id(\"CVE-2020-12655\", \"CVE-2020-10711\", \"CVE-2020-12770\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-06-16 07:17:49 +0000 (Tue, 16 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-29 03:28:39 +0000 (Fri, 29 May 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-c6b9fff7f8)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2020-c6b9fff7f8\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ES5C6ZCMALBEBMKNNCTBSLLSYGFZG3FF\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-c6b9fff7f8 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.6.13~200.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-17T15:40:22", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-05-29T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-5a69decc0c)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-12655"], "modified": "2020-06-16T00:00:00", "id": "OPENVAS:1361412562310877859", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877859", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877859\");\n script_version(\"2020-06-16T07:17:49+0000\");\n script_cve_id(\"CVE-2020-12655\", \"CVE-2020-10711\", \"CVE-2020-12770\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-06-16 07:17:49 +0000 (Tue, 16 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-29 03:28:34 +0000 (Fri, 29 May 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-5a69decc0c)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC30\");\n\n script_xref(name:\"FEDORA\", value:\"2020-5a69decc0c\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IO5XIQSRI747P4RVVTNX7TUPEOCF4OPU\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-5a69decc0c advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 30.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC30\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.6.13~100.fc30\", rls:\"FC30\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-11T15:55:25", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-10T00:00:00", "type": "openvas", "title": "Debian LTS: Security Advisory for linux (DLA-2241-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-11494", "CVE-2019-5108", "CVE-2020-8648", "CVE-2020-12770", "CVE-2020-9383", "CVE-2018-14610", "CVE-2015-8839", "CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12826", "CVE-2020-10942", "CVE-2020-11609", "CVE-2019-20636", "CVE-2019-19768", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10690", "CVE-2020-0009", "CVE-2020-12654", "CVE-2019-19319", "CVE-2020-12653", "CVE-2020-1749", "CVE-2020-11608", "CVE-2020-11668", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-11565", "CVE-2018-14612", "CVE-2020-8649", "CVE-2020-12652", "CVE-2019-19447", "CVE-2018-14611", "CVE-2020-8647", "CVE-2020-2732", "CVE-2018-14613"], "modified": "2020-06-10T00:00:00", "id": "OPENVAS:1361412562310892241", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310892241", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.892241\");\n script_version(\"2020-06-10T03:00:51+0000\");\n script_cve_id(\"CVE-2015-8839\", \"CVE-2018-14610\", \"CVE-2018-14611\", \"CVE-2018-14612\", \"CVE-2018-14613\", \"CVE-2019-19319\", \"CVE-2019-19447\", \"CVE-2019-19768\", \"CVE-2019-20636\", \"CVE-2019-5108\", \"CVE-2020-0009\", \"CVE-2020-0543\", \"CVE-2020-10690\", \"CVE-2020-10751\", \"CVE-2020-10942\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12769\", \"CVE-2020-12770\", \"CVE-2020-12826\", \"CVE-2020-13143\", \"CVE-2020-1749\", \"CVE-2020-2732\", \"CVE-2020-8647\", \"CVE-2020-8648\", \"CVE-2020-8649\", \"CVE-2020-9383\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-10 03:00:51 +0000 (Wed, 10 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-10 03:00:51 +0000 (Wed, 10 Jun 2020)\");\n script_name(\"Debian LTS: Security Advisory for linux (DLA-2241-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DLA-2241-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the DLA-2241-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks.\n\nCVE-2015-8839\n\nA race condition was found in the ext4 filesystem implementation.\nA local user could exploit this to cause a denial of service\n(filesystem corruption).\n\nCVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613\n\nWen Xu from SSLab at Gatech reported that crafted Btrfs volumes\ncould trigger a crash (Oops) and/or out-of-bounds memory access.\nAn attacker able to mount such a volume could use this to cause a\ndenial of service or possibly for privilege escalation.\n\nCVE-2019-5108\n\nMitchell Frank of Cisco discovered that when the IEEE 802.11\n(WiFi) stack was used in AP mode with roaming, it would trigger\nroaming for a newly associated station before the station was\nauthenticated. An attacker within range of the AP could use this\nto cause a denial of service, either by filling up a switching\ntable or by redirecting traffic away from other stations.\n\nCVE-2019-19319\n\nJungyeon discovered that a crafted filesystem can cause the ext4\nimplementation to deallocate or reallocate journal blocks. A user\npermitted to mount filesystems could use this to cause a denial of\nservice (crash), or possibly for privilege escalation.\n\nCVE-2019-19447\n\nIt was discovered that the ext4 filesystem driver did not safely\nhandle unlinking of an inode that, due to filesystem corruption,\nalready has a link count of 0. An attacker able to mount\narbitrary ext4 volumes could use this to cause a denial of service\n(memory corruption or crash) or possibly for privilege escalation.\n\nCVE-2019-19768\n\nTristan Madani reported a race condition in the blktrace debug\nfacility that could result in a use-after-free. A local user able\nto trigger removal of block devices could possibly use this to\ncause a denial of service (crash) or for privilege escalation.\n\nCVE-2019-20636\n\nThe syzbot tool found that the input subsystem did not fully\nvalidate keycode changes, which could result in a heap\nout-of-bounds write. A local user permitted to access the device\nnode for an input or VT device could possibly use this to cause a\ndenial of service (crash or memory corruption) or for privilege\nescalation.\n\nCVE-2020-0009\n\nJann Horn reported that the Android ashmem driver did not prevent\nread-only files from being memory-mapped and then remapped as\nread-write. However, Android drivers are not enabled in Debian\nkernel configurations.\n\nCVE-2020-0543\n\nResearchers at VU Amsterdam discovered that on some Intel CPUs\nsupporting the RDRAND and RDSEED instructions, part of a random\nvalue generated by these instructions may be use ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n3.16.84-1.\n\nWe recommend that you upgrade your linux packages. Binary packages for\nthe EABI ARM (armel) architecture are not yet available, and a separate\nannouncement will be made when they are.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-4.8-arm\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-4.9-x86\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-doc-3.16\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-586\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-686-pae\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-all\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-all-amd64\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-all-armel\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-all-armhf\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-all-i386\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-amd64\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-armmp\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-armmp-lpae\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-common\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-ixp4xx\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-kirkwood\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-orion5x\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-10-versatile\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-11-586\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-11-686-pae\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-11-all\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-11-all-amd64\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-11-all-armhf\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-11-all-i386\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-11-amd64\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-11-armmp\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-11-armmp-lpae\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-3.16.0-11-common\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-586\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-686-pae\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-686-pae-dbg\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-amd64\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-amd64-dbg\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-armmp\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-armmp-lpae\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-ixp4xx\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-kirkwood\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-orion5x\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-10-versatile\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-11-586\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-11-686-pae\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-11-686-pae-dbg\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-11-amd64\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-11-amd64-dbg\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-11-armmp\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-3.16.0-11-armmp-lpae\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-manual-3.16\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-source-3.16\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-3.16.0-10\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-3.16.0-11\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"xen-linux-system-3.16.0-10-amd64\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"xen-linux-system-3.16.0-11-amd64\", ver:\"3.16.84-1\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-21T19:53:29", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-07-03T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1713)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-8992", "CVE-2020-12770", "CVE-2020-9383", "CVE-2014-8181", "CVE-2017-5967", "CVE-2020-12826", "CVE-2020-10942", "CVE-2020-11609", "CVE-2019-20636", "CVE-2019-19768", "CVE-2020-12464", "CVE-2020-12654", "CVE-2020-12653", "CVE-2020-11608", "CVE-2020-11668", "CVE-2020-13143", "CVE-2020-11565", "CVE-2020-8649", "CVE-2020-12652", "CVE-2020-8647", "CVE-2019-18675", "CVE-2020-10741"], "modified": "2020-07-03T00:00:00", "id": "OPENVAS:1361412562311220201713", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201713", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1713\");\n script_version(\"2020-07-03T06:18:13+0000\");\n script_cve_id(\"CVE-2014-8181\", \"CVE-2017-5967\", \"CVE-2019-18675\", \"CVE-2019-19768\", \"CVE-2019-20636\", \"CVE-2020-10741\", \"CVE-2020-10942\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12770\", \"CVE-2020-12826\", \"CVE-2020-13143\", \"CVE-2020-8647\", \"CVE-2020-8649\", \"CVE-2020-8992\", \"CVE-2020-9383\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-07-03 06:18:13 +0000 (Fri, 03 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-03 06:18:13 +0000 (Fri, 03 Jul 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2020-1713)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-3\\.0\\.6\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1713\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1713\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2020-1713 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).(CVE-2019-19768)\n\nThe Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.(CVE-2019-18675)\n\nAn issue was discovered in the Linux kernel through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.(CVE-2020-9383)\n\nThere is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.(CVE-2020-8649)\n\nThere is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.(CVE-2020-8647)\n\nThe time subsystem in the Linux kernel, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distinguished from PID values inside a PID namespace) by reading the /proc/timer_list file, related to the print_timer function in kernel/time/timer_list.c and the __timer_stats_timer_set_start_info function in kernel/time/timer.c.(CVE-2017-5967)\n\n** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2014-8181)\n\next4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.(CVE-2020-8992)\n\n** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-12826. Reason: This candidate is a duplicate of CVE-2020-12826. Notes: All CVE users should reference CVE-2020-12826 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.(CVE-2020-10741)\n\nA signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Ex ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS Virtualization 3.0.6.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-3.0.6.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~862.14.1.6_111\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-05-28T13:50:45", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-05-22T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4369-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-11494", "CVE-2020-11609", "CVE-2019-19769", "CVE-2020-11608", "CVE-2020-11668", "CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "modified": "2020-05-27T00:00:00", "id": "OPENVAS:1361412562310844443", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844443", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844443\");\n script_version(\"2020-05-27T04:05:03+0000\");\n script_cve_id(\"CVE-2019-19377\", \"CVE-2019-19769\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12657\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-27 04:05:03 +0000 (Wed, 27 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-22 03:00:20 +0000 (Fri, 22 May 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4369-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU19\\.10|UBUNTU18\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4369-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-May/005444.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4369-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the btrfs implementation in the Linux kernel did not\nproperly detect that a block was marked dirty in some situations. An\nattacker could use this to specially craft a file system image that, when\nunmounted, could cause a denial of service (system crash). (CVE-2019-19377)\n\nTristan Madani discovered that the file locking implementation in the Linux\nkernel contained a race condition. A local attacker could possibly use this\nto cause a denial of service or expose sensitive information.\n(CVE-2019-19769)\n\nIt was discovered that the Serial CAN interface driver in the Linux kernel\ndid not properly initialize data. A local attacker could use this to expose\nsensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate certain\nmount options to the tmpfs virtual memory file system. A local attacker\nwith the ability to specify mount options could use this to cause a denial\nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the OV51x USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-11608)\n\nIt was discovered that the STV06XX USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-11609)\n\nIt was discovered that the Xirlink C-It USB Camera device driver in the\nLinux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2020-11668)\n\nIt was discovered that the block layer in the Linux kernel contained a race\ncondition leading to a use-after-free vulnerability. A local attacker could\npossibly use this to cause a denial of service (system crash) or execute\narbitrary code. (CVE-2020-12657)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 19.10, Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU19.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1017-kvm\", ver:\"5.3.0-1017.19\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1018-oracle\", ver:\"5.3.0-1018.20\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1019-aws\", ver:\"5.3.0-1019.21\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1020-gcp\", ver:\"5.3.0-1020.22\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1025-raspi2\", ver:\"5.3.0-1025.27\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-generic\", ver:\"5.3.0-53.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-generic-lpae\", ver:\"5.3.0-53.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-lowlatency\", ver:\"5.3.0-53.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-snapdragon\", ver:\"5.3.0-53.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.3.0.1019.31\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1020.31\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.3.0.53.45\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.3.0.53.45\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.3.0.1020.31\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.3.0.1017.19\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.3.0.53.45\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1018.33\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"5.3.0.1025.22\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"5.3.0.53.45\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.3.0.53.45\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1018-oracle\", ver:\"5.3.0-1018.20~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1019-aws\", ver:\"5.3.0-1019.21~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1020-gcp\", ver:\"5.3.0-1020.22~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1020-gke\", ver:\"5.3.0-1020.22~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-generic\", ver:\"5.3.0-53.47~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-generic-lpae\", ver:\"5.3.0-53.47~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-53-lowlatency\", ver:\"5.3.0-53.47~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.3.0.1019.20\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws-edge\", ver:\"5.3.0.1019.20\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1020.19\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp-edge\", ver:\"5.3.0.1020.19\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-18.04\", ver:\"5.3.0.53.109\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-18.04\", ver:\"5.3.0.53.109\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.3\", ver:\"5.3.0.1020.10\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gkeop-5.3\", ver:\"5.3.0.53.109\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-18.04\", ver:\"5.3.0.53.109\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1018.19\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon-hwe-18.04\", ver:\"5.3.0.53.109\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-18.04\", ver:\"5.3.0.53.109\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-28T13:50:20", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-05-20T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux-gke-5.0 (USN-4368-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-11494", "CVE-2020-11609", "CVE-2019-19769", "CVE-2020-11608", "CVE-2020-11668", "CVE-2020-11565", "CVE-2020-11669", "CVE-2020-12657"], "modified": "2020-05-27T00:00:00", "id": "OPENVAS:1361412562310844439", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844439", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844439\");\n script_version(\"2020-05-27T04:05:03+0000\");\n script_cve_id(\"CVE-2019-19769\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-11669\", \"CVE-2020-12657\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-27 04:05:03 +0000 (Wed, 27 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-20 03:00:27 +0000 (Wed, 20 May 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux-gke-5.0 (USN-4368-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4368-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-May/005442.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-gke-5.0'\n package(s) announced via the USN-4368-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Tristan Madani discovered that the file locking implementation in the Linux\nkernel contained a race condition. A local attacker could possibly use this\nto cause a denial of service or expose sensitive information.\n(CVE-2019-19769)\n\nIt was discovered that the Serial CAN interface driver in the Linux kernel\ndid not properly initialize data. A local attacker could use this to expose\nsensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate certain\nmount options to the tmpfs virtual memory file system. A local attacker\nwith the ability to specify mount options could use this to cause a denial\nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the OV51x USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-11608)\n\nIt was discovered that the STV06XX USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-11609)\n\nIt was discovered that the Xirlink C-It USB Camera device driver in the\nLinux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2020-11668)\n\nDavid Gibson discovered that the Linux kernel on Power9 CPUs did not\nproperly save and restore Authority Mask registers state in some\nsituations. A local attacker in a guest VM could use this to cause a denial\nof service (host system crash). (CVE-2020-11669)\n\nIt was discovered that the block layer in the Linux kernel contained a race\ncondition leading to a use-after-free vulnerability. A local attacker could\npossibly use this to cause a denial of service (system crash) or execute\narbitrary code. (CVE-2020-12657)\");\n\n script_tag(name:\"affected\", value:\"'linux-gke-5.0' package(s) on Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1037-gke\", ver:\"5.0.0-1037.38\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1052-oem-osp1\", ver:\"5.0.0-1052.57\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.0\", ver:\"5.0.0.1037.25\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem-osp1\", ver:\"5.0.0.1052.55\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-06-03T15:50:43", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-05-29T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4369-2)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-11494", "CVE-2020-11609", "CVE-2019-19769", "CVE-2020-11608", "CVE-2020-11668", "CVE-2019-19377", "CVE-2020-11565", "CVE-2020-12657"], "modified": "2020-05-29T00:00:00", "id": "OPENVAS:1361412562310844448", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844448", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844448\");\n script_version(\"2020-05-29T08:53:11+0000\");\n script_cve_id(\"CVE-2019-19377\", \"CVE-2019-19769\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12657\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-29 08:53:11 +0000 (Fri, 29 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-29 03:00:28 +0000 (Fri, 29 May 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4369-2)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU19\\.10|UBUNTU18\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4369-2\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-May/005456.