The SUSE Linux Enterprise 12 SP 2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed :
CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)
CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses.
Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace. (bnc#)
CVE-2019-10126: A flaw was found in the Linux kernel that might lead to memory corruption in the marvell mwifiex driver. (bnc#1136935)
CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
(bnc#1134395)
CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.
(bnc#1133738)
CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
(bnc#)
CVE-2019-12818: An issue was discovered in the Linux kernel The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c. (bnc#1137194)
CVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() in drivers/net/phy/mdio_bus.c called put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bnc#1138291)
CVE-2019-12456 a double-fetch bug in _ctl_ioctl_main() could allow local users to create a denial of service (bsc#1136922).
CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures.
NOTE: This id is disputed as not being an issue because All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it. (bnc#)
CVE-2019-11487: The Linux kernel allowed page-_refcount reference count to overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests. (bnc#1133190)
The update package also includes non-security fixes. See advisory for details.
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
{"id": "SUSE_SU-2019-1823-1.NASL", "vendorId": null, "type": "nessus", "bulletinFamily": "scanner", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1823-1)", "description": "The SUSE Linux Enterprise 12 SP 2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)\n\nCVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses.\nForcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace. (bnc#)\n\nCVE-2019-10126: A flaw was found in the Linux kernel that might lead to memory corruption in the marvell mwifiex driver. (bnc#1136935)\n\nCVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.\n(bnc#1134395)\n\nCVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.\n(bnc#1133738)\n\nCVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).\n(bnc#)\n\nCVE-2019-12818: An issue was discovered in the Linux kernel The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c. (bnc#1137194)\n\nCVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() in drivers/net/phy/mdio_bus.c called put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bnc#1138291)\n\nCVE-2019-12456 a double-fetch bug in _ctl_ioctl_main() could allow local users to create a denial of service (bsc#1136922).\n\nCVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures.\nNOTE: This id is disputed as not being an issue because All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it. (bnc#)\n\nCVE-2019-11487: The Linux kernel allowed page-_refcount reference count to overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests. (bnc#1133190)\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2019-07-15T00:00:00", "modified": "2022-05-19T00:00:00", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.3}, "severity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, "href": "https://www.tenable.com/plugins/nessus/126688", "reporter": "This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://www.suse.com/security/cve/CVE-2019-10638/", "https://www.suse.com/security/cve/CVE-2019-10639/", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599", "https://bugzilla.suse.com/show_bug.cgi?id=1140575", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12818", "https://www.suse.com/security/cve/CVE-2019-12819/", "https://bugzilla.suse.com/show_bug.cgi?id=1109137", "https://www.suse.com/security/cve/CVE-2019-12456/", "https://bugzilla.suse.com/show_bug.cgi?id=1136935", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638", "https://bugzilla.suse.com/show_bug.cgi?id=1108382", "https://bugzilla.suse.com/show_bug.cgi?id=1127155", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614", "https://bugzilla.suse.com/show_bug.cgi?id=1133738", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12819", "https://www.suse.com/security/cve/CVE-2019-11487/", "https://www.suse.com/security/cve/CVE-2019-12614/", "http://www.nessus.org/u?f1e15fc1", "https://www.suse.com/security/cve/CVE-2019-12818/", "https://bugzilla.suse.com/show_bug.cgi?id=1138291", "https://bugzilla.suse.com/show_bug.cgi?id=1133190", "https://www.suse.com/security/cve/CVE-2019-10126/", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836", "https://www.suse.com/security/cve/CVE-2019-12380/", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12456", "https://bugzilla.suse.com/show_bug.cgi?id=1096254", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126", "https://bugzilla.suse.com/show_bug.cgi?id=1134701", "https://bugzilla.suse.com/show_bug.cgi?id=1136922", "https://www.suse.com/security/cve/CVE-2018-20836/", "https://bugzilla.suse.com/show_bug.cgi?id=1137194", "https://bugzilla.suse.com/show_bug.cgi?id=1134395", "https://www.suse.com/security/cve/CVE-2019-11599/"], "cvelist": ["CVE-2018-20836", "CVE-2019-10126", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11487", "CVE-2019-11599", "CVE-2019-12380", "CVE-2019-12456", "CVE-2019-12614", "CVE-2019-12818", "CVE-2019-12819"], "immutableFields": [], "lastseen": "2023-01-11T15:20:56", "viewCount": 36, "enchantments": {"dependencies": {"references": [{"type": "almalinux", "idList": ["ALSA-2020:4431"]}, {"type": "amazon", "idList": ["ALAS-2019-1232", "ALAS2-2019-1232"]}, {"type": "androidsecurity", "idList": ["ANDROID:2020-02-01"]}, {"type": "avleonov", "idList": ["AVLEONOV:317FBD7DA93C95993A9FFF38FB04A987"]}, {"type": "centos", "idList": ["CESA-2019:2029", "CESA-2019:3055", "CESA-2020:0374", "CESA-2020:0375", "CESA-2020:0839", "CESA-2020:1016", "CESA-2020:4060", "CESA-2020:4182"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:3CD9371F7B812821D289B3B89526722F", "CFOUNDRY:40058483A2E2195544934D494FF464F7", "CFOUNDRY:5D359B30C62666D917EB31596D1BFDE4", "CFOUNDRY:A005A5D22D18F966EBF6C011F833E895", "CFOUNDRY:BD71AB043932448695E8B3D20302D582"]}, {"type": "cve", "idList": ["CVE-2018-20836", "CVE-2019-10126", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11487", "CVE-2019-11599", "CVE-2019-12380", "CVE-2019-12456", "CVE-2019-12614", "CVE-2019-12818", "CVE-2019-12819", "CVE-2019-14898", "CVE-2019-3892"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1799-1:F9D71", "DEBIAN:DLA-1799-2:074DF", "DEBIAN:DLA-1823-1:39845", "DEBIAN:DLA-1824-1:6789E", "DEBIAN:DLA-1862-1:8E150", "DEBIAN:DLA-1884-1:61F35", "DEBIAN:DLA-1885-1:84558", "DEBIAN:DLA-1919-1:239EC", "DEBIAN:DLA-1919-2:858F8", "DEBIAN:DSA-4465-1:304F1", "DEBIAN:DSA-4465-1:DDE47", "DEBIAN:DSA-4495-1:1269E", "DEBIAN:DSA-4495-1:258DC", "DEBIAN:DSA-4497-1:7E46B", "DEBIAN:DSA-4497-1:F2AF4"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2018-20836", "DEBIANCVE:CVE-2019-10126", "DEBIANCVE:CVE-2019-10638", "DEBIANCVE:CVE-2019-10639", "DEBIANCVE:CVE-2019-11487", "DEBIANCVE:CVE-2019-11599", "DEBIANCVE:CVE-2019-12380", "DEBIANCVE:CVE-2019-12456", "DEBIANCVE:CVE-2019-12614", "DEBIANCVE:CVE-2019-12818", "DEBIANCVE:CVE-2019-12819", "DEBIANCVE:CVE-2019-14898"]}, {"type": "f5", "idList": ["F5:K11225249", "F5:K14255532", "F5:K24249971", "F5:K32804955", "F5:K50315101", "F5:K51674118", "F5:K54337315", "F5:K84310302", "F5:K91444306", "F5:K95593121"]}, {"type": "fedora", "idList": ["FEDORA:03DA06180ED3", "FEDORA:041196190421", "FEDORA:04868606351B", "FEDORA:07B5A6CB4421", "FEDORA:1BD5B6389B47", "FEDORA:2836F613193B", "FEDORA:344346042F3E", "FEDORA:3A3766C5B5A2", "FEDORA:3A69E60B3E88", "FEDORA:4002B609954A", "FEDORA:4CEF5610D7CA", "FEDORA:4F21B6125E50", "FEDORA:511986124F82", "FEDORA:511A7608E6E1", "FEDORA:54AA460F2356", "FEDORA:59E3F606D998", "FEDORA:5A4D662AE22C", "FEDORA:5BC786077CC2", "FEDORA:6B43460C450E", "FEDORA:6E67663233DB", "FEDORA:754F860A98ED", "FEDORA:84FBF6179A05", "FEDORA:9801060D30FA", "FEDORA:98E8F6079A11", "FEDORA:AFCD261367A6", "FEDORA:BF5EC607125E", "FEDORA:C0A4560C423F", "FEDORA:C1EA6603ECEC", "FEDORA:C4D496071279", "FEDORA:C63656040AE1", "FEDORA:C6AF860C4240", "FEDORA:C7391611860D", "FEDORA:CB0956087865", "FEDORA:D3523607924A"]}, {"type": "ibm", "idList": ["2FE97BC0DB8A3B1BCF85FF8F69828770D4396C7CC3ABD37202D8089D2CADF87B", "4BB2759DF5CBB6BF54A7D60BF1046942C755D661255DAAC4EF3C0614D1A3AF9A", "5C971ABE298E715E4DD664F197820425272400B40C52EF433CFD40BAFACB63C8", "65AC1B828E41A5505E1A8E4F6E7E2E7A2BE86DE58C539C97379A40C7ED8BBD9F", "6CB4EF3A076E2190B30084083521AA008A1E2F799850D429F0737446D33988B3", "86C7951371BC0A7800D1FEBC038565FA28DED7D904E47462C3F5395FDE8AB9C9", "8B24753FF8758BF51E7C6001AC39E0EF90B14323A9756CCEF8AC68E99EF03367", "9148A44BD9A1C1A13CCEBD8F0346557CF005830103920CDDC01519240525CB58", "9EAED1F5FB3762874ED935AF686A504F1630ADB20AA5EBFAE97EAEEEA4C0DAF8", "A5A892259BF44584524D97B2CB83E9150F24F7E5C20081122730CDDBEA729805", "B599429672D35F0898136CCC25113D8FA5E242634C8CEB73C87851525F0DA4BB", "B947805A29EE83AAAED8ABADDD8CFF00AA389BFC4D7DDC49FC3A89A557DD856C"]}, {"type": "lenovo", "idList": ["LENOVO:PS500321-NOSID"]}, {"type": "mageia", "idList": ["MGASA-2019-0170", "MGASA-2019-0171", "MGASA-2019-0172"]}, {"type": "nessus", "idList": ["AL2_ALAS-2019-1232.NASL", "ALA_ALAS-2019-1232.NASL", "ALMA_LINUX_ALSA-2020-4431.NASL", "CENTOS8_RHSA-2019-2703.NASL", "CENTOS8_RHSA-2019-3517.NASL", "CENTOS8_RHSA-2020-0339.NASL", "CENTOS8_RHSA-2020-1769.NASL", "CENTOS8_RHSA-2020-4431.NASL", "CENTOS_RHSA-2019-2029.NASL", "CENTOS_RHSA-2019-3055.NASL", "CENTOS_RHSA-2020-0374.NASL", "CENTOS_RHSA-2020-0375.NASL", "CENTOS_RHSA-2020-0839.NASL", "CENTOS_RHSA-2020-1016.NASL", "CENTOS_RHSA-2020-4060.NASL", "CENTOS_RHSA-2020-4182.NASL", "DEBIAN_DLA-1799.NASL", "DEBIAN_DLA-1823.NASL", "DEBIAN_DLA-1824.NASL", "DEBIAN_DLA-1862.NASL", "DEBIAN_DLA-1884.NASL", "DEBIAN_DLA-1885.NASL", "DEBIAN_DLA-1919.NASL", "DEBIAN_DSA-4465.NASL", "DEBIAN_DSA-4495.NASL", "DEBIAN_DSA-4497.NASL", "EULEROS_SA-2019-1588.NASL", "EULEROS_SA-2019-1612.NASL", "EULEROS_SA-2019-1635.NASL", "EULEROS_SA-2019-1639.NASL", "EULEROS_SA-2019-1671.NASL", "EULEROS_SA-2019-1672.NASL", "EULEROS_SA-2019-1793.NASL", "EULEROS_SA-2019-1813.NASL", "EULEROS_SA-2019-1847.NASL", "EULEROS_SA-2019-1919.NASL", "EULEROS_SA-2019-1926.NASL", "EULEROS_SA-2019-2068.NASL", "EULEROS_SA-2019-2201.NASL", "EULEROS_SA-2019-2274.NASL", "EULEROS_SA-2019-2353.NASL", "EULEROS_SA-2019-2531.NASL", "EULEROS_SA-2020-1186.NASL", "EULEROS_SA-2020-1396.NASL", "EULEROS_SA-2020-1452.NASL", "EULEROS_SA-2020-1606.NASL", "EULEROS_SA-2020-1674.NASL", "EULEROS_SA-2021-1056.NASL", "EULEROS_SA-2021-1808.NASL", "F5_BIGIP_SOL32804955.NASL", "F5_BIGIP_SOL51674118.NASL", "FEDORA_2019-7EC378191E.NASL", "FEDORA_2019-83858FC57B.NASL", "FEDORA_2019-C03EDA3CC6.NASL", "FEDORA_2019-F40BD7826F.NASL", "NEWSTART_CGSL_NS-SA-2019-0180_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0183_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2019-0221_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0222_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2019-0247_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0253_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2019-0264_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0266_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2020-0108_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0117_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2022-0002_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0075_KERNEL.NASL", "NUTANIX_NXSA-AOS-5_11_3.NASL", "NUTANIX_NXSA-AOS-5_15_1.NASL", "NUTANIX_NXSA-AOS-5_15_3.NASL", "NUTANIX_NXSA-AOS-5_15_5.NASL", "NUTANIX_NXSA-AOS-5_16_0_1.NASL", "NUTANIX_NXSA-AOS-5_16_1.NASL", "NUTANIX_NXSA-AOS-5_16_1_1.NASL", "NUTANIX_NXSA-AOS-5_16_1_3.NASL", "NUTANIX_NXSA-AOS-5_17.NASL", "NUTANIX_NXSA-AOS-5_17_0_3.NASL", "NUTANIX_NXSA-AOS-5_17_1.NASL", "NUTANIX_NXSA-AOS-5_18.NASL", "NUTANIX_NXSA-AOS-5_19_0_5.NASL", "NUTANIX_NXSA-AOS-5_19_1.NASL", "OPENSUSE-2019-1570.NASL", "OPENSUSE-2019-1571.NASL", "OPENSUSE-2019-1579.NASL", "OPENSUSE-2019-1716.NASL", "OPENSUSE-2019-1757.NASL", "ORACLELINUX_ELSA-2019-2703.NASL", "ORACLELINUX_ELSA-2019-3055.NASL", "ORACLELINUX_ELSA-2019-4670.NASL", "ORACLELINUX_ELSA-2019-4685.NASL", "ORACLELINUX_ELSA-2020-0339.NASL", "ORACLELINUX_ELSA-2020-0374.NASL", "ORACLELINUX_ELSA-2020-0834.NASL", "ORACLELINUX_ELSA-2020-5708.NASL", "ORACLELINUX_ELSA-2020-5715.NASL", "ORACLELINUX_ELSA-2020-5837.NASL", "ORACLELINUX_ELSA-2020-5845.NASL", "ORACLELINUX_ELSA-2020-5866.NASL", "ORACLEVM_OVMSA-2019-0024.NASL", "ORACLEVM_OVMSA-2020-0020.NASL", "ORACLEVM_OVMSA-2020-0041.NASL", "ORACLEVM_OVMSA-2020-0044.NASL", "PHOTONOS_PHSA-2019-1_0-0235_LINUX.NASL", "PHOTONOS_PHSA-2019-1_0-0236_LINUX.NASL", "PHOTONOS_PHSA-2019-1_0-0240_LINUX.NASL", "PHOTONOS_PHSA-2019-1_0-0251_LINUX.NASL", "PHOTONOS_PHSA-2019-2_0-0160_LINUX.NASL", "PHOTONOS_PHSA-2019-2_0-0165_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0015_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0026_LINUX.NASL", "REDHAT-RHSA-2019-2029.NASL", "REDHAT-RHSA-2019-2043.NASL", "REDHAT-RHSA-2019-2703.NASL", "REDHAT-RHSA-2019-2741.NASL", "REDHAT-RHSA-2019-3055.NASL", "REDHAT-RHSA-2019-3076.NASL", "REDHAT-RHSA-2019-3089.NASL", "REDHAT-RHSA-2019-3309.NASL", "REDHAT-RHSA-2019-3517.NASL", "REDHAT-RHSA-2020-0100.NASL", "REDHAT-RHSA-2020-0103.NASL", "REDHAT-RHSA-2020-0174.NASL", "REDHAT-RHSA-2020-0179.NASL", "REDHAT-RHSA-2020-0204.NASL", "REDHAT-RHSA-2020-0328.NASL", "REDHAT-RHSA-2020-0339.NASL", "REDHAT-RHSA-2020-0374.NASL", "REDHAT-RHSA-2020-0375.NASL", "REDHAT-RHSA-2020-0543.NASL", "REDHAT-RHSA-2020-0834.NASL", "REDHAT-RHSA-2020-0839.NASL", "REDHAT-RHSA-2020-1016.NASL", "REDHAT-RHSA-2020-1070.NASL", "REDHAT-RHSA-2020-1567.NASL", "REDHAT-RHSA-2020-1769.NASL", "REDHAT-RHSA-2020-2104.NASL", "REDHAT-RHSA-2020-2289.NASL", "REDHAT-RHSA-2020-2522.NASL", "REDHAT-RHSA-2020-2851.NASL", "REDHAT-RHSA-2020-3230.NASL", "REDHAT-RHSA-2020-3266.NASL", "REDHAT-RHSA-2020-4060.NASL", "REDHAT-RHSA-2020-4062.NASL", "REDHAT-RHSA-2020-4182.NASL", "REDHAT-RHSA-2020-4431.NASL", "REDHAT-RHSA-2020-5656.NASL", "REDHAT-RHSA-2021-0019.NASL", "SLACKWARE_SSA_2019-169-01.NASL", "SLACKWARE_SSA_2019-202-01.NASL", "SLACKWARE_SSA_2019-311-01.NASL", "SLACKWARE_SSA_2020-008-01.NASL", "SLACKWARE_SSA_2020-086-01.NASL", "SL_20190806_KERNEL_ON_SL7_X.NASL", "SL_20191016_KERNEL_ON_SL7_X.NASL", "SL_20200205_KERNEL_ON_SL7_X.NASL", "SL_20200317_KERNEL_ON_SL7_X.NASL", "SL_20200407_KERNEL_ON_SL7_X.NASL", "SL_20201001_KERNEL_ON_SL7_X.NASL", "SL_20201012_KERNEL_ON_SL6_X.NASL", "SUSE_SU-2019-14127-1.NASL", "SUSE_SU-2019-1529-1.NASL", "SUSE_SU-2019-1530-1.NASL", "SUSE_SU-2019-1535-1.NASL", "SUSE_SU-2019-1536-1.NASL", "SUSE_SU-2019-1550-1.NASL", "SUSE_SU-2019-1668-1.NASL", "SUSE_SU-2019-1671-1.NASL", "SUSE_SU-2019-1744-1.NASL", "SUSE_SU-2019-1767-1.NASL", "SUSE_SU-2019-1829-1.NASL", "SUSE_SU-2019-1851-1.NASL", "SUSE_SU-2019-1852-1.NASL", "SUSE_SU-2019-1854-1.NASL", "SUSE_SU-2019-1855-1.NASL", "SUSE_SU-2019-1870-1.NASL", "SUSE_SU-2019-2430-1.NASL", "SUSE_SU-2019-2821-1.NASL", "SUSE_SU-2020-1118-1.NASL", "SUSE_SU-2020-1142-1.NASL", "SUSE_SU-2020-14354-1.NASL", "UBUNTU_USN-4069-1.NASL", "UBUNTU_USN-4069-2.NASL", "UBUNTU_USN-4076-1.NASL", "UBUNTU_USN-4093-1.NASL", "UBUNTU_USN-4094-1.NASL", "UBUNTU_USN-4095-1.NASL", "UBUNTU_USN-4114-1.NASL", "UBUNTU_USN-4115-1.NASL", "UBUNTU_USN-4115-2.NASL", "UBUNTU_USN-4116-1.NASL", "UBUNTU_USN-4117-1.NASL", "UBUNTU_USN-4118-1.NASL", "UBUNTU_USN-4145-1.NASL", "UBUNTU_USN-4414-1.NASL", "UBUNTU_USN-4427-1.NASL", "UBUNTU_USN-4439-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310704465", "OPENVAS:1361412562310704495", "OPENVAS:1361412562310704497", "OPENVAS:1361412562310844102", "OPENVAS:1361412562310844111", "OPENVAS:1361412562310844121", "OPENVAS:1361412562310844131", "OPENVAS:1361412562310844133", "OPENVAS:1361412562310844134", "OPENVAS:1361412562310844156", "OPENVAS:1361412562310844157", "OPENVAS:1361412562310844158", "OPENVAS:1361412562310844159", "OPENVAS:1361412562310844160", "OPENVAS:1361412562310844174", "OPENVAS:1361412562310844192", "OPENVAS:1361412562310844482", "OPENVAS:1361412562310852568", "OPENVAS:1361412562310852570", "OPENVAS:1361412562310852611", "OPENVAS:1361412562310852917", "OPENVAS:1361412562310852928", "OPENVAS:1361412562310876466", "OPENVAS:1361412562310876467", "OPENVAS:1361412562310876476", "OPENVAS:1361412562310876477", "OPENVAS:1361412562310876479", "OPENVAS:1361412562310876484", "OPENVAS:1361412562310876488", "OPENVAS:1361412562310876489", "OPENVAS:1361412562310876510", "OPENVAS:1361412562310876515", "OPENVAS:1361412562310876543", "OPENVAS:1361412562310876555", "OPENVAS:1361412562310876586", "OPENVAS:1361412562310876611", "OPENVAS:1361412562310876621", "OPENVAS:1361412562310876638", "OPENVAS:1361412562310876653", "OPENVAS:1361412562310876666", "OPENVAS:1361412562310876750", "OPENVAS:1361412562310876753", "OPENVAS:1361412562310876809", "OPENVAS:1361412562310876841", "OPENVAS:1361412562310876869", "OPENVAS:1361412562310876925", "OPENVAS:1361412562310876943", "OPENVAS:1361412562310876995", "OPENVAS:1361412562310876999", "OPENVAS:1361412562310877052", "OPENVAS:1361412562310877058", "OPENVAS:1361412562310877070", "OPENVAS:1361412562310877370", "OPENVAS:1361412562310877476", "OPENVAS:1361412562310877540", "OPENVAS:1361412562310883117", "OPENVAS:1361412562310883179", "OPENVAS:1361412562310883191", "OPENVAS:1361412562310883210", "OPENVAS:1361412562310891799", "OPENVAS:1361412562310891823", "OPENVAS:1361412562310891824", "OPENVAS:1361412562310891862", "OPENVAS:1361412562310891884", "OPENVAS:1361412562310891885", "OPENVAS:1361412562310891919", "OPENVAS:1361412562311220191588", "OPENVAS:1361412562311220191612", "OPENVAS:1361412562311220191635", "OPENVAS:1361412562311220191639", "OPENVAS:1361412562311220191671", "OPENVAS:1361412562311220191672", "OPENVAS:1361412562311220191793", "OPENVAS:1361412562311220191813", "OPENVAS:1361412562311220191847", "OPENVAS:1361412562311220191919", "OPENVAS:1361412562311220191926", "OPENVAS:1361412562311220192068", "OPENVAS:1361412562311220192201", "OPENVAS:1361412562311220192274", "OPENVAS:1361412562311220192353", "OPENVAS:1361412562311220192531", "OPENVAS:1361412562311220201186", "OPENVAS:1361412562311220201396", "OPENVAS:1361412562311220201452", "OPENVAS:1361412562311220201606"]}, {"type": "oracle", "idList": ["ORACLE:CPUAPR2021"]}, {"type": "oraclelinux", "idList": ["ELSA-2019-2029", "ELSA-2019-2703", "ELSA-2019-3055", "ELSA-2019-3517", "ELSA-2019-4670", "ELSA-2019-4685", "ELSA-2020-0834", "ELSA-2020-1016", "ELSA-2020-1769", "ELSA-2020-4060", "ELSA-2020-4182", "ELSA-2020-4431", "ELSA-2020-5708", "ELSA-2020-5715", "ELSA-2020-5837", "ELSA-2020-5845", "ELSA-2020-5866", "ELSA-2020-5913", "ELSA-2020-5923", "ELSA-2020-5924"]}, {"type": "osv", "idList": ["OSV:DLA-1799-1", "OSV:DLA-1823-1", "OSV:DLA-1824-1", "OSV:DLA-1862-1", "OSV:DLA-1884-1", "OSV:DLA-1885-1", "OSV:DLA-1919-1", "OSV:DSA-4465-1", "OSV:DSA-4495-1", "OSV:DSA-4497-1"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:152663"]}, {"type": "photon", "idList": ["PHSA-2019-0007", "PHSA-2019-0009", "PHSA-2019-0015", "PHSA-2019-0021", "PHSA-2019-0026", "PHSA-2019-0142", "PHSA-2019-0147", "PHSA-2019-0160", "PHSA-2019-0161", "PHSA-2019-0165", "PHSA-2019-0178", "PHSA-2019-0221", "PHSA-2019-0235", "PHSA-2019-0236", "PHSA-2019-0240", "PHSA-2019-0250", "PHSA-2019-0251", "PHSA-2019-1.0-0235", "PHSA-2019-1.0-0236", "PHSA-2019-1.0-0240", "PHSA-2019-1.0-0248", "PHSA-2019-1.0-0251", "PHSA-2019-2.0-0160", "PHSA-2019-2.0-0161", "PHSA-2019-2.0-0165", "PHSA-2019-3.0-0015", "PHSA-2019-3.0-0021", "PHSA-2019-3.0-0026"]}, {"type": "redhat", "idList": ["RHSA-2019:2029", "RHSA-2019:2043", "RHSA-2019:2703", "RHSA-2019:2741", "RHSA-2019:3055", "RHSA-2019:3076", "RHSA-2019:3089", "RHSA-2019:3309", "RHSA-2019:3517", "RHSA-2020:0100", "RHSA-2020:0103", "RHSA-2020:0174", "RHSA-2020:0179", "RHSA-2020:0204", "RHSA-2020:0328", "RHSA-2020:0339", "RHSA-2020:0374", "RHSA-2020:0375", "RHSA-2020:0543", "RHSA-2020:0834", "RHSA-2020:0839", "RHSA-2020:1016", "RHSA-2020:1070", "RHSA-2020:1567", "RHSA-2020:1769", "RHSA-2020:2104", "RHSA-2020:2289", "RHSA-2020:2522", "RHSA-2020:2851", "RHSA-2020:3230", "RHSA-2020:3266", "RHSA-2020:4060", "RHSA-2020:4062", "RHSA-2020:4182", "RHSA-2020:4431", "RHSA-2020:5633", "RHSA-2020:5656", "RHSA-2021:0019"]}, {"type": "redhatcve", "idList": ["RH:CVE-2018-20836", "RH:CVE-2019-10126", "RH:CVE-2019-10638", "RH:CVE-2019-10639", "RH:CVE-2019-11487", "RH:CVE-2019-11599", "RH:CVE-2019-12380", "RH:CVE-2019-12456", "RH:CVE-2019-12614", "RH:CVE-2019-12818", "RH:CVE-2019-12819", "RH:CVE-2019-14898", "RH:CVE-2019-3892"]}, {"type": "slackware", "idList": ["SSA-2019-169-01", "SSA-2019-202-01", "SSA-2019-311-01", "SSA-2020-008-01", "SSA-2020-086-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:1570-1", "OPENSUSE-SU-2019:1571-1", "OPENSUSE-SU-2019:1579-1", "OPENSUSE-SU-2019:1716-1", "OPENSUSE-SU-2019:1757-1"]}, {"type": "ubuntu", "idList": ["USN-4069-1", "USN-4069-2", "USN-4076-1", "USN-4093-1", "USN-4094-1", "USN-4095-1", "USN-4095-2", "USN-4114-1", "USN-4115-1", "USN-4115-2", "USN-4116-1", "USN-4117-1", "USN-4118-1", "USN-4145-1", "USN-4414-1", "USN-4427-1", "USN-4439-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-20836", "UB:CVE-2019-10126", "UB:CVE-2019-10638", "UB:CVE-2019-10639", "UB:CVE-2019-11487", "UB:CVE-2019-11599", "UB:CVE-2019-12380", "UB:CVE-2019-12456", "UB:CVE-2019-12614", "UB:CVE-2019-12818", "UB:CVE-2019-12819", "UB:CVE-2019-14898"]}, {"type": "veracode", "idList": ["VERACODE:21062", "VERACODE:21703", "VERACODE:21820", "VERACODE:22470", "VERACODE:27313", "VERACODE:27693", "VERACODE:27799"]}, {"type": "virtuozzo", "idList": ["VZA-2021-040"]}, {"type": "zdt", "idList": ["1337DAY-ID-32619"]}]}, "score": {"value": 0.2, "vector": "NONE"}, "backreferences": {"references": [{"type": "almalinux", "idList": ["ALSA-2020:4431"]}, {"type": "amazon", "idList": ["ALAS-2019-1232"]}, {"type": "androidsecurity", "idList": ["ANDROID:2020-02-01"]}, {"type": "centos", "idList": ["CESA-2019:2029", "CESA-2019:3055", "CESA-2020:0374"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:3CD9371F7B812821D289B3B89526722F", "CFOUNDRY:40058483A2E2195544934D494FF464F7", "CFOUNDRY:A005A5D22D18F966EBF6C011F833E895", "CFOUNDRY:BD71AB043932448695E8B3D20302D582"]}, {"type": "cve", "idList": ["CVE-2018-20836", "CVE-2019-10126", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11487", "CVE-2019-11599", "CVE-2019-12380", "CVE-2019-12456", "CVE-2019-12614", "CVE-2019-12818", "CVE-2019-12819"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1799-1:F9D71", "DEBIAN:DLA-1799-2:074DF", "DEBIAN:DLA-1823-1:39845", "DEBIAN:DLA-1824-1:6789E", "DEBIAN:DLA-1862-1:8E150", "DEBIAN:DLA-1884-1:61F35", "DEBIAN:DLA-1885-1:84558", "DEBIAN:DLA-1919-1:239EC", "DEBIAN:DLA-1919-2:858F8", "DEBIAN:DSA-4465-1:304F1", "DEBIAN:DSA-4495-1:1269E", "DEBIAN:DSA-4497-1:7E46B"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2018-20836", "DEBIANCVE:CVE-2019-10126", "DEBIANCVE:CVE-2019-10638", "DEBIANCVE:CVE-2019-10639", "DEBIANCVE:CVE-2019-11487", "DEBIANCVE:CVE-2019-11599", "DEBIANCVE:CVE-2019-12380", "DEBIANCVE:CVE-2019-12456", "DEBIANCVE:CVE-2019-12614", "DEBIANCVE:CVE-2019-12818", "DEBIANCVE:CVE-2019-12819"]}, {"type": "f5", "idList": ["F5:K11225249", "F5:K14255532", "F5:K32804955", "F5:K51674118", "F5:K54337315", "F5:K84310302", "F5:K91444306", "F5:K95593121"]}, {"type": "fedora", "idList": ["FEDORA:03DA06180ED3", "FEDORA:041196190421", "FEDORA:04868606351B", "FEDORA:07B5A6CB4421", "FEDORA:1BD5B6389B47", "FEDORA:2836F613193B", "FEDORA:344346042F3E", "FEDORA:3A3766C5B5A2", "FEDORA:3A69E60B3E88", "FEDORA:4002B609954A", "FEDORA:4CEF5610D7CA", "FEDORA:4F21B6125E50", "FEDORA:511986124F82", "FEDORA:511A7608E6E1", "FEDORA:54AA460F2356", "FEDORA:59E3F606D998", "FEDORA:5A4D662AE22C", "FEDORA:5BC786077CC2", "FEDORA:6B43460C450E", "FEDORA:6E67663233DB", "FEDORA:754F860A98ED", "FEDORA:84FBF6179A05", "FEDORA:9801060D30FA", "FEDORA:98E8F6079A11", "FEDORA:AFCD261367A6", "FEDORA:BF5EC607125E", "FEDORA:C0A4560C423F", "FEDORA:C1EA6603ECEC", "FEDORA:C4D496071279", "FEDORA:C63656040AE1", "FEDORA:C6AF860C4240", "FEDORA:C7391611860D", "FEDORA:CB0956087865", "FEDORA:D3523607924A"]}, {"type": "ibm", "idList": ["5C971ABE298E715E4DD664F197820425272400B40C52EF433CFD40BAFACB63C8", "86C7951371BC0A7800D1FEBC038565FA28DED7D904E47462C3F5395FDE8AB9C9", "A5A892259BF44584524D97B2CB83E9150F24F7E5C20081122730CDDBEA729805"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/CENTOS_LINUX-CVE-2019-11487/", "MSF:ILITIES/ORACLE_LINUX-CVE-2020-10742/", "MSF:ILITIES/UBUNTU-CVE-2019-11487/"]}, {"type": "nessus", "idList": ["AL2_ALAS-2019-1232.NASL", "ALA_ALAS-2019-1232.NASL", "CENTOS_RHSA-2019-2029.NASL", "CENTOS_RHSA-2019-3055.NASL", "DEBIAN_DLA-1799.NASL", "DEBIAN_DLA-1823.NASL", "DEBIAN_DLA-1824.NASL", "DEBIAN_DLA-1862.NASL", "DEBIAN_DLA-1884.NASL", "DEBIAN_DLA-1885.NASL", "DEBIAN_DLA-1919.NASL", "DEBIAN_DSA-4465.NASL", "DEBIAN_DSA-4495.NASL", "DEBIAN_DSA-4497.NASL", "EULEROS_SA-2019-1588.NASL", "EULEROS_SA-2019-1612.NASL", "EULEROS_SA-2019-1639.NASL", "EULEROS_SA-2019-1671.NASL", "EULEROS_SA-2019-1672.NASL", "EULEROS_SA-2019-1793.NASL", "EULEROS_SA-2019-1813.NASL", "EULEROS_SA-2019-1847.NASL", "EULEROS_SA-2019-1919.NASL", "EULEROS_SA-2019-1926.NASL", "EULEROS_SA-2019-2068.NASL", "FEDORA_2019-7EC378191E.NASL", "FEDORA_2019-83858FC57B.NASL", "FEDORA_2019-C03EDA3CC6.NASL", "FEDORA_2019-F40BD7826F.NASL", "PHOTONOS_PHSA-2019-1_0-0235_LINUX.NASL", "PHOTONOS_PHSA-2019-1_0-0236_LINUX.NASL", "PHOTONOS_PHSA-2019-1_0-0240_LINUX.NASL", "PHOTONOS_PHSA-2019-1_0-0251_LINUX.NASL", "PHOTONOS_PHSA-2019-2_0-0160_LINUX.NASL", "PHOTONOS_PHSA-2019-2_0-0165_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0015_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0026_LINUX.NASL", "REDHAT-RHSA-2020-0543.NASL", "REDHAT-RHSA-2020-0834.NASL", "REDHAT-RHSA-2020-5656.NASL", "SLACKWARE_SSA_2019-169-01.NASL", "SLACKWARE_SSA_2019-202-01.NASL", "SL_20200317_KERNEL_ON_SL7_X.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310704465", "OPENVAS:1361412562310704495", "OPENVAS:1361412562310844102", "OPENVAS:1361412562310844111", "OPENVAS:1361412562310844121", "OPENVAS:1361412562310844131", "OPENVAS:1361412562310844133", "OPENVAS:1361412562310844134", "OPENVAS:1361412562310844156", "OPENVAS:1361412562310844157", "OPENVAS:1361412562310844158", "OPENVAS:1361412562310844159", "OPENVAS:1361412562310844160", "OPENVAS:1361412562310844174", "OPENVAS:1361412562310844192", "OPENVAS:1361412562310852568", "OPENVAS:1361412562310852570", "OPENVAS:1361412562310852611", "OPENVAS:1361412562310876466", "OPENVAS:1361412562310876467", "OPENVAS:1361412562310876476", "OPENVAS:1361412562310876477", "OPENVAS:1361412562310876479", "OPENVAS:1361412562310876484", "OPENVAS:1361412562310876488", "OPENVAS:1361412562310876489", "OPENVAS:1361412562310876510", "OPENVAS:1361412562310876515", "OPENVAS:1361412562310876543", "OPENVAS:1361412562310876555", "OPENVAS:1361412562310876586", "OPENVAS:1361412562310876611", "OPENVAS:1361412562310876621", "OPENVAS:1361412562310876638", "OPENVAS:1361412562310876653", "OPENVAS:1361412562310876666", "OPENVAS:1361412562310876750", "OPENVAS:1361412562310876753", "OPENVAS:1361412562310876809", "OPENVAS:1361412562310876841", "OPENVAS:1361412562310876869", "OPENVAS:1361412562310876925", "OPENVAS:1361412562310877476", "OPENVAS:1361412562310877540", "OPENVAS:1361412562310883117", "OPENVAS:1361412562310883191", "OPENVAS:1361412562310891799", "OPENVAS:1361412562310891823", "OPENVAS:1361412562310891824", "OPENVAS:1361412562310891862", "OPENVAS:1361412562310891884", "OPENVAS:1361412562310891885", "OPENVAS:1361412562310891919"]}, {"type": "oraclelinux", "idList": ["ELSA-2019-2029", "ELSA-2019-2703", "ELSA-2019-3055", "ELSA-2020-0834"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:152663"]}, {"type": "photon", "idList": ["PHSA-2019-1.0-0235", "PHSA-2019-1.0-0236", "PHSA-2019-1.0-0240", "PHSA-2019-1.0-0251", "PHSA-2019-2.0-0160", "PHSA-2019-2.0-0161", "PHSA-2019-2.0-0165", "PHSA-2019-3.0-0015", "PHSA-2019-3.0-0021", "PHSA-2019-3.0-0026"]}, {"type": "redhat", "idList": ["RHSA-2020:0543"]}, {"type": "slackware", "idList": ["SSA-2019-169-01", "SSA-2019-202-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:1570-1", "OPENSUSE-SU-2019:1571-1", "OPENSUSE-SU-2019:1579-1", "OPENSUSE-SU-2019:1716-1", "OPENSUSE-SU-2019:1757-1"]}, {"type": "talos", "idList": ["SAP"]}, {"type": "ubuntu", "idList": ["USN-4069-1", "USN-4076-1", "USN-4093-1", "USN-4094-1", "USN-4095-1", "USN-4095-2", "USN-4114-1", "USN-4115-1", "USN-4115-2", "USN-4116-1", "USN-4117-1", "USN-4118-1", "USN-4145-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-20836", "UB:CVE-2019-10126", "UB:CVE-2019-10638", "UB:CVE-2019-10639", "UB:CVE-2019-11487", "UB:CVE-2019-11599", "UB:CVE-2019-12380", "UB:CVE-2019-12456", "UB:CVE-2019-12614", "UB:CVE-2019-12818", "UB:CVE-2019-12819"]}, {"type": "virtuozzo", "idList": ["VZA-2021-040"]}, {"type": "zdt", "idList": ["1337DAY-ID-32619"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2018-20836", "epss": "0.008200000", "percentile": "0.792480000", "modified": "2023-03-14"}, {"cve": "CVE-2019-10126", "epss": "0.006530000", "percentile": "0.763000000", "modified": "2023-03-14"}, {"cve": "CVE-2019-10638", "epss": "0.001510000", "percentile": "0.494850000", "modified": "2023-03-14"}, {"cve": "CVE-2019-10639", "epss": "0.001900000", "percentile": "0.547860000", "modified": "2023-03-14"}, {"cve": "CVE-2019-11487", "epss": "0.001120000", "percentile": "0.428700000", "modified": "2023-03-14"}, {"cve": "CVE-2019-11599", "epss": "0.000430000", "percentile": "0.074570000", "modified": "2023-03-14"}, {"cve": "CVE-2019-12380", "epss": "0.000450000", "percentile": "0.122450000", "modified": "2023-03-14"}, {"cve": "CVE-2019-12456", "epss": "0.000420000", "percentile": "0.056350000", "modified": "2023-03-14"}, {"cve": "CVE-2019-12614", "epss": "0.000460000", "percentile": "0.140590000", "modified": "2023-03-14"}, {"cve": "CVE-2019-12818", "epss": "0.010190000", "percentile": "0.814670000", "modified": "2023-03-14"}, {"cve": "CVE-2019-12819", "epss": "0.000450000", "percentile": "0.122450000", "modified": "2023-03-14"}], "vulnersScore": 0.2}, "_state": {"dependencies": 1673453919, "score": 1673455684, "epss": 1678887117}, "_internal": {"score_hash": "30733ebb7b9d70ac598a665ed16f5b94"}, "pluginID": "126688", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:1823-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(126688);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/19\");\n\n script_cve_id(\n \"CVE-2018-20836\",\n \"CVE-2019-10126\",\n \"CVE-2019-10638\",\n \"CVE-2019-10639\",\n \"CVE-2019-11487\",\n \"CVE-2019-11599\",\n \"CVE-2019-12380\",\n \"CVE-2019-12456\",\n \"CVE-2019-12614\",\n \"CVE-2019-12818\",\n \"CVE-2019-12819\"\n );\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1823-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 12 SP 2 kernel was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-10638: In the Linux kernel, a device could be tracked by an\nattacker using the IP ID values the kernel produces for\nconnection-less protocols (e.g., UDP and ICMP). When such traffic was\nsent to multiple destination IP addresses, it was possible to obtain\nhash collisions (of indices to the counter array) and thereby obtain\nthe hashing key (via enumeration). An attack may be conducted by\nhosting a crafted web page that uses WebRTC or gQUIC to force UDP\ntraffic to attacker-controlled IP addresses. (bnc#1140575)\n\nCVE-2019-10639: The Linux kernel allowed Information Exposure (partial\nkernel address disclosure), leading to a KASLR bypass. Specifically,\nit was possible to extract the KASLR kernel image offset using the IP\nID values the kernel produces for connection-less protocols (e.g., UDP\nand ICMP). When such traffic was sent to multiple destination IP\naddresses, it was possible to obtain hash collisions (of indices to\nthe counter array) and thereby obtain the hashing key (via\nenumeration). This key contains enough bits from a kernel address (of\na static variable) so when the key was extracted (via enumeration),\nthe offset of the kernel image is exposed. This attack can be carried\nout remotely, by the attacker forcing the target device to send UDP or\nICMP (or certain other) traffic to attacker-controlled IP addresses.\nForcing a server to send UDP traffic is trivial if the server is a DNS\nserver. ICMP traffic is trivial if the server answers ICMP Echo\nrequests (ping). For client targets, if the target visited the\nattacker's web page, then WebRTC or gQUIC could be used to force UDP\ntraffic to attacker-controlled IP addresses. NOTE: this attack against\nKASLR became viable because IP ID generation was changed to have a\ndependency on an address associated with a network namespace. (bnc#)\n\nCVE-2019-10126: A flaw was found in the Linux kernel that might lead\nto memory corruption in the marvell mwifiex driver. (bnc#1136935)\n\nCVE-2018-20836: An issue was discovered in the Linux kernel There was\na race condition in smp_task_timedout() and smp_task_done() in\ndrivers/scsi/libsas/sas_expander.c, leading to a use-after-free.\n(bnc#1134395)\n\nCVE-2019-11599: The coredump implementation in the Linux kernel did\nnot use locking or other mechanisms to prevent vma layout or vma flags\nchanges while it ran, which allowed local users to obtain sensitive\ninformation, cause a denial of service, or possibly have unspecified\nother impact by triggering a race condition with mmget_not_zero or\nget_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c,\nfs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.\n(bnc#1133738)\n\nCVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in\narch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was\nan unchecked kstrdup of prop-name, which might allow an attacker to\ncause a denial of service (NULL pointer dereference and system crash).\n(bnc#)\n\nCVE-2019-12818: An issue was discovered in the Linux kernel The\nnfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return\nNULL. If the caller did not check for this, it will trigger a NULL\npointer dereference. This will cause denial of service. This affects\nnfc_llcp_build_gb in net/nfc/llcp_core.c. (bnc#1137194)\n\nCVE-2019-12819: An issue was discovered in the Linux kernel The\nfunction __mdiobus_register() in drivers/net/phy/mdio_bus.c called\nput_device(), which would trigger a fixed_mdio_bus_init\nuse-after-free. This would cause a denial of service. (bnc#1138291)\n\nCVE-2019-12456 a double-fetch bug in _ctl_ioctl_main() could allow\nlocal users to create a denial of service (bsc#1136922).\n\nCVE-2019-12380: An issue was discovered in the efi subsystem in the\nLinux kernel phys_efi_set_virtual_address_map in\narch/x86/platform/efi/efi.c and efi_call_phys_prolog in\narch/x86/platform/efi/efi_64.c mishandle memory allocation failures.\nNOTE: This id is disputed as not being an issue because All the code\ntouched by the referenced commit runs only at boot, before any user\nprocesses are started. Therefore, there is no possibility for an\nunprivileged user to control it. (bnc#)\n\nCVE-2019-11487: The Linux kernel allowed page-_refcount reference\ncount to overflow, with resultant use-after-free issues, if about 140\nGiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c,\nfs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h,\nkernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with\nFUSE requests. (bnc#1133190)\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1096254\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108382\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109137\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127155\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133190\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133738\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1134395\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1134701\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136922\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136935\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137194\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138291\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140575\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20836/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10126/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10638/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10639/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-11487/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-11599/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12380/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12456/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12614/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12818/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12819/\");\n # https://www.suse.com/support/update/announcement/2019/suse-su-20191823-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f1e15fc1\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud 7:zypper in -t patch\nSUSE-OpenStack-Cloud-7-2019-1823=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2:zypper in -t patch\nSUSE-SLE-SAP-12-SP2-2019-1823=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-2019-1823=1\n\nSUSE Linux Enterprise Server 12-SP2-BCL:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-BCL-2019-1823=1\n\nSUSE Enterprise Storage 4:zypper in -t patch\nSUSE-Storage-4-2019-1823=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-20836\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2019-10126\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_117-default\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_121-92_117-default-1-3.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-man-4.4.121-92.117.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-4.4.121-92.117.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-base-4.4.121-92.117.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-base-debuginfo-4.4.121-92.117.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-debuginfo-4.4.121-92.117.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-debugsource-4.4.121-92.117.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-devel-4.4.121-92.117.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-syms-4.4.121-92.117.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "naslFamily": "SuSE Local Security Checks", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_117-default", "cpe:/o:novell:suse_linux:12"], "solution": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud 7:zypper in -t patch SUSE-OpenStack-Cloud-7-2019-1823=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2:zypper in -t patch SUSE-SLE-SAP-12-SP2-2019-1823=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS:zypper in -t patch SUSE-SLE-SERVER-12-SP2-2019-1823=1\n\nSUSE Linux Enterprise Server 12-SP2-BCL:zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2019-1823=1\n\nSUSE Enterprise Storage 4:zypper in -t patch SUSE-Storage-4-2019-1823=1", "nessusSeverity": "High", "cvssScoreSource": "CVE-2018-20836", "vendor_cvss2": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "vendor_cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "vpr": {"risk factor": "High", "score": "7.4"}, "exploitAvailable": true, "exploitEase": "Exploits are available", "patchPublicationDate": "2019-07-11T00:00:00", "vulnerabilityPublicationDate": "2019-04-23T00:00:00", "exploitableWith": []}