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4369-2 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"USN-4369-1 fixed vulnerabilities in the 5.3 Linux kernel. Unfortunately,\nthat update introduced a regression in overlayfs. This update corrects\nthe problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nIt was discovered that the btrfs implementation in the Linux kernel did not\nproperly detect that a block was marked dirty in some situations. An\nattacker could use this to specially craft a file system image that, when\nunmounted, could cause a denial of service (system crash). (CVE-2019-19377)\n\nTristan Madani discovered that the file locking implementation in the Linux\nkernel contained a race condition. A local attacker could possibly use this\nto cause a denial of service or expose sensitive information.\n(CVE-2019-19769)\n\nIt was discovered that the Serial CAN interface driver in the Linux kernel\ndid not properly initialize data. A local attacker could use this to expose\nsensitive information (kernel memory). (CVE-2020-11494)\n\nIt was discovered that the linux kernel did not properly validate certain\nmount options to the tmpfs virtual memory file system. A local attacker\nwith the ability to specify mount options could use this to cause a denial\nof service (system crash). (CVE-2020-11565)\n\nIt was discovered that the OV51x USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-11608)\n\nIt was discovered that the STV06XX USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-11609)\n\nIt was discovered that the Xirlink C-It USB Camera device driver in the\nLinux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2020-11668)\n\nIt was discovered that the block layer in the Linux kernel contained a race\ncondition leading to a use-after-free vulnerability. A local attacker could\npossibly use this to cause a denial of service (system crash) or execute\narbitrary code. (CVE-2020-12657)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 19.10, Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU19.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1026-raspi2\", ver:\"5.3.0-1026.28\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-55-generic\", ver:\"5.3.0-55.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-55-generic-lpae\", ver:\"5.3.0-55.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-55-lowlatency\", ver:\"5.3.0-55.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-55-snapdragon\", ver:\"5.3.0-55.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.3.0.55.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.3.0.55.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.3.0.55.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"5.3.0.1026.23\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"5.3.0.55.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.3.0.55.47\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1026-raspi2\", ver:\"5.3.0-1026.28~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2-hwe-18.04\", ver:\"5.3.0.1026.15\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2022-04-18T12:41:17", "description": "An update that solves 25 vulnerabilities and has 132 fixes\n is now available.\n\nDescription:\n\n\n\n The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other than\n the one which called it. This attack is known as Special Register Buffer\n Data Sampling (SRBDS) or \"CrossTalk\" (bsc#1154824).\n - CVE-2018-1000199: Fixed a potential local code execution via ptrace\n (bsc#1089895).\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to\n cause a denial of service (such as relay blockage) by triggering a NULL\n alloc_percpu result (bnc#1158265).\n - CVE-2019-20806: Fixed a null pointer dereference in\n tw5864_handle_frame() which may had lead to denial of service\n (bsc#1172199).\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU\n consumption and soft lockup) in a certain failure case involving\n TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n - CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\n video driver. This could lead to local information disclosure with\n System execution privileges needed (bsc#1170345).\n - CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev\n (bsc#1170056).\n - CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem\n which could have allowed a remote network user to crash the kernel\n resulting in a denial of service (bsc#1171191).\n - CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n (bsc#1170778).\n - CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\n uninitialized data (bsc#1171220).\n - CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\n where it was assumed that an skb would only contain a single netlink\n message (bsc#1171189).\n - CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap\n could have caused user PTE access (bsc#1172317).\n - CVE-2020-11608: An issue was discovered in\n drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences\n in ov511_mode_init_regs and ov518_mode_init_regs when there are zero\n endpoints, aka CID-998912346c0d (bnc#1168829).\n - CVE-2020-11609: An issue was discovered in the stv06xx subsystem in\n drivers/media/usb/gspca/stv06xx/stv06xx.c and\n drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid\n descriptors, as demonstrated by a NULL pointer dereference, aka\n CID-485b06aadb93 (bnc#1168854).\n - CVE-2020-12114: Fixed a pivot_root race condition which could have\n allowed local users to cause a denial of service (panic) by corrupting a\n mountpoint reference counter (bsc#1171098).\n - CVE-2020-12464: Fixed a use-after-free due to a transfer without a\n reference (bsc#1170901).\n - CVE-2020-12652: Fixed an issue which could have allowed local users to\n hold an incorrect lock during the ioctl operation and trigger a race\n condition (bsc#1171218).\n - CVE-2020-12653: Fixed an issue in the wifi driver which could have\n allowed local users to gain privileges or cause a denial of service\n (bsc#1171195).\n - CVE-2020-12654: Fixed an issue in he wifi driver which could have\n allowed a remote AP to trigger a heap-based buffer overflow\n (bsc#1171202).\n - CVE-2020-12655: Fixed an issue which could have allowed attackers to\n trigger a sync of excessive duration via an XFS v5 image with crafted\n metadata (bsc#1171217).\n - CVE-2020-12656: Fixed an improper handling of certain domain_release\n calls leadingch could have led to a memory leak (bsc#1171219).\n - CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n - CVE-2020-12659: Fixed an out-of-bounds write (by a user with the\n CAP_NET_ADMIN capability) due to improper headroom validation\n (bsc#1171214).\n - CVE-2020-12769: Fixed an issue which could have allowed attackers to\n cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one\n (bsc#1171983).\n - CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store\n in drivers/usb/gadget/configfs.c (bsc#1171982).\n\n The following non-security bugs were fixed:\n\n - ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe()\n (bsc#1051510).\n - ACPI: sysfs: Fix reference count leak in\n acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n - acpi/x86: ignore unspecified bit positions in the ACPI global lock field\n (bsc#1051510).\n - Add br_netfilter to kernel-default-base (bsc#1169020)\n - agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n - ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n - ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256\n (bsc#1051510).\n - ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n - ALSA: hda: Add driver blacklist (bsc#1051510).\n - ALSA: hda: Always use jackpoll helper for jack update after resume\n (bsc#1051510).\n - ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n - ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n - ALSA: hda: Explicitly permit using autosuspend if runtime PM is\n supported (bsc#1051510).\n - ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n - ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n - ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops\n (bsc#1051510).\n - ALSA: hda: Keep the controller initialization even if no codecs found\n (bsc#1051510).\n - ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n - ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround\n (bsc#1172017).\n - ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA\n (git-fixes).\n - ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n - ALSA: hda/realtek - Add more fixup entries for Clevo machines\n (git-fixes).\n - ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n - ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n - ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n - ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n - ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295\n (git-fixes).\n - ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295\n (git-fixes).\n - ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295\n (git-fixes).\n - ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n - ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n - ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme\n (bsc#1111666).\n - ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n - ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes\n bsc#1171293).\n - ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n - ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n - ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n - ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n - ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n - ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio\n option (git-fixes).\n - ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n - ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n - ALSA: pcm: oss: Place the plugin buffer overflow checks correctly\n (bsc#1170522).\n - ALSA: rawmidi: Fix racy buffer resize under concurrent accesses\n (git-fixes).\n - ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n - ALSA: usb-audio: Add control message quirk delay for Kingston HyperX\n headset (git-fixes).\n - ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n - ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n - ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n - ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos\n (bsc#1051510).\n - ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen\n (bsc#1051510).\n - ALSA: usb-audio: Check mapping at creating connector controls, too\n (bsc#1051510).\n - ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n - ALSA: usb-audio: Do not create jack controls for PCM terminals\n (bsc#1051510).\n - ALSA: usb-audio: Do not override ignore_ctl_error value from the map\n (bsc#1051510).\n - ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n - ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif\n (bsc#1051510).\n - ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC\n (git-fixes).\n - ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio\n (git-fixes).\n - ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n - ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry\n (bsc#1051510).\n - ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n - ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n - ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n - ASoC: fix regwmask (bsc#1051510).\n - ASoC: msm8916-wcd-digital: Reset RX interpolation path after use\n (bsc#1051510).\n - ASoC: samsung: Prevent clk_get_rate() calls in atomic context\n (bsc#1111666).\n - ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n - ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n - b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n - batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n - batman-adv: Fix refcnt leak in batadv_show_throughput_override\n (git-fixes).\n - batman-adv: Fix refcnt leak in batadv_store_throughput_override\n (git-fixes).\n - batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n - bcache: avoid unnecessary btree nodes flushing in btree_flush_write()\n (git fixes (block drivers)).\n - bcache: fix incorrect data type usage in btree_flush_write() (git fixes\n (block drivers)).\n - bcache: Revert \"bcache: shrink btree node cache after bch_btree_check()\"\n (git fixes (block drivers)).\n - blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n - blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n - block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n - block: drbd: remove a stray unlock in __drbd_send_protocol()\n (bsc#1171599).\n - block: fix busy device checking in blk_drop_partitions again\n (bsc#1171948).\n - block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n - block: fix memleak of bio integrity data (git fixes (block drivers)).\n - block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n - bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets()\n (networking-stable-20_03_28).\n - bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF\n (bsc#1104745).\n - bnxt_en: reinitialize IRQs when MTU is modified\n (networking-stable-20_03_14).\n - bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n - bnxt_en: Return error when allocating zero size context memory\n (bsc#1104745).\n - bonding/alb: make sure arp header is pulled before accessing it\n (networking-stable-20_03_14).\n - bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n - bpf: Forbid XADD on spilled pointers for unprivileged users\n (bsc#1083647).\n - brcmfmac: abort and release host after error (bsc#1051510).\n - btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n - btrfs: fix log context list corruption after rename whiteout error\n (bsc#1172342).\n - btrfs: fix partial loss of prealloc extent past i_size after fsync\n (bsc#1172343).\n - btrfs: relocation: add error injection points for cancelling balance\n (bsc#1171417).\n - btrfs: relocation: Check cancel request after each data page read\n (bsc#1171417).\n - btrfs: relocation: Check cancel request after each extent found\n (bsc#1171417).\n - btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to\n prevent runaway balance (bsc#1171417).\n - btrfs: relocation: Fix reloc root leakage and the NULL pointer reference\n caused by the leakage (bsc#1171417).\n - btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n - btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent\n runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n - btrfs: reloc: fix reloc root leak and NULL pointer dereference\n (bsc#1171417 bsc#1160947 bsc#1172366).\n - btrfs: setup a nofs context for memory allocation at btrfs_create_tree()\n (bsc#1172127).\n - btrfs: setup a nofs context for memory allocation at __btrfs_set_acl\n (bsc#1172127).\n - btrfs: use nofs context when initializing security xattrs to avoid\n deadlock (bsc#1172127).\n - can: add missing attribute validation for termination\n (networking-stable-20_03_14).\n - cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n - cdc-acm: introduce a cool down (git-fixes).\n - ceph: check if file lock exists before sending unlock request\n (bsc#1168789).\n - ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n - ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n - ceph: fix endianness bug when handling MDS session feature bits\n (bsc#1171695).\n - cgroup, netclassid: periodically release file_lock on classid updating\n (networking-stable-20_03_14).\n - cifs: Allocate crypto structures on the fly for calculating signatures\n of incoming packets (bsc#1144333).\n - cifs: Allocate encryption header through kmalloc (bsc#1144333).\n - cifs: allow unlock flock and OFD lock across fork (bsc#1144333).\n - cifs: check new file size when extending file by fallocate (bsc#1144333).\n - cifs: cifspdu.h: Replace zero-length array with flexible-array member\n (bsc#1144333).\n - cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n - cifs: do not share tcons with DFS (bsc#1144333).\n - cifs: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n - cifs: ensure correct super block for DFS reconnect (bsc#1144333).\n - cifs: Fix bug which the return value by asynchronous read is error\n (bsc#1144333).\n - cifs: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n - cifs: improve read performance for page size 64KB & cache=strict &\n vers=2.1+ (bsc#1144333).\n - cifs: Increment num_remote_opens stats counter even in case of\n smb2_query_dir_first (bsc#1144333).\n - cifs: minor update to comments around the cifs_tcp_ses_lock mutex\n (bsc#1144333).\n - cifs: protect updating server->dstaddr with a spinlock (bsc#1144333).\n - cifs: smb2pdu.h: Replace zero-length array with flexible-array member\n (bsc#1144333).\n - cifs: smbd: Calculate the correct maximum packet size for segmented\n SMBDirect send/receive (bsc#1144333).\n - cifs: smbd: Check and extend sender credits in interrupt context\n (bsc#1144333).\n - cifs: smbd: Check send queue size before posting a send (bsc#1144333).\n - cifs: smbd: Do not schedule work to send immediate packet on every\n receive (bsc#1144333).\n - cifs: smbd: Merge code to track pending packets (bsc#1144333).\n - cifs: smbd: Properly process errors on ib_post_send (bsc#1144333).\n - cifs: smbd: Update receive credits before sending and deal with credits\n roll back on failure before sending (bsc#1144333).\n - cifs: Warn less noisily on default mount (bsc#1144333).\n - clk: Add clk_hw_unregister_composite helper function definition\n (bsc#1051510).\n - clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n - clk: imx: make mux parent strings const (bsc#1051510).\n - clk: mediatek: correct the clocks for MT2701 HDMI PHY module\n (bsc#1051510).\n - clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n - clocksource/drivers/hyper-v: Set TSC clocksource as default w/\n InvariantTSC (bsc#1170620, bsc#1170621).\n - clocksource: dw_apb_timer_of: Fix missing clockevent timers\n (bsc#1051510).\n - component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n - coresight: do not use the BIT() macro in the UAPI header (git fixes\n (block drivers)).\n - cpufreq: s3c64xx: Remove pointless NULL check in\n s3c64xx_cpufreq_driver_init (bsc#1051510).\n - crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n - crypto: ccp - Clean up and exit correctly on allocation failure\n (git-fixes).\n - crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n - crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n - cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n - cxgb4: fix Txq restart check during backpressure (bsc#1127354\n bsc#1127371).\n - debugfs: Add debugfs_create_xul() for hexadecimal unsigned long\n (git-fixes).\n - debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n - devlink: fix return value after hitting end in region read (bsc#1109837).\n - devlink: validate length of param values (bsc#1109837).\n - devlink: validate length of region addr/len (bsc#1109837).\n - dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n - dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n - dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n - dm writecache: fix data corruption when reloading the target (git fixes\n (block drivers)).\n - dm writecache: fix incorrect flush sequence when doing SSD mode commit\n (git fixes (block drivers)).\n - dm writecache: verify watermark during resume (git fixes (block\n drivers)).\n - dm zoned: fix invalid memory access (git fixes (block drivers)).\n - dm zoned: reduce overhead of backing device checks (git fixes (block\n drivers)).\n - dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git\n fixes (block drivers)).\n - dm zoned: support zone sizes smaller than 128MiB (git fixes (block\n drivers)).\n - dp83640: reverse arguments to list_add_tail (git-fixes).\n - drivers: hv: Add a module description line to the hv_vmbus driver\n (bsc#1172249, bsc#1172251).\n - drivers/net/ibmvnic: Update VNIC protocol version reporting\n (bsc#1065729).\n - drivers: w1: add hwmon support structures (jsc#SLE-11048).\n - drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n - drivers: w1: refactor w1_slave_show to make the temp reading\n functionality separate (jsc#SLE-11048).\n - drm: amd/acp: fix broken menu structure (bsc#1114279)\n - drm/amdgpu: Correctly initialize thermal controller for GPUs with\n Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n - drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n - drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is\n (bsc#1113956)\n - drm/atomic: Take the atomic toys away from X (bsc#1112178) \t* context\n changes\n - drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset\n changes\n - drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n - drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n - drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n - drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n - drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n - drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround\n (bsc#1112178)\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of\n (bsc#1114279)\n - drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178)\n - drm/i915: properly sanity check batch_start_offset (bsc#1114279)\n - drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n - drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem\n (bsc#1114279)\n - drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n - drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n - drm/qxl: qxl_release use after free (bsc#1051510).\n - drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279)\n - drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n - drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n - drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956)\n - drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956)\n - dump_stack: avoid the livelock of the dump_lock (git fixes (block\n drivers)).\n - EDAC, sb_edac: Add support for systems with segmented PCI buses\n (bsc#1169525).\n - ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n - ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n - ext4: use non-movable memory for superblock readahead (bsc#1171952).\n - fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n - fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279)\n - fib: add missing attribute validation for tun_id\n (networking-stable-20_03_14).\n - firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n - Fix a backport bug, where btrfs_put_root() -> btrfs_put_fs_root()\n modification is not needed due to missing dependency\n - Following two patches needs to be combined as one commit (one adds\n context, later removes which affects existing patch) else commit series\n cannot be sequenced.\n - fpga: dfl: afu: Corrected error handling levels (git-fixes).\n - fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n - fs/seq_file.c: simplify seq_file iteration code and interface\n (bsc#1170125).