{"nessus": [{"lastseen": "2023-01-11T15:19:28", "description": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575 1140577).\n\nCVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), that lead to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack could be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses.\nForcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).\n\nCVE-2019-10126: A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might have lead to memory corruption and possibly other consequences (bnc#1136935).\n\nCVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n\nCVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm call. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).\n\nCVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n\nCVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service (bnc#1138291).\n\nCVE-2019-12818: An issue was discovered in the Linux kernel The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause a denial of service. This affected nfc_llcp_build_gb in net/nfc/llcp_core.c (bnc#1138293).\n\nCVE-2019-12456: A double-fetch bug in _ctl_ioctl_main() could lead to a local denial of service attack (bsc#1136922 CVE-2019-12456).\n\nCVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures.\nNOTE: This id is disputed as not being an issue because ;All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it (bnc#1136598).\n\nCVE-2019-11487: The Linux kernel before allowed page-_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It could occur with FUSE requests (bnc#1133190 1133191).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-16T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1852-1)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-20836", "CVE-2019-10126", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11487", "CVE-2019-11599", "CVE-2019-12380", "CVE-2019-12456", "CVE-2019-12614", "CVE-2019-12818", "CVE-2019-12819"], "modified": "2022-05-19T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_100-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_100-default-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2019-1852-1.NASL", "href": "https://www.tenable.com/plugins/nessus/126742", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:1852-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(126742);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/19\");\n\n script_cve_id(\n \"CVE-2018-20836\",\n \"CVE-2019-10126\",\n \"CVE-2019-10638\",\n \"CVE-2019-10639\",\n \"CVE-2019-11487\",\n \"CVE-2019-11599\",\n \"CVE-2019-12380\",\n \"CVE-2019-12456\",\n \"CVE-2019-12614\",\n \"CVE-2019-12818\",\n \"CVE-2019-12819\"\n );\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1852-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-10638: In the Linux kernel, a device could be tracked by an\nattacker using the IP ID values the kernel produces for\nconnection-less protocols (e.g., UDP and ICMP). When such traffic was\nsent to multiple destination IP addresses, it was possible to obtain\nhash collisions (of indices to the counter array) and thereby obtain\nthe hashing key (via enumeration). An attack may have been conducted\nby hosting a crafted web page that uses WebRTC or gQUIC to force UDP\ntraffic to attacker-controlled IP addresses (bnc#1140575 1140577).\n\nCVE-2019-10639: The Linux kernel allowed Information Exposure (partial\nkernel address disclosure), that lead to a KASLR bypass. Specifically,\nit was possible to extract the KASLR kernel image offset using the IP\nID values the kernel produces for connection-less protocols (e.g., UDP\nand ICMP). When such traffic is sent to multiple destination IP\naddresses, it was possible to obtain hash collisions (of indices to\nthe counter array) and thereby obtain the hashing key (via\nenumeration). This key contains enough bits from a kernel address (of\na static variable) so when the key is extracted (via enumeration), the\noffset of the kernel image is exposed. This attack could be carried\nout remotely, by the attacker forcing the target device to send UDP or\nICMP (or certain other) traffic to attacker-controlled IP addresses.\nForcing a server to send UDP traffic is trivial if the server is a DNS\nserver. ICMP traffic is trivial if the server answers ICMP Echo\nrequests (ping). For client targets, if the target visited the\nattacker's web page, then WebRTC or gQUIC could be used to force UDP\ntraffic to attacker-controlled IP addresses. NOTE: this attack against\nKASLR became viable because IP ID generation was changed to have a\ndependency on an address associated with a network namespace\n(bnc#1140577).\n\nCVE-2019-10126: A flaw was found in the Linux kernel. A heap based\nbuffer overflow in mwifiex_uap_parse_tail_ies function in\ndrivers/net/wireless/marvell/mwifiex/ie.c might have lead to memory\ncorruption and possibly other consequences (bnc#1136935).\n\nCVE-2018-20836: An issue was discovered in the Linux kernel There was\na race condition in smp_task_timedout() and smp_task_done() in\ndrivers/scsi/libsas/sas_expander.c, leading to a use-after-free\n(bnc#1134395).\n\nCVE-2019-11599: The coredump implementation in the Linux kernel did\nnot use locking or other mechanisms to prevent vma layout or vma flags\nchanges while it ran, which allowed local users to obtain sensitive\ninformation, cause a denial of service, or possibly have unspecified\nother impact by triggering a race condition with mmget_not_zero or\nget_task_mm call. This is related to fs/userfaultfd.c, mm/mmap.c,\nfs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c\n(bnc#1131645 1133738).\n\nCVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in\narch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was\nan unchecked kstrdup of prop-name, which might have allowed an\nattacker to cause a denial of service (NULL pointer dereference and\nsystem crash) (bnc#1137194).\n\nCVE-2019-12819: An issue was discovered in the Linux kernel The\nfunction __mdiobus_register() in drivers/net/phy/mdio_bus.c calls\nput_device(), which would trigger a fixed_mdio_bus_init\nuse-after-free. This would cause a denial of service (bnc#1138291).\n\nCVE-2019-12818: An issue was discovered in the Linux kernel The\nnfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return\nNULL. If the caller did not check for this, it would trigger a NULL\npointer dereference. This would cause a denial of service. This\naffected nfc_llcp_build_gb in net/nfc/llcp_core.c (bnc#1138293).\n\nCVE-2019-12456: A double-fetch bug in _ctl_ioctl_main() could lead to\na local denial of service attack (bsc#1136922 CVE-2019-12456).\n\nCVE-2019-12380: An issue was discovered in the efi subsystem in the\nLinux kernel phys_efi_set_virtual_address_map in\narch/x86/platform/efi/efi.c and efi_call_phys_prolog in\narch/x86/platform/efi/efi_64.c mishandle memory allocation failures.\nNOTE: This id is disputed as not being an issue because ;All the code\ntouched by the referenced commit runs only at boot, before any user\nprocesses are started. Therefore, there is no possibility for an\nunprivileged user to control it (bnc#1136598).\n\nCVE-2019-11487: The Linux kernel before allowed page-_refcount\nreference count overflow, with resultant use-after-free issues, if\nabout 140 GiB of RAM exists. This is related to fs/fuse/dev.c,\nfs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h,\nkernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It could occur with\nFUSE requests (bnc#1133190 1133191).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1053043\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1066223\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108382\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109137\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111188\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1119086\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120902\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1121263\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1125580\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1126961\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127155\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1129770\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1131335\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1131336\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1131645\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1132390\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133140\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133190\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133191\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133738\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1134395\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135642\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136598\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136889\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136922\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136935\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137004\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137194\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137749\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137752\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137915\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138291\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138681\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140575\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140577\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20836/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10126/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10638/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10639/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-11487/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-11599/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12380/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12456/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12614/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12818/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12819/\");\n # https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f06a8621\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud 8:zypper in -t patch\nSUSE-OpenStack-Cloud-8-2019-1852=1\n\nSUSE Linux Enterprise Server for SAP 12-SP3:zypper in -t patch\nSUSE-SLE-SAP-12-SP3-2019-1852=1\n\nSUSE Linux Enterprise Server 12-SP3-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-SP3-2019-1852=1\n\nSUSE Linux Enterprise High Availability 12-SP3:zypper in -t patch\nSUSE-SLE-HA-12-SP3-2019-1852=1\n\nSUSE Enterprise Storage 5:zypper in -t patch\nSUSE-Storage-5-2019-1852=1\n\nSUSE CaaS Platform 3.0 :\n\nTo install this update, use the SUSE CaaS Platform Velum dashboard. It\nwill inform you if it detects new updates and let you then trigger\nupdating of the complete cluster in a controlled way.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-20836\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2019-10126\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_100-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_100-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_180-94_100-default-1-4.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_180-94_100-default-debuginfo-1-4.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"s390x\", reference:\"kernel-default-man-4.4.180-94.100.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-4.4.180-94.100.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-base-4.4.180-94.100.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-base-debuginfo-4.4.180-94.100.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-debuginfo-4.4.180-94.100.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-debugsource-4.4.180-94.100.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-devel-4.4.180-94.100.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-syms-4.4.180-94.100.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T15:20:30", "description": "The SUSE Linux Enterprise 15 kernel version 4.12.14 was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-10638: Attackers used to be able to track the Linux kernel by the IP ID values the kernel produces for connection-less protocols.\nWhen such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack could have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. [bnc#1140575]\n\nCVE-2019-10639: The Linux kernel used to allow Information Exposure (partial kernel address disclosure), leading to a KASLR bypass.\nSpecifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols. When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image was exposed. This attack could be carried out remotely by the attacker forcing the target device to send UDP or ICMP traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server.\nICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. [bnc#1140577]\n\nCVE-2018-20836: A race condition used to exist in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. [bnc#1134395]\n\nCVE-2019-10126: A heap-based buffer overflow in the wireless driver code was fixed. This issue might have lead to memory corruption and possibly other consequences. [bnc#1136935]\n\nCVE-2019-11599: The coredump implementation did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls.\n[bnc#1131645].\n\nCVE-2019-12614: There was an unchecked kstrdup of prop->name on PowerPC platforms, which allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). [bnc#1137194]\n\nCVE-2018-16871: A flaw was found in the NFS implementation. An attacker who was able to mount an exported NFS filesystem was able to trigger a NULL pointer dereference by an invalid NFS sequence. This could panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will were lost.\n[bnc#1137103]\n\nCVE-2019-12819: The function __mdiobus_register() used to call put_device(), which would trigger a fixed_mdio_bus_init use-after-free error. This would cause a denial of service. [bnc#1138291]\n\nCVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it could trigger a NULL pointer dereference. This would cause denial of service. [bnc#1138293]\n\nCVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main() allowed local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a 'double fetch' vulnerability.\n[bsc#1136922]\n\nCVE-2019-12380: An issue was in the EFI subsystem existed that mishandled memory allocation failures. Note, however, that all relevant code runs only at boot-time, before any user processes are started. Therefore, there was no possibility for an unprivileged user to exploit this issue. [bnc#1136598]\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-15T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1829-1)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-16871", "CVE-2018-20836", "CVE-2019-10126", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11599", "CVE-2019-12380", "CVE-2019-12456", "CVE-2019-12614", "CVE-2019-12818", "CVE-2019-12819"], "modified": "2022-05-19T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:cluster-md-kmp-azure", "p-cpe:/a:novell:suse_linux:cluster-md-kmp-azure-debuginfo", "p-cpe:/a:novell:suse_linux:dlm-kmp-azure", "p-cpe:/a:novell:suse_linux:dlm-kmp-azure-debuginfo", "p-cpe:/a:novell:suse_linux:gfs2-kmp-azure", "p-cpe:/a:novell:suse_linux:gfs2-kmp-azure-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure", "p-cpe:/a:novell:suse_linux:kernel-azure-base", "p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debugsource", "p-cpe:/a:novell:suse_linux:kernel-azure-devel", "p-cpe:/a:novell:suse_linux:kernel-azure-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-extra", "p-cpe:/a:novell:suse_linux:kernel-azure-extra-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-livepatch", "p-cpe:/a:novell:suse_linux:kernel-syms-azure", "p-cpe:/a:novell:suse_linux:kselftests-kmp-azure", "p-cpe:/a:novell:suse_linux:kselftests-kmp-azure-debuginfo", "p-cpe:/a:novell:suse_linux:ocfs2-kmp-azure", "p-cpe:/a:novell:suse_linux:ocfs2-kmp-azure-debuginfo", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-azure", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-azure-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2019-1829-1.NASL", "href": "https://www.tenable.com/plugins/nessus/126691", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:1829-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(126691);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/19\");\n\n script_cve_id(\n \"CVE-2018-16871\",\n \"CVE-2018-20836\",\n \"CVE-2019-10126\",\n \"CVE-2019-10638\",\n \"CVE-2019-10639\",\n \"CVE-2019-11599\",\n \"CVE-2019-12380\",\n \"CVE-2019-12456\",\n \"CVE-2019-12614\",\n \"CVE-2019-12818\",\n \"CVE-2019-12819\"\n );\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1829-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 15 kernel version 4.12.14 was updated to\nreceive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-10638: Attackers used to be able to track the Linux kernel by\nthe IP ID values the kernel produces for connection-less protocols.\nWhen such traffic was sent to multiple destination IP addresses, it\nwas possible to obtain hash collisions (of indices to the counter\narray) and thereby obtain the hashing key (via enumeration). An attack\ncould have been conducted by hosting a crafted web page that uses\nWebRTC or gQUIC to force UDP traffic to attacker-controlled IP\naddresses. [bnc#1140575]\n\nCVE-2019-10639: The Linux kernel used to allow Information Exposure\n(partial kernel address disclosure), leading to a KASLR bypass.\nSpecifically, it was possible to extract the KASLR kernel image offset\nusing the IP ID values the kernel produces for connection-less\nprotocols. When such traffic was sent to multiple destination IP\naddresses, it was possible to obtain hash collisions (of indices to\nthe counter array) and thereby obtain the hashing key (via\nenumeration). This key contains enough bits from a kernel address (of\na static variable) so when the key was extracted (via enumeration),\nthe offset of the kernel image was exposed. This attack could be\ncarried out remotely by the attacker forcing the target device to send\nUDP or ICMP traffic to attacker-controlled IP addresses. Forcing a\nserver to send UDP traffic is trivial if the server is a DNS server.\nICMP traffic is trivial if the server answers ICMP Echo requests\n(ping). For client targets, if the target visits the attacker's web\npage, then WebRTC or gQUIC can be used to force UDP traffic to\nattacker-controlled IP addresses. [bnc#1140577]\n\nCVE-2018-20836: A race condition used to exist in smp_task_timedout()\nand smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to\na use-after-free. [bnc#1134395]\n\nCVE-2019-10126: A heap-based buffer overflow in the wireless driver\ncode was fixed. This issue might have lead to memory corruption and\npossibly other consequences. [bnc#1136935]\n\nCVE-2019-11599: The coredump implementation did not use locking or\nother mechanisms to prevent vma layout or vma flags changes while it\nran, which allowed local users to obtain sensitive information, cause\na denial of service, or possibly have unspecified other impact by\ntriggering a race condition with mmget_not_zero or get_task_mm calls.\n[bnc#1131645].\n\nCVE-2019-12614: There was an unchecked kstrdup of prop->name on\nPowerPC platforms, which allowed an attacker to cause a denial of\nservice (NULL pointer dereference and system crash). [bnc#1137194]\n\nCVE-2018-16871: A flaw was found in the NFS implementation. An\nattacker who was able to mount an exported NFS filesystem was able to\ntrigger a NULL pointer dereference by an invalid NFS sequence. This\ncould panic the machine and deny access to the NFS server. Any\noutstanding disk writes to the NFS server will were lost.\n[bnc#1137103]\n\nCVE-2019-12819: The function __mdiobus_register() used to call\nput_device(), which would trigger a fixed_mdio_bus_init use-after-free\nerror. This would cause a denial of service. [bnc#1138291]\n\nCVE-2019-12818: The nfc_llcp_build_tlv function in\nnet/nfc/llcp_commands.c may return NULL. If the caller did not check\nfor this, it could trigger a NULL pointer dereference. This would\ncause denial of service. [bnc#1138293]\n\nCVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main()\nallowed local users to cause a denial of service or possibly have\nunspecified other impact by changing the value of ioc_number between\ntwo kernel reads of that value, aka a 'double fetch' vulnerability.\n[bsc#1136922]\n\nCVE-2019-12380: An issue was in the EFI subsystem existed that\nmishandled memory allocation failures. Note, however, that all\nrelevant code runs only at boot-time, before any user processes are\nstarted. Therefore, there was no possibility for an unprivileged user\nto exploit this issue. [bnc#1136598]\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1088047\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1098633\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106383\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109137\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1119532\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120423\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124167\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127155\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1128432\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1128902\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1128910\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1131645\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1132154\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1132390\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133401\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133738\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1134303\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1134395\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135296\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135556\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135642\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136157\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136598\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136922\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136935\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137103\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137194\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137429\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137728\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137884\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137996\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137998\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137999\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138000\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138002\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138003\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138005\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138006\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138007\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138008\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138009\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138010\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138011\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138012\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138013\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138014\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138015\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138016\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138018\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138019\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138291\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138375\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138589\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138719\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139771\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139782\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139865\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140133\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140328\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140405\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140424\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140575\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140577\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140637\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140658\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140715\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140719\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140726\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140727\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140728\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140814\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-16871/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20836/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10126/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10638/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10639/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-11599/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12380/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12456/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12614/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12818/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12819/\");\n # https://www.suse.com/support/update/announcement/2019/suse-su-20191829-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3bab832d\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Public Cloud 15:zypper in -t patch\nSUSE-SLE-Module-Public-Cloud-15-2019-1829=1\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15-SP1:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1829=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-20836\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2019-10126\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cluster-md-kmp-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cluster-md-kmp-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:dlm-kmp-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:dlm-kmp-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gfs2-kmp-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gfs2-kmp-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-extra-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-livepatch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kselftests-kmp-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kselftests-kmp-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ocfs2-kmp-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ocfs2-kmp-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cluster-md-kmp-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cluster-md-kmp-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"dlm-kmp-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"dlm-kmp-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"gfs2-kmp-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"gfs2-kmp-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-base-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-base-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-debugsource-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-devel-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-devel-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-extra-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-extra-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-livepatch-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-syms-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kselftests-kmp-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kselftests-kmp-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"ocfs2-kmp-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"ocfs2-kmp-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"reiserfs-kmp-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"reiserfs-kmp-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"cluster-md-kmp-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"cluster-md-kmp-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"dlm-kmp-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"dlm-kmp-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"gfs2-kmp-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"gfs2-kmp-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-base-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-base-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-debugsource-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-devel-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-devel-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-extra-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-extra-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-azure-livepatch-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-syms-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kselftests-kmp-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kselftests-kmp-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"ocfs2-kmp-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"ocfs2-kmp-azure-debuginfo-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"reiserfs-kmp-azure-4.12.14-5.33.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"reiserfs-kmp-azure-debuginfo-4.12.14-5.33.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T15:20:10", "description": "The SUSE Linux Enterprise 15 kernel version 4.12.14 was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-10638: Attackers used to be able to track the Linux kernel by the IP ID values the kernel produces for connection-less protocols.\nWhen such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack could have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. [bnc#1140575]\n\nCVE-2019-10639: The Linux kernel used to allow Information Exposure (partial kernel address disclosure), leading to a KASLR bypass.\nSpecifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols. When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image was exposed. This attack could be carried out remotely by the attacker forcing the target device to send UDP or ICMP traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server.\nICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. [bnc#1140577]\n\nCVE-2018-20836: A race condition used to exist in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. [bnc#1134395]\n\nCVE-2019-10126: A heap-based buffer overflow in the wireless driver code was fixed. This issue might have lead to memory corruption and possibly other consequences. [bnc#1136935]\n\nCVE-2019-11599: The coredump implementation did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls.\n[bnc#1131645].\n\nCVE-2019-12614: There was an unchecked kstrdup of prop->name on PowerPC platforms, which allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). [bnc#1137194]\n\nCVE-2018-16871: A flaw was found in the NFS implementation. An attacker who was able to mount an exported NFS filesystem was able to trigger a NULL pointer dereference by an invalid NFS sequence. This could panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will were lost.\n[bnc#1137103]\n\nCVE-2019-12819: The function __mdiobus_register() used to call put_device(), which would trigger a fixed_mdio_bus_init use-after-free error. This would cause a denial of service. [bnc#1138291]\n\nCVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it could trigger a NULL pointer dereference. This would cause denial of service. [bnc#1138293]\n\nCVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main() allowed local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a 'double fetch' vulnerability.\n[bsc#1136922]\n\nCVE-2019-12380: An issue was in the EFI subsystem existed that mishandled memory allocation failures. Note, however, that all relevant code runs only at boot-time, before any user processes are started. Therefore, there was no possibility for an unprivileged user to exploit this issue. [bnc#1136598]\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-16T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1855-1) (SACK Slowness)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-16871", "CVE-2018-20836", "CVE-2019-10126", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11478", "CVE-2019-11599", "CVE-2019-12380", "CVE-2019-12456", "CVE-2019-12614", "CVE-2019-12818", "CVE-2019-12819"], "modified": "2022-12-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-obs-qa", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-vanilla-base", "p-cpe:/a:novell:suse_linux:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-vanilla-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-vanilla-debugsource", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource", "p-cpe:/a:novell:suse_linux:kselftests-kmp-default", "p-cpe:/a:novell:suse_linux:kselftests-kmp-default-debuginfo", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2019-1855-1.NASL", "href": "https://www.tenable.com/plugins/nessus/126744", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:1855-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(126744);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/06\");\n\n script_cve_id(\n \"CVE-2018-16871\",\n \"CVE-2018-20836\",\n \"CVE-2019-10126\",\n \"CVE-2019-10638\",\n \"CVE-2019-10639\",\n \"CVE-2019-11478\",\n \"CVE-2019-11599\",\n \"CVE-2019-12380\",\n \"CVE-2019-12456\",\n \"CVE-2019-12614\",\n \"CVE-2019-12818\",\n \"CVE-2019-12819\"\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2019-0456\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1855-1) (SACK Slowness)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 15 kernel version 4.12.14 was updated to\nreceive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-10638: Attackers used to be able to track the Linux kernel by\nthe IP ID values the kernel produces for connection-less protocols.\nWhen such traffic was sent to multiple destination IP addresses, it\nwas possible to obtain hash collisions (of indices to the counter\narray) and thereby obtain the hashing key (via enumeration). An attack\ncould have been conducted by hosting a crafted web page that uses\nWebRTC or gQUIC to force UDP traffic to attacker-controlled IP\naddresses. [bnc#1140575]\n\nCVE-2019-10639: The Linux kernel used to allow Information Exposure\n(partial kernel address disclosure), leading to a KASLR bypass.\nSpecifically, it was possible to extract the KASLR kernel image offset\nusing the IP ID values the kernel produces for connection-less\nprotocols. When such traffic was sent to multiple destination IP\naddresses, it was possible to obtain hash collisions (of indices to\nthe counter array) and thereby obtain the hashing key (via\nenumeration). This key contains enough bits from a kernel address (of\na static variable) so when the key was extracted (via enumeration),\nthe offset of the kernel image was exposed. This attack could be\ncarried out remotely by the attacker forcing the target device to send\nUDP or ICMP traffic to attacker-controlled IP addresses. Forcing a\nserver to send UDP traffic is trivial if the server is a DNS server.\nICMP traffic is trivial if the server answers ICMP Echo requests\n(ping). For client targets, if the target visits the attacker's web\npage, then WebRTC or gQUIC can be used to force UDP traffic to\nattacker-controlled IP addresses. [bnc#1140577]\n\nCVE-2018-20836: A race condition used to exist in smp_task_timedout()\nand smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to\na use-after-free. [bnc#1134395]\n\nCVE-2019-10126: A heap-based buffer overflow in the wireless driver\ncode was fixed. This issue might have lead to memory corruption and\npossibly other consequences. [bnc#1136935]\n\nCVE-2019-11599: The coredump implementation did not use locking or\nother mechanisms to prevent vma layout or vma flags changes while it\nran, which allowed local users to obtain sensitive information, cause\na denial of service, or possibly have unspecified other impact by\ntriggering a race condition with mmget_not_zero or get_task_mm calls.\n[bnc#1131645].\n\nCVE-2019-12614: There was an unchecked kstrdup of prop->name on\nPowerPC platforms, which allowed an attacker to cause a denial of\nservice (NULL pointer dereference and system crash). [bnc#1137194]\n\nCVE-2018-16871: A flaw was found in the NFS implementation. An\nattacker who was able to mount an exported NFS filesystem was able to\ntrigger a NULL pointer dereference by an invalid NFS sequence. This\ncould panic the machine and deny access to the NFS server. Any\noutstanding disk writes to the NFS server will were lost.\n[bnc#1137103]\n\nCVE-2019-12819: The function __mdiobus_register() used to call\nput_device(), which would trigger a fixed_mdio_bus_init use-after-free\nerror. This would cause a denial of service. [bnc#1138291]\n\nCVE-2019-12818: The nfc_llcp_build_tlv function in\nnet/nfc/llcp_commands.c may return NULL. If the caller did not check\nfor this, it could trigger a NULL pointer dereference. This would\ncause denial of service. [bnc#1138293]\n\nCVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main()\nallowed local users to cause a denial of service or possibly have\nunspecified other impact by changing the value of ioc_number between\ntwo kernel reads of that value, aka a 'double fetch' vulnerability.\n[bsc#1136922]\n\nCVE-2019-12380: An issue was in the EFI subsystem existed that\nmishandled memory allocation failures. Note, however, that all\nrelevant code runs only at boot-time, before any user processes are\nstarted. Therefore, there was no possibility for an unprivileged user\nto exploit this issue. [bnc#1136598]\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1061840\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1088047\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1098633\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106383\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109137\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1119532\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120423\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124167\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127155\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1128432\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1128902\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1128910\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1131645\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1132154\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1132390\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133401\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133738\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1134303\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1134395\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135296\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135556\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135642\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136157\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136598\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136922\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136935\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137103\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137194\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137429\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137728\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137884\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137996\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137998\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137999\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138000\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138002\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138003\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138005\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138006\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138007\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138008\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138009\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138010\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138011\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138012\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138013\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138014\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138015\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138016\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138018\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138019\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138291\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138375\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138589\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138719\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139771\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139782\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139865\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140133\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140328\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140405\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140424\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140575\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140577\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140637\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140658\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140715\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140719\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140726\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140727\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140728\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140814\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-16871/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20836/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10126/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10638/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10639/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-11478/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-11599/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12380/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12456/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12614/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12818/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12819/\");\n # https://www.suse.com/support/update/announcement/2019/suse-su-20191855-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f0271507\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15:zypper in -t patch\nSUSE-SLE-Product-WE-15-2019-1855=1\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-2019-1855=1\n\nSUSE Linux Enterprise Module for Live Patching 15:zypper in -t patch\nSUSE-SLE-Module-Live-Patching-15-2019-1855=1\n\nSUSE Linux Enterprise Module for Legacy Software 15:zypper in -t patch\nSUSE-SLE-Module-Legacy-15-2019-1855=1\n\nSUSE Linux Enterprise Module for Development Tools 15:zypper in -t\npatch SUSE-SLE-Module-Development-Tools-15-2019-1855=1\n\nSUSE Linux Enterprise Module for Basesystem 15:zypper in -t patch\nSUSE-SLE-Module-Basesystem-15-2019-1855=1\n\nSUSE Linux Enterprise High Availability 15:zypper in -t patch\nSUSE-SLE-Product-HA-15-2019-1855=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-20836\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2019-10126\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kselftests-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kselftests-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-zfcpdump-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-default-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-default-base-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-default-base-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-default-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-default-debugsource-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-default-devel-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-default-devel-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-obs-build-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-obs-build-debugsource-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-obs-qa-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-syms-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-vanilla-base-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-vanilla-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kernel-vanilla-debugsource-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kselftests-kmp-default-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"kselftests-kmp-default-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"reiserfs-kmp-default-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"reiserfs-kmp-default-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-zfcpdump-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-default-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-default-base-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-default-base-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-default-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-default-debugsource-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-default-devel-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-default-devel-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-obs-build-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-obs-build-debugsource-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-obs-qa-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-syms-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-vanilla-base-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-vanilla-debuginfo-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kernel-vanilla-debugsource-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kselftests-kmp-default-4.12.14-150.27.