\n - gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n - gre: fix uninit-value in __iptunnel_pull_header\n (networking-stable-20_03_14).\n - HID: hid-input: clear unmapped usages (git-fixes).\n - HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n - HID: i2c-hid: add Trekstor Primebook C11B to descriptor override\n (git-fixes).\n - HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n - HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n - HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices\n (git-fixes).\n - hrtimer: Annotate lockless access to timer->state (git fixes (block\n drivers)).\n - hsr: add restart routine into hsr_get_node_list()\n (networking-stable-20_03_28).\n - hsr: check protocol version in hsr_newlink()\n (networking-stable-20_04_17).\n - hsr: fix general protection fault in hsr_addr_is_self()\n (networking-stable-20_03_28).\n - hsr: set .netnsok flag (networking-stable-20_03_28).\n - hsr: use rcu_read_lock() in hsr_get_node_{list/status}()\n (networking-stable-20_03_28).\n - i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present\n (git-fixes).\n - i2c: acpi: put device when verifying client fails (git-fixes).\n - i2c: brcmstb: remove unused struct member (git-fixes).\n - i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n - i2c: core: decrease reference count of device node in\n i2c_unregister_device (git-fixes).\n - i2c: dev: Fix the race between the release of i2c_dev and cdev\n (bsc#1051510).\n - i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n - i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array\n (git-fixes).\n - i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n - i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n - i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n - i2c: mux: demux-pinctrl: Fix an error handling path in\n 'i2c_demux_pinctrl_probe()' (bsc#1051510).\n - i2c: st: fix missing struct parameter description (bsc#1051510).\n - IB/mlx5: Fix missing congestion control debugfs on rep rdma device\n (bsc#1103991).\n - ibmvnic: Skip fatal error reset after passive init (bsc#1171078\n ltc#184239).\n - iio:ad7797: Use correct attribute_group (bsc#1051510).\n - iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n - iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n - iio: adc: stm32-adc: Use dma_request_chan() instead\n dma_request_slave_channel() (bsc#1051510).\n - iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()'\n (bsc#1051510).\n - iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).\n - iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n - iio: xilinx-xadc: Fix clearing interrupt when enabling trigger\n (bsc#1051510).\n - iio: xilinx-xadc: Fix sequencer configuration for aux channels in\n simultaneous mode (bsc#1051510).\n - ima: Fix return value of ima_write_policy() (git-fixes).\n - input: evdev - call input_flush_device() on release(), not flush()\n (bsc#1051510).\n - input: hyperv-keyboard - add module description (bsc#1172249,\n bsc#1172251).\n - input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n - input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n - input: raydium_i2c_ts - use true and false for boolean values\n (bsc#1051510).\n - input: synaptics-rmi4 - fix error return code in rmi_driver_probe()\n (bsc#1051510).\n - input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n - input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n - input: xpad - add custom init packet for Xbox One S controllers\n (bsc#1051510).\n - iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n - iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n - iommu/amd: Do not loop forever when trying to increase address space\n (bsc#1172098).\n - iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system\n (bsc#1172099).\n - iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n - iommu/amd: Fix race in increase_address_space()/fetch_pte()\n (bsc#1172102).\n - iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n - iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n - ip6_tunnel: Allow rcv/xmit even if remote address is a local address\n (bsc#1166978).\n - ipmi: fix hung processes in __get_guid() (git-fixes).\n - ipv4: fix a RCU-list lock in fib_triestat_seq_show\n (networking-stable-20_04_02).\n - ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface\n (networking-stable-20_03_14).\n - ipv6: do not auto-add link-local address to lag ports\n (networking-stable-20_04_09).\n - ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n - ipv6: Fix nlmsg_flags when splitting a multipath route\n (networking-stable-20_03_01).\n - ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n - ipv6: Fix route replacement with dev-only route\n (networking-stable-20_03_01).\n - ipvlan: add cond_resched_rcu() while processing muticast backlog\n (networking-stable-20_03_14).\n - ipvlan: do not deref eth hdr before checking it's set\n (networking-stable-20_03_14).\n - ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast()\n (networking-stable-20_03_14).\n - iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n - ixgbe: do not check firmware errors (bsc#1170284).\n - kABI fix for early XHCI debug (git-fixes).\n - kabi for for md: improve handling of bio with REQ_PREFLUSH in\n md_flush_request() (git-fixes).\n - kabi/severities: Do not track KVM internal symbols.\n - kabi/severities: Ingnore get_dev_data() The function is internal to the\n AMD IOMMU driver and must not be called by any third party.\n - kABI workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n - keys: reaching the keys quotas correctly (bsc#1051510).\n - KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n - KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n - KVM: Check validity of resolved slot when searching memslots\n (bsc#1172104).\n - KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n - KVM: s390: vsie: Fix possible race when shadowing region 3 tables\n (git-fixes).\n - KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks\n (git-fixes).\n - KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n - KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs\n (bsc#1152489).\n - l2tp: Allow management of tunnels and session in user namespace\n (networking-stable-20_04_17).\n - libata: Remove extra scsi_host_put() in ata_scsi_add_hosts()\n (bsc#1051510).\n - libata: Return correct status in sata_pmp_eh_recover_pm() when\n ATA_DFLAG_DETACH is set (bsc#1051510).\n - lib: raid6: fix awk build warnings (git fixes (block drivers)).\n - lib/raid6/test: fix build on distros whose /bin/sh is not bash (git\n fixes (block drivers)).\n - lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes\n (block drivers)).\n - locks: print unsigned ino in /proc/locks (bsc#1171951).\n - mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n - mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n - mac80211: mesh: fix discovery timer re-arming issue / crash\n (bsc#1051510).\n - macsec: avoid to set wrong mtu (bsc#1051510).\n - macsec: restrict to ethernet devices (networking-stable-20_03_28).\n - macvlan: add cond_resched() during multicast processing\n (networking-stable-20_03_14).\n - macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n - md: improve handling of bio with REQ_PREFLUSH in md_flush_request()\n (git-fixes).\n - md/raid0: Fix an error message in raid0_make_request() (git fixes (block\n drivers)).\n - md/raid10: prevent access of uninitialized resync_pages offset\n (git-fixes).\n - media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n - media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n - media: ti-vpe: cal: fix disable_irqs to only the intended target\n (git-fixes).\n - mei: release me_cl object reference (bsc#1051510).\n - mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n - mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE\n (networking-stable-20_04_09).\n - mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n - mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n - mmc: core: Check request type before completing the request (git-fixes).\n - mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n - mmc: cqhci: Avoid false \"cqhci: CQE stuck on\" by not open-coding timeout\n loop (git-fixes).\n - mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n - mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n - mmc: meson-gx: simplify interrupt handler (git-fixes).\n - mmc: renesas_sdhi: limit block count to 16 bit for old revisions\n (git-fixes).\n - mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n - mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n - mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n - mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers\n (bsc#1051510).\n - mmc: sdhci: Update the tuning failed messages to pr_debug level\n (git-fixes).\n - mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n - mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card()\n (bsc#1051510).\n - mmc: tmio: fix access width of Block Count Register (git-fixes).\n - mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n - mm: thp: handle page cache THP correctly in PageTransCompoundMap (git\n fixes (block drivers)).\n - mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer\n (bsc#1051510).\n - mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n - mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n - mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n - mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n - mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n - net: bcmgenet: correct per TX/RX ring statistics\n (networking-stable-20_04_27).\n - net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n - net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n - net: dsa: bcm_sf2: Do not register slave MDIO bus with OF\n (networking-stable-20_04_09).\n - net: dsa: bcm_sf2: Ensure correct sub-node is parsed\n (networking-stable-20_04_09).\n - net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n - net: dsa: Fix duplicate frames flooded by learning\n (networking-stable-20_03_28).\n - net: dsa: mv88e6xxx: fix lockup on warm boot\n (networking-stable-20_03_14).\n - net/ethernet: add Google GVE driver (jsc#SLE-10538)\n - net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n - net: fec: validate the new settings in fec_enet_set_coalesce()\n (networking-stable-20_03_14).\n - net: fib_rules: Correctly set table field when table number exceeds 8\n bits (networking-stable-20_03_01).\n - net: fix race condition in __inet_lookup_established() (bsc#1151794).\n - net: fq: add missing attribute validation for orphan mask\n (networking-stable-20_03_14).\n - net: hns3: fix \"tc qdisc del\" failed issue (bsc#1109837).\n - net, ip_tunnel: fix interface lookup with no key\n (networking-stable-20_04_02).\n - net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin\n (networking-stable-20_04_17).\n - net: ipv6: do not consider routes via gateways for anycast address check\n (networking-stable-20_04_17).\n - netlink: Use netlink header as base to calculate bad attribute offset\n (networking-stable-20_03_14).\n - net: macsec: update SCI upon MAC address change\n (networking-stable-20_03_14).\n - net: memcg: fix lockdep splat in inet_csk_accept()\n (networking-stable-20_03_14).\n - net: memcg: late association of sock to memcg\n (networking-stable-20_03_14).\n - net/mlx4_en: avoid indirect call in TX completion\n (networking-stable-20_04_27).\n - net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n - net/mlx5: Expose link speed directly (bsc#1171118).\n - net/mlx5: Expose port speed when possible (bsc#1171118).\n - net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n - net: mvneta: Fix the case where the last poll did not process all rx\n (networking-stable-20_03_28).\n - net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node\n (networking-stable-20_04_27).\n - net/packet: tpacket_rcv: do not increment ring index on drop\n (networking-stable-20_03_14).\n - net: phy: restore mdio regs in the iproc mdio driver\n (networking-stable-20_03_01).\n - net: qmi_wwan: add support for ASKEY WWHC050\n (networking-stable-20_03_28).\n - net: revert default NAPI poll timeout to 2 jiffies\n (networking-stable-20_04_17).\n - net_sched: cls_route: remove the right filter from hashtable\n (networking-stable-20_03_28).\n - net_sched: sch_skbprio: add message validation to skbprio_change()\n (bsc#1109837).\n - net/x25: Fix x25_neigh refcnt leak when receiving frame\n (networking-stable-20_04_27).\n - nfc: add missing attribute validation for SE API\n (networking-stable-20_03_14).\n - nfc: add missing attribute validation for vendor subcommand\n (networking-stable-20_03_14).\n - nfc: pn544: Fix occasional HW initialization failure\n (networking-stable-20_03_01).\n - NFC: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n - nfp: abm: fix a memory leak bug (bsc#1109837).\n - nfsd4: fix up replay_matches_cache() (git-fixes).\n - nfsd: Ensure CLONE persists data and metadata changes to the target file\n (git-fixes).\n - nfsd: fix delay timer on 32-bit architectures (git-fixes).\n - nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n - nfs: Directory page cache pages need to be locked when read (git-fixes).\n - nfsd: memory corruption in nfsd4_lock() (git-fixes).\n - nfs: Do not call generic_error_remove_page() while holding locks\n (bsc#1170457).\n - nfs: Fix memory leaks and corruption in readdir (git-fixes).\n - nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n - nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n - nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n - NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n - NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n - nfs: Revalidate the file size on a fatal write error (git-fixes).\n - NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals\n (git-fixes).\n - NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n - NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).\n - NFSv4-Fix-OPEN-CLOSE-race.patch\n - NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid()\n (git-fixes).\n - NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n - NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for\n layoutreturn (git-fixes).\n - nl802154: add missing attribute validation for dev_type\n (networking-stable-20_03_14).\n - nl802154: add missing attribute validation (networking-stable-20_03_14).\n - nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n - objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n - objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n - objtool: Make BP scratch register warning more robust (bsc#1169514).\n - padata: Remove broken queue flushing (git-fixes).\n - Partially revert \"kfifo: fix kfifo_alloc() and kfifo_init()\" (git fixes\n (block drivers)).\n - PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2\n (bsc#1172201, bsc#1172202).\n - PCI: hv: Decouple the func definition in hv_dr_state from VSP message\n (bsc#1172201, bsc#1172202).\n - PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n - perf: Allocate context task_ctx_data for child event (git-fixes).\n - perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n - perf: Copy parent's address filter offsets on clone (git-fixes).\n - perf/core: Add sanity check to deal with pinned event failure\n (git-fixes).\n - perf/core: Avoid freeing static PMU contexts when PMU is unregistered\n (git-fixes).\n - perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n - perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n - perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n - perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n - perf/core: Fix exclusive events' grouping (git-fixes).\n - perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n - perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n - perf/core: Fix locking for children siblings group read (git-fixes).\n - perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes\n (dependent patch for 18736eef1213)).\n - perf/core: Fix perf_event_read_value() locking (git-fixes).\n - perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n - perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent\n patch)).\n - perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n - perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).\n - perf/core: Fix race between close() and fork() (git-fixes).\n - perf/core: Fix the address filtering fix (git-fixes).\n - perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n - perf/core: Force USER_DS when recording user stack data (git-fixes).\n - perf/core: Restore mmap record type correctly (git-fixes).\n - perf: Fix header.size for namespace events (git-fixes).\n - perf/ioctl: Add check for the sample_period value (git-fixes).\n - perf, pt, coresight: Fix address filters for vmas with non-zero offset\n (git-fixes).\n - perf: Return proper values for user stack errors (git-fixes).\n - pinctrl: baytrail: Enable pin configuration setting for GPIO chip\n (git-fixes).\n - pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler\n (git-fixes).\n - pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H\n (git-fixes).\n - platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA\n (bsc#1051510).\n - pnfs: Ensure we do clear the return-on-close layout stateid on fatal\n errors (git-fixes).\n - powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n - powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n - powerpc/setup_64: Set cache-line-size based on cache-block-size\n (bsc#1065729).\n - powerpc/sstep: Fix DS operand in ld encoding to appropriate value\n (bsc#1065729).\n - qede: Fix race between rdma destroy workqueue and link change event\n (networking-stable-20_03_01).\n - r8152: check disconnect status after long sleep\n (networking-stable-20_03_14).\n - raid6/ppc: Fix build for clang (git fixes (block drivers)).\n - random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n - rcu: locking and unlocking need to always be at least barriers (git\n fixes (block drivers)).\n - Redo patch for SLE15-SP1, based on feedback from IBM:\n patches.suse/s390-ftrace-fix-potential-crashes-when-switching-tracers\n (bsc#1171244 LTC#185785 git-fixes).\n - resolve KABI warning for perf-pt-coresight (git-fixes).\n - Revert \"ALSA: hda/realtek: Fix pop noise on ALC225\" (git-fixes).\n - Revert \"drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\"\n (bsc#1114279) \t* offset changes\n - Revert \"HID: i2c-hid: add Trekstor Primebook C11B to descriptor\n override\" Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was\n also reverted.\n - Revert \"HID: i2c-hid: override HID descriptors for certain devices\" This\n broke i2c-hid.ko's build, there is no way around it without a big file\n rename or renaming the kernel module.\n - Revert \"i2c-hid: properly terminate i2c_hid_dmi_desc_override_table\"\n Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n - Revert \"ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\"\n (bsc#1172221).\n - Revert \"RDMA/cma: Simplify rdma_resolve_addr() error flow\" (bsc#1103992).\n - rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n - s390/cio: avoid duplicated 'ADD' uevents (git-fixes).\n - s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n - s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n - s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762\n LTC#185291).\n - s390/diag: fix display of diagnose call statistics (git-fixes).\n - s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n - s390/gmap: return proper error code on ksm unsharing (git-fixes).\n - s390/ism: fix error return code in ism_probe() (git-fixes).\n - s390/pci: do not set affinity for floating irqs (git-fixes).\n - s390/pci: Fix possible deadlock in recover_store() (bsc#1165183\n LTC#184103).\n - s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n - s390/qeth: cancel RX reclaim work earlier (git-fixes).\n - s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n - s390/qeth: do not warn for napi with 0 budget (git-fixes).\n - s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n - s390/qeth: fix promiscuous mode after reset (git-fixes).\n - s390/qeth: fix qdio teardown after early init error (git-fixes).\n - s390/qeth: handle error due to unsupported transport mode (git-fixes).\n - s390/qeth: handle error when backing RX buffer (git-fixes).\n - s390/qeth: lock the card while changing its hsuid (git-fixes).\n - s390/qeth: support net namespaces for L3 devices (git-fixes).\n - s390/time: Fix clk type in get_tod_clock (git-fixes).\n - scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n - scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n - scsi: bnx2i: fix potential use after free (bsc#1171600).\n - scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601)\n - scsi: core: save/restore command resid for error handling (bsc#1171602).\n - scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n - scsi: core: try to get module before removing device (bsc#1171605).\n - scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n - scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n - scsi: esas2r: unlock on error in esas2r_nvram_read_direct()\n (bsc#1171608).\n - scsi: fnic: fix invalid stack access (bsc#1171609).\n - scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n - scsi-ibmvfc-Don-t-send-implicit-logouts-prior-to-NPI.patch\n - scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791\n ltc#185128).\n - scsi-ibmvscsi-Fix-WARN_ON-during-event-pool-release.patch\n - scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n - scsi: iscsi: Fix a potential deadlock in the timeout handler\n (bsc#1171612).\n - scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n - scsi: lpfc: Change default queue allocation for reduced memory\n consumption (bsc#1164780).\n - scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer\n dereferences (bsc#1171614).\n - scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG\n (bsc#1171615).\n - scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event\n (bsc#1164780).\n - scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n - scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type\n (bsc#1164780).\n - scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n - scsi: lpfc: Maintain atomic consistency of queue_claimed flag\n (bsc#1164780).\n - scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n - scsi: lpfc: Remove re-binding of nvme rport during registration\n (bsc#1164780).\n - scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n - scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n - scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n - scsi: megaraid_sas: Do not initiate OCR if controller is not in ready\n state (bsc#1171616).\n - scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n - scsi-qla2xxx-check-UNLOADING-before-posting-async-wo.patch\n - scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n - scsi: qla2xxx: Delete all sessions before unregister local nvme port\n (bsc#1157169).\n - scsi: qla2xxx: Do not log message when reading port speed via sysfs\n (bsc#1157169).\n - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV\n (bsc#1157169).\n - scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n - scsi: qla2xxx: Remove non functional code (bsc#1157169).\n - scsi: qla2xxx: set UNLOADING before waiting for session deletion\n (bsc#1157169).\n - scsi-qla2xxx-set-UNLOADING-before-waiting-for-sessio.patch\n - scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n - scsi: qla4xxx: fix double free bug (bsc#1171618).\n - scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI\n (bsc#1171619).\n - scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n - scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and\n WRITE(6) (bsc#1171621).\n - scsi: ufs: change msleep to usleep_range (bsc#1171622).\n - scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path\n (bsc#1171623).\n - scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic\n (bsc#1171624).\n - scsi: ufs: Fix ufshcd_probe_hba() reture value in case\n ufshcd_scsi_add_wlus() fails (bsc#1171625).\n - scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n - scsi: zfcp: fix missing erp_lock in port recovery trigger for\n point-to-point (git-fixes).\n - sctp: fix possibly using a bad saddr with a given dst\n (networking-stable-20_04_02).\n - sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n - sctp: move the format error check out of __sctp_sf_do_9_1_abort\n (networking-stable-20_03_01).\n - selftests/powerpc: Fix build errors in powerpc ptrace selftests\n (boo#1124278).\n - seq_file: fix problem when seeking mid-record (bsc#1170125).\n - serial: uartps: Move the spinlock after the read of the tx empty\n (git-fixes).\n - sfc: detach from cb_page in efx_copy_channel()\n (networking-stable-20_03_14).\n - signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig\n (bsc#1172185).\n - slcan: not call free_netdev before rtnl_unlock in slcan_open\n (networking-stable-20_03_28).\n - slip: make slhc_compress() more robust against malicious packets\n (networking-stable-20_03_14).\n - smb3: Additional compression structures (bsc#1144333).\n - smb3: Add new compression flags (bsc#1144333).\n - smb3: change noisy error message to FYI (bsc#1144333).\n - smb3: enable swap on SMB3 mounts (bsc#1144333).\n - smb3-fix-performance-regression-with-setting-mtime.patch\n - smb3: Minor cleanup of protocol definitions (bsc#1144333).\n - smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n - smb3: smbdirect support can be configured by default (bsc#1144333).\n - smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n - spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n - spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n - spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n - spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n - spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n - spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n - spi: fsl: do not map irq during probe (git-fixes).\n - spi: fsl: use platform_get_irq() instead of of_irq_to_resource()\n (git-fixes).\n - spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n - spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n - spi: spi-fsl-dspi: Replace interruptible wait queue with a simple\n completion (git-fixes).\n - spi: spi-s3c64xx: Fix system resume support (git-fixes).\n - spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n - staging: comedi: dt2815: fix writing hi byte of analog output\n (bsc#1051510).\n - staging: comedi: Fix comedi_device refcnt leak in comedi_open\n (bsc#1051510).\n - staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n - staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default\n (git-fixes).\n - staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n - staging: vt6656: Fix pairwise key entry save (git-fixes).\n - sunrpc: expiry_time should be seconds not timeval (git-fixes).\n - sunrpc: Fix a potential buffer overflow in 'svc_print_xprts()'\n (git-fixes).\n - supported.conf: Add br_netfilter to base (bsc#1169020).\n - supported.conf: support w1 core and thermometer support\n - svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path\n (bsc#1103992).\n - svcrdma: Fix leak of transport addresses (git-fixes).\n - svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n - taskstats: fix data-race (bsc#1172188).\n - tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n - tcp: repair: fix TCP_QUEUE_SEQ implementation\n (networking-stable-20_03_28).\n - team: add missing attribute validation for array index\n (networking-stable-20_03_14).\n - team: add missing attribute validation for port ifindex\n (networking-stable-20_03_14).\n - team: fix hang in team_mode_get() (networking-stable-20_04_27).\n - tools lib traceevent: Remove unneeded qsort and uses memmove instead\n (git-fixes).\n - tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n - tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n - tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n - tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n - tracing: Disable trace_printk() on post poned tests (git-fixes).\n - tracing: Fix the race between registering 'snapshot' event trigger and\n triggering 'snapshot' operation (git-fixes).\n - tty: rocket, avoid OOB access (git-fixes).\n - tun: Do not put_page() for all negative return values from XDP program\n (bsc#1109837).\n - UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n - UAS: no use logging any details in case of ENODEV (git-fixes).\n - Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n - Update config files: re-enable CONFIG_HAMRADIO and co (bsc#1170740)\n - Update\n patches.suse/powerpc-pseries-ddw-Extend-upper-limit-for-huge-DMA-.patch\n (bsc#1142685 bsc#1167867 ltc#179509 ltc#184616).\n - Update patches.suse/x86-mm-split-vmalloc_sync_all.patch (bsc#1165741,\n bsc#1166969).\n - Update references:\n patches.suse/s390-pci-do-not-set-affinity-for-floating-irqs (bsc#1171817\n LTC#185819 git-fixes).\n - usb: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair\n K70 RGB RAPIDFIRE (git-fixes).\n - usb: cdc-acm: restore capability check order (git-fixes).\n - usb: core: Fix misleading driver bug report (bsc#1051510).\n - usb: dwc3: do not set gadget->is_otg flag (git-fixes).\n - usb: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n - usb: early: Handle AMD's spec-compliant identifiers, too (git-fixes).\n - usb: f_fs: Clear OS Extended descriptor counts to zero in\n ffs_data_reset() (git-fixes).\n - usb: gadget: audio: Fix a missing error return value in audio_bind()\n (git-fixes).\n - usb: gadget: composite: Inform controller driver of self-powered\n (git-fixes).\n - usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n - usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n - usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n - usb: gadget: net2272: Fix a memory leak in an error handling path in\n 'net2272_plat_probe()' (git-fixes).\n - usb: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n - usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n - usb: gadget: udc: bdc: Remove unnecessary NULL checks in\n bdc_req_complete (git-fixes).\n - usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n - usb: hub: Fix handling of connect changes during sleep (git-fixes).\n - usbnet: silence an unnecessary warning (bsc#1170770).\n - usb: serial: garmin_gps: add sanity checking for data length (git-fixes).\n - usb: serial: option: add BroadMobi BM806U (git-fixes).\n - usb: serial: option: add support for ASKEY WWHC050 (git-fixes).\n - usb: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n - usb: serial: qcserial: Add DW5816e support (git-fixes).\n - usb: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n - usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n - usb: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n - usb: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg\n list (git-fixes).\n - video: fbdev: sis: Remove unnecessary parentheses and commented code\n (bsc#1114279)\n - video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n - vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n - vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n - vt: selection, introduce vc_is_sel (git-fixes).\n - vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n - vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n - vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console\n (git-fixes).\n - vxlan: check return value of gro_cells_init()\n (networking-stable-20_03_28).\n - w1: Add subsystem kernel public interface (jsc#SLE-11048).\n - w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n - w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n - w1: use put_device() if device_register() fail (jsc#SLE-11048).\n - watchdog: reset last_hw_keepalive time at start (git-fixes).\n - wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).\n - wil6210: remove reset file from debugfs (git-fixes).\n - wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n - workqueue: do not use wq_select_unbound_cpu() for bound works\n (bsc#1172130).\n - x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n - x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n - x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n - x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n - x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621,\n bsc#1170620).\n - x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump\n (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Report crash data in die() when panic_on_oops is set\n (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Report crash register data or kmsg before running crash\n kernel (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is\n not set (bsc#1170617, bsc#1170618).\n - x86: hyperv: report value of misc_features (git fixes).\n - x86/Hyper-V: Trigger crash enlightenment only once during system crash\n (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617,\n bsc#1170618).\n - x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n - x86/resctrl: Fix invalid attempt at removing the default resource group\n (git-fixes).\n - x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n - x86/unwind/orc: Do not skip the first frame for inactive tasks\n (bsc#1058115).\n - x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n - x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n - x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks\n (bsc#1058115).\n - x86/unwind/orc: Prevent unwinding before ORC initialization\n (bsc#1058115).\n - x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n - x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n - x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n - x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n - xen/pci: reserve MCFG areas earlier (bsc#1170145).\n - xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish\n (networking-stable-20_04_27).\n - xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n - xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n - xfs: do not ever return a stale pointer from __xfs_dir3_free_read\n (git-fixes).\n - xprtrdma: Fix completion wait during device removal (git-fixes).\n\n\nSpecial Instructions and Notes:\n\n Please reboot the system after installing this update.\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.1:\n\n zypper in -t patch openSUSE-2020-801=1", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-06-13T00:00:00", "type": "suse", "title": "Security update for the Linux Kernel (important)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-1000199", "CVE-2019-19462", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-0543", "CVE-2020-10690", "CVE-2020-10711", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-11608", "CVE-2020-11609", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12656", "CVE-2020-12657", "CVE-2020-12659", "CVE-2020-12769", "CVE-2020-13143"], "modified": "2020-06-13T00:00:00", "id": "OPENSUSE-SU-2020:0801-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-11-08T23:04:28", "description": "An update that solves 16 vulnerabilities and has 117 fixes\n is now available.\n\nDescription:\n\n\n\n The openSUSE Leap 15.2 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to\n cause a denial of service (such as relay blockage) by triggering a NULL\n alloc_percpu result (bnc#1158265).\n - CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c\n did not call snd_card_free for a failure path, which causes a memory\n leak, aka CID-9453264ef586 (bnc#1172458).\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU\n consumption and soft lockup) in a certain failure case involving\n TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n - CVE-2020-10711: A NULL pointer dereference flaw was found in the Linux\n kernel's SELinux subsystem. This flaw occurs while importing the\n Commercial IP Security Option (CIPSO) protocol's category bitmap into\n the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine.\n While processing the CIPSO restricted bitmap tag in the\n 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to\n indicate that the category bitmap is present, even if it has not been\n allocated. This issue leads to a NULL pointer dereference issue while\n importing the same category bitmap into SELinux. This flaw allowed a\n remote network user to crash the system kernel, resulting in a denial of\n service (bnc#1171191).\n - CVE-2020-10732: A flaw was found in the implementation of Userspace core\n dumps. This flaw allowed an attacker with a local account to crash a\n trivial program and exfiltrate private kernel data (bnc#1171220).\n - CVE-2020-10751: SELinux LSM hook implementation before version 5.7,\n where it incorrectly assumed that an skb would only contain a single\n netlink message. The hook would incorrectly only validate the first\n netlink message in the skb and allow or deny the rest of the messages\n within the skb with the granted permission without further processing\n (bnc#1171189).\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown. Linux scheduler\n logical bug allowed an attacker to turn off the SSBD protection.\n (bnc#1172781).\n - CVE-2020-10767: Fixed that Indirect Branch Prediction Barrier is\n force-disabled when STIBP is unavailable or enhanced IBRS is available.\n (bnc#1172782).\n - CVE-2020-10768: Fixed that indirect branch speculation can be enabled\n after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command\n (bnc#1172783).\n - CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x.\n (bnc#1172999).\n - CVE-2020-12656: Fixed a memory leak in gss_mech_free in the\n rpcsec_gss_krb5 implementation due to lack of certain domain_release\n calls (bnc#1171219).\n - CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed\n attackers to cause a panic via concurrent calls to dw_spi_irq and\n dw_spi_transfer_one, aka CID-19b61392c5a8 (bnc#1171983).\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts to access\n disabled memory space (bnc#1171868).\n - CVE-2020-13143: gadget_dev_desc_UDC_store in\n drivers/usb/gadget/configfs.c relied on kstrdup without considering the\n possibility of an internal '\\0' value, which allowed attackers to\n trigger an out-of-bounds read, aka CID-15753588bcd4 (bnc#1171982).\n - CVE-2020-13974: tty/vt/keyboard.c had an integer overflow if k_ascii is\n called several times in a row, aka CID-b86dab054059. (bnc#1172775).\n - CVE-2020-14416: A race condition in tty->disc_data handling in the slip\n and slcan line discipline could lead to a use-after-free, aka\n CID-0ace17d56824. This affects drivers/net/slip/slip.c and\n drivers/net/can/slcan.c (bnc#1162002).\n\n The following non-security bugs were fixed:\n\n - ACPICA: Fixes for acpiExec namespace init file (git-fixes).\n - ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe()\n (git-fixes).\n - ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx handling\n (git-fixes).\n - ACPI: PM: Avoid using power resources if there are none for D0\n (git-fixes).\n - ACPI: sysfs: Fix reference count leak in\n acpi_sysfs_add_hotplug_profile() (git-fixes).\n - af_unix: add compat_ioctl support (git-fixes).\n - agp/intel: Reinforce the barrier after GTT updates (git-fixes).\n - ALSA: emu10k1: delete an unnecessary condition (git-fixes).\n - ALSA: es1688: Add the missed snd_card_free() (git-fixes).\n - ALSA: fireface: fix configuration error for nominal sampling transfer\n frequency (git-fixes).\n - ALSA: firewire-lib: fix invalid assignment to union data for directional\n parameter (git-fixes).\n - ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).\n - ALSA: hda: add member to store ratio for stripe control (git-fixes).\n - ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up\n (git-fixes).\n - ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n - ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround\n (bsc#1172017).\n - ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines\n (git-fixes).\n - ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).\n - ALSA: hda/realtek - Add more fixup entries for Clevo machines\n (git-fixes).\n - ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n - ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).\n - ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme\n (git-fixes).\n - ALSA: hda/realtek - Fix unused variable warning w/o\n CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).\n - ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).\n - ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).\n - ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).\n - ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n - ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio\n option (git-fixes).\n - ALSA: pcm: disallow linking stream to itself (git-fixes).\n - ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n - ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).\n - ALSA: usb-audio: Add duplex sound support for USB devices using implicit\n feedback (git-fixes).\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).\n - ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt\n Dock (git-fixes).\n - ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).\n - ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats()\n (git-fixes).\n - ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).\n - ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing\n crosspoints (git-fixes).\n - ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).\n - ALSA: usb-audio: Fix racy list management in output queue (git-fixes).\n - ALSA: usb-audio: Improve frames size computation (git-fixes).\n - ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).\n - ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC\n (git-fixes).\n - ALSA: usb-audio: Print more information in stream proc files (git-fixes).\n - ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio\n (git-fixes).\n - ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen\n (git-fixes).\n - ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).\n - ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).\n - amd-xgbe: Use __napi_schedule() in BH context\n (networking-stable-20_04_17).\n - arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).\n - ARM: oxnas: make ox820_boot_secondary static (git-fixes).\n - asm-gemeric/tlb: remove stray function declarations (bsc#1156395).\n - ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).\n - ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet\n (git-fixes).\n - ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need\n pmc_plt_clk_0 quirk (bsc#1171246).\n - ASoC: intel - fix the card names (git-fixes).\n - ASoC: max9867: fix volume controls (git-fixes).\n - ASoC: meson: add missing free_irq() in error path (git-fixes).\n - ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).\n - ASoC: SOF: core: fix error return code in sof_probe_continue()\n (git-fixes).\n - ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).\n - ath10k: Remove ath10k_qmi_register_service_notifier() declaration\n (git-fixes).\n - ath10k: remove the max_sched_scan_reqs value (git-fixes).\n - ath10k: Skip handling del_server during driver exit (git-fixes).\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).\n - ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).\n - ath9k_htc: Silence undersized packet warnings (git-fixes).\n - ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).\n - ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).\n - b43legacy: Fix case where channel status is corrupted (git-fixes).\n - bfq: Avoid false bfq queue merging (bsc#1171513).\n - bfq: Fix check detecting whether waker queue should be selected\n (bsc#1168838).\n - bfq: Use only idle IO periods for think time calculations (bsc#1171513).\n - bfq: Use 'ttime' local variable (bsc#1171513).\n - blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).\n - blk-iocost: fix incorrect vtime comparison in iocg_is_idle()\n (bsc#1173206).\n - bluetooth: btmtkuart: Improve exception handling in btmtuart_probe()\n (git-fixes).\n - bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).\n - bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371\n bsc#1153274).\n - bpf: Fix map permissions check (bsc#1155518).\n - bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).\n - bpf: Restrict bpf_probe_read{, str}() only to archs where they work\n (bsc#1172344).\n - bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).\n - bpf, sockmap: Check update requirements after locking (git-fixes).\n - bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).\n - brcmfmac: fix wrong location to get firmware feature (git-fixes).\n - btrfs: fix log context list corruption after rename whiteout error\n (bsc#1172342).\n - btrfs: fix partial loss of prealloc extent past i_size after fsync\n (bsc#1172343).\n - btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent\n runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n - btrfs: reloc: fix reloc root leak and NULL pointer dereference\n (bsc#1171417 bsc#1160947 bsc#1172366).\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n - ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).\n - ceph: allow rename operation under different quota realms (bsc#1172988).\n - ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).\n - ceph: convert mdsc->cap_dirty to a per-session list (bsc#1172984\n bsc#1167104).\n - ceph: document what protects i_dirty_item and i_flushing_item\n (bsc#1172940).\n - ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).\n - ceph: do not return -ESTALE if there's still an open file (bsc#1171915).\n - ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).\n - ceph: fix potential race in ceph_check_caps (bsc#1172940).\n - ceph: flush release queue when handling caps for unknown inode\n (bsc#1172939).\n - ceph: make sure mdsc->mutex is nested in s->s_mutex to fix dead lock\n (bsc#1172989).\n - ceph: normalize 'delta' parameter usage in check_quota_exceeded\n (bsc#1172987).\n - ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).