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"kselftests-kmp-default-debuginfo-4.12.14-150.27.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T15:20:11", "description": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-10638: A device could have been tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)\n\nCVE-2019-10639: Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP).\nWhen such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image was exposed. This attack could have been carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server.\nICMP traffic was trivial if the server answered ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. (bnc#1140577)\n\nCVE-2018-20836: A race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, could have lead to a use-after-free. (bnc#1134395)\n\nCVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.\n(bnc#1133738)\n\nCVE-2019-12614: An unchecked kstrdup might have allowed an attacker to cause denial of service (a NULL pointer dereference and system crash).\n(bnc#1137194)\n\nCVE-2019-12819: The function __mdiobus_register() in drivers/net/phy/mdio_bus.c called put_device() which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bnc#1138291)\n\nCVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may have returned NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause denial of service. (bnc#1138293)\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-16T00:00:00", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1851-1) (SACK Slowness)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-16871", "CVE-2018-20836", "CVE-2019-10126", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11478", "CVE-2019-11599", "CVE-2019-12456", "CVE-2019-12614", "CVE-2019-12818", "CVE-2019-12819"], "modified": "2022-12-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-extra", "p-cpe:/a:novell:suse_linux:kernel-default-extra-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2019-1851-1.NASL", "href": "https://www.tenable.com/plugins/nessus/126741", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:1851-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(126741);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/06\");\n\n script_cve_id(\n \"CVE-2018-16871\",\n \"CVE-2018-20836\",\n \"CVE-2019-10126\",\n \"CVE-2019-10638\",\n \"CVE-2019-10639\",\n \"CVE-2019-11478\",\n \"CVE-2019-11599\",\n \"CVE-2019-12456\",\n \"CVE-2019-12614\",\n \"CVE-2019-12818\",\n \"CVE-2019-12819\"\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2019-0456\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1851-1) (SACK Slowness)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-10638: A device could have been tracked by an attacker using\nthe IP ID values the kernel produces for connection-less protocols\n(e.g., UDP and ICMP). When such traffic was sent to multiple\ndestination IP addresses, it was possible to obtain hash collisions\n(of indices to the counter array) and thereby obtain the hashing key\n(via enumeration). An attack may have been conducted by hosting a\ncrafted web page that uses WebRTC or gQUIC to force UDP traffic to\nattacker-controlled IP addresses. (bnc#1140575)\n\nCVE-2019-10639: Information Exposure (partial kernel address\ndisclosure), leading to a KASLR bypass. Specifically, it was possible\nto extract the KASLR kernel image offset using the IP ID values the\nkernel produces for connection-less protocols (e.g., UDP and ICMP).\nWhen such traffic was sent to multiple destination IP addresses, it\nwas possible to obtain hash collisions (of indices to the counter\narray) and thereby obtain the hashing key (via enumeration). This key\ncontains enough bits from a kernel address (of a static variable) so\nwhen the key is extracted (via enumeration), the offset of the kernel\nimage was exposed. This attack could have been carried out remotely,\nby the attacker forcing the target device to send UDP or ICMP (or\ncertain other) traffic to attacker-controlled IP addresses. Forcing a\nserver to send UDP traffic is trivial if the server is a DNS server.\nICMP traffic was trivial if the server answered ICMP Echo requests\n(ping). For client targets, if the target visited the attacker's web\npage, then WebRTC or gQUIC could be used to force UDP traffic to\nattacker-controlled IP addresses. (bnc#1140577)\n\nCVE-2018-20836: A race condition in smp_task_timedout() and\nsmp_task_done() in drivers/scsi/libsas/sas_expander.c, could have lead\nto a use-after-free. (bnc#1134395)\n\nCVE-2019-11599: The coredump implementation in the Linux kernel did\nnot use locking or other mechanisms to prevent vma layout or vma flags\nchanges while it runs, which allowed local users to obtain sensitive\ninformation, cause a denial of service, or possibly have unspecified\nother impact by triggering a race condition with mmget_not_zero or\nget_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c,\nfs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.\n(bnc#1133738)\n\nCVE-2019-12614: An unchecked kstrdup might have allowed an attacker to\ncause denial of service (a NULL pointer dereference and system crash).\n(bnc#1137194)\n\nCVE-2019-12819: The function __mdiobus_register() in\ndrivers/net/phy/mdio_bus.c called put_device() which would trigger a\nfixed_mdio_bus_init use-after-free. This would cause a denial of\nservice. (bnc#1138291)\n\nCVE-2019-12818: The nfc_llcp_build_tlv function in\nnet/nfc/llcp_commands.c may have returned NULL. If the caller did not\ncheck for this, it would trigger a NULL pointer dereference. This\nwould cause denial of service. (bnc#1138293)\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1061840\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1088047\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1098633\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106383\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109137\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1119532\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120423\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124167\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1127155\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1128432\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1128902\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1128910\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1132154\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1132390\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133401\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133738\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1134303\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1134395\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135296\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135556\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135642\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136157\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136811\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136922\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137103\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137194\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137221\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137366\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137429\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137728\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137884\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137996\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137998\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137999\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138000\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138002\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138003\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138005\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138006\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138007\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138008\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138009\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138010\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138011\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138012\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138013\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138014\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138015\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138016\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138018\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138019\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138291\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138375\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138589\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138719\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139771\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139782\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139865\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140133\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140328\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140405\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140424\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140575\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140577\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140637\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140658\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140715\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140719\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140726\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140727\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140728\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140814\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140948\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=821419\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=945811\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-16871/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20836/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10126/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10638/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10639/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-11478/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-11599/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12456/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12614/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12818/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12819/\");\n # https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?2446a209\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 12-SP4:zypper in -t patch\nSUSE-SLE-WE-12-SP4-2019-1851=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP4:zypper in -t\npatch SUSE-SLE-SDK-12-SP4-2019-1851=1\n\nSUSE Linux Enterprise Server 12-SP4:zypper in -t patch\nSUSE-SLE-SERVER-12-SP4-2019-1851=1\n\nSUSE Linux Enterprise Live Patching 12-SP4:zypper in -t patch\nSUSE-SLE-Live-Patching-12-SP4-2019-1851=1\n\nSUSE Linux Enterprise High Availability 12-SP4:zypper in -t patch\nSUSE-SLE-HA-12-SP4-2019-1851=1\n\nSUSE Linux Enterprise Desktop 12-SP4:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP4-2019-1851=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-20836\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2019-10126\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-extra-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP4\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-devel-debuginfo-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-base-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-base-debuginfo-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-debuginfo-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-debugsource-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-devel-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-syms-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-debuginfo-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-debugsource-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-devel-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-devel-debuginfo-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-extra-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-extra-debuginfo-4.12.14-95.24.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-syms-4.12.14-95.24.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T15:19:23", "description": "The openSUSE Leap 15.0 was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-10638: A device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575).\n\n - CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed.\n This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping).\n For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).\n\n - CVE-2018-20836: There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n\n - CVE-2019-10126: A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences (bnc#1136935).\n\n - CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).\n\n - CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c where there was an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n\n - CVE-2018-16871: A flaw was found in NFS where an attacker who is able to mount an exported NFS filesystem was able to trigger a NULL pointer dereference by an invalid NFS sequence. (bnc#1137103).\n\nThe following non-security bugs were fixed :\n\n - 6lowpan: Off by one handling ->nexthdr (bsc#1051510).\n\n - added De0-Nanos-SoC board support (and others based on Altera SOC).\n\n - Add sample kernel-default-base spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n\n - Add sample kernel-default-base spec file (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n\n - af_key: unconditionally clone on broadcast (bsc#1051510).\n\n - alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n\n - alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n\n - alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n\n - alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n\n - alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n\n - alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n\n - alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n\n - apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n\n - audit: fix a memory leak bug (bsc#1051510).\n\n - ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n\n - blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).\n\n - block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n\n - bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n\n - can: af_can: Fix error path of can_init() (bsc#1051510).\n\n - can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n\n - can: purge socket error queue on sock destruct (bsc#1051510).\n\n - ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n\n - cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n\n - clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).\n\n - clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n\n - coresight: etb10: Fix handling of perf mode (bsc#1051510).\n\n - coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n\n - cpu/topology: Export die_id (jsc#SLE-5454).\n\n - crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n\n - crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n\n - crypto: user - prevent operating on larval algorithms (bsc#1133401).\n\n - device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n\n - dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n\n - dm, dax: Fix detection of DAX support (bsc#1139782).\n\n - doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n\n - Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).\n\n - Do not provide kernel-default-srchash from kernel-default-base.\n\n - Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n\n - driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n\n - driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n\n - drivers/base: Introduce kill_device() (bsc#1139865).\n\n - drivers/base: kABI fixes for struct device_private (bsc#1106383).\n\n - drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n\n - drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).\n\n - drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n\n - drivers: thermal: tsens: Do not print error message on\n -EPROBE_DEFER (bsc#1051510).\n\n - drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n\n - drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n\n - EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n\n - ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).\n\n - ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).\n\n - genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n\n - genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n\n - genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n\n - hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n\n - hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n\n - hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).\n\n - hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).\n\n - hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).\n\n - hwmon: (k10temp) Add support for family 17h (FATE#327735).\n\n - hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).\n\n - hwmon: (k10temp) Add support for temperature offsets (FATE#327735).\n\n - hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).\n\n - hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).\n\n - hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).\n\n - hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).\n\n - hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).\n\n - hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).\n\n - hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).\n\n - hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).\n\n - hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).\n\n - hwmon: k10temp: Support Threadripper 2920X, 2970WX;\n simplify offset table (FATE#327735).\n\n - hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).\n\n - hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n\n - hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).\n\n - i2c: acorn: fix i2c warning (bsc#1135642).\n\n - i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).\n\n - ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n\n - input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n\n - input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n\n - Install extra rpm scripts for kernel subpackaging (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n\n - Install extra rpm scripts for kernel subpackaging (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n\n - kabi fixup blk_mq_register_dev() (bsc#1140637).\n\n - kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n\n - kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n\n - kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).\n\n - kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n\n - libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n\n - libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n\n - libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n\n - mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n\n - mac80211: drop robust management frames from unknown TA (bsc#1051510).\n\n - mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n\n - media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n\n - mISDN: make sure device name is NUL terminated (bsc#1051510).\n\n - mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n\n - module: Fix livepatch/ftrace module text permissions race (bsc#1071995).\n\n - module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).\n\n - net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n\n - net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n\n - net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n\n - nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n\n - nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n\n - nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n\n - ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n\n - nvme: copy MTFA field from identify controller (bsc#1140715).\n\n - nvme-rdma: fix double freeing of async event data (bsc#1120423).\n\n - nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).\n\n - ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n\n - pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n\n - pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n\n - perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n\n - perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n\n - perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n\n - perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n\n - perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n\n - powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n\n - powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n\n - powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).\n\n - powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n\n - powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n\n - powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n\n - ppp: mppe: Add softdep to arc4 (bsc#1088047).\n\n - qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n\n - qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n\n - qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n\n - qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n\n - rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n\n - ras/CEC: Convert the timer callback to a workqueue (bsc#1114279).\n\n - ras/CEC: Fix binary search function (bsc#1114279).\n\n - Refresh patches.fixes/scsi-Introduce-scsi_start_queue.patch (bsc#1119532).\n\n - Remove the previous subpackage infrastructure. This partially reverts commit 9b3ca32c11854156b2f950ff5e26131377d8445e ('Add kernel-subpackage-build.spec (FATE#326579).')\n\n - Replace the bluetooth fix with the upstream commit (bsc#1135556)\n\n - Revert 'Drop multiversion(kernel) from the KMP template ()' (bsc#1109137).\n\n - Revert 'Drop multiversion(kernel) from the KMP template (fate#323189)' (bsc#1109137). This reverts commit 71504d805c1340f68715ad41958e5ef35da2c351.\n\n - Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).'\n\n - Revert 'KMPs: provide and conflict a kernel version specific KMP name'\n\n - Revert 'Revert 'Drop multiversion(kernel) from the KMP template ()''\n\n - Revert 'Revert 'Drop multiversion(kernel) from the KMP template (fate#323189)'' This feature was requested for SLE15 but aws reverted in packaging and master.\n\n - Revert 's390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).'\n\n - Revert 'Sign non-x86 kernels when possible (boo#1134303)' This reverts commit bac621c6704610562ebd9e74ae5ad85ca8025681.\n\n - Revert 'svm: Fix AVIC incomplete IPI emulation' (bsc#1140133).\n\n - rpm: Add arm64 dtb-allwinner subpackage 4.10 added arch/arm64/boot/dts/allwinner/.\n\n - rpm: Add arm64 dtb-zte subpackage 4.9 added arch/arm64/boot/dts/zte/.\n\n - rpm/kernel-binary.spec.in: Add back kernel-binary-base subpackage (jsc#SLE-3853).\n\n - rpm/kernel-binary.spec.in: Build livepatch support in SUSE release projects (bsc#1124167).\n\n - rpm/kernel-subpackage-build: handle arm kernel zImage.\n\n - rpm/kernel-subpackage-spec: only provide firmware actually present in subpackage.\n\n - rpm/package-descriptions: fix typo in kernel-azure\n\n - rpm/post.sh: correct typo in err msg (bsc#1137625)\n\n - s390/dasd: fix using offset into zero size array error (bsc#1051510).\n\n - s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).\n\n - s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n\n - s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n\n - s390/setup: fix early warning messages (bsc#1051510).\n\n - s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n\n - sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n\n - scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.\n\n - scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes\n\n - scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n\n - scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n\n - scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n\n - scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n\n - scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n\n - scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n\n - scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n\n - scsi: zfcp: fix missing zfcp_port reference put on\n -EBUSY from port_remove (bsc#1051510).\n\n - scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n\n - scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n\n - scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n\n - smb3: Fix endian warning (bsc#1137884).\n\n - soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n\n - soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n\n - staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n\n - svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n\n - svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n\n - sysctl: handle overflow in proc_get_long (bsc#1051510).\n\n - thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n\n - thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n\n - thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n\n - tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n\n - tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n\n - topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n\n - topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n\n - tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n\n - Trim build dependencies of sample subpackage spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n\n - Trim build dependencies of sample subpackage spec file (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n\n - tty: max310x: Fix external crystal register setup (bsc#1051510).\n\n - usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).\n\n - usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).\n\n - usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n\n - usbnet: ipheth: fix racing condition (bsc#1051510).\n\n - usb: serial: fix initial-termios handling (bsc#1135642).\n\n - usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n\n - usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n\n - usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n\n - usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n\n - usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n\n - usb: xhci: avoid NULL pointer deref when bos field is NULL (bsc#1135642).\n\n - vfio: ccw: only free cp on final interrupt (bsc#1051510).\n\n - vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n\n - x86/amd_nb: Add support for Raven Ridge CPUs ().\n\n - x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).\n\n - x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).\n\n - x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n\n - x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382).\n\n - x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n\n - x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().\n\n - x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).\n\n - x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n\n - x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n\n - x86/microcode: Fix microcode hotplug state (bsc#1114279).\n\n - x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n\n - x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n\n - x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n\n - x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n\n - x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n\n - x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n\n - x86/topology: Define topology_die_id() (jsc#SLE-5454).\n\n - x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-22T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2019-1716)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-16871", "CVE-2018-20836", "CVE-2019-10126", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11599", "CVE-2019-12614"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "cpe:/o:novell:opensuse:15.0"], "id": "OPENSUSE-2019-1716.NASL", "href": "https://www.tenable.com/plugins/nessus/126884", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-1716.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(126884);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2018-16871\", \"CVE-2018-20836\", \"CVE-2019-10126\", \"CVE-2019-10638\", \"CVE-2019-10639\", \"CVE-2019-11599\", \"CVE-2019-12614\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2019-1716)\");\n script_summary(english:\"Check for the openSUSE-2019-1716 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The openSUSE Leap 15.0 was updated to receive various security and\nbugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-10638: A device can be tracked by an attacker\n using the IP ID values the kernel produces for\n connection-less protocols (e.g., UDP and ICMP). When\n such traffic is sent to multiple destination IP\n addresses, it is possible to obtain hash collisions (of\n indices to the counter array) and thereby obtain the\n hashing key (via enumeration). An attack may be\n conducted by hosting a crafted web page that uses WebRTC\n or gQUIC to force UDP traffic to attacker-controlled IP\n addresses (bnc#1140575).\n\n - CVE-2019-10639: The Linux kernel allowed Information\n Exposure (partial kernel address disclosure), leading to\n a KASLR bypass. Specifically, it is possible to extract\n the KASLR kernel image offset using the IP ID values the\n kernel produces for connection-less protocols (e.g., UDP\n and ICMP). When such traffic is sent to multiple\n destination IP addresses, it is possible to obtain hash\n collisions (of indices to the counter array) and thereby\n obtain the hashing key (via enumeration). This key\n contains enough bits from a kernel address (of a static\n variable) so when the key is extracted (via\n enumeration), the offset of the kernel image is exposed.\n This attack can be carried out remotely, by the attacker\n forcing the target device to send UDP or ICMP (or\n certain other) traffic to attacker-controlled IP\n addresses. Forcing a server to send UDP traffic is\n trivial if the server is a DNS server. ICMP traffic is\n trivial if the server answers ICMP Echo requests (ping).\n For client targets, if the target visits the attacker's\n web page, then WebRTC or gQUIC can be used to force UDP\n traffic to attacker-controlled IP addresses. NOTE: this\n attack against KASLR became viable in 4.1 because IP ID\n generation was changed to have a dependency on an\n address associated with a network namespace\n (bnc#1140577).\n\n - CVE-2018-20836: There was a race condition in\n smp_task_timedout() and smp_task_done() in\n drivers/scsi/libsas/sas_expander.c, leading to a\n use-after-free (bnc#1134395).\n\n - CVE-2019-10126: A heap based buffer overflow in\n mwifiex_uap_parse_tail_ies function in\n drivers/net/wireless/marvell/mwifiex/ie.c might lead to\n memory corruption and possibly other consequences\n (bnc#1136935).\n\n - CVE-2019-11599: The coredump implementation in the Linux\n kernel did not use locking or other mechanisms to\n prevent vma layout or vma flags changes while it runs,\n which allowed local users to obtain sensitive\n information, cause a denial of service, or possibly have\n unspecified other impact by triggering a race condition\n with mmget_not_zero or get_task_mm calls. This is\n related to fs/userfaultfd.c, mm/mmap.c,\n fs/proc/task_mmu.c, and\n drivers/infiniband/core/uverbs_main.c (bnc#1131645\n 1133738).\n\n - CVE-2019-12614: An issue was discovered in\n dlpar_parse_cc_property in\n arch/powerpc/platforms/pseries/dlpar.c where there was\n an unchecked kstrdup of prop->name, which might allow an\n attacker to cause a denial of service (NULL pointer\n dereference and system crash) (bnc#1137194).\n\n - CVE-2018-16871: A flaw was found in NFS where an\n attacker who is able to mount an exported NFS filesystem\n was able to trigger a NULL pointer dereference by an\n invalid NFS sequence. (bnc#1137103).\n\nThe following non-security bugs were fixed :\n\n - 6lowpan: Off by one handling ->nexthdr (bsc#1051510).\n\n - added De0-Nanos-SoC board support (and others based on\n Altera SOC).\n\n - Add sample kernel-default-base spec file (FATE#326579,\n jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n\n - Add sample kernel-default-base spec file (jsc#SLE-4117,\n jsc#SLE-3853, bsc#1128910).\n\n - af_key: unconditionally clone on broadcast\n (bsc#1051510).\n\n - alsa: firewire-lib/fireworks: fix miss detection of\n received MIDI messages (bsc#1051510).\n\n - alsa: hda - Force polling mode on CNL for fixing codec\n communication (bsc#1051510).\n\n - alsa: hda/realtek: Add quirks for several Clevo notebook\n barebones (bsc#1051510).\n\n - alsa: hda/realtek - Change front mic location for Lenovo\n M710q (bsc#1051510).\n\n - alsa: line6: Fix write on zero-sized buffer\n (bsc#1051510).\n\n - alsa: seq: fix incorrect order of dest_client/dest_ports\n arguments (bsc#1051510).\n\n - alsa: usb-audio: fix sign unintended sign extension on\n left shifts (bsc#1051510).\n\n - apparmor: enforce nullbyte at end of tag string\n (bsc#1051510).\n\n - audit: fix a memory leak bug (bsc#1051510).\n\n - ax25: fix inconsistent lock state in ax25_destroy_timer\n (bsc#1051510).\n\n - blk-mq: free hw queue's resource in hctx's release\n handler (bsc#1140637).\n\n - block: Fix a NULL pointer dereference in\n generic_make_request() (bsc#1139771).\n\n - bluetooth: Fix faulty expression for minimum encryption\n key size check (bsc#1140328).\n\n - can: af_can: Fix error path of can_init() (bsc#1051510).\n\n - can: flexcan: fix timeout when set small bitrate\n (bsc#1051510).\n\n - can: purge socket error queue on sock destruct\n (bsc#1051510).\n\n - ceph: flush dirty inodes before proceeding with remount\n (bsc#1140405).\n\n - cfg80211: fix memory leak of wiphy device name\n (bsc#1051510).\n\n - clk: rockchip: Turn on 'aclk_dmac1' for suspend on\n rk3288 (bsc#1051510).\n\n - clk: tegra: Fix PLLM programming on Tegra124+ when PMC\n overrides divider (bsc#1051510).\n\n - coresight: etb10: Fix handling of perf mode\n (bsc#1051510).\n\n - coresight: etm4x: Add support to enable ETMv4.2\n (bsc#1051510).\n\n - cpu/topology: Export die_id (jsc#SLE-5454).\n\n - crypto: algapi - guard against uninitialized spawn list\n in crypto_remove_spawns (bsc#1133401).\n\n - crypto: cryptd - Fix skcipher instance memory leak\n (bsc#1051510).\n\n - crypto: user - prevent operating on larval algorithms\n (bsc#1133401).\n\n - device core: Consolidate locking and unlocking of parent\n and device (bsc#1106383).\n\n - dmaengine: imx-sdma: remove BD_INTR for channel0\n (bsc#1051510).\n\n - dm, dax: Fix detection of DAX support (bsc#1139782).\n\n - doc: Cope with the deprecation of AutoReporter\n (bsc#1051510).\n\n - Do not provide kernel-default from kernel-default-base\n (boo#1132154, bsc#1106751).\n\n - Do not provide kernel-default-srchash from\n kernel-default-base.\n\n - Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n\n - driver core: Establish order of operations for\n device_add and device_del via bitflag (bsc#1106383).\n\n - driver core: Probe devices asynchronously instead of the\n driver (bsc#1106383).\n\n - drivers/base: Introduce kill_device() (bsc#1139865).\n\n - drivers/base: kABI fixes for struct device_private\n (bsc#1106383).\n\n - drivers: misc: fix out-of-bounds access in function\n param_set_kgdbts_var (bsc#1051510).\n\n - drivers/rapidio/devices/rio_mport_cdev.c: fix resource\n leak in error handling path in 'rio_dma_transfer()'\n (bsc#1051510).\n\n - drivers/rapidio/rio_cm.c: fix potential oops in\n riocm_ch_listen() (bsc#1051510).\n\n - drivers: thermal: tsens: Do not print error message on\n -EPROBE_DEFER (bsc#1051510).\n\n - drm/arm/hdlcd: Allow a bit of clock tolerance\n (bsc#1051510).\n\n - drm/i915/gvt: ignore unexpected pvinfo write\n (bsc#1051510).\n\n - EDAC/mc: Fix edac_mc_find() in case no device is found\n (bsc#1114279).\n\n - ftrace/x86: Remove possible deadlock between\n register_kprobe() and ftrace_run_update_code()\n (bsc#1071995).\n\n - ftrace/x86: Remove possible deadlock between\n register_kprobe() and ftrace_run_update_code()\n (bsc#1071995 fate#323487).\n\n - genirq: Prevent use-after-free and work list corruption\n (bsc#1051510).\n\n - genirq: Respect IRQCHIP_SKIP_SET_WAKE in\n irq_chip_set_wake_parent() (bsc#1051510).\n\n - genwqe: Prevent an integer overflow in the ioctl\n (bsc#1051510).\n\n - hwmon/coretemp: Cosmetic: Rename internal variables to\n zones from packages (jsc#SLE-5454).\n\n - hwmon/coretemp: Support multi-die/package\n (jsc#SLE-5454).\n\n - hwmon: (k10temp) 27C Offset needed for Threadripper2\n (FATE#327735).\n\n - hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).\n\n - hwmon: (k10temp) Add support for AMD Ryzen w/ Vega\n graphics (FATE#327735).\n\n - hwmon: (k10temp) Add support for family 17h\n (FATE#327735).\n\n - hwmon: (k10temp) Add support for Stoney Ridge and\n Bristol Ridge CPUs (FATE#327735).\n\n - hwmon: (k10temp) Add support for temperature offsets\n (FATE#327735).\n\n - hwmon: (k10temp) Add temperature offset for Ryzen 1900X\n (FATE#327735).\n\n - hwmon: (k10temp) Add temperature offset for Ryzen 2700X\n (FATE#327735).\n\n - hwmon: (k10temp) Correct model name for Ryzen 1600X\n (FATE#327735).\n\n - hwmon: (k10temp) Display both Tctl and Tdie\n (FATE#327735).\n\n - hwmon: (k10temp) Fix reading critical temperature\n register (FATE#327735).\n\n - hwmon: (k10temp) Make function get_raw_temp static\n (FATE#327735).\n\n - hwmon: (k10temp) Move chip specific code into probe\n function (FATE#327735).\n\n - hwmon: (k10temp) Only apply temperature offset if result\n is positive (FATE#327735).\n\n - hwmon: (k10temp) Support all Family 15h Model 6xh and\n Model 7xh processors (FATE#327735).\n\n - hwmon: k10temp: Support Threadripper 2920X, 2970WX;\n simplify offset table (FATE#327735).\n\n - hwmon: (k10temp) Use API function to access System\n Management Network (FATE#327735).\n\n - hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs\n ().\n\n - hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs\n (FATE#327735).\n\n - i2c: acorn: fix i2c warning (bsc#1135642).\n\n - i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).\n\n - ibmveth: Update ethtool settings to reflect virtual\n properties (bsc#1136157, LTC#177197).\n\n - input: synaptics - enable SMBus on ThinkPad E480 and\n E580 (bsc#1051510).\n\n - input: uinput - add compat ioctl number translation for\n UI_*_FF_UPLOAD (bsc#1051510).\n\n - Install extra rpm scripts for kernel subpackaging\n (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n\n - Install extra rpm scripts for kernel subpackaging\n (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n\n - kabi fixup blk_mq_register_dev() (bsc#1140637).\n\n - kabi: x86/topology: Add CPUID.1F multi-die/package\n support (jsc#SLE-5454).\n\n - kabi: x86/topology: Define topology_logical_die_id()\n (jsc#SLE-5454).\n\n - kvm: x86: Include CPUID leaf 0x8000001e in kvm's\n supported CPUID (bsc#1114279).\n\n - kvm: x86: Include multiple indices with CPUID leaf\n 0x8000001d (bsc#1114279).\n\n - libata: Extend quirks for the ST1000LM024 drives with\n NOLPM quirk (bsc#1051510).\n\n - libnvdimm/bus: Prevent duplicate device_unregister()\n calls (bsc#1139865).\n\n - libnvdimm, pfn: Fix over-trim in trim_pfn_device()\n (bsc#1140719).\n\n - mac80211: Do not use stack memory with scatterlist for\n GMAC (bsc#1051510).\n\n - mac80211: drop robust management frames from unknown TA\n (bsc#1051510).\n\n - mac80211: handle deauthentication/disassociation from\n TDLS peer (bsc#1051510).