\n - ceph: request expedited service on session's last cap flush (bsc#1172985\n bsc#1167104).\n - ceph: reset i_requested_max_size if file write is not wanted\n (bsc#1172983).\n - ceph: skip checking caps when session reconnecting and releasing reqs\n (bsc#1172990).\n - ceph: split up __finish_cap_flush (bsc#1172940).\n - ceph: throw a warning if we destroy session with mutex still locked\n (bsc#1172940).\n - char/random: Add a newline at the end of the file (jsc#SLE-12424).\n - clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).\n - clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).\n - clk: clk-flexgen: fix clock-critical handling (git-fixes).\n - clk: mediatek: assign the initial value to clk_init_data of mtk_mux\n (git-fixes).\n - clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers\n (git-fixes).\n - clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).\n - clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits\n (git-fixes).\n - clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).\n - clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).\n - clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical\n (git-fixes).\n - clk: sprd: return correct type of value for _sprd_pll_recalc_rate\n (git-fixes).\n - clk: sunxi: Fix incorrect usage of round_down() (git-fixes).\n - clk: ti: am33xx: fix RTC clock parent (git-fixes).\n - clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).\n - component: Silence bind error on -EPROBE_DEFER (git-fixes).\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References:\n bsc#1172739\n - coredump: fix crash when umh is disabled (git-fixes).\n - coredump: fix null pointer dereference on coredump (git-fixes).\n - crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).\n - crypto: algboss - do not wait during notifier callback (git-fixes).\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is\n fully iterated (git-fixes).\n - crypto: ccp -- do not \"select\" CONFIG_DMADEVICES (git-fixes).\n - crypto: chelsio/chtls: properly set tp->lsndtime (git-fixes).\n - crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n - crypto: stm32/crc32 - fix multi-instance (git-fixes).\n - crypto: stm32/crc32 - fix run-time self test issue (git-fixes).\n - cxgb4: fix adapter crash due to wrong MC size\n (networking-stable-20_04_27).\n - cxgb4: fix large delays in PTP synchronization\n (networking-stable-20_04_27).\n - Delete\n patches.suse/seltests-powerpc-Add-a-selftest-for-memcpy_mcsafe.patch\n (bsc#1171699).\n - dma-coherent: fix integer overflow in the reserved-memory dma allocation\n (git-fixes).\n - dma-debug: fix displaying of dma allocation type (git-fixes).\n - dma-direct: fix data truncation in dma_direct_get_required_mask()\n (git-fixes).\n - dmaengine: dmatest: Fix process hang when reading 'wait' parameter\n (git-fixes).\n - dmaengine: dmatest: Restore default for channel (git-fixes).\n - dmaengine: mmp_tdma: Do not ignore slave config validation errors\n (git-fixes).\n - dmaengine: mmp_tdma: Reset channel error on release (git-fixes).\n - dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).\n - dmaengine: pch_dma.c: Avoid data race between probe and irq handler\n (git-fixes).\n - dmaengine: tegra210-adma: Fix an error handling path in\n 'tegra_adma_probe()' (git-fixes).\n - dm verity fec: fix hash block number in verity_fec_decode (git fixes\n (block drivers)).\n - dm writecache: fix data corruption when reloading the target (git fixes\n (block drivers)).\n - drivers/net/ibmvnic: Update VNIC protocol version reporting\n (bsc#1065729).\n - drivers: phy: sr-usb: do not use internal fsm for USB2 phy init\n (git-fixes).\n - drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static\n (git-fixes).\n - drm/amd/display: add basic atomic check for cursor plane (git-fixes).\n - drm/amd/display: drop cursor position check in atomic test (git-fixes).\n - drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).\n - drm/amdgpu: force fbdev into vram (bsc#1152472) \t* context changes\n - drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).\n - drm/amdgpu: simplify padding calculations (v2) (git-fixes).\n - drm/amd/powerplay: avoid using pm_en before it is initialized revised\n (git-fixes).\n - drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).\n - drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) \t* context\n changes\n - drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).\n - drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).\n - drm: encoder_slave: fix refcouting error for modules (git-fixes).\n - drm/etnaviv: fix perfmon domain interation (git-fixes).\n - drm/etnaviv: rework perfmon query infrastructure (git-fixes).\n - drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is\n (bsc#1152489)\n - drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled\n (git-fixes).\n - drm/i915: extend audio CDCLK>=2*BCLK constraint to more platforms\n (git-fixes).\n - drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)\n - drm/i915: fix port checks for MST support on gen >= 11 (git-fixes).\n - drm/i915/gem: Avoid iterating an empty list (git-fixes).\n - drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)\n - drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of\n (bsc#1152489)\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of\n inheritance (git-fixes).\n - drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489)\n * context changes\n - drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).\n - drm/i915: Limit audio CDCLK>=2*BCLK constraint back to GLK only\n (git-fixes).\n - drm/i915: Propagate error from completed fences (git-fixes).\n - drm/i915: Whitelist context-local timestamp in the gen9 cmdparser\n (git-fixes).\n - drm/i915: work around false-positive maybe-uninitialized warning\n (git-fixes).\n - drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).\n - drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper()\n (git-fixes).\n - drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).\n - drm/vkms: Hold gem object while still in-use (git-fixes).\n - dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg()\n (git-fixes).\n - e1000e: Disable TSO for buffer overrun workaround (git-fixes).\n - e1000e: Do not wake up the system via WOL if device wakeup is disabled\n (git-fixes).\n - EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).\n - EDAC/ghes: Setup DIMM label from DMI and use it in error reports\n (bsc#1168779).\n - EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable\n (bsc#1152489).\n - EDAC/synopsys: Do not dump uninitialized pinf->col (bsc#1152489).\n - efi/efivars: Add missing kobject_put() in sysfs entry creation error\n path (git-fixes).\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness\n (jsc#SLE-12424).\n - efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).\n - efi/tpm: Verify event log header before parsing (bsc#1173461).\n - eventpoll: fix missing wakeup for ovflist in ep_poll_callback\n (bsc#1159867).\n - evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).\n - evm: Fix a small race in init_desc() (git-fixes).\n - evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).\n - evm: Fix RCU list related warnings (git-fixes).\n - extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()'\n (git-fixes).\n - fanotify: fix ignore mask logic for events on child and on dir\n (bsc#1172719).\n - fdt: add support for rng-seed (jsc#SLE-12424).\n - fdt: Update CRC check for rng-seed (jsc#SLE-12424).\n - firmware: imx: scu: Fix corruption of header (git-fixes).\n - firmware: imx: scu: Fix possible memory leak in imx_scu_probe()\n (git-fixes).\n - firmware: imx-scu: Support one TX and one RX (git-fixes).\n - firmware: imx: warn on unexpected RX (git-fixes).\n - firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).\n - firmware: xilinx: Fix an error handling path in\n 'zynqmp_firmware_probe()' (git-fixes).\n - Fix a regression of AF_ALG crypto interface hang with aes_s390\n (bsc#1167651)\n - fpga: dfl: afu: Corrected error handling levels (git-fixes).\n - fs: Do not check if there is a fsnotify watcher on pseudo inodes\n (bsc#1158765).\n - fsnotify: Rearrange fast path to minimise overhead when there is no\n watcher (bsc#1158765).\n - genetlink: clean up family attributes allocations (git-fixes).\n - genetlink: fix memory leaks in genl_family_rcv_msg_dumpit()\n (bsc#1154353).\n - gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).\n - gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).\n - gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip\n de-registration (git-fixes).\n - gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).\n - gpiolib: Document that GPIO line names are not globally unique\n (git-fixes).\n - gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).\n - gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).\n - gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).\n - gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).\n - habanalabs: Align protection bits configuration of all TPCs (git-fixes).\n - HID: alps: Add AUI1657 device ID (git-fixes).\n - HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead\n (git-fixes).\n - HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).\n - HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).\n - HID: intel-ish-hid: avoid bogus uninitialized-variable warning\n (git-fixes).\n - HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).\n - HID: multitouch: enable multi-input as a quirk for some devices\n (git-fixes).\n - HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A\n keyboard-dock (git-fixes).\n - HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).\n - hsr: check protocol version in hsr_newlink()\n (networking-stable-20_04_17).\n - i2c: acpi: put device when verifying client fails (git-fixes).\n - i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).\n - i2c: designware-pci: Add support for Elkhart Lake PSE I2C\n (jsc#SLE-12734).\n - i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).\n - i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).\n - i2c: dev: Fix the race between the release of i2c_dev and cdev\n (git-fixes).\n - i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n - i2c: mux: demux-pinctrl: Fix an error handling path in\n 'i2c_demux_pinctrl_probe()' (git-fixes).\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280\n ltc#185369).\n - ibmvnic: Flush existing work items before device removal (bsc#1065729).\n - ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n - ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).\n - ice: Fix inability to set channels when down (jsc#SLE-7926).\n - ieee80211: Fix incorrect mask for default PE duration (git-fixes).\n - iio: adc: stm32-adc: fix device used to request dma (git-fixes).\n - iio: adc: stm32-adc: Use dma_request_chan() instead\n dma_request_slave_channel() (git-fixes).\n - iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).\n - iio: adc: stm32-dfsdm: Use dma_request_chan() instead\n dma_request_slave_channel() (git-fixes).\n - iio: adc: ti-ads8344: Fix channel selection (git-fixes).\n - iio: buffer: Do not allow buffers without any channels enabled to be\n activated (git-fixes).\n - iio:chemical:pms7003: Fix timestamp alignment and prevent data leak\n (git-fixes).\n - iio:chemical:sps30: Fix timestamp alignment (git-fixes).\n - iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()'\n (git-fixes).\n - iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).\n - iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).\n - iio: vcnl4000: Fix i2c swapped word reading (git-fixes).\n - ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()\n (bsc#1172223).\n - ima: Directly assign the ima_default_policy pointer to ima_rules\n (bsc#1172223)\n - ima: Directly free *entry in ima_alloc_init_template() if digests is\n NULL (bsc#1172223).\n - ima: Remove __init annotation from ima_pcrread() (git-fixes).\n - include/asm-generic/topology.h: guard cpumask_of_node() macro argument\n (bsc#1148868).\n - Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).\n - Input: edt-ft5x06 - fix get_default register write access (git-fixes).\n - Input: evdev - call input_flush_device() on release(), not flush()\n (git-fixes).\n - Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).\n - Input: mms114 - fix handling of mms345l (git-fixes).\n - Input: synaptics - add a second working PNP_ID for Lenovo T470s\n (git-fixes).\n - Input: synaptics-rmi4 - fix error return code in rmi_driver_probe()\n (git-fixes).\n - Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n - Input: usbtouchscreen - add support for BonXeon TP (git-fixes).\n - Input: xpad - add custom init packet for Xbox One S controllers\n (git-fixes).\n - iocost: check active_list of all the ancestors in iocg_activate()\n (bsc#1173206).\n - iocost: do not let vrate run wild while there's no saturation signal\n (bsc1173206).\n - iocost: over-budget forced IOs should schedule async delay (bsc#1173206).\n - iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).\n - iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).\n - iommu/amd: Do not loop forever when trying to increase address space\n (bsc#1172063).\n - iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system\n (bsc#1172393).\n - iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).\n - iommu/amd: Fix race in increase_address_space()/fetch_pte()\n (bsc#1172065).\n - iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).\n - iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).\n - iommu/qcom: Fix local_base status check (bsc#1172067).\n - iommu/virtio: Reverse arguments to list_add (bsc#1172068).\n - ipv4: Update fib_select_default to handle nexthop objects\n (networking-stable-20_04_27).\n - ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n - ipvs: Improve robustness to the ipvs sysctl (git-fixes).\n - irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).\n - irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).\n - irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).\n - irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).\n - iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).\n - iwlwifi: mvm: limit maximum queue appropriately (git-fixes).\n - iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).\n - jbd2: fix data races at struct journal_head (bsc#1173438).\n - kabi: ppc64le: prevent struct dma_map_ops to become defined\n (jsc#SLE-12424).\n - kabi/severities: Ingnore get_dev_data() The function is internal to the\n AMD IOMMU driver and must not be called by any third party.\n - kABI workaround for struct hdac_bus changes (git-fixes).\n - ktest: Add timeout for ssh sync testing (git-fixes).\n - KVM: Check validity of resolved slot when searching memslots\n (bsc#1172069).\n - KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated\n (bsc#1171904).\n - KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n - l2tp: Allow management of tunnels and session in user namespace\n (networking-stable-20_04_17).\n - libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).\n - libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).\n - lib: devres: add a helper function for ioremap_uc (git-fixes).\n - libertas_tf: avoid a null dereference in pointer priv (git-fixes).\n - lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).\n - libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n - libnvdimm: cover up nd_region changes (bsc#1162400).\n - libnvdimm/dax: Pick the right alignment default when creating dax\n devices (bsc#1171759).\n - libnvdimm/label: Remove the dpa align check (bsc#1171759).\n - libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).\n - libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).\n - libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n - libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).\n - libnvdimm/pfn_dev: Add a build check to make sure we notice when struct\n page size change (bsc#1171743).\n - libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock\n (bsc#1171759).\n - libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid\n (bsc#1171743).\n - libnvdimm/pmem: Advance namespace seed for specific probe errors\n (bsc#1171743).\n - libnvdimm/region: Fix build error (bsc#1162400).\n - libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).\n - libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).\n - libnvdimm/region: Rewrite _probe_success() to _advance_seeds()\n (bsc#1171743).\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n - lib: Uplevel the pmem \"region\" ida to a global allocator (bc#1162400).\n - list: Add hlist_unhashed_lockless() (bsc#1173438).\n - livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n - livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n - livepatch: Prevent module-specific KLP rela sections from referencing\n vmlinux symbols (bsc#1071995).\n - livepatch: Remove .klp.arch (bsc#1071995).\n - locktorture: Allow CPU-hotplug to be disabled via --bootargs\n (bsc#1173068).\n - lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).\n - lpfc: fix axchg pointer reference after free and double frees\n (bsc#1171530).\n - lpfc: Fix pointer checks and comments in LS receive refactoring\n (bsc#1171530).\n - lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).\n - lpfc: Synchronize NVME transport and lpfc driver devloss_tmo\n (bcs#1173060).\n - mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).\n - mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in\n zynqmp_ipi_mbox_probe() (git-fixes).\n - Make the \"Reducing compressed framebufer size\" message be\n DRM_INFO_ONCE() (git-fixes).\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n - media: cedrus: Program output format during each run (git-fixes).\n - media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).\n - media: platform: fcp: Set appropriate DMA parameters (git-fixes).\n - media: Revert \"staging: imgu: Address a compiler warning on alignment\"\n (git-fixes).\n - media: staging: ipu3: Fix stale list entries on parameter queue failure\n (git-fixes).\n - media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).\n - mei: release me_cl object reference (git-fixes).\n - mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).\n - mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).\n - mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).\n - mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).\n - misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).\n - misc: rtsx: Add short delay after exit from ASPM (git-fixes).\n - mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n - mm: adjust vm_committed_as_batch according to vm overcommit policy\n (bnc#1173271).\n - mmc: block: Fix use-after-free issue for rpmb (git-fixes).\n - mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of\n DEFINE_SIMPLE_ATTRIBUTE (git-fixes).\n - mmc: fix compilation of user API (git-fixes).\n - mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error\n (git-fixes).\n - mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).\n - mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).\n - mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).\n - mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card()\n (git-fixes).\n - mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card()\n (git-fixes).\n - mmc: tmio: Further fixup runtime PM management at remove (git-fixes).\n - mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe()\n (git-fixes).\n - mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).\n - mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).\n - mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400\n bsc#1170895 ltc#184375 ltc#185686).\n - mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).\n - mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).\n - mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).\n - mt76: mt76x02u: Add support for newer versions of the XBox One wifi\n adapter (git-fixes).\n - mtd: Fix mtd not registered due to nvmem name collision (git-fixes).\n - mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).\n - mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).\n - mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).\n - mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).\n - mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).\n - mtd: rawnand: ingenic: Fix the probe error path (git-fixes).\n - mtd: rawnand: marvell: Fix probe error path (git-fixes).\n - mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).\n - mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet\n registered (git-fixes).\n - mtd: rawnand: mtk: Fix the probe error path (git-fixes).\n - mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).\n - mtd: rawnand: orion: Fix the probe error path (git-fixes).\n - mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).\n - mtd: rawnand: oxnas: Release all devices in the _remove() path\n (git-fixes).\n - mtd: rawnand: pasemi: Fix the probe error path (git-fixes).\n - mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).\n - mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).\n - mtd: rawnand: socrates: Fix the probe error path (git-fixes).\n - mtd: rawnand: sunxi: Fix the probe error path (git-fixes).\n - mtd: rawnand: timings: Fix default tR_max and tCCS_min timings\n (git-fixes).\n - mtd: rawnand: tmio: Fix the probe error path (git-fixes).\n - mtd: rawnand: xway: Fix the probe error path (git-fixes).\n - mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).\n - mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial\n flash (jsc#SLE-12737).\n - mwifiex: avoid -Wstringop-overflow warning (git-fixes).\n - mwifiex: Fix memory corruption in dump_station (git-fixes).\n - net: bcmgenet: correct per TX/RX ring statistics\n (networking-stable-20_04_27).\n - net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL\n (networking-stable-20_04_27).\n - net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n - net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled\n (networking-stable-20_04_27).\n - net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n - net: dsa: declare lockless TX feature for slave ports (bsc#1154353).\n - net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode\n (networking-stable-20_04_17).\n - net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).\n - net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).\n - netfilter: connlabels: prefer static lock initialiser (git-fixes).\n - netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n - netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no\n actions (git-fixes).\n - netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).\n - netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy\n (git-fixes).\n - netfilter: not mark a spinlock as __read_mostly (git-fixes).\n - net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin\n (networking-stable-20_04_17).\n - net: ipv6: do not consider routes via gateways for anycast address check\n (networking-stable-20_04_17).\n - net/mlx4_en: avoid indirect call in TX completion\n (networking-stable-20_04_27).\n - net/mlx5e: Add missing release firmware call\n (networking-stable-20_04_17).\n - net/mlx5e: Fix pfnum in devlink port attribute\n (networking-stable-20_04_17).\n - net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).\n - net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).\n - net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).\n - net/mlx5: Fix crash upon suspend/resume (bsc#1172365).\n - net/mlx5: Fix frequent ioread PCI access during recovery\n (networking-stable-20_04_17).\n - net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node\n (networking-stable-20_04_27).\n - net: openvswitch: ovs_ct_exit to be done under ovs_lock\n (networking-stable-20_04_27).\n - net: phy: propagate an error back to the callers of phy_sfp_probe\n (bsc#1154353).\n - net: qrtr: send msgs from local of same id as broadcast\n (networking-stable-20_04_17).\n - net: revert default NAPI poll timeout to 2 jiffies\n (networking-stable-20_04_17).\n - net: revert \"net: get rid of an signed integer overflow in\n ip_idents_reserve()\" (bnc#1158748 (network regression)).\n - net: tun: record RX queue in skb before do_xdp_generic()\n (networking-stable-20_04_17).\n - net: vmxnet3: fix possible buffer overflow caused by bad DMA value in\n vmxnet3_get_rss() (bsc#1172484).\n - net/x25: Fix x25_neigh refcnt leak when receiving frame\n (networking-stable-20_04_27).\n - NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).\n - nfs: add minor version to nfs_server_key for fscache (bsc#1172467).\n - nfsd4: make drc_slab global, not per-net (git-fixes).\n - nfsd: always check return value of find_any_file (bsc#1172208).\n - NFS: Fix fscache super_cookie index_key from changing after umount\n (git-fixes).\n - nfs: fix NULL deference in nfs4_get_valid_delegation.\n - nfs: fscache: use timespec64 in inode auxdata (git-fixes).\n - nfs: set invalid blocks after NFSv4 writes (git-fixes).\n - NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION\n (git-fixes).\n - NFSv4: Fix fscache cookie aux_data to ensure change_attr is included\n (git-fixes).\n - ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).\n - ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).\n - ntb: intel: fix static declaration (jsc#SLE-12710).\n - nvdimm: Avoid race between probe and reading device attributes\n (bsc#1170442).\n - nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).\n - nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).\n - nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n - objtool: Allow no-op CFI ops in alternatives (bsc#1169514).\n - objtool: Clean instruction state before each function validation\n (bsc#1169514).\n - objtool: Fix !CFI insn_state propagation (bsc#1169514).\n - objtool: Fix ORC vs alternatives (bsc#1169514).\n - objtool: Ignore empty alternatives (bsc#1169514).\n - objtool: Remove check preventing branches within alternative\n (bsc#1169514).\n - objtool: Rename struct cfi_state (bsc#1169514).\n - objtool: Uniquely identify alternative instruction groups (bsc#1169514).\n - p54usb: add AirVasT USB stick device-id (git-fixes).\n - panic: do not print uninitialized taint_flags (bsc#1172814).\n - PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).\n - PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link\n (git-fixes).\n - PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n - PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n - PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n - PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n - pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.\n - PCI: Fix pci_register_host_bridge() device_register() error handling\n (git-fixes).\n - PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).\n - PCI: mobiveil: Add callback function for interrupt initialization\n (bsc#1161495).\n - PCI: mobiveil: Add callback function for link up check (bsc#1161495).\n - PCI: mobiveil: Add Header Type field check (bsc#1161495).\n - PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).\n - PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host\n (bsc#1161495).\n - PCI: mobiveil: Collect the interrupt related operations into a function\n (bsc#1161495).\n - PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).\n - PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT\n (bsc#1161495).\n - PCI: mobiveil: Introduce a new structure mobiveil_root_port\n (bsc#1161495).\n - PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).\n - PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).\n - PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space\n (bsc#1161495).\n - PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver\n (bsc#1161495).\n - PCI: mobiveil: Move the host initialization into a function\n (bsc#1161495).\n - PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).\n - PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n - PCI: Program MPS for RCiEP devices (git-fixes).\n - PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port\n (git-fixes).\n - PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n - PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths\n (git-fixes).\n - PCI: vmd: Filter resource type bits from shadow register (git-fixes).\n - pcm_native: result of put_user() needs to be checked (git-fixes).\n - perf/core: Fix endless multiplex timer (git-fixes).\n - perf/core: fix parent pid/tid in task exit events (git-fixes).\n - pinctrl: freescale: imx: Fix an error handling path in\n 'imx_pinctrl_probe()' (git-fixes).\n - pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak\n in case of error in 'imx_pinctrl_probe()' (git-fixes).\n - pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()'\n (git-fixes).\n - pinctrl: intel: Add Intel Tiger Lake pin controller support\n (jsc#SLE-12737).\n - pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).\n - pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries\n (git-fixes).\n - pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210\n (git-fixes).\n - pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE\n GPIOs (git-fixes).\n - pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).\n - pinctrl: stmfx: stmfx_pinconf_set does not require to get direction\n anymore (git-fixes).\n - pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).\n - platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA\n (git-fixes).\n - platform/x86: dell-laptop: do not register micmute LED if there is no\n token (git-fixes).\n - platform/x86: intel-vbtn: Also handle tablet-mode switch on \"Detachable\"\n and \"Portable\" chassis-types (git-fixes).\n - platform/x86: intel-vbtn: Do not advertise switches to userspace if they\n are not there (git-fixes).\n - platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 /\n \"Laptop\" chasis-type (git-fixes).\n - platform/x86: intel-vbtn: Split keymap into buttons and switches parts\n (git-fixes).\n - platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).\n - PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).\n - pnp: Use list_for_each_entry() instead of open coding (git-fixes).\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n - powerpc/64s/exception: Fix machine check no-loss idle wakeup\n (bsc#1156395).\n - powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).\n - powerpc/64s: Save FSCR to init_task.thread.fscr after feature init\n (bsc#1065729).\n - powerpc/book3s64: Export has_transparent_hugepage() related functions\n (bsc#1171759).\n - powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again\n (bsc#1172344).\n - powerpc/fadump: Account for memory_limit while reserving memory\n (jsc#SLE-9099 git-fixes).\n - powerpc/fadump: consider reserved ranges while reserving memory\n (jsc#SLE-9099 git-fixes).\n - powerpc/fadump: use static allocation for reserved memory ranges\n (jsc#SLE-9099 git-fixes).\n - powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).\n - powerpc/powernv: Fix a warning message (bsc#1156395).\n - powerpc/setup_64: Set cache-line-size based on cache-block-size\n (bsc#1065729).\n - powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n - power: reset: qcom-pon: reg write mask depends on pon generation\n (git-fixes).\n - power: supply: bq24257_charger: Replace depends on REGMAP_I2C with\n select (git-fixes).\n - power: supply: core: fix HWMON temperature labels (git-fixes).\n - power: supply: core: fix memory leak in HWMON error path (git-fixes).\n - power: supply: lp8788: Fix an error handling path in\n 'lp8788_charger_probe()' (git-fixes).\n - power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).\n - printk: queue wake_up_klogd irq_work only if per-CPU areas are ready\n (bsc#1172095).\n - proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).\n - pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).\n - r8152: support additional Microsoft Surface Ethernet Adapter variant\n (git-fixes).\n - r8169: Revive default chip version for r8168 (bsc#1173085).\n - raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n - random: fix data races at timer_rand_state (bsc#1173438).\n - rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).\n - rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).\n - rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff()\n (bsc#1172046).\n - rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).\n - rcutorture: Add 100-CPU configuration (bsc#1173068).\n - rcutorture: Add worst-case call_rcu() forward-progress results\n (bsc#1173068).\n - rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).\n - rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).\n - rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).\n - rcutorture: Summarize summary of build and run results (bsc#1173068).\n - rcutorture: Test TREE03 with the threadirqs kernel boot parameter\n (bsc#1173068).\n - rcu: Use *_ONCE() to protect lockless ->expmask accesses (bsc#1171828).\n - rcu: Use WRITE_ONCE() for assignments to ->pprev for hlist_nulls\n (bsc#1173438).\n - RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).\n - RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).\n - RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work\n (jsc#SLE-8446).\n - RDMA/nl: Do not permit empty devices names during\n RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).\n - RDMA/srpt: Fix disabling device management (jsc#SLE-8449).\n - RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated\n (jsc#SLE-8449).\n - remoteproc: Add missing '\\n' in log messages (git-fixes).\n - remoteproc: Fall back to using parent memory pool if no dedicated\n available (git-fixes).\n - remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).\n - remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).\n - Revert \"drm/amd/display: disable dcn20 abm feature for bring up\"\n (git-fixes).\n - Revert \"fs/seq_file.c: seq_read(): add info message about buggy .next\n functions\" (bsc#1172751) The message floods dmesg and its benefit is\n marginal in default kernel.\n - Revert \"pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a\n resource leak in case of error in 'imx_pinctrl_probe()'\" (git-fixes).\n - rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n - rpm/modules.fips: * add aes-ce-ccm and des3_ede-x86_64 (boo#173030) *\n add aes_ti and aes_neon_bs (boo#1172956)\n - rtc: mc13xxx: fix a double-unlock issue (git-fixes).\n - rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).\n - rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).\n - rtw88: fix an issue about leak system resources (git-fixes).\n - rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).\n - s390/pci: Log new handle in clp_disable_fh() (git-fixes).\n - sched/cfs: change initial value of runnable_avg (bsc#1158765).\n - sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(),\n to fix mask corruption (bnc#1155798 (CPU scheduler functional and\n performance backports)).\n - sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).\n - sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes\n (sched)).\n - sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and\n performance backports)).\n - sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional\n and performance backports)).\n - sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n - sched/deadline: Initialize ->dl_boosted (bsc#1172823).\n - sched/deadline: Initialize ->dl_boosted (git fixes (sched)).\n - sched: etf: do not assume all sockets are full blown\n (networking-stable-20_04_27).\n - sched/fair: find_idlest_group(): Remove unused sd_flag parameter\n (bnc#1155798 (CPU scheduler functional and performance backports)).\n - sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU\n scheduler functional and performance backports)).\n - sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n - sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n - sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n - sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU\n scheduler functional and performance backports)).\n - sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n - sched: Offload wakee task activation if it the wakee is descheduling\n (bnc#1158748, bnc#1159781).\n - sched: Optimize ttwu() spinning on p->on_cpu (bnc#1158748, bnc#1159781).\n - sched/pelt: Sync util/runnable_sum with PELT window when propagating\n (bnc#1155798 (CPU scheduler functional and performance backports)).\n - scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n - scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM\n (bsc#1172759 ltc#184814).\n - scsi: lpfc: Change default queue allocation for reduced memory\n consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Copyright updates for 12.6.0.4 patches (bsc#1171530).\n - scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).\n - scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).\n - scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777\n bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func\n (bsc#1171530).\n - scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Fix noderef and address space warnings (bsc#1164777\n bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).\n - scsi: lpfc: Maintain atomic consistency of queue_claimed flag\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).\n - scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780\n bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Remove re-binding of nvme rport during registration\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777\n bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777\n bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780\n bsc#1165211 jsc#SLE-8654).\n - scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with\n __BIG_ENDIAN_BITFIELD macro (bsc#1173206).\n - scsi: qla2xxx: Delete all sessions before unregister local nvme port\n (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n - scsi: qla2xxx: Do not log message when reading port speed via sysfs\n (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV\n (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n - scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).\n - scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).\n - scsi: zfcp: add diagnostics buffer for exchange config data\n (bsc#1158050).\n - scsi: zfcp: auto variables for dereferenced structs in open port handler\n (bsc#1158050).\n - scsi: zfcp: diagnostics buffer caching and use for exchange port data\n (bsc#1158050).\n - scsi: zfcp: enhance handling of FC Endpoint Security errors\n (bsc#1158050).\n - scsi: zfcp: expose fabric name as common fc_host sysfs attribute\n (bsc#1158050).\n - scsi: zfcp: Fence adapter status propagation for common statuses\n (bsc#1158050).\n - scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects\n (bsc#1158050).\n - scsi: zfcp: Fence fc_host updates during link-down handling\n (bsc#1158050).\n - scsi: zfcp: fix fc_host attributes that should be unknown on local link\n down (bsc#1158050).\n - scsi: zfcp: fix wrong data and display format of SFP+ temperature\n (bsc#1158050).\n - scsi: zfcp: implicitly refresh config-data diagnostics when reading\n sysfs (bsc#1158050).\n - scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs\n (bsc#1158050).\n - scsi: zfcp: introduce sysfs interface for diagnostics of local SFP\n transceiver (bsc#1158050).\n - scsi: zfcp: introduce sysfs interface to read the local B2B-Credit\n (bsc#1158050).\n - scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).\n - scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).\n - scsi: zfcp: Move allocation of the shost object to after xconf- and\n xport-data (bsc#1158050).\n - scsi: zfcp: Move fc_host updates during xport data handling into fenced\n function (bsc#1158050).\n - scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter\n variable (bsc#1158050).\n - scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).\n - scsi: zfcp: Move shost modification after QDIO (re-)open into fenced\n function (bsc#1158050).\n - scsi: zfcp: Move shost updates during xconfig data handling into fenced\n function (bsc#1158050).\n - scsi: zfcp: proper indentation to reduce confusion in\n zfcp_erp_required_act (bsc#1158050).\n - scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).\n - scsi: zfcp: signal incomplete or error for sync exchange config/port\n data (bsc#1158050).\n - scsi: zfcp: support retrieval of SFP Data via Exchange Port Data\n (bsc#1158050).\n - scsi: zfcp: trace FC Endpoint Security of FCP devices and connections\n (bsc#1158050).\n - scsi: zfcp: wire previously driver-specific sysfs attributes also to\n fc_host (bsc#1158050).\n - selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o\n (bsc#1155518).\n - selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).\n - selftests/bpf: Fix invalid memory reads in core_relo selftest\n (bsc#1155518).\n - selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).\n - selftests/bpf, flow_dissector: Close TAP device FD after the test\n (bsc#1155518).\n - selftests/timens: handle a case when alarm clocks are not supported\n (bsc#1164648,jsc#SLE-11493).\n - serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).\n - slimbus: core: Fix mismatch in of_node_get/put (git-fixes).\n - soc: mediatek: cmdq: return send msg error code (git-fixes).\n - soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).\n - soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new\n data (git-fixes).\n - soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request\n (git-fixes).\n - soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS\n (git-fixes).\n - soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).\n - soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).\n - spi: bcm2835aux: Fix controller unregister order (git-fixes).\n - spi: bcm2835: Fix controller unregister order (git-fixes).\n - spi: bcm-qspi: Handle clock probe deferral (git-fixes).\n - spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).\n - SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).\n - spi: dt-bindings: spi-controller: Fix #address-cells for slave mode\n (git-fixes).\n - spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).\n - spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).\n - spi: dw: Fix controller unregister order (git-fixes).\n - spi: dw: Fix native CS being unset (git-fixes).\n - spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).\n - spi: dw-pci: Add runtime power management support (jsc#SLE-12735).\n - spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).\n - spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI\n (jsc#SLE-12735).\n - spi: dw: use \"smp_mb()\" to avoid sending spi data error (git-fixes).\n - spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).\n - spi: Fix controller unregister order (git-fixes).\n - spi: fsl: do not map irq during probe (git-fixes).\n - spi: fsl: use platform_get_irq() instead of of_irq_to_resource()\n (git-fixes).\n - spi: pxa2xx: Fix controller unregister order (git-fixes).\n - spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).\n - spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource\n (git-fixes).\n - spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_*\n macros (git-fixes).\n - spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).\n - spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).\n - spi: spi-fsl-dspi: Replace interruptible wait queue with a simple\n completion (git-fixes).\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).\n - staging: iio: ad2s1210: Fix SPI reading (git-fixes).\n - staging: kpc2000: fix error return code in kp2000_pcie_probe()\n (git-fixes).\n - staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).\n - staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).\n - sun6i: dsi: fix gcc-4.8 (bsc#1152489)\n - SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).\n - supported.conf: Add pinctrl-tigerlake as supported\n - supported.conf: Mark two hwtracing helper modules as externally\n supported (bsc#1170879)\n - svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).\n - tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n - team: fix hang in team_mode_get() (networking-stable-20_04_27).\n - thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support\n (jsc#SLE-12668).\n - tick/sched: Annotate lockless access to last_jiffies_update\n (bsc#1173438).\n - timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).\n - torture: Allow \"CFLIST\" to specify default list of scenarios\n (bsc#1173068).\n - torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).\n - torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).\n - torture: Handle systems lacking the mpstat command (bsc#1173068).\n - torture: Hoist calls to lscpu to higher-level kvm.sh script\n (bsc#1173068).\n - torture: Make results-directory date format completion-friendly\n (bsc#1173068).\n - torture: Use gawk instead of awk for systime() function (bsc#1173068).\n - tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).\n - tty: n_gsm: Fix SOF skipping (git-fixes).\n - tty: n_gsm: Fix waking up upper tty layer when room available\n (git-fixes).\n - tty: serial: add missing spin_lock_init for SiFive serial console\n (git-fixes).\n - tun: correct header offsets in napi frags mode (git-fixes).\n - Update config files: Add CONFIG_PINCTRL_TIGERLAKE=m\n - Update patch reference for intel_th patch (jsc#SLE-12705)\n - Update the patch reference for ish-hid fix (jsc#SLE-12683)\n - usb: core: Fix misleading driver bug report (git-fixes).\n - usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B\n (git-fixes).\n - usb: dwc2: gadget: move gadget resume after the core is in L0 state\n (git-fixes).\n - usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n - usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n - usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).\n - usb: gadget: audio: Fix a missing error return value in audio_bind()\n (git-fixes).\n - usb: gadget: fix illegal array access in binding with UDC (git-fixes).\n - usb: gadget: fix potential double-free in m66592_probe (git-fixes).\n - usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n - usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n - usb: gadget: legacy: fix redundant initialization warnings (git-fixes).