\n\n - media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n\n - mISDN: make sure device name is NUL terminated\n (bsc#1051510).\n\n - mmc: core: Prevent processing SDIO IRQs when the card is\n suspended (bsc#1051510).\n\n - module: Fix livepatch/ftrace module text permissions\n race (bsc#1071995).\n\n - module: Fix livepatch/ftrace module text permissions\n race (bsc#1071995 fate#323487).\n\n - net: mvpp2: prs: Fix parser range for VID filtering\n (bsc#1098633).\n\n - net: mvpp2: prs: Use the correct helpers when removing\n all VID filters (bsc#1098633).\n\n - net: mvpp2: Use strscpy to handle stat strings\n (bsc#1098633).\n\n - nfit/ars: Allow root to busy-poll the ARS state machine\n (bsc#1140814).\n\n - nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n\n - nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n\n - ntp: Allow TAI-UTC offset to be set to zero\n (bsc#1135642).\n\n - nvme: copy MTFA field from identify controller\n (bsc#1140715).\n\n - nvme-rdma: fix double freeing of async event data\n (bsc#1120423).\n\n - nvme-rdma: fix possible double free of controller async\n event buffer (bsc#1120423).\n\n - ocfs2: try to reuse extent block in dealloc without\n meta_alloc (bsc#1128902).\n\n - pci: PM: Skip devices in D0 for suspend-to-idle\n (bsc#1051510).\n\n - pci: rpadlpar: Fix leaked device_node references in\n add/remove paths (bsc#1051510).\n\n - perf/x86/intel/cstate: Support multi-die/package\n (jsc#SLE-5454).\n\n - perf/x86/intel/rapl: Cosmetic rename internal variables\n in response to multi-die/pkg support (jsc#SLE-5454).\n\n - perf/x86/intel/rapl: Support multi-die/package\n (jsc#SLE-5454).\n\n - perf/x86/intel/uncore: Cosmetic renames in response to\n multi-die/pkg support (jsc#SLE-5454).\n\n - perf/x86/intel/uncore: Support multi-die/package\n (jsc#SLE-5454).\n\n - powercap/intel_rapl: Simplify rapl_find_package()\n (jsc#SLE-5454).\n\n - powercap/intel_rapl: Support multi-die/package\n (jsc#SLE-5454).\n\n - powercap/intel_rapl: Update RAPL domain name and debug\n messages (jsc#SLE-5454).\n\n - powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to\n power9 event list (bsc#1137728, LTC#178106).\n\n - powerpc/perf: Add POWER9 alternate PM_RUN_CYC and\n PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n\n - powerpc/rtas: retry when cpu offline races with\n suspend/migration (bsc#1140428, LTC#178808).\n\n - ppp: mppe: Add softdep to arc4 (bsc#1088047).\n\n - qmi_wwan: add network device usage statistics for qmimux\n devices (bsc#1051510).\n\n - qmi_wwan: add support for QMAP padding in the RX path\n (bsc#1051510).\n\n - qmi_wwan: avoid RCU stalls on device disconnect when in\n QMAP mode (bsc#1051510).\n\n - qmi_wwan: extend permitted QMAP mux_id value range\n (bsc#1051510).\n\n - rapidio: fix a NULL pointer dereference when\n create_workqueue() fails (bsc#1051510).\n\n - ras/CEC: Convert the timer callback to a workqueue\n (bsc#1114279).\n\n - ras/CEC: Fix binary search function (bsc#1114279).\n\n - Refresh\n patches.fixes/scsi-Introduce-scsi_start_queue.patch\n (bsc#1119532).\n\n - Remove the previous subpackage infrastructure. This\n partially reverts commit\n 9b3ca32c11854156b2f950ff5e26131377d8445e ('Add\n kernel-subpackage-build.spec (FATE#326579).')\n\n - Replace the bluetooth fix with the upstream commit\n (bsc#1135556)\n\n - Revert 'Drop multiversion(kernel) from the KMP template\n ()' (bsc#1109137).\n\n - Revert 'Drop multiversion(kernel) from the KMP template\n (fate#323189)' (bsc#1109137). This reverts commit\n 71504d805c1340f68715ad41958e5ef35da2c351.\n\n - Revert 'KMPs: obsolete older KMPs of the same flavour\n (bsc#1127155, bsc#1109137).'\n\n - Revert 'KMPs: provide and conflict a kernel version\n specific KMP name'\n\n - Revert 'Revert 'Drop multiversion(kernel) from the KMP\n template ()''\n\n - Revert 'Revert 'Drop multiversion(kernel) from the KMP\n template (fate#323189)'' This feature was requested for\n SLE15 but aws reverted in packaging and master.\n\n - Revert 's390/jump_label: Use 'jdd' constraint on gcc9\n (bsc#1138589).'\n\n - Revert 'Sign non-x86 kernels when possible\n (boo#1134303)' This reverts commit\n bac621c6704610562ebd9e74ae5ad85ca8025681.\n\n - Revert 'svm: Fix AVIC incomplete IPI emulation'\n (bsc#1140133).\n\n - rpm: Add arm64 dtb-allwinner subpackage 4.10 added\n arch/arm64/boot/dts/allwinner/.\n\n - rpm: Add arm64 dtb-zte subpackage 4.9 added\n arch/arm64/boot/dts/zte/.\n\n - rpm/kernel-binary.spec.in: Add back kernel-binary-base\n subpackage (jsc#SLE-3853).\n\n - rpm/kernel-binary.spec.in: Build livepatch support in\n SUSE release projects (bsc#1124167).\n\n - rpm/kernel-subpackage-build: handle arm kernel zImage.\n\n - rpm/kernel-subpackage-spec: only provide firmware\n actually present in subpackage.\n\n - rpm/package-descriptions: fix typo in kernel-azure\n\n - rpm/post.sh: correct typo in err msg (bsc#1137625)\n\n - s390/dasd: fix using offset into zero size array error\n (bsc#1051510).\n\n - s390/jump_label: Use 'jdd' constraint on gcc9\n (bsc#1138589).\n\n - s390/qeth: fix race when initializing the IP address\n table (bsc#1051510).\n\n - s390/qeth: fix VLAN attribute in bridge_hostnotify udev\n event (bsc#1051510).\n\n - s390/setup: fix early warning messages (bsc#1051510).\n\n - s390/virtio: handle find on invalid queue gracefully\n (bsc#1051510).\n\n - sbitmap: fix improper use of smp_mb__before_atomic()\n (bsc#1140658).\n\n - scripts/git_sort/git_sort.py: add djbw/nvdimm\n nvdimm-pending.\n\n - scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes\n\n - scsi: core: add new RDAC LENOVO/DE_Series device\n (bsc#1132390).\n\n - scsi: qla2xxx: Fix abort handling in\n tcm_qla2xxx_write_pending() (bsc#1140727).\n\n - scsi: qla2xxx: Fix FC-AL connection target discovery\n (bsc#1094555).\n\n - scsi: qla2xxx: Fix incorrect region-size setting in\n optrom SYSFS routines (bsc#1140728).\n\n - scsi: qla2xxx: Fix N2N target discovery with Local loop\n (bsc#1094555).\n\n - scsi: target/iblock: Fix overrun in WRITE SAME emulation\n (bsc#1140424).\n\n - scsi: vmw_pscsi: Fix use-after-free in\n pvscsi_queue_lck() (bsc#1135296).\n\n - scsi: zfcp: fix missing zfcp_port reference put on\n -EBUSY from port_remove (bsc#1051510).\n\n - scsi: zfcp: fix rport unblock if deleted SCSI devices on\n Scsi_Host (bsc#1051510).\n\n - scsi: zfcp: fix scsi_eh host reset with port_forced ERP\n for non-NPIV FCP devices (bsc#1051510).\n\n - scsi: zfcp: fix to prevent port_remove with pure auto\n scan LUNs (only sdevs) (bsc#1051510).\n\n - smb3: Fix endian warning (bsc#1137884).\n\n - soc: mediatek: pwrap: Zero initialize rdata in\n pwrap_init_cipher (bsc#1051510).\n\n - soc: rockchip: Set the proper PWM for rk3288\n (bsc#1051510).\n\n - staging: comedi: ni_mio_common: Fix divide-by-zero for\n DIO cmdtest (bsc#1051510).\n\n - svm: Add warning message for AVIC IPI invalid target\n (bsc#1140133).\n\n - svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n\n - sysctl: handle overflow in proc_get_long (bsc#1051510).\n\n - thermal: rcar_gen3_thermal: disable interrupt in .remove\n (bsc#1051510).\n\n - thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal\n variables to zones from packages (jsc#SLE-5454).\n\n - thermal/x86_pkg_temp_thermal: Support multi-die/package\n (jsc#SLE-5454).\n\n - tmpfs: fix link accounting when a tmpfile is linked in\n (bsc#1051510).\n\n - tmpfs: fix uninitialized return value in shmem_link\n (bsc#1051510).\n\n - topology: Create core_cpus and die_cpus sysfs attributes\n (jsc#SLE-5454).\n\n - topology: Create package_cpus sysfs attribute\n (jsc#SLE-5454).\n\n - tracing/snapshot: Resize spare buffer if size changed\n (bsc#1140726).\n\n - Trim build dependencies of sample subpackage spec file\n (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n\n - Trim build dependencies of sample subpackage spec file\n (jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n\n - tty: max310x: Fix external crystal register setup\n (bsc#1051510).\n\n - usb: chipidea: udc: workaround for endpoint conflict\n issue (bsc#1135642).\n\n - usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam\n regression) (bsc#1135642).\n\n - usb: Fix chipmunk-like voice when using Logitech C270\n for recording audio (bsc#1051510).\n\n - usbnet: ipheth: fix racing condition (bsc#1051510).\n\n - usb: serial: fix initial-termios handling (bsc#1135642).\n\n - usb: serial: option: add support for Simcom\n SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n\n - usb: serial: option: add Telit 0x1260 and 0x1261\n compositions (bsc#1051510).\n\n - usb: serial: pl2303: add Allied Telesis VT-Kit3\n (bsc#1051510).\n\n - usb: serial: pl2303: fix tranceiver suspend mode\n (bsc#1135642).\n\n - usb: usb-storage: Add new ID to ums-realtek\n (bsc#1051510).\n\n - usb: xhci: avoid NULL pointer deref when bos field is\n NULL (bsc#1135642).\n\n - vfio: ccw: only free cp on final interrupt\n (bsc#1051510).\n\n - vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n\n - x86/amd_nb: Add support for Raven Ridge CPUs ().\n\n - x86/amd_nb: Add support for Raven Ridge CPUs\n (FATE#327735).\n\n - x86/CPU/AMD: Do not force the CPB cap when running under\n a hypervisor (bsc#1114279).\n\n - x86/cpufeatures: Carve out CQM features retrieval\n (jsc#SLE-5382).\n\n - x86/cpufeatures: Combine word 11 and 12 into a new\n scattered features word (jsc#SLE-5382).\n\n - x86/cpufeatures: Enumerate the new AVX512 BFLOAT16\n instructions (jsc#SLE-5382).\n\n - x86/CPU/hygon: Fix phys_proc_id calculation logic for\n multi-die processors ().\n\n - x86/CPU/hygon: Fix phys_proc_id calculation logic for\n multi-die processors (fate#327735).\n\n - x86/mce: Fix machine_check_poll() tests for error types\n (bsc#1114279).\n\n - x86/microcode, cpuhotplug: Add a microcode loader CPU\n hotplug callback (bsc#1114279).\n\n - x86/microcode: Fix microcode hotplug state\n (bsc#1114279).\n\n - x86/microcode: Fix the ancient deprecated microcode\n loading method (bsc#1114279).\n\n - x86/mm/mem_encrypt: Disable all instrumentation for\n early SME setup (bsc#1114279).\n\n - x86/smpboot: Rename match_die() to match_pkg()\n (jsc#SLE-5454).\n\n - x86/speculation/mds: Revert CPU buffer clear on double\n fault exit (bsc#1114279).\n\n - x86/topology: Add CPUID.1F multi-die/package support\n (jsc#SLE-5454).\n\n - x86/topology: Create topology_max_die_per_package()\n (jsc#SLE-5454).\n\n - x86/topology: Define topology_die_id() (jsc#SLE-5454).\n\n - x86/topology: Define topology_logical_die_id()\n (jsc#SLE-5454).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1088047\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1094555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1098633\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106383\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109137\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1119532\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120423\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124167\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127155\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128902\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128910\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1131645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1132154\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1132390\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133738\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134303\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134395\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135556\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135642\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136157\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136935\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137103\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137194\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137728\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137884\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138589\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1139771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1139782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1139865\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140133\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140328\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140405\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140575\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140577\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140637\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140715\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140726\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140727\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140728\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140814\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-20836\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-base-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-base-debuginfo-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-debuginfo-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-debugsource-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-devel-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-devel-debuginfo-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-base-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-base-debuginfo-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-debuginfo-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-debugsource-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-devel-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-devel-debuginfo-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-devel-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-docs-html-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-base-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-debugsource-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-devel-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-macros-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-build-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-build-debugsource-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-qa-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-source-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-source-vanilla-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-syms-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-base-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-debuginfo-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-debugsource-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-devel-4.12.14-lp150.12.67.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-lp150.12.67.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T15:19:48", "description": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575 1140577).\n\nCVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image was exposed. This attack could be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).\n\nCVE-2019-13233: In arch/x86/lib/insn-eval.c in the Linux kernel, there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation (bnc#1140454).\n\nCVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n\nCVE-2019-10126: A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might have lead to memory corruption and possibly other consequences (bnc#1136935).\n\nCVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-16T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1854-1)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-20836", "CVE-2019-10126", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11599", "CVE-2019-13233"], "modified": "2022-05-19T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-debug", "p-cpe:/a:novell:suse_linux:kernel-debug-base", "p-cpe:/a:novell:suse_linux:kernel-debug-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-debug-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-debug-debugsource", "p-cpe:/a:novell:suse_linux:kernel-debug-devel", "p-cpe:/a:novell:suse_linux:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-debug-livepatch-devel", "p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-livepatch", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-kvmsmall", "p-cpe:/a:novell:suse_linux:kernel-kvmsmall-base", "p-cpe:/a:novell:suse_linux:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:suse_linux:kernel-kvmsmall-devel", "p-cpe:/a:novell:suse_linux:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-kvmsmall-livepatch-devel", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-obs-qa", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-vanilla", "p-cpe:/a:novell:suse_linux:kernel-vanilla-base", "p-cpe:/a:novell:suse_linux:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-vanilla-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-vanilla-debugsource", "p-cpe:/a:novell:suse_linux:kernel-vanilla-devel", "p-cpe:/a:novell:suse_linux:kernel-vanilla-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-vanilla-livepatch-devel", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-man", "p-cpe:/a:novell:suse_linux:kselftests-kmp-default", "p-cpe:/a:novell:suse_linux:kselftests-kmp-default-debuginfo", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2019-1854-1.NASL", "href": "https://www.tenable.com/plugins/nessus/126743", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:1854-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(126743);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/19\");\n\n script_cve_id(\n \"CVE-2018-20836\",\n \"CVE-2019-10126\",\n \"CVE-2019-10638\",\n \"CVE-2019-10639\",\n \"CVE-2019-11599\",\n \"CVE-2019-13233\"\n );\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1854-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-10638: In the Linux kernel, a device could be tracked by an\nattacker using the IP ID values the kernel produces for\nconnection-less protocols (e.g., UDP and ICMP). When such traffic was\nsent to multiple destination IP addresses, it was possible to obtain\nhash collisions (of indices to the counter array) and thereby obtain\nthe hashing key (via enumeration). An attack may have been conducted\nby hosting a crafted web page that uses WebRTC or gQUIC to force UDP\ntraffic to attacker-controlled IP addresses (bnc#1140575 1140577).\n\nCVE-2019-10639: The Linux kernel allowed Information Exposure (partial\nkernel address disclosure), leading to a KASLR bypass. Specifically,\nit was possible to extract the KASLR kernel image offset using the IP\nID values the kernel produces for connection-less protocols (e.g., UDP\nand ICMP). When such traffic was sent to multiple destination IP\naddresses, it was possible to obtain hash collisions (of indices to\nthe counter array) and thereby obtain the hashing key (via\nenumeration). This key contains enough bits from a kernel address (of\na static variable) so when the key was extracted (via enumeration),\nthe offset of the kernel image was exposed. This attack could be\ncarried out remotely, by the attacker forcing the target device to\nsend UDP or ICMP (or certain other) traffic to attacker-controlled IP\naddresses. Forcing a server to send UDP traffic is trivial if the\nserver is a DNS server. ICMP traffic is trivial if the server answers\nICMP Echo requests (ping). For client targets, if the target visits\nthe attacker's web page, then WebRTC or gQUIC can be used to force UDP\ntraffic to attacker-controlled IP addresses. NOTE: this attack against\nKASLR became viable because IP ID generation was changed to have a\ndependency on an address associated with a network namespace\n(bnc#1140577).\n\nCVE-2019-13233: In arch/x86/lib/insn-eval.c in the Linux kernel, there\nwas a use-after-free for access to an LDT entry because of a race\ncondition between modify_ldt() and a #BR exception for an MPX bounds\nviolation (bnc#1140454).\n\nCVE-2018-20836: An issue was discovered in the Linux kernel There was\na race condition in smp_task_timedout() and smp_task_done() in\ndrivers/scsi/libsas/sas_expander.c, leading to a use-after-free\n(bnc#1134395).\n\nCVE-2019-10126: A flaw was found in the Linux kernel. A heap based\nbuffer overflow in mwifiex_uap_parse_tail_ies function in\ndrivers/net/wireless/marvell/mwifiex/ie.c might have lead to memory\ncorruption and possibly other consequences (bnc#1136935).\n\nCVE-2019-11599: The coredump implementation in the Linux kernel did\nnot use locking or other mechanisms to prevent vma layout or vma flags\nchanges while it ran, which allowed local users to obtain sensitive\ninformation, cause a denial of service, or possibly have unspecified\nother impact by triggering a race condition with mmget_not_zero or\nget_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c,\nfs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c\n(bnc#1131645 1133738).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1088047\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1098633\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103990\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103991\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103992\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106383\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109837\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114685\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1119113\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1119532\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120423\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1125703\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1128902\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1130836\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1131645\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1132390\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133401\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133738\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1134303\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1134395\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135556\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135642\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135897\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136161\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136264\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136935\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137728\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138879\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139712\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139771\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139865\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140133\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140228\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140328\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140405\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140424\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140454\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140463\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140575\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140577\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140637\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140658\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140715\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140719\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140726\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140727\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140728\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140814\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140887\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140888\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140889\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140891\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140893\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140948\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140954\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140955\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140956\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140957\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140958\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140959\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140960\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140961\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140962\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140964\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140971\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140972\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140992\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20836/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10126/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10638/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-10639/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-11599/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-13233/\");\n # https://www.suse.com/support/update/announcement/2019/suse-su-20191854-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7a0188d6\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15-SP1:zypper in -t patch\nSUSE-SLE-Product-WE-15-SP1-2019-1854=1\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15-SP1:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1854=1\n\nSUSE Linux Enterprise Module for Live Patching 15-SP1:zypper in -t\npatch SUSE-SLE-Module-Live-Patching-15-SP1-2019-1854=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP1:zypper in -t\npatch SUSE-SLE-Module-Legacy-15-SP1-2019-1854=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP1:zypper in -t\npatch SUSE-SLE-Module-Development-Tools-15-SP1-2019-1854=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP1:zypper in -t patch\nSUSE-SLE-Module-Basesystem-15-SP1-2019-1854=1\n\nSUSE Linux Enterprise High Availability 15-SP1:zypper in -t patch\nSUSE-SLE-Product-HA-15-SP1-2019-1854=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-20836\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2019-10126\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-debug-livepatch-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-livepatch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-kvmsmall-livepatch-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-vanilla-livepatch-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kselftests-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kselftests-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-base-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-base-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-debugsource-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-devel-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-livepatch-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-base-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-debugsource-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-livepatch-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-livepatch-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-man-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-base-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-base-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-debugsource-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-devel-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-obs-build-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-obs-build-debugsource-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-obs-qa-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-syms-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-vanilla-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-vanilla-base-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-vanilla-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-vanilla-debugsource-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-vanilla-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-vanilla-livepatch-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kselftests-kmp-default-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kselftests-kmp-default-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"reiserfs-kmp-default-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"reiserfs-kmp-default-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-base-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-base-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-debugsource-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-devel-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-debug-livepatch-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-base-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-debugsource-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-kvmsmall-livepatch-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-livepatch-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-man-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-base-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-base-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-debugsource-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-devel-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-obs-build-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-obs-build-debugsource-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-obs-qa-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-syms-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-vanilla-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-vanilla-base-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-vanilla-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-vanilla-debugsource-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-vanilla-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-vanilla-livepatch-devel-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kselftests-kmp-default-4.12.14-197.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kselftests-kmp-default-debuginfo-4.12.14-197.10.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T15:20:03", "description": "The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-10638: A device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575).\n\n - CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed.\n This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping).\n For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).\n\n - CVE-2019-13233: In arch/x86/lib/insn-eval.c there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation (bnc#1140454).\n\n - CVE-2018-20836: There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n\n - CVE-2019-10126: A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might have lead to memory corruption and possibly other consequences (bnc#1136935).\n\n - CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1133738).\n\n - CVE-2019-12817: arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected (bnc#1138263).\n\n - CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel. There was an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n\n - CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed.\n (bnc#1137103).\n\nThe following non-security bugs were fixed :\n\n - 6lowpan: Off by one handling ->nexthdr (bsc#1051510).\n\n - Abort file_remove_privs() for non-reg. files (bsc#1140888).\n\n - ACPICA: Clear status of GPEs on first direct enable (bsc#1111666).\n\n - ACPI: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).\n\n - ACPI: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).\n\n - af_key: unconditionally clone on broadcast (bsc#1051510).\n\n - alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n\n - alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n\n - alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n\n - alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n\n - alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n\n - alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n\n - alsa: usb-audio: Fix parse of UAC2 Extension Units (bsc#1111666).\n\n - alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n\n - apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n\n - ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).\n\n - audit: fix a memory leak bug (bsc#1051510).\n\n - ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n\n - blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).\n\n - block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n\n - bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n\n - bpf, devmap: Add missing bulk queue free (bsc#1109837).\n\n - bpf, devmap: Add missing RCU read lock on flush (bsc#1109837).\n\n - bpf, devmap: Fix premature entry free on destroying map (bsc#1109837).\n\n - bpf: devmap: fix use-after-free Read in\n __dev_map_entry_free (bsc#1109837).\n\n - bpf: lpm_trie: check left child of last leftmost node for NULL (bsc#1109837).\n\n - bpf: sockmap fix msg->sg.size account on ingress skb (bsc#1109837).\n\n - bpf: sockmap, fix use after free from sleep in psock backlog workqueue (bsc#1109837).\n\n - bpf: sockmap remove duplicate queue free (bsc#1109837).\n\n - bpf, tcp: correctly handle DONT_WAIT flags and timeo == 0 (bsc#1109837).\n\n - can: af_can: Fix error path of can_init() (bsc#1051510).\n\n - can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n\n - can: purge socket error queue on sock destruct (bsc#1051510).\n\n - ceph: factor out ceph_lookup_inode() (bsc#1138681).\n\n - ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).\n\n - ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).\n\n - ceph: flush dirty inodes before proceeding with remount (bsc#1138681).\n\n - ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n\n - ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).\n\n - ceph: quota: fix quota subdir mounts (bsc#1138681).\n\n - ceph: remove duplicated filelock ref increase (bsc#1138681).\n\n - cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n\n - clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).\n\n - clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n\n - coresight: etb10: Fix handling of perf mode (bsc#1051510).\n\n - coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n\n - cpu/topology: Export die_id (jsc#SLE-5454).\n\n - crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n\n - crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n\n - crypto: user - prevent operating on larval algorithms (bsc#1133401).\n\n - dax: Fix xarray entry association for mixed mappings (bsc#1140893).\n\n - device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n\n - dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n\n - doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n\n - Documentation/ABI: Document umwait control sysfs interfaces (jsc#SLE-5187).\n\n - Documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).\n\n - Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n\n - driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n\n - driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n\n - drivers/base/devres: introduce devm_release_action() (bsc#1103992).\n\n - drivers/base/devres: introduce devm_release_action() (bsc#1103992 FATE#326009).\n\n - drivers/base: Introduce kill_device() (bsc#1139865).\n\n - drivers/base: kABI fixes for struct device_private (bsc#1106383).\n\n - drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n\n - drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n\n - Drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n\n - drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n\n - drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).\n\n - drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n\n - drivers: thermal: tsens: Do not print error message on\n -EPROBE_DEFER (bsc#1051510).\n\n - drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).\n\n - drm/amd/powerplay: use hardware fan control if no powerplay fan table (bsc#1111666).\n\n - drm/arm/hdlcd: Actually validate CRTC modes (bsc#1111666).\n\n - drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n\n - drm/arm/mali-dp: Add a loop around the second set CVAL and try 5 times (bsc#1111666).\n\n - drm/etnaviv: add missing failure path to destroy suballoc (bsc#1111666).\n\n - drm/fb-helper: generic: Do not take module ref for fbcon (bsc#1111666).\n\n - drm: Fix drm_release() and device unplug (bsc#1111666).\n\n - drm/i915: Add new AML_ULX support list (jsc#SLE-4986).\n\n - drm/i915: Add new ICL PCI ID (jsc#SLE-4986).\n\n - drm/i915/aml: Add new Amber Lake PCI ID (jsc#SLE-4986).\n\n - drm/i915: Apply correct ddi translation table for AML device (jsc#SLE-4986).\n\n - drm/i915: Attach the pci match data to the device upon creation (jsc#SLE-4986).\n\n - drm/i915/cfl: Adding another PCI Device ID (jsc#SLE-4986).\n\n - drm/i915/cml: Add CML PCI IDS (jsc#SLE-4986).\n\n - drm/i915/dmc: protect against reading random memory (bsc#1051510).\n\n - drm/i915: Fix uninitialized mask in intel_device_info_subplatform_init (jsc#SLE-4986).\n\n - drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n\n - drm/i915/icl: Adding few more device IDs for Ice Lake (jsc#SLE-4986).\n\n - drm/i915: Introduce concept of a sub-platform (jsc#SLE-4986).\n\n - drm/i915: Mark AML 0x87CA as ULX (jsc#SLE-4986).\n\n - drm/i915: Move final cleanup of drm_i915_private to i915_driver_destroy (jsc#SLE-4986).\n\n - drm/i915: Remove redundant device id from IS_IRONLAKE_M macro (jsc#SLE-4986).\n\n - drm/i915: Split Pineview device info into desktop and mobile (jsc#SLE-4986).\n\n - drm/i915: Split some PCI ids into separate groups (jsc#SLE-4986).\n\n - drm/i915: start moving runtime device info to a separate struct (jsc#SLE-4986).\n\n - drm/imx: notify drm core before sending event during crtc disable (bsc#1111666).\n\n - drm/imx: only send event on crtc disable if kept disabled (bsc#1111666).\n\n - drm: panel-orientation-quirks: Add quirk for GPD MicroPC (bsc#1111666).\n\n - drm: panel-orientation-quirks: Add quirk for GPD pocket2 (bsc#1111666).\n\n - drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1111666).\n\n - drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1111666).\n\n - EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n\n - ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).\n\n - failover: allow name change on IFF_UP slave interfaces (bsc#1109837).\n\n - fs: hugetlbfs: fix hwpoison reserve accounting (bsc#1139712) \n\n - fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).\n\n - fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).\n\n - fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).\n\n - ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).\n\n - ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).\n\n - genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n\n - genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n\n - genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n\n - gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).\n\n - hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).\n\n - hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).\n\n - hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n\n - hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n\n - hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).\n\n - hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).\n\n - hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).\n\n - hwmon: (k10temp) Add support for family 17h (FATE#327735).\n\n - hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).\n\n - hwmon: (k10temp) Add support for temperature offsets (FATE#327735).\n\n - hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).\n\n - hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).\n\n - hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).\n\n - hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).\n\n - hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).\n\n - hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).\n\n - hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).\n\n - hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).\n\n - hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).\n\n - hwmon: k10temp: Support Threadripper 2920X, 2970WX;\n simplify offset table (FATE#327735).\n\n - hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).\n\n - hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).\n\n - i2c: acorn: fix i2c warning (bsc#1135642).\n\n - i2c: mlxcpld: Add support for extended transaction length for i2c-mlxcpld (bsc#1112374).\n\n - i2c: mlxcpld: Add support for smbus block read transaction (bsc#1112374).\n\n - i2c: mlxcpld: Allow configurable adapter id for mlxcpld (bsc#1112374).\n\n - i2c: mlxcpld: Fix adapter functionality support callback (bsc#1112374).\n\n - i2c: mlxcpld: Fix wrong initialization order in probe (bsc#1112374).\n\n - i2c: mux: mlxcpld: simplify code to reach the adapter (bsc#1112374).\n\n - i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).\n\n - IB/hfi1: Clear the IOWAIT pending bits when QP is put into error state (bsc#1114685 FATE#325854).\n\n - IB/hfi1: Create inline to get extended headers (bsc#1114685 FATE#325854).\n\n - IB/hfi1: Validate fault injection opcode user input (bsc#1114685 FATE#325854).\n\n - IB/mlx5: Verify DEVX general object type correctly (bsc#1103991 FATE#326007).\n\n - ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n\n - input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n\n - input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n\n - iommu/amd: Make iommu_disable safer (bsc#1140955).\n\n - iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).\n\n - iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).\n\n - iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes (bsc#1111666).\n\n - iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).