\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer before null\n check (git-fixes).\n - usb: gadget: net2272: Fix a memory leak in an error handling path in\n 'net2272_plat_probe()' (git-fixes).\n - usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in\n s3c2410_udc_nuke (git-fixes).\n - usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe()\n (git-fixes).\n - usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n - usb: musb: Fix runtime PM imbalance on error (git-fixes).\n - usb: musb: start session in resume for host port (git-fixes).\n - usb: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe()\n (git-fixes).\n - usb: serial: option: add Telit LE910C1-EUX compositions (git-fixes).\n - usb: serial: qcserial: add DW5816e QDL support (git-fixes).\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors\n (git-fixes).\n - usb: usbfs: correct kernel->user page attribute mismatch (git-fixes).\n - usb: usbfs: fix mmap dma mismatch (git-fixes).\n - vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).\n - vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).\n - vfio/mdev: Fix reference count leak in add_mdev_supported_type\n (git-fixes).\n - vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).\n - vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn()\n (git-fixes).\n - video: fbdev: w100fb: Fix a potential double free (git-fixes).\n - virtio-blk: handle block_device_operations callbacks after hot unplug\n (git fixes (block drivers)).\n - vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n - vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n - vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n - vmxnet3: update to version 4 (bsc#1172484).\n - vmxnet3: use correct hdr reference when packet is encapsulated\n (bsc#1172484).\n - vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n - vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).\n - vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).\n - vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console\n (git-fixes).\n - vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n - vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR\n (networking-stable-20_04_27).\n - w1: omap-hdq: cleanup to add missing newline for some dev_dbg\n (git-fixes).\n - watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).\n - wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).\n - wireguard: device: avoid circular netns references (git-fixes).\n - wireguard: noise: do not assign initiation time in if condition\n (git-fixes).\n - wireguard: noise: read preshared key while taking lock (bsc#1169021\n jsc#SLE-12250).\n - wireguard: noise: separate receive counter from send counter\n (bsc#1169021 jsc#SLE-12250).\n - wireguard: queueing: preserve flow hash across packet scrubbing\n (bsc#1169021 jsc#SLE-12250).\n - wireguard: receive: account for napi_gro_receive never returning\n GRO_DROP (git-fixes).\n - wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021\n jsc#SLE-12250).\n - work around mvfs bug (bsc#1162063).\n - workqueue: do not use wq_select_unbound_cpu() for bound works\n (git-fixes).\n - workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).\n - x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).\n - x86: Fix early boot crash on gcc-10, third try (bsc#1152489).\n - x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).\n - x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).\n - x86/resctrl: Fix invalid attempt at removing the default resource group\n (bsc#1152489).\n - x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).\n - x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks\n (bsc#1058115).\n - xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish\n (networking-stable-20_04_27).\n - xfrm: fix error in comment (git fixes (block drivers)).\n - xfs: clean up the error handling in xfs_swap_extents (git-fixes).\n - xfs: do not commit sunit/swidth updates to disk if that would cause\n repair failures (bsc#1172169).\n - xfs: do not fail unwritten extent conversion on writeback due to edquot\n (bsc#1158242).\n - xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).\n - xfs: force writes to delalloc regions to unwritten (bsc#1158242).\n - xfs: measure all contiguous previous extents for prealloc size\n (bsc#1158242).\n - xfs: preserve default grace interval during quotacheck (bsc#1172170).\n - xfs: refactor agfl length computation function (bsc#1172169).\n - xfs: split the sunit parameter update into two parts (bsc#1172169).\n - wireguard: selftests: initalize ipv6 members to NULL to squelch clang\n warning (git-fixes).\n\n\nSpecial Instructions and Notes:\n\n Please reboot the system after installing this update.\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.2:\n\n zypper in -t patch openSUSE-2020-935=1", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-07-07T00:00:00", "type": "suse", "title": "Security update for the Linux Kernel (important)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19462", "CVE-2019-20810", "CVE-2019-20812", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10773", "CVE-2020-12656", "CVE-2020-12769", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14416"], "modified": "2020-07-07T00:00:00", "id": "OPENSUSE-SU-2020:0935-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2023-05-18T15:02:19", "description": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\nCVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n\nCVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n\nCVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).\n\nCVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n\nCVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n\nCVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n\nCVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n\nCVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n\nCVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n\nCVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n\nCVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n\nCVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n\nCVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n\nCVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n\nCVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n\nCVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n\nCVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n\nCVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n\nCVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n\nCVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n\nCVE-2019-20806: Fixed a NULL pointer dereference which may had lead to denial of service (bsc#1172199).\n\nCVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n\nCVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-06-18T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:1587-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-1000199", "CVE-2019-19462", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-0543", "CVE-2020-10690", "CVE-2020-10711", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12656", "CVE-2020-12657", "CVE-2020-12659", "CVE-2020-12768", "CVE-2020-12769", "CVE-2020-13143"], "modified": "2022-05-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-azure", "p-cpe:/a:novell:suse_linux:kernel-azure-base", "p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debugsource", "p-cpe:/a:novell:suse_linux:kernel-azure-devel", "p-cpe:/a:novell:suse_linux:kernel-syms-azure", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-1587-1.NASL", "href": "https://www.tenable.com/plugins/nessus/137608", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:1587-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(137608);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/13\");\n\n script_cve_id(\n \"CVE-2018-1000199\",\n \"CVE-2019-9455\",\n \"CVE-2019-19462\",\n \"CVE-2019-20806\",\n \"CVE-2019-20812\",\n \"CVE-2020-0543\",\n \"CVE-2020-10690\",\n \"CVE-2020-10711\",\n \"CVE-2020-10720\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-10757\",\n \"CVE-2020-12114\",\n \"CVE-2020-12464\",\n \"CVE-2020-12652\",\n \"CVE-2020-12653\",\n \"CVE-2020-12654\",\n \"CVE-2020-12655\",\n \"CVE-2020-12656\",\n \"CVE-2020-12657\",\n \"CVE-2020-12659\",\n \"CVE-2020-12768\",\n \"CVE-2020-12769\",\n \"CVE-2020-13143\"\n );\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:1587-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0543: Fixed a side channel attack against special registers\nwhich could have resulted in leaking of read values to cores other\nthan the one which called it. This attack is known as Special Register\nBuffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\nCVE-2020-13143: Fixed an out-of-bounds read in\ngadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c\n(bsc#1171982).\n\nCVE-2020-12769: Fixed an issue which could have allowed attackers to\ncause a panic via concurrent calls to dw_spi_irq and\ndw_spi_transfer_one (bsc#1171983).\n\nCVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in\narch/x86/kvm/svm.c (bsc#1171736).\n\nCVE-2020-12659: Fixed an out-of-bounds write (by a user with the\nCAP_NET_ADMIN capability) due to improper headroom validation\n(bsc#1171214).\n\nCVE-2020-12657: An a use-after-free in block/bfq-iosched.c\n(bsc#1171205).\n\nCVE-2020-12656: Fixed an improper handling of certain domain_release\ncalls leadingch could have led to a memory leak (bsc#1171219).\n\nCVE-2020-12655: Fixed an issue which could have allowed attackers to\ntrigger a sync of excessive duration via an XFS v5 image with crafted\nmetadata (bsc#1171217).\n\nCVE-2020-12654: Fixed an issue in he wifi driver which could have\nallowed a remote AP to trigger a heap-based buffer overflow\n(bsc#1171202).\n\nCVE-2020-12653: Fixed an issue in the wifi driver which could have\nallowed local users to gain privileges or cause a denial of service\n(bsc#1171195).\n\nCVE-2020-12652: Fixed an issue which could have allowed local users to\nhold an incorrect lock during the ioctl operation and trigger a race\ncondition (bsc#1171218).\n\nCVE-2020-12464: Fixed a use-after-free due to a transfer without a\nreference (bsc#1170901).\n\nCVE-2020-12114: Fixed a pivot_root race condition which could have\nallowed local users to cause a denial of service (panic) by corrupting\na mountpoint reference counter (bsc#1171098).\n\nCVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon\nmmap could have caused user PTE access (bsc#1172317).\n\nCVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\nwhere it was assumed that an skb would only contain a single netlink\nmessage (bsc#1171189).\n\nCVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\nuninitialized data (bsc#1171220).\n\nCVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n(bsc#1170778).\n\nCVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem\nwhich could have allowed a remote network user to crash the kernel\nresulting in a denial of service (bsc#1171191).\n\nCVE-2020-10690: Fixed the race between the release of ptp_clock and\ncdev (bsc#1170056).\n\nCVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\nvideo driver. This could lead to local information disclosure with\nSystem execution privileges needed (bsc#1170345).\n\nCVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which\ncould have resulted in a denial of service (bsc#1172453).\n\nCVE-2019-20806: Fixed a NULL pointer dereference which may had lead to\ndenial of service (bsc#1172199).\n\nCVE-2019-19462: Fixed an issue which could have allowed local user to\ncause denial of service (bsc#1158265).\n\nCVE-2018-1000199: Fixed a potential local code execution via ptrace\n(bsc#1089895).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1082555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083647\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1089895\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103990\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103991\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103992\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104745\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109837\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124278\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127354\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127355\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127371\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1141558\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1142685\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151794\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152489\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154824\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1157169\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158265\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160388\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160947\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164871\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165183\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165478\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165741\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166969\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166978\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167574\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167851\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167867\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168332\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168503\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168670\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168789\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169005\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169020\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169525\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169762\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170056\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170125\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170145\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170345\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170457\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170522\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170592\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170620\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170621\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170770\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170778\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170791\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170901\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171078\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171098\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171118\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171195\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171202\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171205\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171214\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171217\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171218\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171244\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171417\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171527\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171599\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171601\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171602\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171604\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171605\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171606\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171607\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171608\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171609\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171610\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171611\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171612\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171613\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171614\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171615\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171618\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171619\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171620\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171621\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171622\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171623\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171624\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171626\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171662\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171679\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171691\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171692\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171694\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171695\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171736\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171761\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171817\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171948\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171949\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171951\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171952\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171979\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171982\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172096\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172097\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172098\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172099\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172101\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172102\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172103\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172104\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172127\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172130\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172185\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172188\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172199\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172201\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172202\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172218\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172221\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172249\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172251\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172253\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172317\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172342\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172366\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172378\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172391\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172397\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172453\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-1000199/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19462/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20806/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20812/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-9455/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-0543/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10690/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10711/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10720/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10732/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10751/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10757/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12114/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12464/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12652/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12653/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12654/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12655/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12656/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12657/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12659/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12768/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12769/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13143/\");\n # https://www.suse.com/support/update/announcement/2020/suse-su-20201587-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?686552aa\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-1587=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-12659\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-12657\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-4.12.14-16.16.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-base-4.12.14-16.16.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-base-debuginfo-4.12.14-16.16.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-debuginfo-4.12.14-16.16.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-debugsource-4.12.14-16.16.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-devel-4.12.14-16.16.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-syms-azure-4.12.14-16.16.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:01:36", "description": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\nCVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n\nCVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n\nCVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).\n\nCVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n\nCVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n\nCVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n\nCVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n\nCVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n\nCVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n\nCVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n\nCVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n\nCVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n\nCVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n\nCVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n\nCVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n\nCVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n\nCVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n\nCVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n\nCVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n\nCVE-2019-20806: Fixed a NULL pointer dereference which may had lead to denial of service (bsc#1172199).\n\nCVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n\nCVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-06-18T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:1605-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-1000199", "CVE-2019-19462", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-0543", "CVE-2020-10690", "CVE-2020-10711", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12656", "CVE-2020-12657", "CVE-2020-12768", "CVE-2020-12769", "CVE-2020-13143"], "modified": "2022-05-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-1605-1.NASL", "href": "https://www.tenable.com/plugins/nessus/137617", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:1605-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(137617);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/13\");\n\n script_cve_id(\n \"CVE-2018-1000199\",\n \"CVE-2019-9455\",\n \"CVE-2019-19462\",\n \"CVE-2019-20806\",\n \"CVE-2019-20812\",\n \"CVE-2020-0543\",\n \"CVE-2020-10690\",\n \"CVE-2020-10711\",\n \"CVE-2020-10720\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-10757\",\n \"CVE-2020-12114\",\n \"CVE-2020-12464\",\n \"CVE-2020-12652\",\n \"CVE-2020-12653\",\n \"CVE-2020-12654\",\n \"CVE-2020-12655\",\n \"CVE-2020-12656\",\n \"CVE-2020-12657\",\n \"CVE-2020-12768\",\n \"CVE-2020-12769\",\n \"CVE-2020-13143\"\n );\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:1605-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0543: Fixed a side channel attack against special registers\nwhich could have resulted in leaking of read values to cores other\nthan the one which called it. This attack is known as Special Register\nBuffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\nCVE-2020-13143: Fixed an out-of-bounds read in\ngadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c\n(bsc#1171982).\n\nCVE-2020-12769: Fixed an issue which could have allowed attackers to\ncause a panic via concurrent calls to dw_spi_irq and\ndw_spi_transfer_one (bsc#1171983).\n\nCVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in\narch/x86/kvm/svm.c (bsc#1171736).\n\nCVE-2020-12657: An a use-after-free in block/bfq-iosched.c\n(bsc#1171205).\n\nCVE-2020-12656: Fixed an improper handling of certain domain_release\ncalls leadingch could have led to a memory leak (bsc#1171219).\n\nCVE-2020-12655: Fixed an issue which could have allowed attackers to\ntrigger a sync of excessive duration via an XFS v5 image with crafted\nmetadata (bsc#1171217).\n\nCVE-2020-12654: Fixed an issue in he wifi driver which could have\nallowed a remote AP to trigger a heap-based buffer overflow\n(bsc#1171202).\n\nCVE-2020-12653: Fixed an issue in the wifi driver which could have\nallowed local users to gain privileges or cause a denial of service\n(bsc#1171195).\n\nCVE-2020-12652: Fixed an issue which could have allowed local users to\nhold an incorrect lock during the ioctl operation and trigger a race\ncondition (bsc#1171218).\n\nCVE-2020-12464: Fixed a use-after-free due to a transfer without a\nreference (bsc#1170901).\n\nCVE-2020-12114: Fixed a pivot_root race condition which could have\nallowed local users to cause a denial of service (panic) by corrupting\na mountpoint reference counter (bsc#1171098).\n\nCVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon\nmmap could have caused user PTE access (bsc#1172317).\n\nCVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\nwhere it was assumed that an skb would only contain a single netlink\nmessage (bsc#1171189).\n\nCVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\nuninitialized data (bsc#1171220).\n\nCVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n(bsc#1170778).\n\nCVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem\nwhich could have allowed a remote network user to crash the kernel\nresulting in a denial of service (bsc#1171191).\n\nCVE-2020-10690: Fixed the race between the release of ptp_clock and\ncdev (bsc#1170056).\n\nCVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\nvideo driver. This could lead to local information disclosure with\nSystem execution privileges needed (bsc#1170345).\n\nCVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which\ncould have resulted in a denial of service (bsc#1172453).\n\nCVE-2019-20806: Fixed a NULL pointer dereference which may had lead to\ndenial of service (bsc#1172199).\n\nCVE-2019-19462: Fixed an issue which could have allowed local user to\ncause denial of service (bsc#1158265).\n\nCVE-2018-1000199: Fixed a potential local code execution via ptrace\n(bsc#1089895).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1082555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1089895\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151794\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152489\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154824\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1157169\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158265\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160388\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160947\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165183\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165741\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166969\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167574\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167851\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168503\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168670\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169020\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169525\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170056\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170125\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170145\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170345\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170457\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170522\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170592\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170620\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170770\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170778\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170791\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170901\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171078\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171098\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171118\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171195\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171202\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171205\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171217\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171218\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171417\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171527\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171599\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171601\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171602\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171604\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171605\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171606\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171607\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171608\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171609\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171610\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171611\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171612\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171613\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171614\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171615\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171618\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171619\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171620\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171621\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171622\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171623\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171624\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171626\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171679\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171691\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171694\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171695\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171736\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171761\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171948\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171949\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171951\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171952\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171982\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172096\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172097\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172098\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172099\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172101\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172102\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172103\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172104\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172127\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172130\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172185\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172188\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172199\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172221\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172253\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172317\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172342\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172366\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172391\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172397\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172453\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-1000199/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19462/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20806/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20812/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-9455/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-0543/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10690/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10711/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10720/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10732/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10751/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10757/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12114/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12464/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12652/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12653/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12654/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12655/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12656/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12657/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12768/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12769/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13143/\");\n # https://www.suse.com/support/update/announcement/2020/suse-su-20201605-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?de301b80\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 12-SP4 :\n\nzypper in -t patch SUSE-SLE-WE-12-SP4-2020-1605=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP4 :\n\nzypper in -t patch SUSE-SLE-SDK-12-SP4-2020-1605=1\n\nSUSE Linux Enterprise Server 12-SP4 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP4-2020-1605=1\n\nSUSE Linux Enterprise Live Patching 12-SP4 :\n\nzypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2020-1605=1\n\nSUSE Linux Enterprise High Availability 12-SP4 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP4-2020-1605=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-12464\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-12657\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-devel-debuginfo-4.12.14-95.54.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-95.54.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-4.12.14-95.54.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-base-4.12.14-95.54.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-base-debuginfo-4.12.14-95.54.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-debuginfo-4.12.14-95.54.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-debugsource-4.12.14-95.54.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-devel-4.12.14-95.54.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-syms-4.12.14-95.54.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:01:35", "description": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\nCVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n\nCVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n\nCVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).\n\nCVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n\nCVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n\nCVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n\nCVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n\nCVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n\nCVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n\nCVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n\nCVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n\nCVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n\nCVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n\nCVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n\nCVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n\nCVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n\nCVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n\nCVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n\nCVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n\nCVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n\nCVE-2019-20806: Fixed a NULL pointer dereference which may had lead to denial of service (bsc#1172199).\n\nCVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n\nCVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895)\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-06-18T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:1599-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-1000199", "CVE-2019-19462", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-0543", "CVE-2020-10690", "CVE-2020-10711", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12656", "CVE-2020-12657", "CVE-2020-12659", "CVE-2020-12768", "CVE-2020-12769", "CVE-2020-13143"], "modified": "2022-05-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-1599-1.NASL", "href": "https://www.tenable.com/plugins/nessus/137613", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:1599-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(137613);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/13\");\n\n script_cve_id(\n \"CVE-2018-1000199\",\n \"CVE-2019-9455\",\n \"CVE-2019-19462\",\n \"CVE-2019-20806\",\n \"CVE-2019-20812\",\n \"CVE-2020-0543\",\n \"CVE-2020-10690\",\n \"CVE-2020-10711\",\n \"CVE-2020-10720\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-10757\",\n \"CVE-2020-12114\",\n \"CVE-2020-12464\",\n \"CVE-2020-12652\",\n \"CVE-2020-12653\",\n \"CVE-2020-12654\",\n \"CVE-2020-12655\",\n \"CVE-2020-12656\",\n \"CVE-2020-12657\",\n \"CVE-2020-12659\",\n \"CVE-2020-12768\",\n \"CVE-2020-12769\",\n \"CVE-2020-13143\"\n );\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:1599-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0543: Fixed a side channel attack against special registers\nwhich could have resulted in leaking of read values to cores other\nthan the one which called it. This attack is known as Special Register\nBuffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\nCVE-2020-13143: Fixed an out-of-bounds read in\ngadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c\n(bsc#1171982).\n\nCVE-2020-12769: Fixed an issue which could have allowed attackers to\ncause a panic via concurrent calls to dw_spi_irq and\ndw_spi_transfer_one (bsc#1171983).\n\nCVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in\narch/x86/kvm/svm.c (bsc#1171736).\n\nCVE-2020-12659: Fixed an out-of-bounds write (by a user with the\nCAP_NET_ADMIN capability) due to improper headroom validation\n(bsc#1171214).\n\nCVE-2020-12657: An a use-after-free in block/bfq-iosched.c\n(bsc#1171205).\n\nCVE-2020-12656: Fixed an improper handling of certain domain_release\ncalls leadingch could have led to a memory leak (bsc#1171219).\n\nCVE-2020-12655: Fixed an issue which could have allowed attackers to\ntrigger a sync of excessive duration via an XFS v5 image with crafted\nmetadata (bsc#1171217).\n\nCVE-2020-12654: Fixed an issue in he wifi driver which could have\nallowed a remote AP to trigger a heap-based buffer overflow\n(bsc#1171202).\n\nCVE-2020-12653: Fixed an issue in the wifi driver which could have\nallowed local users to gain privileges or cause a denial of service\n(bsc#1171195).\n\nCVE-2020-12652: Fixed an issue which could have allowed local users to\nhold an incorrect lock during the ioctl operation and trigger a race\ncondition (bsc#1171218).\n\nCVE-2020-12464: Fixed a use-after-free due to a transfer without a\nreference (bsc#1170901).\n\nCVE-2020-12114: Fixed a pivot_root race condition which could have\nallowed local users to cause a denial of service (panic) by corrupting\na mountpoint reference counter (bsc#1171098).\n\nCVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon\nmmap could have caused user PTE access (bsc#1172317).\n\nCVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\nwhere it was assumed that an skb would only contain a single netlink\nmessage (bsc#1171189).\n\nCVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\nuninitialized data (bsc#1171220).\n\nCVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n(bsc#1170778).\n\nCVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem\nwhich could have allowed a remote network user to crash the kernel\nresulting in a denial of service (bsc#1171191).\n\nCVE-2020-10690: Fixed the race between the release of ptp_clock and\ncdev (bsc#1170056).\n\nCVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\nvideo driver. This could lead to local information disclosure with\nSystem execution privileges needed (bsc#1170345).\n\nCVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which\ncould have resulted in a denial of service (bsc#1172453).\n\nCVE-2019-20806: Fixed a NULL pointer dereference which may had lead to\ndenial of service (bsc#1172199).\n\nCVE-2019-19462: Fixed an issue which could have allowed local user to\ncause denial of service (bsc#1158265).\n\nCVE-2018-1000199: Fixed a potential local code execution via ptrace\n(bsc#1089895)\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1082555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083647\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1089895\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103990\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103991\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103992\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104745\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109837\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124278\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127354\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127355\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127371\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1142685\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151794\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152489\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154824\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1157169\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158265\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160388\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160947\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164871\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165183\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165478\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165741\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166969\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166978\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167574\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167851\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167867\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168332\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168670\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168789\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169020\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169525\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169762\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170056\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170125\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170145\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170345\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170457\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170522\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170592\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170620\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170621\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170770\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170778\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170791\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170901\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171078\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171098\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171118\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171195\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171202\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171205\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171214\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171217\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171218\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171244\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171417\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171527\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171599\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171601\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171602\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171604\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171605\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171606\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171607\");\n script_set_attribute(attribute:\"see_also\", value:\&qu