\n\n - iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).\n\n - iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).\n\n - iommu: Use right function to get group for device (bsc#1140958).\n\n - iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).\n\n - iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).\n\n - iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).\n\n - iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).\n\n - iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).\n\n - iov_iter: Fix build error without CONFIG_CRYPTO (bsc#1111666).\n\n - ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).\n\n - irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).\n\n - irqchip/mbigen: Do not clear eventid when freeing an MSI (bsc#1051510).\n\n - ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw (bsc#1140228).\n\n - kabi fixup blk_mq_register_dev() (bsc#1140637).\n\n - kabi: Mask no_vf_scan in struct pci_dev (jsc#SLE-5803 FATE#327056).\n\n - kabi workaround for asus-wmi changes (bsc#1051510).\n\n - kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n\n - kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n\n - kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).\n\n - kvm: x86: fix return value for reserved EFER (bsc#1140992).\n\n - kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).\n\n - kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n\n - kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).\n\n - libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n\n - libceph: assign cookies in linger_submit() (bsc#1135897).\n\n - libceph: check reply num_data_items in setup_request_data() (bsc#1135897).\n\n - libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).\n\n - libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).\n\n - libceph: introduce alloc_watch_request() (bsc#1135897).\n\n - libceph: introduce ceph_pagelist_alloc() (bsc#1135897).\n\n - libceph: preallocate message data items (bsc#1135897).\n\n - libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897). This feature was requested for SLE15 but aws reverted in packaging and master.\n\n - libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).\n\n - libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n\n - libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n\n - mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n\n - mac80211: drop robust management frames from unknown TA (bsc#1051510).\n\n - mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n\n - media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n\n - mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).\n\n - mISDN: make sure device name is NUL terminated (bsc#1051510).\n\n - mlxsw: core: Add API for QSFP module temperature thresholds reading (bsc#1112374).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD workqueue (bsc#1112374).\n\n - mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context warning (bsc#1112374).\n\n - mlxsw: core: Move ethtool module callbacks to a common location (bsc#1112374).\n\n - mlxsw: core: Prevent reading unsupported slave address from SFP EEPROM (bsc#1112374).\n\n - mlxsw: pci: Reincrease PCI reset timeout (bsc#1112374).\n\n - mlxsw: reg: Add Management Temperature Bulk Register (bsc#1112374).\n\n - mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).\n\n - mlxsw: spectrum: Move QSFP EEPROM definitions to common location (bsc#1112374).\n\n - mlxsw: spectrum: Put MC TCs into DWRR mode (bsc#1112374).\n\n - mmc: core: complete HS400 before checking status (bsc#1111666).\n\n - mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n\n - mm/devm_memremap_pages: introduce devm_memunmap_pages (bsc#1103992 FATE#326009).\n\n - mm: fix race on soft-offlining free huge pages (bsc#1139712). \n\n - mm: hugetlb: delete dequeue_hwpoisoned_huge_page() (bsc#1139712). \n\n - mm: hugetlb: prevent reuse of hwpoisoned free hugepages (bsc#1139712). \n\n - mm: hugetlb: soft-offline: dissolve_free_huge_page() return zero on !PageHuge (bsc#bsc#1139712). \n\n - mm: hugetlb: soft-offline: dissolve source hugepage after successful migration (bsc#1139712). \n\n - mm: hugetlb: soft_offline: save compound page order before page migration (bsc#1139712) \n\n - mm: hwpoison: change PageHWPoison behavior on hugetlb pages (bsc#1139712). \n\n - mm: hwpoison: dissolve in-use hugepage in unrecoverable memory error (bsc#1139712). \n\n - mm: hwpoison: introduce idenfity_page_state (bsc#1139712). \n\n - mm: hwpoison: introduce memory_failure_hugetlb() (bsc#1139712). \n\n - mm/page_alloc.c: avoid potential NULL pointer dereference (git fixes (mm/pagealloc)).\n\n - mm/page_alloc.c: fix never set ALLOC_NOFRAGMENT flag (git fixes (mm/pagealloc)).\n\n - mm: soft-offline: close the race against page allocation (bsc#1139712). \n\n - mm: soft-offline: dissolve free hugepage if soft-offlined (bsc#1139712). \n\n - mm: soft-offline: return -EBUSY if set_hwpoison_free_buddy_page() fails (bsc#1139712). \n\n - mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).\n\n - module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).\n\n - net: core: support XDP generic on stacked devices (bsc#1109837).\n\n - net: do not clear sock->sk early to avoid trouble in strparser (bsc#1103990 FATE#326006).\n\n - net: ena: add ethtool function for changing io queue sizes (bsc#1138879).\n\n - net: ena: add good checksum counter (bsc#1138879).\n\n - net: ena: add handling of llq max tx burst size (bsc#1138879).\n\n - net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1138879).\n\n - net: ena: add newline at the end of pr_err prints (bsc#1138879).\n\n - net: ena: add support for changing max_header_size in LLQ mode (bsc#1138879).\n\n - net: ena: allow automatic fallback to polling mode (bsc#1138879).\n\n - net: ena: allow queue allocation backoff when low on memory (bsc#1138879).\n\n - net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1138879).\n\n - net: ena: enable negotiating larger Rx ring size (bsc#1138879).\n\n - net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1138879).\n\n - net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1138879).\n\n - net: ena: fix ena_com_fill_hash_function() implementation (bsc#1138879).\n\n - net: ena: fix: Free napi resources when ena_up() fails (bsc#1138879).\n\n - net: ena: fix incorrect test of supported hash function (bsc#1138879).\n\n - net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1138879).\n\n - net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1138879).\n\n - net: ena: gcc 8: fix compilation warning (bsc#1138879).\n\n - net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1138879).\n\n - net: ena: make ethtool show correct current and max queue sizes (bsc#1138879).\n\n - net: ena: optimise calculations for CQ doorbell (bsc#1138879).\n\n - net: ena: remove inline keyword from functions in *.c (bsc#1138879).\n\n - net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1138879).\n\n - net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1138879).\n\n - net: ena: use dev_info_once instead of static variable (bsc#1138879).\n\n - net: ethernet: ti: cpsw_ethtool: fix ethtool ring param set (bsc#1130836).\n\n - net: Fix missing meta data in skb with vlan packet (bsc#1109837).\n\n - net/mlx5: Avoid reloading already removed devices (bsc#1103990 FATE#326006).\n\n - net/mlx5e: Fix ethtool rxfh commands when CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990 FATE#326006).\n\n - net/mlx5e: Fix the max MTU check in case of XDP (bsc#1103990 FATE#326006).\n\n - net/mlx5e: Fix use-after-free after xdp_return_frame (bsc#1103990 FATE#326006).\n\n - net/mlx5e: Rx, Check ip headers sanity (bsc#1103990 FATE#326006).\n\n - net/mlx5e: Rx, Fixup skb checksum for packets with tail padding (bsc#1109837).\n\n - net/mlx5e: XDP, Fix shifted flag index in RQ bitmap (bsc#1103990 FATE#326006).\n\n - net/mlx5: FPGA, tls, hold rcu read lock a bit longer (bsc#1103990 FATE#326006).\n\n - net/mlx5: FPGA, tls, idr remove on flow delete (bsc#1103990 FATE#326006).\n\n - net/mlx5: Set completion EQs as shared resources (bsc#1103991 FATE#326007).\n\n - net/mlx5: Update pci error handler entries and command translation (bsc#1103991 FATE#326007).\n\n - net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n\n - net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n\n - net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n\n - net: phy: marvell10g: report if the PHY fails to boot firmware (bsc#1119113 FATE#326472).\n\n - net/sched: cbs: Fix error path of cbs_module_init (bsc#1109837).\n\n - net/sched: cbs: fix port_rate miscalculation (bsc#1109837).\n\n - net/tls: avoid NULL pointer deref on nskb->sk in fallback (bsc#1109837).\n\n - net/tls: avoid potential deadlock in tls_set_device_offload_rx() (bsc#1109837).\n\n - net: tls, correctly account for copied bytes with multiple sk_msgs (bsc#1109837).\n\n - net/tls: do not copy negative amounts of data in reencrypt (bsc#1109837).\n\n - net/tls: do not ignore netdev notifications if no TLS features (bsc#1109837).\n\n - net/tls: do not leak IV and record seq when offload fails (bsc#1109837).\n\n - net/tls: do not leak partially sent record in device mode (bsc#1109837).\n\n - net/tls: fix build without CONFIG_TLS_DEVICE (bsc#1109837).\n\n - net/tls: fix copy to fragments in reencrypt (bsc#1109837).\n\n - net/tls: fix page double free on TX cleanup (bsc#1109837).\n\n - net/tls: fix refcount adjustment in fallback (bsc#1109837).\n\n - net/tls: fix state removal with feature flags off (bsc#1109837).\n\n - net/tls: fix the IV leaks (bsc#1109837).\n\n - net/tls: prevent bad memory access in tls_is_sk_tx_device_offloaded() (bsc#1109837).\n\n - net/tls: replace the sleeping lock around RX resync with a bit lock (bsc#1109837).\n\n - net/udp_gso: Allow TX timestamp with UDP GSO (bsc#1109837).\n\n - new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).\n\n - nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n\n - nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n\n - nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n\n - nfp: bpf: fix static check error through tightening shift amount adjustment (bsc#1109837).\n\n - nfp: flower: add rcu locks when accessing netdev for tunnels (bsc#1109837).\n\n - nl80211: fix station_info pertid memory leak (bsc#1051510).\n\n - ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n\n - nvme: copy MTFA field from identify controller (bsc#1140715).\n\n - nvme-rdma: fix double freeing of async event data (bsc#1120423).\n\n - nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).\n\n - ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n\n - pci: Disable VF decoding before pcibios_sriov_disable() updates resources (jsc#SLE-5803).\n\n - pci: Disable VF decoding before pcibios_sriov_disable() updates resources (jsc#SLE-5803 FATE#327056).\n\n - pci: Do not poll for PME if the device is in D3cold (bsc#1051510).\n\n - pci/IOV: Add flag so platforms can skip VF scanning (jsc#SLE-5803).\n\n - pci/IOV: Add flag so platforms can skip VF scanning (jsc#SLE-5803 FATE#327056).\n\n - pci/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803).\n\n - pci/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803 FATE#327056).\n\n - pci/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992).\n\n - pci/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992 FATE#326009).\n\n - pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n\n - pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n\n - perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n\n - perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n\n - perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n\n - perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n\n - perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n\n - pinctrl/amd: add get_direction handler (bsc#1140463).\n\n - pinctrl/amd: fix gpio irq level in debugfs (bsc#1140463).\n\n - pinctrl/amd: fix masking of GPIO interrupts (bsc#1140463).\n\n - pinctrl/amd: make functions amd_gpio_suspend and amd_gpio_resume static (bsc#1140463).\n\n - pinctrl/amd: poll InterruptEnable bits in amd_gpio_irq_set_type (bsc#1140463).\n\n - pinctrl/amd: poll InterruptEnable bits in enable_irq (bsc#1140463).\n\n - platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).\n\n - platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).\n\n - platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).\n\n - platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).\n\n - platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).\n\n - platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n\n - platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).\n\n - platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).\n\n - platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).\n\n - platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).\n\n - platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).\n\n - platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).\n\n - platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).\n\n - platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).\n\n - platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).\n\n - platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).\n\n - platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).\n\n - platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).\n\n - platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).\n\n - platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).\n\n - platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).\n\n - platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).\n\n - platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).\n\n - platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).\n\n - platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).\n\n - platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).\n\n - platform/x86: mlx-platform: Remove unused define (bsc#1112374).\n\n - platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).\n\n - PM: ACPI/PCI: Resume all devices during hibernation (bsc#1111666).\n\n - powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n\n - powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n\n - powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).\n\n - powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n\n - powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n\n - powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n\n - ppc64le: enable CONFIG_PPC_DT_CPU_FTRS (jsc#SLE-7159).\n\n - ppp: mppe: Add softdep to arc4 (bsc#1088047).\n\n - ptrace: Fix -$gt;ptracer_cred handling for PTRACE_TRACEME (git-fixes).\n\n - ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).\n\n - pwm: stm32: Use 3 cells ->of_xlate() (bsc#1111666).\n\n - qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).\n\n - qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n\n - qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n\n - qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n\n - qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n\n - qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n\n - rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n\n - RAS/CEC: Convert the timer callback to a workqueue (bsc#1114279).\n\n - RAS/CEC: Fix binary search function (bsc#1114279).\n\n - rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).\n\n - rdma/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992).\n\n - rdma/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992 FATE#326009).\n\n - rdma/mlx5: Do not allow the user to write to the clock page (bsc#1103991).\n\n - rdma/mlx5: Do not allow the user to write to the clock page (bsc#1103991 FATE#326007).\n\n - rdma/mlx5: Initialize roce port info before multiport master init (bsc#1103991).\n\n - rdma/mlx5: Initialize roce port info before multiport master init (bsc#1103991 FATE#326007).\n\n - rdma/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992).\n\n - rdma/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992 FATE#326009).\n\n - Refresh patches.fixes/scsi-Introduce-scsi_start_queue.patch (bsc#1119532).\n\n - regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).\n\n - Replace the bluetooth fix with the upstream commit (bsc#1135556)\n\n - Reshuffle patches to match series_sort.py\n\n - Revert 'net: ena: ethtool: add extra properties retrieval via get_priv_flags' (bsc#1138879).\n\n - Revert 'net/mlx5e: Enable reporting checksum unnecessary also for L3 packets' (bsc#1103990).\n\n - Revert 'net/mlx5e: Enable reporting checksum unnecessary also for L3 packets' (bsc#1103990 FATE#326006).\n\n - Revert 'Revert 'Drop multiversion(kernel) from the KMP template ()''\n\n - Revert 'Revert 'Drop multiversion(kernel) from the KMP template (fate#323189)\n\n - Revert 's390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).' This broke the build with older gcc instead.\n\n - Revert 'Sign non-x86 kernels when possible (boo#1134303)' This reverts commit bac621c6704610562ebd9e74ae5ad85ca8025681. We do not have reports of this working with all ARM architectures in all cases (boot, kexec, ..) so revert for now.\n\n - Revert 'svm: Fix AVIC incomplete IPI emulation' (bsc#1140133).\n\n - rpm/package-descriptions: fix typo in kernel-azure\n\n - rpm/post.sh: correct typo in err msg (bsc#1137625)\n\n - s390/dasd: fix using offset into zero size array error (bsc#1051510).\n\n - s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).\n\n - s390/pci: improve bar check (jsc#SLE-5803).\n\n - s390/pci: improve bar check (jsc#SLE-5803 FATE#327056).\n\n - s390/pci: map IOV resources (jsc#SLE-5803).\n\n - s390/pci: map IOV resources (jsc#SLE-5803 FATE#327056).\n\n - s390/pci: skip VF scanning (jsc#SLE-5803).\n\n - s390/pci: skip VF scanning (jsc#SLE-5803 FATE#327056).\n\n - s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n\n - s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n\n - s390/setup: fix early warning messages (bsc#1051510).\n\n - s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n\n - sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n\n - sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).\n\n - scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.\n\n - scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes\n\n - scripts/git_sort/git_sort.py: drop old scsi branches\n\n - scsi: aacraid: change event_wait to a completion (jsc#SLE-4710 bsc#1136161).\n\n - scsi: aacraid: change wait_sem to a completion (jsc#SLE-4710 bsc#1136161).\n\n - scsi: aacraid: clean up some indentation and formatting issues (jsc#SLE-4710 bsc#1136161).\n\n - scsi: aacraid: Mark expected switch fall-through (jsc#SLE-4710 bsc#1136161).\n\n - scsi: aacraid: Mark expected switch fall-throughs (jsc#SLE-4710 bsc#1136161).\n\n - scsi: be2iscsi: be_iscsi: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n\n - scsi: be2iscsi: be_main: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n\n - scsi: be2iscsi: fix spelling mistake 'Retreiving' -gt;\n 'Retrieving' (jsc#SLE-4721 bsc#1136264).\n\n - scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721 bsc#1136264).\n\n - scsi: be2iscsi: remove unused variable dmsg (jsc#SLE-4721 bsc#1136264).\n\n - scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721 bsc#1136264).\n\n - scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n\n - scsi: csiostor: csio_wr: mark expected switch fall-through (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: drop serial_number usage (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: fix calls to dma_set_mask_and_coherent() (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: fix incorrect dma device in case of vport (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: no need to check return value of debugfs_create functions (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: Remove set but not used variable 'pln' (jsc#SLE-4679 bsc#1136343).\n\n - scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).\n\n - scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).\n\n - scsi: megaraid_sas: correct an info message (bsc#1136271).\n\n - scsi: megaraid_sas: driver version update (bsc#1136271).\n\n - scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).\n\n - scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).\n\n - scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).\n\n - scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).\n\n - scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Add flag high_iops_queues (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Add missing breaks in switch statements (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Add support for ATLAS PCIe switch (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Add support for NVMe Switch Adapter (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Affinity high iops queues IRQs to local node (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: change _base_get_msix_index prototype (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Enable interrupt coalescing on high iops (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: fix indentation issue (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Fix kernel panic during expander reset (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Fix typo in request_desript_type (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: function pointers of request descriptor (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Improve the threshold value and introduce module param (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Introduce perf_mode module parameter (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Irq poll to avoid CPU hard lockups (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Rename mpi endpoint device ID macro (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: save and use MSI-X index for posting RD (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: simplify interrupt handler (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Update driver version to 27.102.00.00 (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Update driver version to 29.100.00.00 (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Use high iops queues under some circumstances (bsc#1125703,jsc#SLE-4717).\n\n - scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Fix spelling mistake 'OUSTANDING' -> 'OUTSTANDING' (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: remove set but not used variables 'cdev' and 'udev' (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n\n - scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n\n - scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n\n - scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n\n - scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n\n - scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n\n - scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n\n - scsi: zfcp: fix missing zfcp_port reference put on\n -EBUSY from port_remove (bsc#1051510).\n\n - scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n\n - scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n\n - scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n\n - signal/ptrace: Do not leak uninitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).\n\n - smb3: Fix endian warning (bsc#1137884).\n\n - soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n\n - soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n\n - sort patches to proper position\n\n - squash patches.fixes/tcp-fix-fack_count-accounting-on-tcp_shift\n _skb_data.patch into patches.fixes/tcp-limit-payload-size-of-sacked-skbs.patc h to match what stable backports do\n\n - staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n\n - staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).\n\n - supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)\n\n - svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n\n - svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n\n - sysctl: handle overflow in proc_get_long (bsc#1051510).\n\n - thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n\n - thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n\n - thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n\n - tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n\n - tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n\n - tools: bpftool: fix infinite loop in map create (bsc#1109837).\n\n - topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n\n - topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n\n - tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n\n - tty: max310x: Fix external crystal register setup (bsc#1051510).\n\n - typec: tcpm: fix compiler warning about stupid things (git-fixes).\n\n - usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).\n\n - usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).\n\n - usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n\n - usbnet: ipheth: fix racing condition (bsc#1051510).\n\n - usb: serial: fix initial-termios handling (bsc#1135642).\n\n - usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n\n - usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n\n - usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n\n - usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n\n - usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n\n - usb: xhci: avoid NULL pointer deref when bos field is NULL (bsc#1135642).\n\n - vfio: ccw: only free cp on final interrupt (bsc#1051510).\n\n - vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n\n - x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).\n\n - x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).\n\n - x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n\n - x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.\n\n - x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n\n - x86/cpufeatures: Enumerate user wait instructions (jsc#SLE-5187).\n\n - x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).\n\n - x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n\n - x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n\n - x86/microcode: Fix microcode hotplug state (bsc#1114279).\n\n - x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n\n - x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n\n - x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n\n - x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n\n - x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n\n - x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n\n - x86/topology: Define topology_die_id() (jsc#SLE-5454).\n\n - x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n\n - x86/umwait: Add sysfs interface to control umwait C0.2 state (jsc#SLE-5187).\n\n - x86/umwait: Add sysfs interface to control umwait maximum time (jsc#SLE-5187).\n\n - x86/umwait: Initialize umwait control values (jsc#SLE-5187).\n\n - xdp: check device pointer before clearing (bsc#1109837).\n\n - (nl,mac)80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-22T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2019-1757)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-16871", "CVE-2018-20836", "CVE-2019-10126", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11599", "CVE-2019-12614", "CVE-2019-12817", "CVE-2019-13233"], "modified": "2022-05-23T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "cpe:/o:novell:opensuse:15.1"], "id": "OPENSUSE-2019-1757.NASL", "href": "https://www.tenable.com/plugins/nessus/126897", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-1757.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(126897);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/23\");\n\n script_cve_id(\"CVE-2018-16871\", \"CVE-2018-20836\", \"CVE-2019-10126\", \"CVE-2019-10638\", \"CVE-2019-10639\", \"CVE-2019-11599\", \"CVE-2019-12614\", \"CVE-2019-12817\", \"CVE-2019-13233\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2019-1757)\");\n script_summary(english:\"Check for the openSUSE-2019-1757 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The openSUSE Leap 15.1 kernel was updated to receive various security\nand bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-10638: A device could be tracked by an attacker\n using the IP ID values the kernel produces for\n connection-less protocols (e.g., UDP and ICMP). When\n such traffic is sent to multiple destination IP\n addresses, it is possible to obtain hash collisions (of\n indices to the counter array) and thereby obtain the\n hashing key (via enumeration). An attack may be\n conducted by hosting a crafted web page that uses WebRTC\n or gQUIC to force UDP traffic to attacker-controlled IP\n addresses (bnc#1140575).\n\n - CVE-2019-10639: The Linux kernel allowed Information\n Exposure (partial kernel address disclosure), leading to\n a KASLR bypass. Specifically, it is possible to extract\n the KASLR kernel image offset using the IP ID values the\n kernel produces for connection-less protocols (e.g., UDP\n and ICMP). When such traffic is sent to multiple\n destination IP addresses, it is possible to obtain hash\n collisions (of indices to the counter array) and thereby\n obtain the hashing key (via enumeration). This key\n contains enough bits from a kernel address (of a static\n variable) so when the key is extracted (via\n enumeration), the offset of the kernel image is exposed.\n This attack can be carried out remotely, by the attacker\n forcing the target device to send UDP or ICMP (or\n certain other) traffic to attacker-controlled IP\n addresses. Forcing a server to send UDP traffic is\n trivial if the server is a DNS server. ICMP traffic is\n trivial if the server answers ICMP Echo requests (ping).\n For client targets, if the target visits the attacker's\n web page, then WebRTC or gQUIC can be used to force UDP\n traffic to attacker-controlled IP addresses. NOTE: this\n attack against KASLR became viable in 4.1 because IP ID\n generation was changed to have a dependency on an\n address associated with a network namespace\n (bnc#1140577).\n\n - CVE-2019-13233: In arch/x86/lib/insn-eval.c there was a\n use-after-free for access to an LDT entry because of a\n race condition between modify_ldt() and a #BR exception\n for an MPX bounds violation (bnc#1140454).\n\n - CVE-2018-20836: There was a race condition in\n smp_task_timedout() and smp_task_done() in\n drivers/scsi/libsas/sas_expander.c, leading to a\n use-after-free (bnc#1134395).\n\n - CVE-2019-10126: A heap based buffer overflow in\n mwifiex_uap_parse_tail_ies function in\n drivers/net/wireless/marvell/mwifiex/ie.c might have\n lead to memory corruption and possibly other\n consequences (bnc#1136935).\n\n - CVE-2019-11599: The coredump implementation in the Linux\n kernel did not use locking or other mechanisms to\n prevent vma layout or vma flags changes while it runs,\n which allowed local users to obtain sensitive\n information, cause a denial of service, or possibly have\n unspecified other impact by triggering a race condition\n with mmget_not_zero or get_task_mm calls. This is\n related to fs/userfaultfd.c, mm/mmap.c,\n fs/proc/task_mmu.c, and\n drivers/infiniband/core/uverbs_main.c (bnc#1133738).\n\n - CVE-2019-12817: arch/powerpc/mm/mmu_context_book3s64.c\n in the Linux kernel for powerpc has a bug where\n unrelated processes may be able to read/write to one\n another's virtual memory under certain conditions via an\n mmap above 512 TB. Only a subset of powerpc systems are\n affected (bnc#1138263).\n\n - CVE-2019-12614: An issue was discovered in\n dlpar_parse_cc_property in\n arch/powerpc/platforms/pseries/dlpar.c in the Linux\n kernel. There was an unchecked kstrdup of prop->name,\n which might allow an attacker to cause a denial of\n service (NULL pointer dereference and system crash)\n (bnc#1137194).\n\n - CVE-2018-16871: A NULL pointer dereference due to an\n anomalized NFS message sequence was fixed.\n (bnc#1137103).\n\nThe following non-security bugs were fixed :\n\n - 6lowpan: Off by one handling ->nexthdr (bsc#1051510).\n\n - Abort file_remove_privs() for non-reg. files\n (bsc#1140888).\n\n - ACPICA: Clear status of GPEs on first direct enable\n (bsc#1111666).\n\n - ACPI: PM: Allow transitions to D0 to occur in special\n cases (bsc#1051510).\n\n - ACPI: PM: Avoid evaluating _PS3 on transitions from\n D3hot to D3cold (bsc#1051510).\n\n - af_key: unconditionally clone on broadcast\n (bsc#1051510).\n\n - alsa: firewire-lib/fireworks: fix miss detection of\n received MIDI messages (bsc#1051510).\n\n - alsa: hda - Force polling mode on CNL for fixing codec\n communication (bsc#1051510).\n\n - alsa: hda/realtek: Add quirks for several Clevo notebook\n barebones (bsc#1051510).\n\n - alsa: hda/realtek - Change front mic location for Lenovo\n M710q (bsc#1051510).\n\n - alsa: line6: Fix write on zero-sized buffer\n (bsc#1051510).\n\n - alsa: seq: fix incorrect order of dest_client/dest_ports\n arguments (bsc#1051510).\n\n - alsa: usb-audio: Fix parse of UAC2 Extension Units\n (bsc#1111666).\n\n - alsa: usb-audio: fix sign unintended sign extension on\n left shifts (bsc#1051510).\n\n - apparmor: enforce nullbyte at end of tag string\n (bsc#1051510).\n\n - ASoC: cx2072x: fix integer overflow on unsigned int\n multiply (bsc#1111666).\n\n - audit: fix a memory leak bug (bsc#1051510).\n\n - ax25: fix inconsistent lock state in ax25_destroy_timer\n (bsc#1051510).\n\n - blk-mq: free hw queue's resource in hctx's release\n handler (bsc#1140637).\n\n - block: Fix a NULL pointer dereference in\n generic_make_request() (bsc#1139771).\n\n - bluetooth: Fix faulty expression for minimum encryption\n key size check (bsc#1140328).\n\n - bpf, devmap: Add missing bulk queue free (bsc#1109837).\n\n - bpf, devmap: Add missing RCU read lock on flush\n (bsc#1109837).\n\n - bpf, devmap: Fix premature entry free on destroying map\n (bsc#1109837).\n\n - bpf: devmap: fix use-after-free Read in\n __dev_map_entry_free (bsc#1109837).\n\n - bpf: lpm_trie: check left child of last leftmost node\n for NULL (bsc#1109837).\n\n - bpf: sockmap fix msg->sg.size account on ingress skb\n (bsc#1109837).\n\n - bpf: sockmap, fix use after free from sleep in psock\n backlog workqueue (bsc#1109837).\n\n - bpf: sockmap remove duplicate queue free (bsc#1109837).\n\n - bpf, tcp: correctly handle DONT_WAIT flags and timeo ==\n 0 (bsc#1109837).\n\n - can: af_can: Fix error path of can_init() (bsc#1051510).\n\n - can: flexcan: fix timeout when set small bitrate\n (bsc#1051510).\n\n - can: purge socket error queue on sock destruct\n (bsc#1051510).\n\n - ceph: factor out ceph_lookup_inode() (bsc#1138681).\n\n - ceph: fix NULL pointer deref when debugging is enabled\n (bsc#1138681).\n\n - ceph: fix potential use-after-free in\n ceph_mdsc_build_path (bsc#1138681).\n\n - ceph: flush dirty inodes before proceeding with remount\n (bsc#1138681).\n\n - ceph: flush dirty inodes before proceeding with remount\n (bsc#1140405).\n\n - ceph: print inode number in __caps_issued_mask debugging\n messages (bsc#1138681).\n\n - ceph: quota: fix quota subdir mounts (bsc#1138681).\n\n - ceph: remove duplicated filelock ref increase\n (bsc#1138681).\n\n - cfg80211: fix memory leak of wiphy device name\n (bsc#1051510).\n\n - clk: rockchip: Turn on 'aclk_dmac1' for suspend on\n rk3288 (bsc#1051510).\n\n - clk: tegra: Fix PLLM programming on Tegra124+ when PMC\n overrides divider (bsc#1051510).\n\n - coresight: etb10: Fix handling of perf mode\n (bsc#1051510).\n\n - coresight: etm4x: Add support to enable ETMv4.2\n (bsc#1051510).\n\n - cpu/topology: Export die_id (jsc#SLE-5454).\n\n - crypto: algapi - guard against uninitialized spawn list\n in crypto_remove_spawns (bsc#1133401).\n\n - crypto: cryptd - Fix skcipher instance memory leak\n (bsc#1051510).\n\n - crypto: user - prevent operating on larval algorithms\n (bsc#1133401).\n\n - dax: Fix xarray entry association for mixed mappings\n (bsc#1140893).\n\n - device core: Consolidate locking and unlocking of parent\n and device (bsc#1106383).\n\n - dmaengine: imx-sdma: remove BD_INTR for channel0\n (bsc#1051510).\n\n - doc: Cope with the deprecation of AutoReporter\n (bsc#1051510).\n\n - Documentation/ABI: Document umwait control sysfs\n interfaces (jsc#SLE-5187).\n\n - Documentation: DMA-API: fix a function name of\n max_mapping_size (bsc#1140954).\n\n - Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n\n - driver core: Establish order of operations for\n device_add and device_del via bitflag (bsc#1106383).\n\n - driver core: Probe devices asynchronously instead of the\n driver (bsc#1106383).\n\n - drivers/base/devres: introduce devm_release_action()\n (bsc#1103992).\n\n - drivers/base/devres: introduce devm_release_action()\n (bsc#1103992 FATE#326009).\n\n - drivers/base: Introduce kill_device() (bsc#1139865).\n\n - drivers/base: kABI fixes for struct device_private\n (bsc#1106383).\n\n - drivers: depend on HAS_IOMEM for\n devm_platform_ioremap_resource() (bsc#1136333\n jsc#SLE-4994).\n\n - drivers: fix a typo in the kernel doc for\n devm_platform_ioremap_resource() (bsc#1136333\n jsc#SLE-4994).\n\n - Drivers: misc: fix out-of-bounds access in function\n param_set_kgdbts_var (bsc#1051510).\n\n - drivers: provide devm_platform_ioremap_resource()\n (bsc#1136333 jsc#SLE-4994).\n\n - drivers/rapidio/devices/rio_mport_cdev.c: fix resource\n leak in error handling path in 'rio_dma_transfer()'\n (bsc#1051510).\n\n - drivers/rapidio/rio_cm.c: fix potential oops in\n riocm_ch_listen() (bsc#1051510).\n\n - drivers: thermal: tsens: Do not print error message on\n -EPROBE_DEFER (bsc#1051510).\n\n - drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE\n (bsc#1051510).\n\n - drm/amd/powerplay: use hardware fan control if no\n powerplay fan table (bsc#1111666).\n\n - drm/arm/hdlcd: Actually validate CRTC modes\n (bsc#1111666).\n\n - drm/arm/hdlcd: Allow a bit of clock tolerance\n (bsc#1051510).\n\n - drm/arm/mali-dp: Add a loop around the second set CVAL\n and try 5 times (bsc#1111666).\n\n - drm/etnaviv: add missing failure path to destroy\n suballoc (bsc#1111666).\n\n - drm/fb-helper: generic: Do not take module ref for fbcon\n (bsc#1111666).\n\n - drm: Fix drm_release() and device unplug (bsc#1111666).\n\n - drm/i915: Add new AML_ULX support list (jsc#SLE-4986).\n\n - drm/i915: Add new ICL PCI ID (jsc#SLE-4986).\n\n - drm/i915/aml: Add new Amber Lake PCI ID (jsc#SLE-4986).\n\n - drm/i915: Apply correct ddi translation table for AML\n device (jsc#SLE-4986).\n\n - drm/i915: Attach the pci match data to the device upon\n creation (jsc#SLE-4986).\n\n - drm/i915/cfl: Adding another PCI Device ID\n (jsc#SLE-4986).\n\n - drm/i915/cml: Add CML PCI IDS (jsc#SLE-4986).\n\n - drm/i915/dmc: protect against reading random memory\n (bsc#1051510).\n\n - drm/i915: Fix uninitialized mask in\n intel_device_info_subplatform_init (jsc#SLE-4986).\n\n - drm/i915/gvt: ignore unexpected pvinfo write\n (bsc#1051510).\n\n - drm/i915/icl: Adding few more device IDs for Ice Lake\n (jsc#SLE-4986).\n\n - drm/i915: Introduce concept of a sub-platform\n (jsc#SLE-4986).\n\n - drm/i915: Mark AML 0x87CA as ULX (jsc#SLE-4986).\n\n - drm/i915: Move final cleanup of drm_i915_private to\n i915_driver_destroy (jsc#SLE-4986).\n\n - drm/i915: Remove redundant device id from IS_IRONLAKE_M\n macro (jsc#SLE-4986).\n\n - drm/i915: Split Pineview device info into desktop and\n mobile (jsc#SLE-4986).\n\n - drm/i915: Split some PCI ids into separate groups\n (jsc#SLE-4986).\n\n - drm/i915: start moving runtime device info to a separate\n struct (jsc#SLE-4986).\n\n - drm/imx: notify drm core before sending event during\n crtc disable (bsc#1111666).\n\n - drm/imx: only send event on crtc disable if kept\n disabled (bsc#1111666).\n\n - drm: panel-orientation-quirks: Add quirk for GPD MicroPC\n (bsc#1111666).\n\n - drm: panel-orientation-quirks: Add quirk for GPD pocket2\n (bsc#1111666).\n\n - drm/vmwgfx: fix a warning due to missing dma_parms\n (bsc#1111666).\n\n - drm/vmwgfx: Use the backdoor port if the HB port is not\n available (bsc#1111666).\n\n - EDAC/mc: Fix edac_mc_find() in case no device is found\n (bsc#1114279).\n\n - ext4: do not delete unlinked inode from orphan list on\n failed truncate (bsc#1140891).\n\n - failover: allow name change on IFF_UP slave interfaces\n (bsc#1109837).\n\n - fs: hugetlbfs: fix hwpoison reserve accounting\n (bsc#1139712) \n\n - fs/ocfs2: fix race in ocfs2_dentry_attach_lock()\n (bsc#1140889).\n\n - fs/proc/proc_sysctl.c: Fix a NULL pointer dereference\n (bsc#1140887).\n\n - fs/proc/proc_sysctl.c: fix NULL pointer dereference in\n put_links (bsc#1140887).\n\n - ftrace/x86: Remove possible deadlock between\n register_kprobe() and ftrace_run_update_code()\n (bsc#1071995).\n\n - ftrace/x86: Remove possible deadlock between\n register_kprobe() and ftrace_run_update_code()\n (bsc#1071995 fate#323487).\n\n - genirq: Prevent use-after-free and work list corruption\n (bsc#1051510).\n\n - genirq: Respect IRQCHIP_SKIP_SET_WAKE in\n irq_chip_set_wake_parent() (bsc#1051510).\n\n - genwqe: Prevent an integer overflow in the ioctl\n (bsc#1051510).\n\n - gpio: omap: fix lack of irqstatus_raw0 for OMAP4\n (bsc#1051510).\n\n - hugetlbfs: dirty pages as they are added to pagecache\n (git fixes (mm/hugetlbfs)).\n\n - hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444!\n (git fixes (mm/hugetlbfs)).\n\n - hwmon/coretemp: Cosmetic: Rename internal variables to\n zones from packages (jsc#SLE-5454).\n\n - hwmon/coretemp: Support multi-die/package\n (jsc#SLE-5454).\n\n - hwmon: (k10temp) 27C Offset needed for Threadripper2\n (FATE#327735).\n\n - hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).\n\n - hwmon: (k10temp) Add support for AMD Ryzen w/ Vega\n graphics (FATE#327735).\n\n - hwmon: (k10temp) Add support for family 17h\n (FATE#327735).\n\n - hwmon: (k10temp) Add support for Stoney Ridge and\n Bristol Ridge CPUs (FATE#327735).\n\n - hwmon: (k10temp) Add support for temperature offsets\n (FATE#327735).\n\n - hwmon: (k10temp) Add temperature offset for Ryzen 1900X\n (FATE#327735).\n\n - hwmon: (k10temp) Add temperature offset for Ryzen 2700X\n (FATE#327735).\n\n - hwmon: (k10temp) Correct model name for Ryzen 1600X\n (FATE#327735).\n\n - hwmon: (k10temp) Display both Tctl and Tdie\n (FATE#327735).\n\n - hwmon: (k10temp) Fix reading critical temperature\n register (FATE#327735).\n\n - hwmon: (k10temp) Make function get_raw_temp static\n (FATE#327735).\n\n - hwmon: (k10temp) Move chip specific code into probe\n function (FATE#327735).\n\n - hwmon: (k10temp) Only apply temperature offset if result\n is positive (FATE#327735).\n\n - hwmon: (k10temp) Support all Family 15h Model 6xh and\n Model 7xh processors (FATE#327735).\n\n - hwmon: k10temp: Support Threadripper 2920X, 2970WX;\n simplify offset table (FATE#327735).\n\n - hwmon: (k10temp) Use API function to access System\n Management Network (FATE#327735).\n\n - hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs\n (FATE#327735).\n\n - i2c: acorn: fix i2c warning (bsc#1135642).\n\n - i2c: mlxcpld: Add support for extended transaction\n length for i2c-mlxcpld (bsc#1112374).\n\n - i2c: mlxcpld: Add support for smbus block read\n transaction (bsc#1112374).\n\n - i2c: mlxcpld: Allow configurable adapter id for mlxcpld\n (bsc#1112374).\n\n - i2c: mlxcpld: Fix adapter functionality support callback\n (bsc#1112374).\n\n - i2c: mlxcpld: Fix wrong initialization order in probe\n (bsc#1112374).\n\n - i2c: mux: mlxcpld: simplify code to reach the adapter\n (bsc#1112374).\n\n - i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).\n\n - IB/hfi1: Clear the IOWAIT pending bits when QP is put\n into error state (bsc#1114685 FATE#325854).\n\n - IB/hfi1: Create inline to get extended headers\n (bsc#1114685 FATE#325854).\n\n - IB/hfi1: Validate fault injection opcode user input\n (bsc#1114685 FATE#325854).\n\n - IB/mlx5: Verify DEVX general object type correctly\n (bsc#1103991 FATE#326007).\n\n - ibmveth: Update ethtool settings to reflect virtual\n properties (bsc#1136157, LTC#177197).\n\n - input: synaptics - enable SMBus on ThinkPad E480 and\n E580 (bsc#1051510).\n\n - input: uinput - add compat ioctl number translation for\n UI_*_FF_UPLOAD (bsc#1051510).\n\n - iommu/amd: Make iommu_disable safer (bsc#1140955).\n\n - iommu/arm-smmu: Add support for qcom,smmu-v2 variant\n (bsc#1051510).\n\n - iommu/arm-smmu: Avoid constant zero in TLBI writes\n (bsc#1140956).\n\n - iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes\n (bsc#1111666).\n\n - iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer\n register (bsc#1051510).\n\n - iommu/arm-smmu-v3: Use explicit mb() when moving cons\n pointer (bsc#1051510).\n\n - iommu: Fix a leak in iommu_insert_resv_region\n (bsc#1140957).\n\n - iommu: Use right function to get group for device\n (bsc#1140958).\n\n - iommu/vt-d: Duplicate iommu_resv_region objects per\n device list (bsc#1140959).\n\n - iommu/vt-d: Handle PCI bridge RMRR device scopes in\n intel_iommu_get_resv_regions (bsc#1140960).\n\n - iommu/vt-d: Handle RMRR with PCI bridge device scopes\n (bsc#1140961).\n\n - iommu/vt-d: Introduce is_downstream_to_pci_bridge helper\n (bsc#1140962).\n\n - iommu/vt-d: Remove unnecessary rcu_read_locks\n (bsc#1140964).\n\n - iov_iter: Fix build error without CONFIG_CRYPTO\n (bsc#1111666).\n\n - ipv6: fib: Do not assume only nodes hold a reference on\n routes (bsc#1138732).\n\n - irqchip/gic-v3-its: fix some definitions of inner\n cacheability attributes (bsc#1051510).\n\n - irqchip/mbigen: Do not clear eventid when freeing an MSI\n (bsc#1051510).\n\n - ixgbe: Avoid NULL pointer dereference with VF on\n non-IPsec hw (bsc#1140228).\n\n - kabi fixup blk_mq_register_dev() (bsc#1140637).\n\n - kabi: Mask no_vf_scan in struct pci_dev (jsc#SLE-5803\n FATE#327056).\n\n - kabi workaround for asus-wmi changes (bsc#1051510).\n\n - kabi: x86/topology: Add CPUID.1F multi-die/package\n support (jsc#SLE-5454).\n\n - kabi: x86/topology: Define topology_logical_die_id()\n (jsc#SLE-5454).\n\n - kvm: svm/avic: fix off-by-one in checking host APIC ID\n (bsc#1140971).\n\n - kvm: x86: fix return value for reserved EFER\n (bsc#1140992).\n\n - kvm: x86: Include CPUID leaf 0x8000001e in kvm's\n supported CPUID (bsc#1114279).\n\n - kvm: x86: Include multiple indices with CPUID leaf\n 0x8000001d (bsc#1114279).\n\n - kvm: x86: Skip EFER vs. guest CPUID checks for\n host-initiated writes (bsc#1140972).\n\n - libata: Extend quirks for the ST1000LM024 drives with\n NOLPM quirk (bsc#1051510).\n\n - libceph: assign cookies in linger_submit()\n (bsc#1135897).\n\n - libceph: check reply num_data_items in\n setup_request_data() (bsc#1135897).\n\n - libceph: do not consume a ref on pagelist in\n ceph_msg_data_add_pagelist() (bsc#1135897).\n\n - libceph: enable fallback to ceph_msg_new() in\n ceph_msgpool_get() (bsc#1135897).\n\n - libceph: introduce alloc_watch_request() (bsc#1135897).\n\n - libceph: introduce ceph_pagelist_alloc() (bsc#1135897).\n\n - libceph: preallocate message data items (bsc#1135897).\n\n - libceph, rbd: add error handling for\n osd_req_op_cls_init() (bsc#1135897). This feature was\n requested for SLE15 but aws reverted in packaging and\n master.\n\n - libceph, rbd, ceph: move ceph_osdc_alloc_messages()\n calls (bsc#1135897).\n\n - libnvdimm/bus: Prevent duplicate device_unregister()\n calls (bsc#1139865).\n\n - libnvdimm, pfn: Fix over-trim in trim_pfn_device()\n (bsc#1140719).\n\n - mac80211: Do not use stack memory with scatterlist for\n GMAC (bsc#1051510).\n\n - mac80211: drop robust management frames from unknown TA\n (bsc#1051510).\n\n - mac80211: handle deauthentication/disassociation from\n TDLS peer (bsc#1051510).\n\n - media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n\n - mfd: hi655x: Fix regmap area declared size for hi655x\n (bsc#1051510).\n\n - mISDN: make sure device name is NUL terminated\n (bsc#1051510).\n\n - mlxsw: core: Add API for QSFP module temperature\n thresholds reading (bsc#1112374).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD\n workqueue (bsc#1112374).\n\n - mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context\n warning (bsc#1112374).\n\n - mlxsw: core: Move ethtool module callbacks to a common\n location (bsc#1112374).\n\n - mlxsw: core: Prevent reading unsupported slave address\n from SFP EEPROM (bsc#1112374).\n\n - mlxsw: pci: Reincrease PCI reset timeout (bsc#1112374).\n\n - mlxsw: reg: Add Management Temperature Bulk Register\n (bsc#1112374).\n\n - mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).\n\n - mlxsw: spectrum: Move QSFP EEPROM definitions to common\n location (bsc#1112374).\n\n - mlxsw: spectrum: Put MC TCs into DWRR mode\n (bsc#1112374).\n\n - mmc: core: complete HS400 before checking status\n (bsc#1111666).\n\n - mmc: core: Prevent processing SDIO IRQs when the card is\n suspended (bsc#1051510).\n\n - mm/devm_memremap_pages: introduce devm_memunmap_pages\n (bsc#1103992 FATE#326009).\n\n - mm: fix race on soft-offlining free huge pages\n (bsc#1139712). \n\n - mm: hugetlb: delete dequeue_hwpoisoned_huge_page()\n (bsc#1139712). \n\n - mm: hugetlb: prevent reuse of hwpoisoned free hugepages\n (bsc#1139712). \n\n - mm: hugetlb: soft-offline: dissolve_free_huge_page()\n return zero on !PageHuge (bsc#bsc#1139712). \n\n - mm: hugetlb: soft-offline: dissolve source hugepage\n after successful migration (bsc#1139712). \n\n - mm: hugetlb: soft_offline: save compound page order\n before page migration (bsc#1139712) \n\n - mm: hwpoison: change PageHWPoison behavior on hugetlb\n pages (bsc#1139712). \n\n - mm: hwpoison: dissolve in-use hugepage in unrecoverable\n memory error (bsc#1139712). \n\n - mm: hwpoison: introduce idenfity_page_state\n (bsc#1139712). \n\n - mm: hwpoison: introduce memory_failure_hugetlb()\n (bsc#1139712). \n\n - mm/page_alloc.c: avoid potential NULL pointer\n dereference (git fixes (mm/pagealloc)).\n\n - mm/page_alloc.c: fix never set ALLOC_NOFRAGMENT flag\n (git fixes (mm/pagealloc)).\n\n - mm: soft-offline: close the race against page allocation\n (bsc#1139712). \n\n - mm: soft-offline: dissolve free hugepage if\n soft-offlined (bsc#1139712). \n\n - mm: soft-offline: return -EBUSY if\n set_hwpoison_free_buddy_page() fails (bsc#1139712). \n\n - mm/vmscan.c: prevent useless kswapd loops (git fixes\n (mm/vmscan)).\n\n - module: Fix livepatch/ftrace module text permissions\n race (bsc#1071995 fate#323487).\n\n - net: core: support XDP generic on stacked devices\n (bsc#1109837).\n\n - net: do not clear sock->sk early to avoid trouble in\n strparser (bsc#1103990 FATE#326006).\n\n - net: ena: add ethtool function for changing io queue\n sizes (bsc#1138879).\n\n - net: ena: add good checksum counter (bsc#1138879).\n\n - net: ena: add handling of llq max tx burst size\n (bsc#1138879).\n\n - net: ena: add MAX_QUEUES_EXT get feature admin command\n (bsc#1138879).\n\n - net: ena: add newline at the end of pr_err prints\n (bsc#1138879).\n\n - net: ena: add support for changing max_header_size in\n LLQ mode (bsc#1138879).\n\n - net: ena: allow automatic fallback to polling mode\n (bsc#1138879).\n\n - net: ena: allow queue allocation backoff when low on\n memory (bsc#1138879).\n\n - net: ena: arrange ena_probe() function variables in\n reverse christmas tree (bsc#1138879).\n\n - net: ena: enable negotiating larger Rx ring size\n (bsc#1138879).\n\n - net: ena: ethtool: add extra properties retrieval via\n get_priv_flags (bsc#1138879).\n\n - net: ena: Fix bug where ring allocation backoff stopped\n too late (bsc#1138879).\n\n - net: ena: fix ena_com_fill_hash_function()\n implementation (bsc#1138879).\n\n - net: ena: fix: Free napi resources when ena_up() fails\n (bsc#1138879).\n\n - net: ena: fix incorrect test of supported hash function\n (bsc#1138879).\n\n - net: ena: fix: set freed objects to NULL to avoid\n failing future allocations (bsc#1138879).\n\n - net: ena: fix swapped parameters when calling\n ena_com_indirect_table_fill_entry (bsc#1138879).\n\n - net: ena: gcc 8: fix compilation warning (bsc#1138879).\n\n - net: ena: improve latency by disabling adaptive\n interrupt moderation by default (bsc#1138879).\n\n - net: ena: make ethtool show correct current and max\n queue sizes (bsc#1138879).\n\n - net: ena: optimise calculations for CQ doorbell\n (bsc#1138879).\n\n - net: ena: remove inline keyword from functions in *.c\n (bsc#1138879).\n\n - net: ena: replace free_tx/rx_ids union with single\n free_ids field in ena_ring (bsc#1138879).\n\n - net: ena: update driver version from 2.0.3 to 2.1.0\n (bsc#1138879).\n\n - net: ena: use dev_info_once instead of static variable\n (bsc#1138879).\n\n - net: ethernet: ti: cpsw_ethtool: fix ethtool ring param\n set (bsc#1130836).\n\n - net: Fix missing meta data in skb with vlan packet\n (bsc#1109837).\n\n - net/mlx5: Avoid reloading already removed devices\n (bsc#1103990 FATE#326006).\n\n - net/mlx5e: Fix ethtool rxfh commands when\n CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990\n FATE#326006).\n\n - net/mlx5e: Fix the max MTU check in case of XDP\n (bsc#1103990 FATE#326006).\n\n - net/mlx5e: Fix use-after-free after xdp_return_frame\n (bsc#1103990 FATE#326006).\n\n - net/mlx5e: Rx, Check ip headers sanity (bsc#1103990\n FATE#326006).\n\n - net/mlx5e: Rx, Fixup skb checksum for packets with tail\n padding (bsc#1109837).\n\n - net/mlx5e: XDP, Fix shifted flag index in RQ bitmap\n (bsc#1103990 FATE#326006).\n\n - net/mlx5: FPGA, tls, hold rcu read lock a bit longer\n (bsc#1103990 FATE#326006).\n\n - net/mlx5: FPGA, tls, idr remove on flow delete\n (bsc#1103990 FATE#326006).\n\n - net/mlx5: Set completion EQs as shared resources\n (bsc#1103991 FATE#326007).\n\n - net/mlx5: Update pci error handler entries and command\n translation (bsc#1103991 FATE#326007).\n\n - net: mvpp2: prs: Fix parser range for VID filtering\n (bsc#1098633).\n\n - net: mvpp2: prs: Use the correct helpers when removing\n all VID filters (bsc#1098633).\n\n - net: mvpp2: Use strscpy to handle stat strings\n (bsc#1098633).\n\n - net: phy: marvell10g: report if the PHY fails to boot\n firmware (bsc#1119113 FATE#326472).\n\n - net/sched: cbs: Fix error path of cbs_module_init\n (bsc#1109837).\n\n - net/sched: cbs: fix port_rate miscalculation\n (bsc#1109837).\n\n - net/tls: avoid NULL pointer deref on nskb->sk in\n fallback (bsc#1109837).\n\n - net/tls: avoid potential deadlock in\n tls_set_device_offload_rx() (bsc#1109837).\n\n - net: tls, correctly account for copied bytes with\n multiple sk_msgs (bsc#1109837).\n\n - net/tls: do not copy negative amounts of data in\n reencrypt (bsc#1109837).\n\n - net/tls: do not ignore netdev notifications if no TLS\n features (bsc#1109837).\n\n - net/tls: do not leak IV and record seq when offload\n fails (bsc#1109837).\n\n - net/tls: do not leak partially sent record in device\n mode (bsc#1109837).\n\n - net/tls: fix build without CONFIG_TLS_DEVICE\n (bsc#1109837).\n\n - net/tls: fix copy to fragments in reencrypt\n (bsc#1109837).\n\n - net/tls: fix page double free on TX cleanup\n (bsc#1109837).\n\n - net/tls: fix refcount adjustment in fallback\n (bsc#1109837).\n\n - net/tls: fix state removal with feature flags off\n (bsc#1109837).\n\n - net/tls: fix the IV leaks (bsc#1109837).\n\n - net/tls: prevent bad memory access in\n tls_is_sk_tx_device_offloaded() (bsc#1109837).\n\n - net/tls: replace the sleeping lock around RX resync with\n a bit lock (bsc#1109837).\n\n - net/udp_gso: Allow TX timestamp with UDP GSO\n (bsc#1109837).\n\n - new primitive: vmemdup_user() (jsc#SLE-4712\n bsc#1136156).\n\n - nfit/ars: Allow root to busy-poll the ARS state machine\n (bsc#1140814).\n\n - nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n\n - nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n\n - nfp: bpf: fix static check error through tightening\n shift amount adjustment (bsc#1109837).\n\n - nfp: flower: add rcu locks when accessing netdev for\n tunnels (bsc#1109837).\n\n - nl80211: fix station_info pertid memory leak\n (bsc#1051510).\n\n - ntp: Allow TAI-UTC offset to be set to zero\n (bsc#1135642).\n\n - nvme: copy MTFA field from identify controller\n (bsc#1140715).\n\n - nvme-rdma: fix double freeing of async event data\n (bsc#1120423).\n\n - nvme-rdma: fix possible double free of controller async\n event buffer (bsc#1120423).\n\n - ocfs2: try to reuse extent block in dealloc without\n meta_alloc (bsc#1128902).\n\n - pci: Disable VF decoding before pcibios_sriov_disable()\n updates resources (jsc#SLE-5803).\n\n - pci: Disable VF decoding before pcibios_sriov_disable()\n updates resources (jsc#SLE-5803 FATE#327056).\n\n - pci: Do not poll for PME if the device is in D3cold\n (bsc#1051510).\n\n - pci/IOV: Add flag so platforms can skip VF scanning\n (jsc#SLE-5803).\n\n - pci/IOV: Add flag so platforms can skip VF scanning\n (jsc#SLE-5803 FATE#327056).\n\n - pci/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803).\n\n - pci/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803\n FATE#327056).\n\n - pci/P2PDMA: fix the gen_pool_add_virt() failure path\n (bsc#1103992).\n\n - pci/P2PDMA: fix the gen_pool_add_virt() failure path\n (bsc#1103992 FATE#326009).\n\n - pci: PM: Skip devices in D0 for suspend-to-idle\n (bsc#1051510).\n\n - pci: rpadlpar: Fix leaked device_node references in\n add/remove paths (bsc#1051510).\n\n - perf/x86/intel/cstate: Support multi-die/package\n (jsc#SLE-5454).\n\n - perf/x86/intel/rapl: Cosmetic rename internal variables\n in response to multi-die/pkg support (jsc#SLE-5454).\n\n - perf/x86/intel/rapl: Support multi-die/package\n (jsc#SLE-5454).\n\n - perf/x86/intel/uncore: Cosmetic renames in response to\n multi-die/pkg support (jsc#SLE-5454).\n\n - perf/x86/intel/uncore: Support multi-die/package\n (jsc#SLE-5454).\n\n - pinctrl/amd: add get_direction handler (bsc#1140463).\n\n - pinctrl/amd: fix gpio irq level in debugfs\n (bsc#1140463).\n\n - pinctrl/amd: fix masking of GPIO interrupts\n (bsc#1140463).\n\n - pinctrl/amd: make functions amd_gpio_suspend and\n amd_gpio_resume static (bsc#1140463).\n\n - pinctrl/amd: poll InterruptEnable bits in\n amd_gpio_irq_set_type (bsc#1140463).\n\n - pinctrl/amd: poll InterruptEnable bits in enable_irq\n (bsc#1140463).\n\n - platform_data/mlxreg: Add capability field to core\n platform data (bsc#1112374).\n\n - platform_data/mlxreg: additions for Mellanox watchdog\n driver (bsc#1112374).\n\n - platform_data/mlxreg: Document fixes for core platform\n data (bsc#1112374).\n\n - platform/mellanox: Add new ODM system types to\n mlx-platform (bsc#1112374).\n\n - platform/mellanox: Add TmFifo driver for Mellanox\n BlueField Soc (bsc#1136333 jsc#SLE-4994).\n\n - platform/x86: asus-wmi: Only Tell EC the OS will handle\n display hotkeys from asus_nb_wmi (bsc#1051510).\n\n - platform/x86: mlx-platform: Add ASIC hotplug device\n configuration (bsc#1112374).\n\n - platform/x86: mlx-platform: Add definitions for new\n registers (bsc#1112374).\n\n - platform/x86: mlx-platform: Add extra CPLD for next\n generation systems (bsc#1112374).\n\n - platform/x86: mlx-platform: Add LED platform driver\n activation (bsc#1112374).\n\n - platform/x86: mlx-platform: Add mlxreg-fan platform\n driver activation (bsc#1112374).\n\n - platform/x86: mlx-platform: Add mlxreg-io platform\n driver activation (bsc#1112374).\n\n - platform/x86: mlx-platform: Add mlx-wdt platform driver\n activation (bsc#1112374).\n\n - platform/x86: mlx-platform: Add support for fan\n capability registers (bsc#1112374).\n\n - platform/x86: mlx-platform: Add support for fan\n direction register (bsc#1112374).\n\n - platform/x86: mlx-platform: Add support for new VMOD0007\n board name (bsc#1112374).\n\n - platform/x86: mlx-platform: Add support for tachometer\n speed register (bsc#1112374).\n\n - platform/x86: mlx-platform: Add UID LED for the next\n generation systems (bsc#1112374).\n\n - platform/x86: mlx-platform: Allow mlxreg-io driver\n activation for more systems (bsc#1112374).\n\n - platform/x86: mlx-platform: Allow mlxreg-io driver\n activation for new systems (bsc#1112374).\n\n - platform/x86: mlx-platform: Change mlxreg-io\n configuration for MSN274x systems (bsc#1112374).\n\n - platform/x86: mlx-platform: Convert to use SPDX\n identifier (bsc#1112374).\n\n - platform/x86: mlx-platform: Fix access mode for fan_dir\n attribute (bsc#1112374).\n\n - platform/x86: mlx-platform: Fix copy-paste error in\n mlxplat_init() (bsc#1112374).\n\n - platform/x86: mlx-platform: Fix LED configuration\n (bsc#1112374).\n\n - platform/x86: mlx-platform: Fix tachometer registers\n (bsc#1112374).\n\n - platform/x86: mlx-platform: Remove unused define\n (bsc#1112374).\n\n - platform/x86: mlx-platform: Rename new systems product\n names (bsc#1112374).\n\n - PM: ACPI/PCI: Resume all devices during hibernation\n (bsc#1111666).\n\n - powercap/intel_rapl: Simplify rapl_find_package()\n (jsc#SLE-5454).\n\n - powercap/intel_rapl: Support multi-die/package\n (jsc#SLE-5454).\n\n - powercap/intel_rapl: Update RAPL domain name and debug\n messages (jsc#SLE-5454).\n\n - powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to\n power9 event list (bsc#1137728, LTC#178106).\n\n - powerpc/perf: Add POWER9 alternate PM_RUN_CYC and\n PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n\n - powerpc/rtas: retry when cpu offline races with\n suspend/migration (bsc#1140428, LTC#178808).\n\n - ppc64le: enable CONFIG_PPC_DT_CPU_FTRS (jsc#SLE-7159).\n\n - ppp: mppe: Add softdep to arc4 (bsc#1088047).\n\n - ptrace: Fix -$gt;ptracer_cred handling for\n PTRACE_TRACEME (git-fixes).\n\n - ptrace: restore smp_rmb() in __ptrace_may_access()\n (git-fixes).\n\n - pwm: stm32: Use 3 cells ->of_xlate() (bsc#1111666).\n\n - qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector\n index (jsc#SLE-4693 bsc#1136462).\n\n - qmi_wwan: add network device usage statistics for qmimux\n devices (bsc#1051510).\n\n - qmi_wwan: add support for QMAP padding in the RX path\n (bsc#1051510).\n\n - qmi_wwan: avoid RCU stalls on device disconnect when in\n QMAP mode (bsc#1051510).\n\n - qmi_wwan: extend permitted QMAP mux_id value range\n (bsc#1051510).\n\n - qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n\n - rapidio: fix a NULL pointer dereference when\n create_workqueue() fails (bsc#1051510).\n\n - RAS/CEC: Convert the timer callback to a workqueue\n (bsc#1114279).\n\n - RAS/CEC: Fix binary search function (bsc#1114279).\n\n - rbd: do not assert on writes to snapshots (bsc#1137985\n bsc#1138681).\n\n - rdma/ipoib: Allow user space differentiate between valid\n dev_port (bsc#1103992).\n\n - rdma/ipoib: Allow user space differentiate between valid\n dev_port (bsc#1103992 FATE#326009).\n\n - rdma/mlx5: Do not allow the user to write to the clock\n page (bsc#1103991).\n\n - rdma/mlx5: Do not allow the user to write to the clock\n page (bsc#1103991 FATE#326007).\n\n - rdma/mlx5: Initialize roce port info before multiport\n master init (bsc#1103991).\n\n - rdma/mlx5: Initialize roce port info before multiport\n master init (bsc#1103991 FATE#326007).\n\n - rdma/mlx5: Use rdma_user_map_io for mapping BAR pages\n (bsc#1103992).\n\n - rdma/mlx5: Use rdma_user_map_io for mapping BAR pages\n (bsc#1103992 FATE#326009).\n\n - Refresh\n patches.fixes/scsi-Introduce-scsi_start_queue.patch\n (bsc#1119532).\n\n - regulator: s2mps11: Fix buck7 and buck8 wrong voltages\n (bsc#1051510).\n\n - Replace the bluetooth fix with the upstream commit\n (bsc#1135556)\n\n - Reshuffle patches to match series_sort.py\n\n - Revert 'net: ena: ethtool: add extra properties\n retrieval via get_priv_flags' (bsc#1138879).\n\n - Revert 'net/mlx5e: Enable reporting checksum unnecessary\n also for L3 packets' (bsc#1103990).\n\n - Revert 'net/mlx5e: Enable reporting checksum unnecessary\n also for L3 packets' (bsc#1103990 FATE#326006).\n\n - Revert 'Revert 'Drop multiversion(kernel) from the KMP\n template ()''\n\n - Revert 'Revert 'Drop multiversion(kernel) from the KMP\n template (fate#323189)\n\n - Revert 's390/jump_label: Use 'jdd' constraint on gcc9\n (bsc#1138589).' This broke the build with older gcc\n instead.\n\n - Revert 'Sign non-x86 kernels when possible\n (boo#1134303)' This reverts commit\n bac621c6704610562ebd9e74ae5ad85ca8025681. We do not have\n reports of this working with all ARM architectures in\n all cases (boot, kexec, ..) so revert for now.\n\n - Revert 'svm: Fix AVIC incomplete IPI emulation'\n (bsc#1140133).\n\n - rpm/package-descriptions: fix typo in kernel-azure\n\n - rpm/post.sh: correct typo in err msg (bsc#1137625)\n\n - s390/dasd: fix using offset into zero size array error\n (bsc#1051510).\n\n - s390/jump_label: Use 'jdd' constraint on gcc9\n (bsc#1138589).\n\n - s390/pci: improve bar check (jsc#SLE-5803).\n\n - s390/pci: improve bar check (jsc#SLE-5803 FATE#327056).\n\n - s390/pci: map IOV resources (jsc#SLE-5803).\n\n - s390/pci: map IOV resources (jsc#SLE-5803 FATE#327056).\n\n - s390/pci: skip VF scanning (jsc#SLE-5803).\n\n - s390/pci: skip VF scanning (jsc#SLE-5803 FATE#327056).\n\n - s390/qeth: fix race when initializing the IP address\n table (bsc#1051510).\n\n - s390/qeth: fix VLAN attribute in bridge_hostnotify udev\n event (bsc#1051510).\n\n - s390/setup: fix early warning messages (bsc#1051510).\n\n - s390/virtio: handle find on invalid queue gracefully\n (bsc#1051510).\n\n - sbitmap: fix improper use of smp_mb__before_atomic()\n (bsc#1140658).\n\n - sched/topology: Improve load balancing on AMD EPYC\n (bsc#1137366).\n\n - scripts/git_sort/git_sort.py: add djbw/nvdimm\n nvdimm-pending.\n\n - scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes\n\n - scripts/git_sort/git_sort.py: drop old scsi branches\n\n - scsi: aacraid: change event_wait to a completion\n (jsc#SLE-4710 bsc#1136161).\n\n - scsi: aacraid: change wait_sem to a completion\n (jsc#SLE-4710 bsc#1136161).\n\n - scsi: aacraid: clean up some indentation and formatting\n issues (jsc#SLE-4710 bsc#1136161).\n\n - scsi: aacraid: Mark expected switch fall-through\n (jsc#SLE-4710 bsc#1136161).\n\n - scsi: aacraid: Mark expected switch fall-throughs\n (jsc#SLE-4710 bsc#1136161).\n\n - scsi: be2iscsi: be_iscsi: Mark expected switch\n fall-through (jsc#SLE-4721 bsc#1136264).\n\n - scsi: be2iscsi: be_main: Mark expected switch\n fall-through (jsc#SLE-4721 bsc#1136264).\n\n - scsi: be2iscsi: fix spelling mistake 'Retreiving' -gt;\n 'Retrieving' (jsc#SLE-4721 bsc#1136264).\n\n - scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721\n bsc#1136264).\n\n - scsi: be2iscsi: remove unused variable dmsg\n (jsc#SLE-4721 bsc#1136264).\n\n - scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721\n bsc#1136264).\n\n - scsi: core: add new RDAC LENOVO/DE_Series device\n (bsc#1132390).\n\n - scsi: csiostor: csio_wr: mark expected switch\n fall-through (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: drop serial_number usage (jsc#SLE-4679\n bsc#1136343).\n\n - scsi: csiostor: fix calls to dma_set_mask_and_coherent()\n (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: fix incorrect dma device in case of\n vport (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: fix missing data copy in\n csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: fix NULL pointer dereference in\n csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: no need to check return value of\n debugfs_create functions (jsc#SLE-4679 bsc#1136343).\n\n - scsi: csiostor: Remove set but not used variable 'pln'\n (jsc#SLE-4679 bsc#1136343).\n\n - scsi: hpsa: bump driver version (jsc#SLE-4712\n bsc#1136156).\n\n - scsi: hpsa: check for lv removal (jsc#SLE-4712\n bsc#1136156).\n\n - scsi: hpsa: clean up two indentation issues\n (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: correct device id issues (jsc#SLE-4712\n bsc#1136156).\n\n - scsi: hpsa: correct device resets (jsc#SLE-4712\n bsc#1136156).\n\n - scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712\n bsc#1136156).\n\n - scsi: hpsa: correct simple mode (jsc#SLE-4712\n bsc#1136156).\n\n - scsi: hpsa: fix an uninitialized read and dereference of\n pointer dev (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: mark expected switch fall-throughs\n (jsc#SLE-4712 bsc#1136156).\n\n - scsi: hpsa: remove timeout from TURs (jsc#SLE-4712\n bsc#1136156).\n\n - scsi: hpsa: switch to generic DMA API (jsc#SLE-4712\n bsc#1136156).\n\n - scsi: hpsa: Use vmemdup_user to replace the open code\n (jsc#SLE-4712 bsc#1136156).\n\n - scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in\n driver (bsc#1136271).\n\n - scsi: megaraid_sas: correct an info message\n (bsc#1136271).\n\n - scsi: megaraid_sas: driver version update (bsc#1136271).\n\n - scsi: megaraid_sas: Retry reads of outbound_intr_status\n reg (bsc#1136271).\n\n - scsi: megaraid_sas: Rework code to get PD and LD list\n (bsc#1136271).\n\n - scsi: megaraid_sas: Rework device add code in AEN path\n (bsc#1136271).\n\n - scsi: megaraid_sas: Update structures for\n HOST_DEVICE_LIST DCMD (bsc#1136271).\n\n - scsi: mpt3sas: Add Atomic RequestDescriptor support on\n Aero (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Add flag high_iops_queues\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Add missing breaks in switch statements\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Add support for ATLAS PCIe switch\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Add support for NVMe Switch Adapter\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Affinity high iops queues IRQs to local\n node (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: change _base_get_msix_index prototype\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Enable interrupt coalescing on high iops\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: fix indentation issue\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Fix kernel panic during expander reset\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Fix typo in request_desript_type\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: function pointers of request descriptor\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Improve the threshold value and introduce\n module param (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Introduce perf_mode module parameter\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Irq poll to avoid CPU hard lockups\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Load balance to improve performance and\n avoid soft lockups (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Rename mpi endpoint device ID macro\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: save and use MSI-X index for posting RD\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: simplify interrupt handler\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Update driver version to 27.102.00.00\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Update driver version to 29.100.00.00\n (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Update mpt3sas driver version to\n 28.100.00.00 (bsc#1125703,jsc#SLE-4717).\n\n - scsi: mpt3sas: Use high iops queues under some\n circumstances (bsc#1125703,jsc#SLE-4717).\n\n - scsi: qedi: add module param to set ping packet size\n (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Add packet filter in light L2 Rx path\n (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Check for session online before getting\n iSCSI TLV data (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro\n definition (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Fix spelling mistake 'OUSTANDING' ->\n 'OUTSTANDING' (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Move LL2 producer index processing in BH\n (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: remove set but not used variables 'cdev' and\n 'udev' (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE\n (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qedi: Update driver version to 8.33.0.21\n (jsc#SLE-4693 bsc#1136462).\n\n - scsi: qla2xxx: Fix abort handling in\n tcm_qla2xxx_write_pending() (bsc#1140727).\n\n - scsi: qla2xxx: Fix FC-AL connection target discovery\n (bsc#1094555).\n\n - scsi: qla2xxx: Fix incorrect region-size setting in\n optrom SYSFS routines (bsc#1140728).\n\n - scsi: qla2xxx: Fix N2N target discovery with Local loop\n (bsc#1094555).\n\n - scsi: target/iblock: Fix overrun in WRITE SAME emulation\n (bsc#1140424).\n\n - scsi: target/iblock: Fix overrun in WRITE SAME emulation\n (bsc#1140424).\n\n - scsi: vmw_pscsi: Fix use-after-free in\n pvscsi_queue_lck() (bsc#1135296).\n\n - scsi: zfcp: fix missing zfcp_port reference put on\n -EBUSY from port_remove (bsc#1051510).\n\n - scsi: zfcp: fix rport unblock if deleted SCSI devices on\n Scsi_Host (bsc#1051510).\n\n - scsi: zfcp: fix scsi_eh host reset with port_forced ERP\n for non-NPIV FCP devices (bsc#1051510).\n\n - scsi: zfcp: fix to prevent port_remove with pure auto\n scan LUNs (only sdevs) (bsc#1051510).\n\n - signal/ptrace: Do not leak uninitialized kernel memory\n with PTRACE_PEEK_SIGINFO (git-fixes).\n\n - smb3: Fix endian warning (bsc#1137884).\n\n - soc: mediatek: pwrap: Zero initialize rdata in\n pwrap_init_cipher (bsc#1051510).\n\n - soc: rockchip: Set the proper PWM for rk3288\n (bsc#1051510).\n\n - sort patches to proper position\n\n - squash\n patches.fixes/tcp-fix-fack_count-accounting-on-tcp_shift\n _skb_data.patch into\n patches.fixes/tcp-limit-payload-size-of-sacked-skbs.patc\n h to match what stable backports do\n\n - staging: comedi: ni_mio_common: Fix divide-by-zero for\n DIO cmdtest (bsc#1051510).\n\n - staging:iio:ad7150: fix threshold mode config bit\n (bsc#1051510).\n\n - supported.conf: added mlxbf_tmfifo (bsc#1136333\n jsc#SLE-4994)\n\n - svm: Add warning message for AVIC IPI invalid target\n (bsc#1140133).\n\n - svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n\n - sysctl: handle overflow in proc_get_long (bsc#1051510).\n\n - thermal: rcar_gen3_thermal: disable interrupt in .remove\n (bsc#1051510).\n\n - thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal\n variables to zones from packages (jsc#SLE-5454).\n\n - thermal/x86_pkg_temp_thermal: Support multi-die/package\n (jsc#SLE-5454).\n\n - tmpfs: fix link accounting when a tmpfile is linked in\n (bsc#1051510).\n\n - tmpfs: fix uninitialized return value in shmem_link\n (bsc#1051510).\n\n - tools: bpftool: fix infinite loop in map create\n (bsc#1109837).\n\n - topology: Create core_cpus and die_cpus sysfs attributes\n (jsc#SLE-5454).\n\n - topology: Create package_cpus sysfs attribute\n (jsc#SLE-5454).\n\n - tracing/snapshot: Resize spare buffer if size changed\n (bsc#1140726).\n\n - tty: max310x: Fix external crystal register setup\n (bsc#1051510).\n\n - typec: tcpm: fix compiler warning about stupid things\n (git-fixes).\n\n - usb: chipidea: udc: workaround for endpoint conflict\n issue (bsc#1135642).\n\n - usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam\n regression) (bsc#1135642).\n\n - usb: Fix chipmunk-like voice when using Logitech C270\n for recording audio (bsc#1051510).\n\n - usbnet: ipheth: fix racing condition (bsc#1051510).\n\n - usb: serial: fix initial-termios handling (bsc#1135642).\n\n - usb: serial: option: add support for Simcom\n SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n\n - usb: serial: option: add Telit 0x1260 and 0x1261\n compositions (bsc#1051510).\n\n - usb: serial: pl2303: add Allied Telesis VT-Kit3\n (bsc#1051510).\n\n - usb: serial: pl2303: fix tranceiver suspend mode\n (bsc#1135642).\n\n - usb: usb-storage: Add new ID to ums-realtek\n (bsc#1051510).\n\n - usb: xhci: avoid NULL pointer deref when bos field is\n NULL (bsc#1135642).\n\n - vfio: ccw: only free cp on final interrupt\n (bsc#1051510).\n\n - vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n\n - x86/amd_nb: Add support for Raven Ridge CPUs\n (FATE#327735).\n\n - x86/CPU/AMD: Do not force the CPB cap when running under\n a hypervisor (bsc#1114279).\n\n - x86/cpufeatures: Carve out CQM features retrieval\n (jsc#SLE-5382).\n\n - x86/cpufeatures: Combine word 11 and 12 into a new\n scattered features word (jsc#SLE-5382). This changes\n definitions of some bits, but they are intended to be\n used only by the core, so hopefully, no KMP uses the\n definitions.\n\n - x86/cpufeatures: Enumerate the new AVX512 BFLOAT16\n instructions (jsc#SLE-5382).\n\n - x86/cpufeatures: Enumerate user wait instructions\n (jsc#SLE-5187).\n\n - x86/CPU/hygon: Fix phys_proc_id calculation logic for\n multi-die processors (fate#327735).\n\n - x86/mce: Fix machine_check_poll() tests for error types\n (bsc#1114279).\n\n - x86/microcode, cpuhotplug: Add a microcode loader CPU\n hotplug callback (bsc#1114279).\n\n - x86/microcode: Fix microcode hotplug state\n (bsc#1114279).\n\n - x86/microcode: Fix the ancient deprecated microcode\n loading method (bsc#1114279).\n\n - x86/mm/mem_encrypt: Disable all instrumentation for\n early SME setup (bsc#1114279).\n\n - x86/smpboot: Rename match_die() to match_pkg()\n (jsc#SLE-5454).\n\n - x86/speculation/mds: Revert CPU buffer clear on double\n fault exit (bsc#1114279).\n\n - x86/topology: Add CPUID.1F multi-die/package support\n (jsc#SLE-5454).\n\n - x86/topology: Create topology_max_die_per_package()\n (jsc#SLE-5454).\n\n - x86/topology: Define topology_die_id() (jsc#SLE-5454).\n\n - x86/topology: Define topology_logical_die_id()\n (jsc#SLE-5454).\n\n - x86/umwait: Add sysfs interface to control umwait C0.2\n state (jsc#SLE-5187).\n\n - x86/umwait: Add sysfs interface to control umwait\n maximum time (jsc#SLE-5187).\n\n - x86/umwait: Initialize umwait control values\n (jsc#SLE-5187).\n\n - xdp: check device pointer before clearing (bsc#1109837).\n\n - (nl,mac)80211: allow 4addr AP operation on crypto\n controlled devices (bsc#1051510).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1088047\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1094555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1098633\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103990\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103991\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103992\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106383\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109837\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112374\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114685\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1119113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1119532\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120423\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125703\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128902\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1130836\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1132390\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133738\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134303\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134395\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135556\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135642\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135897\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136156\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136157\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136161\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136264\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136271\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136935\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137103\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137194\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137366\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137728\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137884\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137985\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138589\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138681\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138879\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1139712\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1139771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1139865\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140133\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140228\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140328\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140405\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140454\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140463\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140575\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140577\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140637\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140715\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140726\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140727\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140728\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140814\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140888\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140889\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140891\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140893\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140948\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140955\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140957\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140958\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140960\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140961\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140962\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140964\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140971\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140972\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140992\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-20836\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-debuginfo-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debuginfo-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debugsource-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-debuginfo-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-debuginfo-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debuginfo-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debugsource-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-debuginfo-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-devel-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-docs-html-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debugsource-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-macros-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-debugsource-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-qa-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-vanilla-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-syms-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debuginfo-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debugsource-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-4.12.14-lp151.28.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-lp151.28.10.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-26T14:53:00", "description": "The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-5390 aka 'SegmentSmack': A remote attacker even with relatively low bandwidth could have caused lots of CPU usage by triggering the worst case scenario during IP and/or TCP fragment reassembly (bsc#1102340)\n\nCVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bnc#1135603)\n\nCVE-2018-20836: A race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, could have lead to a use-after-free. (bnc#1134395)\n\nCVE-2019-12614: An unchecked kstrdup might have allowed an attacker to cause denial of service (a NULL pointer dereference and system crash).\n(bnc#1137194)\n\nCVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may have returned NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause denial of service. (bnc#1138293)\n\nCVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main() allowed local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a 'double fetch' vulnerability.\n(bsc#1136922)\n\nCVE-2019-11487: An attacker could have triggered use-after-free via page reference count overflow on slow filesystems with at least of 140 GiB of RAM available. (bnc#1133190)\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-19T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1870-1) (SACK Slowness)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-20836", "CVE-2018-5390", "CVE-2018-7191", "CVE-2019-11478", "CVE-2019-11487", "CVE-2019-12456", "CVE-2019-12614", "CVE-2019-12818"], "modified": "2022-12-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-xen", "p-cpe:/a:novell:suse_linux:kernel-xen-base", "p-cpe:/a:novell:suse_linux:kernel-xen-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-xen-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-xen-debugsource", "p-cpe:/a:novell:suse_linux:kernel-xen-devel", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_118-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_118-xen", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2019-1870-1.NASL", "href": "https://www.tenable.com/plugins/nessus/126811", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:1870-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(126811);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/06\");\n\n script_cve_id(\n \"CVE-2018-20836\",\n \"CVE-2018-5390\",\n \"CVE-2018-7191\",\n \"CVE-2019-11478\",\n \"CVE-2019-11487\",\n \"CVE-2019-12456\",\n \"CVE-2019-12614\",\n \"CVE-2019-12818\"\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2019-0456\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1870-1) (SACK Slowness)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-5390 aka 'SegmentSmack': A remote attacker even with\nrelatively low bandwidth could have caused lots of CPU usage by\ntriggering the worst case scenario during IP and/or TCP fragment\nreassembly (bsc#1102340)\n\nCVE-2018-7191: In the tun subsystem in the Linux kernel,\ndev_get_valid_name was not called before register_netdevice. This\nallowed local users to cause a denial of service (NULL pointer\ndereference and panic) via an ioctl(TUNSETIFF) call with a dev name\ncontaining a / character. (bnc#1135603)\n\nCVE-2018-20836: A race condition in smp_task_timedout() and\nsmp_task_done() in drivers/scsi/libsas/sas_expander.c, could have lead\nto a use-after-free. (bnc#1134395)\n\nCVE-2019-12614: An unchecked kstrdup might have allowed an attacker to\ncause denial of service (a NULL pointer dereference and system crash).\n(bnc#1137194)\n\nCVE-2019-12818: The nfc_llcp_build_tlv function in\nnet/nfc/llcp_commands.c may have returned NULL. If the caller did not\ncheck for this, it would trigger a NULL pointer dereference. This\nwould cause denial of service. (bnc#1138293)\n\nCVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main()\nallowed local users to cause a denial of service or possibly have\nunspecified other impact by changing the value of ioc_number between\ntwo kernel reads of that value, aka a 'double fetch' vulnerability.\n(bsc#1136922)\n\nCVE-2019-11487: An attacker could have triggered use-after-free via\npage reference count overflow on slow filesystems with at least of 140\nGiB of RAM available. (bnc#1133190)\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102340\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112824\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1130159\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133190\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1134395\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135603\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136922\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1137194\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1138293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20836/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-5390/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-7191/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-11487/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12456/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12614/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12818/\");\n # https://www.suse.com/support/update/announcement/2019/suse-su-20191870-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ce50e84b\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server for SAP 12-SP1:zypper in -t patch\nSUSE-SLE-SAP-12-SP1-2019-1870=1\n\nSUSE Linux Enterprise Server 12-SP1-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-SP1-2019-1870=1\n\nSUSE Linux Enterprise Module for Public Cloud 12:zypper in -t patch\nSUSE-SLE-Module-Public-Cloud-12-2019-1870=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/19\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_118-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_118-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-base-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-base-debuginfo-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-debuginfo-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-debugsource-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-xen-devel-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_118-default-1-2.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-man-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-default-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-default-base-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-default-base-debuginfo-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-default-debuginfo-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-default-debugsource-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-default-devel-3.12.74-60.64.118.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"kernel-syms-3.12.74-60.64.118.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-03-26T15:16:31", "description": "Update to v5.1.8\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-06-13T00:00:00", "type": "nessus", "title": "Fedora 30 : kernel / kernel-headers (2019-c03eda3cc6)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12456", "CVE-2019-12614"], "modified": "2020-01-10T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:kernel", "p-cpe:/a:fedoraproject:fedora:kernel-headers", "cpe:/o:fedoraproject:fedora:30"], "id": "FEDORA_2019-C03EDA3CC6.NASL", "href": "https://www.tenable.com/plugins/nessus/125865", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-c03eda3cc6.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(125865);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2020/01/10\");\n\n script_cve_id(\"CVE-2019-12456\", \"CVE-2019-12614\");\n script_xref(name:\"FEDORA\", value:\"2019-c03eda3cc6\");\n\n script_name(english:\"Fedora 30 : kernel / kernel-headers (2019-c03eda3cc6)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to v5.1.8\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-c03eda3cc6\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel and / or kernel-headers packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-12456\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:30\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/05/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/06/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/06/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^30([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 30\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-12456\", \"CVE-2019-12614\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for FEDORA-2019-c03eda3cc6\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\nif (rpm_check(release:\"FC30\", reference:\"kernel-5.1.8-300.fc30\")) flag++;\nif (rpm_check(release:\"FC30\", reference:\"kernel-headers-5.1.8-300.fc30\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-headers\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T15:17:08", "description": "The openSUSE Leap 15.1 was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic.\n (bsc#1137586).\n\n - CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)\n\n - CVE-2019-11479: It was possible to send a crafted sequence of SACKs which would fragment the RACK send map. A remote attacker may be able to further exploit the fragmented send map to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. This would have resulted in excess resource consumption due to low mss values.\n (bsc#1137586)\n\n - CVE-2019-12819: The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service (bnc#1138291).\n\n - CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c (bnc#1138293).\n\n - CVE-2019-12456: An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c that allowed local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a 'double fetch' vulnerability. (bnc#1136922)\n\n - CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures (bnc#1136598).\n\n - CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424).\n\n - CVE-2019-10124: An attacker could exploit an issue in the hwpoison implementation to cause a denial of service (BUG). (bsc#1130699)\n\n - CVE-2019-12382: In the drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c was an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1136586).\n\n - CVE-2019-11487: The Linux kernel allowed page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bnc#1133190).", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-06-20T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2019-1571) (SACK Panic) (SACK Slowness)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 6.5, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 8.3, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-10124", "CVE-2019-11477", "CVE-2019-11478", "CVE-2019-11479", "CVE-2019-11487", "CVE-2019-12380", "CVE-2019-12382", "CVE-2019-12456", "CVE-2019-12818", "CVE-2019-12819", "CVE-2019-3846"], "modified": "2022-12-05T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "cpe:/o:novell:opensuse:15.1"], "id": "OPENSUSE-2019-1571.NASL", "href": "https://www.tenable.com/plugins/nessus/126059", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-1571.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(126059);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2019-10124\",\n \"CVE-2019-11477\",\n \"CVE-2019-11478\",\n \"CVE-2019-11479\",\n \"CVE-2019-11487\",\n \"CVE-2019-12380\",\n \"CVE-2019-12382\",\n \"CVE-2019-12456\",\n \"CVE-2019-12818\",\n \"CVE-2019-12819\",\n \"CVE-2019-3846\"\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2019-0456\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2019-1571) (SACK Panic) (SACK Slowness)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote openSUSE host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The openSUSE Leap 15.1 was updated to receive various security and\nbugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-11477: A sequence of SACKs may have been\n crafted by a remote attacker such that one can trigger\n an integer overflow, leading to a kernel panic.\n (bsc#1137586).\n\n - CVE-2019-11478: It was possible to send a crafted\n sequence of SACKs which would fragment the TCP\n retransmission queue. A remote attacker may have been\n able to further exploit the fragmented queue to cause an\n expensive linked-list walk for subsequent SACKs received\n for that same TCP connection. (bsc#1137586)\n\n - CVE-2019-11479: It was possible to send a crafted\n sequence of SACKs which would fragment the RACK send\n map. A remote attacker may be able to further exploit\n the fragmented send map to cause an expensive\n linked-list walk for subsequent SACKs received for that\n same TCP connection. This would have resulted in excess\n resource consumption due to low mss values.\n (bsc#1137586)\n\n - CVE-2019-12819: The function __mdiobus_register() in\n drivers/net/phy/mdio_bus.c calls put_device(), which\n will trigger a fixed_mdio_bus_init use-after-free. This\n will cause a denial of service (bnc#1138291).\n\n - CVE-2019-12818: The nfc_llcp_build_tlv function in\n net/nfc/llcp_commands.c may return NULL. If the caller\n did not check for this, it will trigger a NULL pointer\n dereference. This will cause denial of service. This\n affects nfc_llcp_build_gb in net/nfc/llcp_core.c\n (bnc#1138293).\n\n - CVE-2019-12456: An issue was discovered in the\n MPT3COMMAND case in _ctl_ioctl_main in\n drivers/scsi/mpt3sas/mpt3sas_ctl.c that allowed local\n users to cause a denial of service or possibly have\n unspecified other impact by changing the value of\n ioc_number between two kernel reads of that value, aka a\n 'double fetch' vulnerability. (bnc#1136922)\n\n - CVE-2019-12380: An issue was discovered in the efi\n subsystem in the Linux kernel\n phys_efi_set_virtual_address_map in\n arch/x86/platform/efi/efi.c and efi_call_phys_prolog in\n arch/x86/platform/efi/efi_64.c mishandle memory\n allocation failures (bnc#1136598).\n\n - CVE-2019-3846: A flaw that allowed an attacker to\n corrupt memory and possibly escalate privileges was\n found in the mwifiex kernel module while connecting to a\n malicious wireless network (bnc#1136424).\n\n - CVE-2019-10124: An attacker could exploit an issue in\n the hwpoison implementation to cause a denial of service\n (BUG). (bsc#1130699)\n\n - CVE-2019-12382: In the drm_load_edid_firmware in\n drivers/gpu/drm/drm_edid_load.c was an unchecked kstrdup\n of fwstr, which might allow an attacker to cause a\n denial of service (NULL pointer dereference and system\n crash) (bnc#1136586).\n\n - CVE-2019-11487: The Linux kernel allowed page->_refcount\n reference count overflow, with resultant use-after-free\n issues, if about 140 GiB of RAM exists. This is related\n to fs/fuse/dev.c, fs/pipe.c, fs/splice.c,\n include/linux/mm.h, include/linux/pipe_fs_i.h,\n kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can\n occur with FUSE requests (bnc#1133190).\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1012382\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1050242\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051510\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1053043\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1056787\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1058115\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1061840\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1064802\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065729\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1066129\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1068546\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1075020\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1082387\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083647\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1085535\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1093389\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1099658\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103992\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1104353\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1104427\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111666\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111696\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113722\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1115688\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1117114\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1117158\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1117561\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1118139\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120091\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120423\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120566\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120902\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124503\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126206\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126356\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128432\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1130699\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1131673\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133190\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133612\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134090\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134671\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134730\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134738\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134743\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134806\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134936\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134945\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134946\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134947\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134948\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134949\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134950\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134951\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134952\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134953\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134972\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134974\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134975\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134980\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134981\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134987\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134989\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134990\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134994\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134998\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134999\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135018\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135024\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135026\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135027\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135028\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135029\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135031\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135033\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135034\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135035\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135036\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135037\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135038\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135039\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135041\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135042\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135044\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135045\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135046\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135047\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135049\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135051\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135052\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135053\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135055\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135056\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135058\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135153\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135542\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135556\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135642\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135661\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136188\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136206\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136215\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136345\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136347\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136348\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136353\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136424\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136430\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136432\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136434\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136435\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136438\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136439\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136456\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136460\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136461\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136469\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136477\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136478\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136498\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136573\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136586\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136598\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136881\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136922\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136935\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136978\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136990\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137151\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137152\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137153\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137162\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137201\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137224\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137232\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137233\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137236\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137372\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137429\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137444\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137586\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137752\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137996\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137998\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137999\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138000\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138002\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138003\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138005\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138006\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138007\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138008\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138009\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138010\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138011\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138012\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138013\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138014\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138015\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138016\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138018\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138019\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138291\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138336\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138375\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected the Linux Kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/06/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/06/20\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-debuginfo-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debuginfo-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debugsource-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-debuginfo-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-debuginfo-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debuginfo-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debugsource-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-debuginfo-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-devel-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-docs-html-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debugsource-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-macros-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-debugsource-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-qa-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-vanilla-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-syms-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debuginfo-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debugsource-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-4.12.14-lp151.28.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-lp151.28.7.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc\");\n}\n", "cvss": {"score": 8.3, "vector": "AV:A/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-03-25T15:06:09", "description": "Update to v5.1.8\n\n----\n\nUpdate to v5.1.7\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-06-13T00:00:00", "type": "nessus", "title": "Fedora 29 : kernel / kernel-headers (2019-83858fc57b)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12454", "CVE-2019-12456", "CVE-2019-12614"], "modified": "2020-01-10T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:kernel", "p-cpe:/a:fedoraproject:fedora:kernel-headers", "cpe:/o:fedoraproject:fedora:29"], "id": "FEDORA_2019-83858FC57B.NASL", "href": "https://www.tenable.com/plugins/nessus/125863", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-83858fc57b.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(125863);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2020/01/10\");\n\n script_cve_id(\"CVE-2019-12454\", \"CVE-2019-12456\", \"CVE-2019-12614\");\n script_xref(name:\"FEDORA\", value:\"2019-83858fc57b\");\n\n script_name(english:\"Fedora 29 : kernel / kernel-headers (2019-83858fc57b)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to v5.1.8\n\n----\n\nUpdate to v5.1.7\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-83858fc57b\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel and / or kernel-headers packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-12456\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:29\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/05/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/06/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/06/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^29([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 29\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-12454\", \"CVE-2019-12456\", \"CVE-2019-12614\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for FEDORA-2019-83858fc57b\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\nif (rpm_check(release:\"FC29\", reference:\"kernel-5.1.8-200.fc29\")) flag++;\nif (rpm_check(release:\"FC29\", reference:\"kernel-headers-5.1.8-200.fc29\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-headers\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-02-25T14:39:13", "description": "It was discovered that an integer overflow existed in the Linux kernel when reference counting pages, leading to potential use-after-free issues. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-11487)\n\nJann Horn discovered that a race condition existed in the Linux kernel when performing core dumps. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information.\n(CVE-2019-11599)\n\nIt was discovered that the ext4 file system implementation in the Linux kernel did not properly zero out memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11833)\n\nIt was discovered that the Bluetooth Human Interface Device Protocol (HIDP) implementation in the Linux kernel did not properly verify strings were NULL terminated in certain situations. A local attacker could use this to expose sensitive information (kernel memory).\n(CVE-2019-11884).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-23T00:00:00", "type": "nessus", "title": "Ubuntu 19.04 : Linux kernel vulnerabilities (USN-4069-1)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-11487", "CVE-2019-11599", "CVE-2019-11833", "CVE-2019-11884"], "modified": "2023-01-12T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-snapdragon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gke", "p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual", "cpe:/o:canonical:ubuntu_linux:19.04"], "id": "UBUNTU_USN-4069-1.NASL", "href": "https://www.tenable.com/plugins/nessus/126950", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4069-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(126950);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/12\");\n\n script_cve_id(\"CVE-2019-11487\", \"CVE-2019-11599\", \"CVE-2019-11833\", \"CVE-2019-11884\");\n script_xref(name:\"USN\", value:\"4069-1\");\n\n script_name(english:\"Ubuntu 19.04 : Linux kernel vulnerabilities (USN-4069-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that an integer overflow existed in the Linux kernel\nwhen reference counting pages, leading to potential use-after-free\nissues. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2019-11487)\n\nJann Horn discovered that a race condition existed in the Linux kernel\nwhen performing core dumps. A local attacker could use this to cause a\ndenial of service (system crash) or expose sensitive information.\n(CVE-2019-11599)\n\nIt was discovered that the ext4 file system implementation in the\nLinux kernel did not properly zero out memory in some situations. A\nlocal attacker could use this to expose sensitive information (kernel\nmemory). (CVE-2019-11833)\n\nIt was discovered that the Bluetooth Human Interface Device Protocol\n(HIDP) implementation in the Linux kernel did not properly verify\nstrings were NULL terminated in certain situations. A local attacker\ncould use this to expose sensitive information (kernel memory).\n(CVE-2019-11884).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/4069-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-snapdragon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:19.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2019-2023 Canonical, Inc. / NASL script (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nvar release = chomp(release);\nif (! preg(pattern:\"^(19\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 19.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-11487\", \"CVE-2019-11599\", \"CVE-2019-11833\", \"CVE-2019-11884\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-4069-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nvar flag = 0;\n\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-5.0.0-1011-aws\", pkgver:\"5.0.0-1011.12\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-5.0.0-1011-gcp\", pkgver:\"5.0.0-1011.11\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-5.0.0-1011-kvm\", pkgver:\"5.0.0-1011.12\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-5.0.0-1012-azure\", pkgver:\"5.0.0-1012.12\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-5.0.0-1013-raspi2\", pkgver:\"5.0.0-1013.13\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-5.0.0-1017-snapdragon\", pkgver:\"5.0.0-1017.18\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-5.0.0-21-generic\", pkgver:\"5.0.0-21.22\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-5.0.0-21-generic-lpae\", pkgver:\"5.0.0-21.22\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-5.0.0-21-lowlatency\", pkgver:\"5.0.0-21.22\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-aws\", pkgver:\"5.0.0.1011.11\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-azure\", pkgver:\"5.0.0.1012.11\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-gcp\", pkgver:\"5.0.0.1011.11\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-generic\", pkgver:\"5.0.0.21.22\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-generic-lpae\", pkgver:\"5.0.0.21.22\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-gke\", pkgver:\"5.0.0.1011.11\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-kvm\", pkgver:\"5.0.0.1011.11\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-lowlatency\", pkgver:\"5.0.0.21.22\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-raspi2\", pkgver:\"5.0.0.1013.10\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-snapdragon\", pkgver:\"5.0.0.1017.10\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"linux-image-virtual\", pkgver:\"5.0.0.21.22\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-5.0-aws / linux-image-5.0-azure / linux-image-5.0-gcp / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-02-25T14:40:03", "description": "USN-4069-1 fixed vulnerabilities in the Linux kernel for Ubuntu 19.04.\nThis update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 19.04 for Ubuntu 18.04 LTS.\n\nIt was discovered that an integer overflow existed in the Linux kernel when reference counting pages, leading to potential use-after-free issues. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-11487)\n\nJann Horn discovered that a race condition existed in the Linux kernel when performing core dumps. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information.\n(CVE-2019-11599)\n\nIt was discovered that the ext4 file system implementation in the Linux kernel did not properly zero out memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11833)\n\nIt was discovered that the Bluetooth Human Interface Device Protocol (HIDP) implementation in the Linux kernel did not properly verify strings were NULL terminated in certain situations. A local attacker could use this to expose sensitive information (kernel memory).\n(CVE-2019-11884).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-08-12T00:00:00", "type": "nessus", "title": "Ubuntu 18.04 LTS : linux-hwe vulnerabilities (USN-4069-2)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-11487", "CVE-2019-11599", "CVE-2019-11833", "CVE-2019-11884"], "modified": "2023-01-12T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-18.04", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts"], "id": "UBUNTU_USN-4069-2.NASL", "href": "https://www.tenable.com/plugins/nessus/127792", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4069-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(127792);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/12\");\n\n script_cve_id(\"CVE-2019-11487\", \"CVE-2019-11599\", \"CVE-2019-11833\", \"CVE-2019-11884\");\n script_xref(name:\"USN\", value:\"4069-2\");\n\n script_name(english:\"Ubuntu 18.04 LTS : linux-hwe vulnerabilities (USN-4069-2)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"USN-4069-1 fixed vulnerabilities in the Linux kernel for Ubuntu 19.04.\nThis update provides the corresponding updates for the Linux Hardware\nEnablement (HWE) kernel from Ubuntu 19.04 for Ubuntu 18.04 LTS.\n\nIt was discovered that an integer overflow existed in the Linux kernel\nwhen reference counting pages, leading to potential use-after-free\nissues. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2019-11487)\n\nJann Horn discovered that a race condition existed in the Linux kernel\nwhen performing core dumps. A local attacker could use this to cause a\ndenial of service (system crash) or expose sensitive information.\n(CVE-2019-11599)\n\nIt was discovered that the ext4 file system implementation in the\nLinux kernel did not properly zero out memory in some situations. A\nlocal attacker could use this to expose sensitive information (kernel\nmemory). (CVE-2019-11833)\n\nIt was discovered that the Bluetooth Human Interface Device Protocol\n(HIDP) implementation in the Linux kernel did not properly verify\nstrings were NULL terminated in certain situations. A local attacker\ncould use this to expose sensitive information (kernel memory).\n(CVE-2019-11884).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/4069-2/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/08/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/08/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2019-2023 Canonical, Inc. / NASL script (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nvar release = chomp(release);\nif (! preg(pattern:\"^(18\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 18.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-11487\", \"CVE-2019-11599\", \"CVE-2019-11833\", \"CVE-2019-11884\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-4069-2\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nvar flag = 0;\n\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.0.0-23-generic\", pkgver:\"5.0.0-23.24~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.0.0-23-generic-lpae\", pkgver:\"5.0.0-23.24~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.0.0-23-lowlatency\", pkgver:\"5.0.0-23.24~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-generic-hwe-18.04\", pkgver:\"5.0.0.23.80\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-generic-lpae-hwe-18.04\", pkgver:\"5.0.0.23.80\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-lowlatency-hwe-18.04\", pkgver:\"5.0.0.23.80\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-snapdragon-hwe-18.04\", pkgver:\"5.0.0.23.80\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-virtual-hwe-18.04\", pkgver:\"5.0.0.23.80\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-5.0-generic / linux-image-5.0-generic-lpae / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T15:17:08", "description": "Example: The openSUSE Leap 42.3 kernel was updated to 4.4.180 to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic.\n (bsc#1137586).\n\n - CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)\n\n - CVE-2019-11479: It was possible to send a crafted sequence of SACKs which would fragment the RACK send map. A remote attacker may be able to further exploit the fragmented send map to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. This would have resulted in excess resource consumption due to low mss values.\n (bsc#1137586)\n\n - CVE-2019-12819: The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service (bnc#1138291).\n\n - CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c (bnc#1138293).\n\n - CVE-2019-12456: An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c that allowed local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a 'double fetch' vulnerability (bnc#1136922).\n\n - CVE-2019-12380: phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures (bnc#1136598).\n\n - CVE-2019-11487: The Linux kernel allowed page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bnc#1133190).\n\n - CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424).\n\n - CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c. There was an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1136586).\n\n - CVE-2019-5489: The mincore() implementation in mm/mincore.c allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server (bnc#1120843).\n\n - CVE-2019-11833: fs/ext4/extents.c did not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem (bnc#1135281).\n\n - CVE-2018-7191: In the tun subsystem dev_get_valid_name is not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343 (bnc#1135603).\n\n - CVE-2019-11190, CVE-2019-11191: The Linux kernel allowed local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat (bnc#1131543 bnc#1132374 bnc#1132472).\n\nThe following non-security bugs were fixed :\n\n - ALSA: line6: use dynamic buffers (bnc#1012382).\n\n - ARM: dts: pfla02: increase phy reset duration (bnc#1012382).\n\n - ARM: iop: do not use using 64-bit DMA masks (bnc#1012382).\n\n - ARM: orion: do not use using 64-bit DMA masks (bnc#1012382).\n\n - ASoC: cs4270: Set auto-increment bit for register writes (bnc#1012382).\n\n - ASoC: Intel: avoid Oops if DMA setup fails (bnc#1012382).\n\n - ASoC:soc-pcm:fix a codec fixup issue in TDM case (bnc#1012382).\n\n - ASoC: tlv320aic32x4: Fix Common Pins (bnc#1012382).\n\n - ath6kl: Only use match sets when firmware supports it (bsc#1120902).\n\n - backlight: lm3630a: Return 0 on success in update_status functions (bsc#1106929)\n\n - bitops: avoid integer overflow in GENMASK(_ULL) (bnc#1012382).\n\n - block: fix use-after-free on gendisk (bsc#1136448).\n\n - bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bnc#1012382).\n\n - bnxt_en: Improve multicast address setup logic (bnc#1012382).\n\n - bonding: fix arp_validate toggling in active-backup mode (bnc#1012382).\n\n - bonding: show full hw address in sysfs for slave entries (bnc#1012382).\n\n - bpf: reject wrong sized filters earlier (bnc#1012382).\n\n - bridge: Fix error path for kobject_init_and_add() (bnc#1012382).\n\n - btrfs: add a helper to return a head ref (bsc#1134813).\n\n - btrfs: breakout empty head cleanup to a helper (bsc#1134813).\n\n - btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: extent-tree: Open-code process_func in\n __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: Factor out common delayed refs init code (bsc#1134813).\n\n - btrfs: Introduce init_delayed_ref_head (bsc#1134813).\n\n - btrfs: move all ref head cleanup to the helper function (bsc#1134813).\n\n - btrfs: move extent_op cleanup to a helper (bsc#1134813).\n\n - btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).\n\n - btrfs: Open-code add_delayed_data_ref (bsc#1134813).\n\n - btrfs: Open-code add_delayed_tree_ref (bsc#1134813).\n\n - btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n\n - btrfs: qgroup: Do not scan leaf if we're modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1134338).\n\n - btrfs: remove delayed_ref_node from ref_head (bsc#1134813).\n\n - btrfs: split delayed ref head initialization and addition (bsc#1134813).\n\n - btrfs: track refs in a rb_tree instead of a list (bsc#1134813).\n\n - btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).\n\n - btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).\n\n - btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).\n\n - cdc-acm: cleaning up debug in data submission path (bsc#1136539).\n\n - cdc-acm: fix race between reset and control messaging (bsc#1106110).\n\n - cdc-acm: handle read pipe errors (bsc#1135878).\n\n - cdc-acm: reassemble fragmented notifications (bsc#1136590).\n\n - cdc-acm: store in and out pipes in acm structure (bsc#1136575).\n\n - cifs: do not attempt cifs operation on smb2+ rename error (bnc#1012382).\n\n - cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n\n - clk: fix mux clock documentation (bsc#1090888).\n\n - cpu/hotplug: Provide cpus_read|write_[un]lock() (bsc#1138374, LTC#178199).\n\n - cpu/hotplug: Provide lockdep_assert_cpus_held() (bsc#1138374, LTC#178199).\n\n - cpupower: remove stringop-truncation waring (bsc#1119086).\n\n - cpu/speculation: Add 'mitigations=' cmdline option (bnc#1012382 bsc#1112178).\n\n - crypto: vmx - CTR: always increment IV as quadword (bsc#1135661, bsc#1137162).\n\n - crypto: vmx - fix copy-paste error in CTR mode (bsc#1135661, bsc#1137162).\n\n - crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n\n - crypto: vmx: Only call enable_kernel_vsx() (bsc#1135661, bsc#1137162).\n\n - crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n\n - debugfs: fix use-after-free on symlink traversal (bnc#1012382).\n\n - Documentation: Add MDS vulnerability documentation (bnc#1012382).\n\n - Documentation: Add nospectre_v1 parameter (bnc#1012382).\n\n - Documentation: Correct the possible MDS sysfs values (bnc#1012382).\n\n - Documentation: Move L1TF to separate directory (bnc#1012382).\n\n - Do not jump to compute_result state from check_result state (bnc#1012382).\n\n - drivers/virt/fsl_hypervisor.c: dereferencing error pointers in ioctl (bnc#1012382).\n\n - drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl (bnc#1012382).\n\n - drm/bridge: adv7511: Fix low refresh rate selection (bsc#1106929)\n\n - drm/rockchip: shutdown drm subsystem on shutdown (bsc#1106929)\n\n - drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to (bsc#1106929)\n\n - drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1106929)\n\n - Drop multiversion(kernel) from the KMP template (bsc#1127155).\n\n - dt-bindings: rcar-dmac: Document missing error interrupt (bsc#1085535).\n\n - exportfs: fix 'passing zero to ERR_PTR()' warning (bsc#1136458).\n\n - ext4: actually request zeroing of inode table after grow (bsc#1136451).\n\n - ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n\n - ext4: fix ext4_show_options for file systems w/o journal (bsc#1136452).\n\n - ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).\n\n - ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1136623).\n\n - ext4: Return EAGAIN in case of DIO is beyond end of file (bsc#1136810).\n\n - ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n\n - fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bnc#1012382).\n\n - ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n\n - genirq: Prevent use-after-free and work list corruption (bnc#1012382).\n\n - gpu: ipu-v3: dp: fix CSC handling (bnc#1012382).\n\n - HID: debug: fix race condition with between rdesc_show() and device removal (bnc#1012382).\n\n - HID: input: add mapping for Expose/Overview key (bnc#1012382).\n\n - HID: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bnc#1012382).\n\n - hugetlbfs: fix memory leak for resv_map (bnc#1012382).\n\n - IB/hfi1: Eliminate opcode tests on mr deref ().\n\n - IB/hfi1: Unreserve a reserved request when it is completed ().\n\n - ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n\n - ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n\n - ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n\n - ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n\n - ibmvnic: remove set but not used variable 'netdev' (bsc#1137739).\n\n - IB/rdmavt: Add wc_flags and wc_immdata to cq entry trace ().\n\n - IB/rdmavt: Fix frwr memory registration ().\n\n - igb: Fix WARN_ONCE on runtime suspend (bnc#1012382).\n\n - iio: adc: xilinx: fix potential use-after-free on remove (bnc#1012382).\n\n - init: initialize jump labels before command line option parsing (bnc#1012382).\n\n - Input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bnc#1012382).\n\n - ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1135120).\n\n - ipv4: Fix raw socket lookup for local traffic (bnc#1012382).\n\n - ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (bnc#1012382).\n\n - ipv4: set the tcp_min_rtt_wlen range from 0 to one day (bnc#1012382).\n\n - ipv6: fix a potential deadlock in do_ipv6_setsockopt() (bnc#1012382).\n\n - ipv6/flowlabel: wait rcu grace period before put_pid() (bnc#1012382).\n\n - ipv6: invert flowlabel sharing check in process and user mode (bnc#1012382).\n\n - ipvs: do not schedule icmp errors from tunnels (bnc#1012382).\n\n - iwiwifi: fix bad monitor buffer register addresses (bsc#1129770).\n\n - jffs2: fix use-after-free on symlink traversal (bnc#1012382).\n\n - kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n\n - kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n\n - kbuild: simplify ld-option implementation (bnc#1012382).\n\n - kconfig: display recursive dependency resolution hint just once (bsc#1100132).\n\n - kconfig/[mn]conf: handle backspace (^H) key (bnc#1012382).\n\n - keys: Timestamp new keys (bsc#1120902).\n\n - KVM: fail KVM_SET_VCPU_EVENTS with invalid exception number (bnc#1012382).\n\n - KVM: x86: avoid misreporting level-triggered irqs as edge-triggered in tracing (bnc#1012382).\n\n - libata: fix using DMA buffers on stack (bnc#1012382).\n\n - libertas_tf: prevent underflow in process_cmdrequest() (bsc#1119086).\n\n - libnvdimm/btt: Fix a kmemdup failure check (bnc#1012382).\n\n - mac80211_hwsim: validate number of different channels (bsc#1085539).\n\n - media: pvrusb2: Prevent a buffer overflow (bsc#1135642).\n\n - media: v4l2: i2c: ov7670: Fix PLL bypass register values (bnc#1012382).\n\n - MIPS: scall64-o32: Fix indirect syscall number load (bnc#1012382).\n\n - mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n\n - mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n\n - net: ena: fix return value of ena_com_config_llq_info() (bsc#1117562).\n\n - net: ethernet: ti: fix possible object reference leak (bnc#1012382).\n\n - netfilter: bridge: set skb transport_header before entering NF_INET_PRE_ROUTING (bnc#1012382).\n\n - netfilter: compat: initialize all fields in xt_init (bnc#1012382).\n\n - netfilter: ebtables: CONFIG_COMPAT: drop a bogus WARN_ON (bnc#1012382).\n\n - net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bnc#1012382).\n\n - net: hns: Use NAPI_POLL_WEIGHT for hns driver (bnc#1012382).\n\n - net: ibm: fix possible object reference leak (bnc#1012382).\n\n - net/ibmvnic: Remove tests of member address (bsc#1137739).\n\n - net: ks8851: Delay requesting IRQ until opened (bnc#1012382).\n\n - net: ks8851: Dequeue RX packets explicitly (bnc#1012382).\n\n - net: ks8851: Reassert reset pin if chip ID check fails (bnc#1012382).\n\n - net: ks8851: Set initial carrier state to down (bnc#1012382).\n\n - net: Remove NO_IRQ from powerpc-only network drivers (bsc#1137739).\n\n - net: stmmac: move stmmac_check_ether_addr() to driver probe (bnc#1012382).\n\n - net: ucc_geth - fix Oops when changing number of buffers in the ring (bnc#1012382).\n\n - net: xilinx: fix possible object reference leak (bnc#1012382).\n\n - nfsd: Do not release the callback slot unless it was actually held (bnc#1012382).\n\n - NFS: Forbid setting AF_INET6 to 'struct sockaddr_in'->sin_family (bnc#1012382).\n\n - ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n\n - nvme: Do not allow to reset a reconnecting controller (bsc#1133874).\n\n - packet: Fix error path in packet_init (bnc#1012382).\n\n - packet: validate msg_namelen in send directly (bnc#1012382).\n\n - PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1137142).\n\n - PCI: Mark Atheros AR9462 to avoid bus reset (bsc#1135642).\n\n - perf/x86/intel: Allow PEBS multi-entry in watermark mode (git-fixes).\n\n - perf/x86/intel: Fix handling of wakeup_events for multi-entry PEBS (bnc#1012382).\n\n - platform/x86: sony-laptop: Fix unintentional fall-through (bnc#1012382).\n\n - powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (bnc#1012382).\n\n - powerpc/64: Call setup_barrier_nospec() from setup_arch() (bnc#1012382 bsc#1131107).\n\n - powerpc/64: Make meltdown reporting Book3S 64 specific (bnc#1012382).\n\n - powerpc/64s: Include cpu header (bnc#1012382).\n\n - powerpc/booke64: set RI in default MSR (bnc#1012382).\n\n - powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n\n - powerpc/eeh: Fix race with driver un/bind (bsc#1066223).\n\n - powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E (bnc#1012382).\n\n - powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for nospectre_v2 boot arg (bnc#1012382).\n\n - powerpc/fsl: Add infrastructure to fixup branch predictor flush (bnc#1012382).\n\n - powerpc/fsl: Add macro to flush the branch predictor (bnc#1012382).\n\n - powerpc/fsl: Add nospectre_v2 command line argument (bnc#1012382).\n\n - powerpc/fsl: Emulate SPRN_BUCSR register (bnc#1012382).\n\n - powerpc/fsl: Enable runtime patching if nospectre_v2 boot arg is used (bnc#1012382).\n\n - powerpc/fsl: Fixed warning: orphan section `__btb_flush_fixup' (bnc#1012382).\n\n - powerpc/fsl: Fix the flush of branch predictor (bnc#1012382).\n\n - powerpc/fsl: Flush branch predictor when entering KVM (bnc#1012382).\n\n - powerpc/fsl: Flush the branch predictor at each kernel entry (32 bit) (bnc#1012382).\n\n - powerpc/fsl: Flush the branch predictor at each kernel entry (64bit) (bnc#1012382).\n\n - powerpc/fsl: Sanitize the syscall table for NXP PowerPC 32 bit platforms (bnc#1012382).\n\n - powerpc/fsl: Update Spectre v2 reporting (bnc#1012382).\n\n - powerpc/lib: fix book3s/32 boot failure due to code patching (bnc#1012382).\n\n - powerpc/perf: Add blacklisted events for Power9 DD2.1 (bsc#1053043).\n\n - powerpc/perf: Add blacklisted events for Power9 DD2.2 (bsc#1053043).\n\n - powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n\n - powerpc/perf: Infrastructure to support addition of blacklisted events (bsc#1053043).\n\n - powerpc/process: Fix sparse address space warnings (bsc#1066223).\n\n - powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n\n - powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n\n - powerpc/xmon: Add RFI flush related fields to paca dump (bnc#1012382).\n\n - qede: fix write to free'd pointer error and double free of ptp (bsc#1019695 bsc#1019696).\n\n - qlcnic: Avoid potential NULL pointer dereference (bnc#1012382).\n\n - RDMA/iw_cxgb4: Fix the unchecked ep dereference (bsc#1005778 bsc#1005780 bsc#1005781).\n\n - RDMA/qedr: Fix out of bounds index check in query pkey (bsc#1022604).\n\n - Revert 'block/loop: Use global lock for ioctl() operation.' (bnc#1012382).\n\n - Revert 'cpu/speculation: Add 'mitigations=' cmdline option' (stable backports).\n\n - Revert 'Do not jump to compute_result state from check_result state' (git-fixes).\n\n - Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).' This reverts commit 4cc83da426b53d47f1fde9328112364eab1e9a19.\n\n - Revert 'sched: Add sched_smt_active()' (stable backports).\n\n - Revert 'x86/MCE: Save microcode revision in machine check records' (kabi).\n\n - Revert 'x86/speculation/mds: Add 'mitigations=' support for MDS' (stable backports).\n\n - Revert 'x86/speculation: Support 'mitigations=' cmdline option' (stable backports).\n\n - rtc: da9063: set uie_unsupported when relevant (bnc#1012382).\n\n - rtc: sh: Fix invalid alarm warning for non-enabled alarm (bnc#1012382).\n\n - rtlwifi: fix false rates in\n _rtl8821ae_mrate_idx_to_arfr_id() (bsc#1120902).\n\n - s390/3270: fix lockdep false positive on view->lock (bnc#1012382).\n\n - s390: ctcm: fix ctcm_new_device error return code (bnc#1012382).\n\n - s390/dasd: Fix capacity calculation for large volumes (bnc#1012382).\n\n - sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bnc#1012382).\n\n - sc16is7xx: move label 'err_spi' to correct section (git-fixes).\n\n - sched: Add sched_smt_active() (bnc#1012382).\n\n - sched/numa: Fix a possible divide-by-zero (bnc#1012382).\n\n - scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (bnc#1012382).\n\n - scsi: libsas: fix a race condition when smp task timeout (bnc#1012382).\n\n - scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bnc#1012382).\n\n - scsi: qla4xxx: fix a potential NULL pointer dereference (bnc#1012382).\n\n - scsi: storvsc: Fix calculation of sub-channel count (bnc#1012382).\n\n - scsi: zfcp: reduce flood of fcrscn1 trace records on multi-element RSCN (bnc#1012382).\n\n - selftests/net: correct the return value for run_netsocktests (bnc#1012382).\n\n - selinux: never allow relabeling on context mounts (bnc#1012382).\n\n - signals: avoid random wakeups in sigsuspend() (bsc#1137915)\n\n - slip: make slhc_free() silently accept an error pointer (bnc#1012382).\n\n - staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bnc#1012382).\n\n - staging: iio: adt7316: fix the dac read calculation (bnc#1012382).\n\n - staging: iio: adt7316: fix the dac write calculation (bnc#1012382).\n\n - tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n\n - tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n\n - tcp: limit payload size of sacked skbs (bsc#1137586).\n\n - tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n\n - team: fix possible recursive locking when add slaves (bnc#1012382).\n\n - timer/debug: Change /proc/timer_stats from 0644 to 0600 (bnc#1012382).\n\n - tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bnc#1012382).\n\n - tipc: check link name with right length in tipc_nl_compat_link_set (bnc#1012382).\n\n - tipc: handle the err returned from cmd header function (bnc#1012382).\n\n - tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n\n - trace: Fix preempt_enable_no_resched() abuse (bnc#1012382).\n\n - tracing: Fix partial reading of trace event's id file (bsc#1136573).\n\n - treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n\n - UAS: fix alignment of scatter/gather segments (bnc#1012382 bsc#1129770).\n\n - ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1136455).\n\n - Update config files: disable IDE on ppc64le\n\n - usb: cdc-acm: fix race during wakeup blocking TX traffic (bsc#1129770).\n\n - usb: cdc-acm: fix unthrottle races (bsc#1135642).\n\n - usb: core: Fix bug caused by duplicate interface PM usage counter (bnc#1012382).\n\n - usb: core: Fix unterminated string returned by usb_string() (bnc#1012382).\n\n - usb: dwc3: Fix default lpm_nyet_threshold value (bnc#1012382).\n\n - usb: gadget: net2272: Fix net2272_dequeue() (bnc#1012382).\n\n - usb: gadget: net2280: Fix net2280_dequeue() (bnc#1012382).\n\n - usb: gadget: net2280: Fix overrun of OUT messages (bnc#1012382).\n\n - usbnet: ipheth: fix potential NULL pointer dereference in ipheth_carrier_set (bnc#1012382).\n\n - usbnet: ipheth: prevent TX queue timeouts when device not ready (bnc#1012382).\n\n - usb: serial: fix unthrottle races (bnc#1012382).\n\n - usb: serial: use variable for status (bnc#1012382).\n\n - usb: u132-hcd: fix resource leak (bnc#1012382).\n\n - usb: usbip: fix isoc packet num validation in get_pipe (bnc#1012382).\n\n - usb: w1 ds2490: Fix bug caused by improper use of altsetting array (bnc#1012382).\n\n - usb: yurex: Fix protection fault after device removal (bnc#1012382).\n\n - vfio/pci: use correct format characters (bnc#1012382).\n\n - vlan: disable SIOCSHWTSTAMP in container (bnc#1012382).\n\n - vrf: sit mtu should not be updated when vrf netdev is the link (bnc#1012382).\n\n - x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n\n - x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n\n - x86/bugs: Add AMD's SPEC_CTRL MSR usage (bnc#1012382).\n\n - x86/bugs: Change L1TF mitigation string to match upstream (bnc#1012382).\n\n - x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR (bnc#1012382).\n\n - x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features (bnc#1012382).\n\n - x86/cpu/bugs: Use __initconst for 'const' init data (bnc#1012382).\n\n - x86/cpufeatures: Hide AMD-specific speculation flags (bnc#1012382).\n\n - x86/Kconfig: Select SCHED_SMT if SMP enabled (bnc#1012382).\n\n - x86/MCE: Save microcode revision in machine check records (bnc#1012382).\n\n - x86/mds: Add MDSUM variant to the MDS documentation (bnc#1012382).\n\n - x86/microcode/intel: Add a helper which gives the microcode revision (bnc#1012382).\n\n - x86/microcode/intel: Check microcode revision before updating sibling threads (bnc#1012382).\n\n - x86/microcode: Make sure boot_cpu_data.microcode is up-to-date (bnc#1012382).\n\n - x86/microcode: Update the new microcode revision unconditionally (bnc#1012382).\n\n - x86/mm: Use WRITE_ONCE() when setting PTEs (bnc#1012382).\n\n - x86/process: Consolidate and simplify switch_to_xtra() code (bnc#1012382).\n\n - x86/speculataion: Mark command line parser data\n __initdata (bnc#1012382).\n\n - x86/speculation: Add command line control for indirect branch speculation (bnc#1012382).\n\n - x86/speculation: Add prctl() control for indirect branch speculation (bnc#1012382).\n\n - x86/speculation: Add seccomp Spectre v2 user space protection mode (bnc#1012382).\n\n - x86/speculation: Avoid __switch_to_xtra() calls (bnc#1012382).\n\n - x86/speculation: Clean up spectre_v2_parse_cmdline() (bnc#1012382).\n\n - x86/speculation: Disable STIBP when enhanced IBRS is in use (bnc#1012382).\n\n - x86/speculation: Enable prctl mode for spectre_v2_user (bnc#1012382).\n\n - x86/speculation/l1tf: Document l1tf in sysfs (bnc#1012382).\n\n - x86/speculation: Mark string arrays const correctly (bnc#1012382).\n\n - x86/speculation/mds: Fix comment (bnc#1012382).\n\n - x86/speculation/mds: Fix documentation typo (bnc#1012382).\n\n - x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common() (bnc#1012382).\n\n - x86/speculation: Prepare arch_smt_update() for PRCTL mode (bnc#1012382).\n\n - x86/speculation: Prepare for conditional IBPB in switch_mm() (bnc#1012382).\n\n - x86/speculation: Prepare for per task indirect branch speculation control (bnc#1012382).\n\n - x86/speculation: Prevent stale SPEC_CTRL msr content (bnc#1012382).\n\n - x86/speculation: Provide IBPB always command line options (bnc#1012382).\n\n - x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation (bnc#1012382).\n\n - x86/speculation: Remove unnecessary ret variable in cpu_show_common() (bnc#1012382).\n\n - x86/speculation: Rename SSBD update functions (bnc#1012382).\n\n - x86/speculation: Reorder the spec_v2 code (bnc#1012382).\n\n - x86/speculation: Reorganize speculation control MSRs update (bnc#1012382).\n\n - x86/speculation: Split out TIF update (bnc#1012382).\n\n - x86/speculation: Support Enhanced IBRS on future CPUs (bnc#1012382).\n\n - x86/speculation: Support 'mitigations=' cmdline option (bnc#1012382 bsc#1112178).\n\n - x86/speculation: Unify conditional spectre v2 print functions (bnc#1012382).\n\n - x86/speculation: Update the TIF_SSBD comment (bnc#1012382).\n\n - xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n\n - xsysace: Fix error handling in ace_setup (bnc#1012382).", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-06-19T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2019-1570) (SACK Panic) (SACK Slowness)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 6.5, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 8.3, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-4343", "CVE-2018-7191", "CVE-2019-11190", "CVE-2019-11191", "CVE-2019-11477", "CVE-2019-11478", "CVE-2019-11479", "CVE-2019-11487", "CVE-2019-11833", "CVE-2019-12380", "CVE-2019-12382", "CVE-2019-12456", "CVE-2019-12818", "CVE-2019-12819", "CVE-2019-3846", "CVE-2019-5489"], "modified": "2022-12-05T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-docs-pdf", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "cpe:/o:novell:opensuse:42.3"], "id": "OPENSUSE-2019-1570.NASL", "href": "https://www.tenable.com/plugins/nessus/126033", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-1570.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(126033);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2013-4343\",\n \"CVE-2018-7191\",\n \"CVE-2019-11190\",\n \"CVE-2019-11191\",\n \"CVE-2019-11477\",\n \"CVE-2019-11478\",\n \"CVE-2019-11479\",\n \"CVE-2019-11487\",\n \"CVE-2019-11833\",\n \"CVE-2019-12380\",\n \"CVE-2019-12382\",\n \"CVE-2019-12456\",\n \"CVE-2019-12818\",\n \"CVE-2019-12819\",\n \"CVE-2019-3846\",\n \"CVE-2019-5489\"\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2019-0456\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2019-1570) (SACK Panic) (SACK Slowness)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote openSUSE host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"Example: The openSUSE Leap 42.3 kernel was updated to 4.4.180 to\nreceive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-11477: A sequence of SACKs may have been\n crafted by a remote attacker such that one can trigger\n an integer overflow, leading to a kernel panic.\n (bsc#1137586).\n\n - CVE-2019-11478: It was possible to send a crafted\n sequence of SACKs which would fragment the TCP\n retransmission queue. A remote attacker may have been\n able to further exploit the fragmented queue to cause an\n expensive linked-list walk for subsequent SACKs received\n for that same TCP connection. (bsc#1137586)\n\n - CVE-2019-11479: It was possible to send a crafted\n sequence of SACKs which would fragment the RACK send\n map. A remote attacker may be able to further exploit\n the fragmented send map to cause an expensive\n linked-list walk for subsequent SACKs received for that\n same TCP connection. This would have resulted in excess\n resource consumption due to low mss values.\n (bsc#1137586)\n\n - CVE-2019-12819: The function __mdiobus_register() in\n drivers/net/phy/mdio_bus.c calls put_device(), which\n will trigger a fixed_mdio_bus_init use-after-free. This\n will cause a denial of service (bnc#1138291).\n\n - CVE-2019-12818: The nfc_llcp_build_tlv function in\n net/nfc/llcp_commands.c may return NULL. If the caller\n did not check for this, it will trigger a NULL pointer\n dereference. This will cause denial of service. This\n affects nfc_llcp_build_gb in net/nfc/llcp_core.c\n (bnc#1138293).\n\n - CVE-2019-12456: An issue was discovered in the\n MPT3COMMAND case in _ctl_ioctl_main in\n drivers/scsi/mpt3sas/mpt3sas_ctl.c that allowed local\n users to cause a denial of service or possibly have\n unspecified other impact by changing the value of\n ioc_number between two kernel reads of that value, aka a\n 'double fetch' vulnerability (bnc#1136922).\n\n - CVE-2019-12380: phys_efi_set_virtual_address_map in\n arch/x86/platform/efi/efi.c and efi_call_phys_prolog in\n arch/x86/platform/efi/efi_64.c mishandle memory\n allocation failures (bnc#1136598).\n\n - CVE-2019-11487: The Linux kernel allowed page->_refcount\n reference count overflow, with resultant use-after-free\n issues, if about 140 GiB of RAM exists. This is related\n to fs/fuse/dev.c, fs/pipe.c, fs/splice.c,\n include/linux/mm.h, include/linux/pipe_fs_i.h,\n kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can\n occur with FUSE requests (bnc#1133190).\n\n - CVE-2019-3846: A flaw that allowed an attacker to\n corrupt memory and possibly escalate privileges was\n found in the mwifiex kernel module while connecting to a\n malicious wireless network (bnc#1136424).\n\n - CVE-2019-12382: An issue was discovered in\n drm_load_edid_firmware in\n drivers/gpu/drm/drm_edid_load.c. There was an unchecked\n kstrdup of fwstr, which might allow an attacker to cause\n a denial of service (NULL pointer dereference and system\n crash) (bnc#1136586).\n\n - CVE-2019-5489: The mincore() implementation in\n mm/mincore.c allowed local attackers to observe page\n cache access patterns of other processes on the same\n system, potentially allowing sniffing of secret\n information. (Fixing this affects the output of the\n fincore program.) Limited remote exploitation may be\n possible, as demonstrated by latency differences in\n accessing public files from an Apache HTTP Server\n (bnc#1120843).\n\n - CVE-2019-11833: fs/ext4/extents.c did not zero out the\n unused memory region in the extent tree block, which\n might allow local users to obtain sensitive information\n by reading uninitialized data in the filesystem\n (bnc#1135281).\n\n - CVE-2018-7191: In the tun subsystem dev_get_valid_name\n is not called before register_netdevice. This allowed\n local users to cause a denial of service (NULL pointer\n dereference and panic) via an ioctl(TUNSETIFF) call with\n a dev name containing a / character. This is similar to\n CVE-2013-4343 (bnc#1135603).\n\n - CVE-2019-11190, CVE-2019-11191: The Linux kernel allowed\n local users to bypass ASLR on setuid programs (such as\n /bin/su) because install_exec_creds() is called too late\n in load_elf_binary() in fs/binfmt_elf.c, and thus the\n ptrace_may_access() check has a race condition when\n reading /proc/pid/stat (bnc#1131543 bnc#1132374\n bnc#1132472).\n\nThe following non-security bugs were fixed :\n\n - ALSA: line6: use dynamic buffers (bnc#1012382).\n\n - ARM: dts: pfla02: increase phy reset duration\n (bnc#1012382).\n\n - ARM: iop: do not use using 64-bit DMA masks\n (bnc#1012382).\n\n - ARM: orion: do not use using 64-bit DMA masks\n (bnc#1012382).\n\n - ASoC: cs4270: Set auto-increment bit for register writes\n (bnc#1012382).\n\n - ASoC: Intel: avoid Oops if DMA setup fails\n (bnc#1012382).\n\n - ASoC:soc-pcm:fix a codec fixup issue in TDM case\n (bnc#1012382).\n\n - ASoC: tlv320aic32x4: Fix Common Pins (bnc#1012382).\n\n - ath6kl: Only use match sets when firmware supports it\n (bsc#1120902).\n\n - backlight: lm3630a: Return 0 on success in update_status\n functions (bsc#1106929)\n\n - bitops: avoid integer overflow in GENMASK(_ULL)\n (bnc#1012382).\n\n - block: fix use-after-free on gendisk (bsc#1136448).\n\n - bluetooth: Align minimum encryption key size for LE and\n BR/EDR connections (bnc#1012382).\n\n - bnxt_en: Improve multicast address setup logic\n (bnc#1012382).\n\n - bonding: fix arp_validate toggling in active-backup mode\n (bnc#1012382).\n\n - bonding: show full hw address in sysfs for slave entries\n (bnc#1012382).\n\n - bpf: reject wrong sized filters earlier (bnc#1012382).\n\n - bridge: Fix error path for kobject_init_and_add()\n (bnc#1012382).\n\n - btrfs: add a helper to return a head ref (bsc#1134813).\n\n - btrfs: breakout empty head cleanup to a helper\n (bsc#1134813).\n\n - btrfs: delayed-ref: Introduce better documented delayed\n ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: delayed-ref: Use btrfs_ref to refactor\n btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052\n bsc#1108838).\n\n - btrfs: delayed-ref: Use btrfs_ref to refactor\n btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052\n bsc#1108838).\n\n - btrfs: extent-tree: Fix a bug that btrfs is unable to\n add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: extent-tree: Open-code process_func in\n __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: extent-tree: Use btrfs_ref to refactor\n add_pinned_bytes() (bsc#1063638 bsc#1128052\n bsc#1108838).\n\n - btrfs: extent-tree: Use btrfs_ref to refactor\n btrfs_free_extent() (bsc#1063638 bsc#1128052\n bsc#1108838).\n\n - btrfs: extent-tree: Use btrfs_ref to refactor\n btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052\n bsc#1108838).\n\n - btrfs: Factor out common delayed refs init code\n (bsc#1134813).\n\n - btrfs: Introduce init_delayed_ref_head (bsc#1134813).\n\n - btrfs: move all ref head cleanup to the helper function\n (bsc#1134813).\n\n - btrfs: move extent_op cleanup to a helper (bsc#1134813).\n\n - btrfs: move ref_mod modification into the if (ref) logic\n (bsc#1134813).\n\n - btrfs: Open-code add_delayed_data_ref (bsc#1134813).\n\n - btrfs: Open-code add_delayed_tree_ref (bsc#1134813).\n\n - btrfs: qgroup: Check bg while resuming relocation to\n avoid NULL pointer dereference (bsc#1134806).\n\n - btrfs: qgroup: Do not scan leaf if we're modifying reloc\n tree (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: reloc: Also queue orphan reloc tree for cleanup\n to avoid BUG_ON() (bsc#1134338).\n\n - btrfs: remove delayed_ref_node from ref_head\n (bsc#1134813).\n\n - btrfs: split delayed ref head initialization and\n addition (bsc#1134813).\n\n - btrfs: track refs in a rb_tree instead of a list\n (bsc#1134813).\n\n - btrfs: Use init_delayed_ref_common in\n add_delayed_data_ref (bsc#1134813).\n\n - btrfs: Use init_delayed_ref_common in\n add_delayed_tree_ref (bsc#1134813).\n\n - btrfs: Use init_delayed_ref_head in add_delayed_ref_head\n (bsc#1134813).\n\n - cdc-acm: cleaning up debug in data submission path\n (bsc#1136539).\n\n - cdc-acm: fix race between reset and control messaging\n (bsc#1106110).\n\n - cdc-acm: handle read pipe errors (bsc#1135878).\n\n - cdc-acm: reassemble fragmented notifications\n (bsc#1136590).\n\n - cdc-acm: store in and out pipes in acm structure\n (bsc#1136575).\n\n - cifs: do not attempt cifs operation on smb2+ rename\n error (bnc#1012382).\n\n - cifs: keep FileInfo handle live during oplock break\n (bsc#1106284, bsc#1131565).\n\n - clk: fix mux clock documentation (bsc#1090888).\n\n - cpu/hotplug: Provide cpus_read|write_[un]lock()\n (bsc#1138374, LTC#178199).\n\n - cpu/hotplug: Provide lockdep_assert_cpus_held()\n (bsc#1138374, LTC#178199).\n\n - cpupower: remove stringop-truncation waring\n (bsc#1119086).\n\n - cpu/speculation: Add 'mitigations=' cmdline option\n (bnc#1012382 bsc#1112178).\n\n - crypto: vmx - CTR: always increment IV as quadword\n (bsc#1135661, bsc#1137162).\n\n - crypto: vmx - fix copy-paste error in CTR mode\n (bsc#1135661, bsc#1137162).\n\n - crypto: vmx - ghash: do nosimd fallback manually\n (bsc#1135661, bsc#1137162).\n\n - crypto: vmx: Only call enable_kernel_vsx() (bsc#1135661,\n bsc#1137162).\n\n - crypto: vmx - return correct error code on failed setkey\n (bsc#1135661, bsc#1137162).\n\n - debugfs: fix use-after-free on symlink traversal\n (bnc#1012382).\n\n - Documentation: Add MDS vulnerability documentation\n (bnc#1012382).\n\n - Documentation: Add nospectre_v1 parameter (bnc#1012382).\n\n - Documentation: Correct the possible MDS sysfs values\n (bnc#1012382).\n\n - Documentation: Move L1TF to separate directory\n (bnc#1012382).\n\n - Do not jump to compute_result state from check_result\n state (bnc#1012382).\n\n - drivers/virt/fsl_hypervisor.c: dereferencing error\n pointers in ioctl (bnc#1012382).\n\n - drivers/virt/fsl_hypervisor.c: prevent integer overflow\n in ioctl (bnc#1012382).\n\n - drm/bridge: adv7511: Fix low refresh rate selection\n (bsc#1106929)\n\n - drm/rockchip: shutdown drm subsystem on shutdown\n (bsc#1106929)\n\n - drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader()\n leading to (bsc#1106929)\n\n - drm/vmwgfx: NULL pointer dereference from\n vmw_cmd_dx_view_define() (bsc#1106929)\n\n - Drop multiversion(kernel) from the KMP template\n (bsc#1127155).\n\n - dt-bindings: rcar-dmac: Document missing error interrupt\n (bsc#1085535).\n\n - exportfs: fix 'passing zero to ERR_PTR()' warning\n (bsc#1136458).\n\n - ext4: actually request zeroing of inode table after grow\n (bsc#1136451).\n\n - ext4: avoid panic during forced reboot due to aborted\n journal (bsc#1126356).\n\n - ext4: fix ext4_show_options for file systems w/o journal\n (bsc#1136452).\n\n - ext4: fix use-after-free race with\n debug_want_extra_isize (bsc#1136449).\n\n - ext4: make sure enough credits are reserved for\n dioread_nolock writes (bsc#1136623).\n\n - ext4: Return EAGAIN in case of DIO is beyond end of file\n (bsc#1136810).\n\n - ext4: wait for outstanding dio during truncate in\n nojournal mode (bsc#1136438).\n\n - fs/proc/proc_sysctl.c: Fix a NULL pointer dereference\n (bnc#1012382).\n\n - ftrace/x86_64: Emulate call function while updating in\n breakpoint handler (bsc#1099658).\n\n - genirq: Prevent use-after-free and work list corruption\n (bnc#1012382).\n\n - gpu: ipu-v3: dp: fix CSC handling (bnc#1012382).\n\n - HID: debug: fix race condition with between rdesc_show()\n and device removal (bnc#1012382).\n\n - HID: input: add mapping for Expose/Overview key\n (bnc#1012382).\n\n - HID: input: add mapping for keyboard Brightness\n Up/Down/Toggle keys (bnc#1012382).\n\n - hugetlbfs: fix memory leak for resv_map (bnc#1012382).\n\n - IB/hfi1: Eliminate opcode tests on mr deref ().\n\n - IB/hfi1: Unreserve a reserved request when it is\n completed ().\n\n - ibmvnic: Add device identification to requested IRQs\n (bsc#1137739).\n\n - ibmvnic: Do not close unopened driver during reset\n (bsc#1137752).\n\n - ibmvnic: Fix unchecked return codes of memory\n allocations (bsc#1137752).\n\n - ibmvnic: Refresh device multicast list after reset\n (bsc#1137752).\n\n - ibmvnic: remove set but not used variable 'netdev'\n (bsc#1137739).\n\n - IB/rdmavt: Add wc_flags and wc_immdata to cq entry trace\n ().\n\n - IB/rdmavt: Fix frwr memory registration ().\n\n - igb: Fix WARN_ONCE on runtime suspend (bnc#1012382).\n\n - iio: adc: xilinx: fix potential use-after-free on remove\n (bnc#1012382).\n\n - init: initialize jump labels before command line option\n parsing (bnc#1012382).\n\n - Input: snvs_pwrkey - initialize necessary driver data\n before enabling IRQ (bnc#1012382).\n\n - ipmi:ssif: compare block number correctly for multi-part\n return messages (bsc#1135120).\n\n - ipv4: Fix raw socket lookup for local traffic\n (bnc#1012382).\n\n - ipv4: ip_do_fragment: Preserve skb_iif during\n fragmentation (bnc#1012382).\n\n - ipv4: set the tcp_min_rtt_wlen range from 0 to one day\n (bnc#1012382).\n\n - ipv6: fix a potential deadlock in do_ipv6_setsockopt()\n (bnc#1012382).\n\n - ipv6/flowlabel: wait rcu grace period before put_pid()\n (bnc#1012382).\n\n - ipv6: invert flowlabel sharing check in process and user\n mode (bnc#1012382).\n\n - ipvs: do not schedule icmp errors from tunnels\n (bnc#1012382).\n\n - iwiwifi: fix bad monitor buffer register addresses\n (bsc#1129770).\n\n - jffs2: fix use-after-free on symlink traversal\n (bnc#1012382).\n\n - kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter\n (bsc#1137586).\n\n - kabi: move sysctl_tcp_min_snd_mss to preserve struct net\n layout (bsc#1137586).\n\n - kbuild: simplify ld-option implementation (bnc#1012382).\n\n - kconfig: display recursive dependency resolution hint\n just once (bsc#1100132).\n\n - kconfig/[mn]conf: handle backspace (^H) key\n (bnc#1012382).\n\n - keys: Timestamp new keys (bsc#1120902).\n\n - KVM: fail KVM_SET_VCPU_EVENTS with invalid exception\n number (bnc#1012382).\n\n - KVM: x86: avoid misreporting level-triggered irqs as\n edge-triggered in tracing (bnc#1012382).\n\n - libata: fix using DMA buffers on stack (bnc#1012382).\n\n - libertas_tf: prevent underflow in process_cmdrequest()\n (bsc#1119086).\n\n - libnvdimm/btt: Fix a kmemdup failure check\n (bnc#1012382).\n\n - mac80211_hwsim: validate number of different channels\n (bsc#1085539).\n\n - media: pvrusb2: Prevent a buffer overflow (bsc#1135642).\n\n - media: v4l2: i2c: ov7670: Fix PLL bypass register values\n (bnc#1012382).\n\n - MIPS: scall64-o32: Fix indirect syscall number load\n (bnc#1012382).\n\n - mount: copy the port field into the cloned nfs_server\n structure (bsc#1136990).\n\n - mwifiex: Fix heap overflow in\n mwifiex_uap_parse_tail_ies() (bsc#1136935).\n\n - net: ena: fix return value of ena_com_config_llq_info()\n (bsc#1117562).\n\n - net: ethernet: ti: fix possible object reference leak\n (bnc#1012382).\n\n - netfilter: bridge: set skb transport_header before\n entering NF_INET_PRE_ROUTING (bnc#1012382).\n\n - netfilter: compat: initialize all fields in xt_init\n (bnc#1012382).\n\n - netfilter: ebtables: CONFIG_COMPAT: drop a bogus WARN_ON\n (bnc#1012382).\n\n - net: hns: Fix WARNING when remove HNS driver with SMMU\n enabled (bnc#1012382).\n\n - net: hns: Use NAPI_POLL_WEIGHT for hns driver\n (bnc#1012382).\n\n - net: ibm: fix possible object reference leak\n (bnc#1012382).\n\n - net/ibmvnic: Remove tests of member address\n (bsc#1137739).\n\n - net: ks8851: Delay requesting IRQ until opened\n (bnc#1012382).\n\n - net: ks8851: Dequeue RX packets explicitly\n (bnc#1012382).\n\n - net: ks8851: Reassert reset pin if chip ID check fails\n (bnc#1012382).\n\n - net: ks8851: Set initial carrier state to down\n (bnc#1012382).\n\n - net: Remove NO_IRQ from powerpc-only network drivers\n (bsc#1137739).\n\n - net: stmmac: move stmmac_check_ether_addr() to driver\n probe (bnc#1012382).\n\n - net: ucc_geth - fix Oops when changing number of buffers\n in the ring (bnc#1012382).\n\n - net: xilinx: fix possible object reference leak\n (bnc#1012382).\n\n - nfsd: Do not release the callback slot unless it was\n actually held (bnc#1012382).\n\n - NFS: Forbid setting AF_INET6 to 'struct\n sockaddr_in'->sin_family (bnc#1012382).\n\n - ntp: Allow TAI-UTC offset to be set to zero\n (bsc#1135642).\n\n - nvme: Do not allow to reset a reconnecting controller\n (bsc#1133874).\n\n - packet: Fix error path in packet_init (bnc#1012382).\n\n - packet: validate msg_namelen in send directly\n (bnc#1012382).\n\n - PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken\n (bsc#1137142).\n\n - PCI: Mark Atheros AR9462 to avoid bus reset\n (bsc#1135642).\n\n - perf/x86/intel: Allow PEBS multi-entry in watermark mode\n (git-fixes).\n\n - perf/x86/intel: Fix handling of wakeup_events for\n multi-entry PEBS (bnc#1012382).\n\n - platform/x86: sony-laptop: Fix unintentional\n fall-through (bnc#1012382).\n\n - powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (bnc#1012382).\n\n - powerpc/64: Call setup_barrier_nospec() from\n setup_arch() (bnc#1012382 bsc#1131107).\n\n - powerpc/64: Make meltdown reporting Book3S 64 specific\n (bnc#1012382).\n\n - powerpc/64s: Include cpu header (bnc#1012382).\n\n - powerpc/booke64: set RI in default MSR (bnc#1012382).\n\n - powerpc/cacheinfo: add cacheinfo_teardown,\n cacheinfo_rebuild (bsc#1138374, LTC#178199).\n\n - powerpc/eeh: Fix race with driver un/bind (bsc#1066223).\n\n - powerpc/fsl: Add barrier_nospec implementation for NXP\n PowerPC Book3E (bnc#1012382).\n\n - powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for\n nospectre_v2 boot arg (bnc#1012382).\n\n - powerpc/fsl: Add infrastructure to fixup branch\n predictor flush (bnc#1012382).\n\n - powerpc/fsl: Add macro to flush the branch predictor\n (bnc#1012382).\n\n - powerpc/fsl: Add nospectre_v2 command line argument\n (bnc#1012382).\n\n - powerpc/fsl: Emulate SPRN_BUCSR register (bnc#1012382).\n\n - powerpc/fsl: Enable runtime patching if nospectre_v2\n boot arg is used (bnc#1012382).\n\n - powerpc/fsl: Fixed warning: orphan section\n `__btb_flush_fixup' (bnc#1012382).\n\n - powerpc/fsl: Fix the flush of branch predictor\n (bnc#1012382).\n\n - powerpc/fsl: Flush branch predictor when entering KVM\n (bnc#1012382).\n\n - powerpc/fsl: Flush the branch predictor at each kernel\n entry (32 bit) (bnc#1012382).\n\n - powerpc/fsl: Flush the branch predictor at each kernel\n entry (64bit) (bnc#1012382).\n\n - powerpc/fsl: Sanitize the syscall table for NXP PowerPC\n 32 bit platforms (bnc#1012382).\n\n - powerpc/fsl: Update Spectre v2 reporting (bnc#1012382).\n\n - powerpc/lib: fix book3s/32 boot failure due to code\n patching (bnc#1012382).\n\n - powerpc/perf: Add blacklisted events for Power9 DD2.1\n (bsc#1053043).\n\n - powerpc/perf: Add blacklisted events for Power9 DD2.2\n (bsc#1053043).\n\n - powerpc/perf: Fix MMCRA corruption by bhrb_filter\n (bsc#1053043).\n\n - powerpc/perf: Infrastructure to support addition of\n blacklisted events (bsc#1053043).\n\n - powerpc/process: Fix sparse address space warnings\n (bsc#1066223).\n\n - powerpc/pseries/mobility: prevent cpu hotplug during DT\n update (bsc#1138374, LTC#178199).\n\n - powerpc/pseries/mobility: rebuild cacheinfo hierarchy\n post-migration (bsc#1138374, LTC#178199).\n\n - powerpc/xmon: Add RFI flush related fields to paca dump\n (bnc#1012382).\n\n - qede: fix write to free'd pointer error and double free\n of ptp (bsc#1019695 bsc#1019696).\n\n - qlcnic: Avoid potential NULL pointer dereference\n (bnc#1012382).\n\n - RDMA/iw_cxgb4: Fix the unchecked ep dereference\n (bsc#1005778 bsc#1005780 bsc#1005781).\n\n - RDMA/qedr: Fix out of bounds index check in query pkey\n (bsc#1022604).\n\n - Revert 'block/loop: Use global lock for ioctl()\n operation.' (bnc#1012382).\n\n - Revert 'cpu/speculation: Add 'mitigations=' cmdline\n option' (stable backports).\n\n - Revert 'Do not jump to compute_result state from\n check_result state' (git-fixes).\n\n - Revert 'KMPs: obsolete older KMPs of the same flavour\n (bsc#1127155, bsc#1109137).' This reverts commit\n 4cc83da426b53d47f1fde9328112364eab1e9a19.\n\n - Revert 'sched: Add sched_smt_active()' (stable\n backports).\n\n - Revert 'x86/MCE: Save microcode revision in machine\n check records' (kabi).\n\n - Revert 'x86/speculation/mds: Add 'mitigations=' support\n for MDS' (stable backports).\n\n - Revert 'x86/speculation: Support 'mitigations=' cmdline\n option' (stable backports).\n\n - rtc: da9063: set uie_unsupported when relevant\n (bnc#1012382).\n\n - rtc: sh: Fix invalid alarm warning for non-enabled alarm\n (bnc#1012382).\n\n - rtlwifi: fix false rates in\n _rtl8821ae_mrate_idx_to_arfr_id() (bsc#1120902).\n\n - s390/3270: fix lockdep false positive on view->lock\n (bnc#1012382).\n\n - s390: ctcm: fix ctcm_new_device error return code\n (bnc#1012382).\n\n - s390/dasd: Fix capacity calculation for large volumes\n (bnc#1012382).\n\n - sc16is7xx: missing unregister/delete driver on error in\n sc16is7xx_init() (bnc#1012382).\n\n - sc16is7xx: move label 'err_spi' to correct section\n (git-fixes).\n\n - sched: Add sched_smt_active() (bnc#1012382).\n\n - sched/numa: Fix a possible divide-by-zero (bnc#1012382).\n\n - scsi: csiostor: fix missing data copy in\n csio_scsi_err_handler() (bnc#1012382).\n\n - scsi: libsas: fix a race condition when smp task timeout\n (bnc#1012382).\n\n - scsi: qla2xxx: Fix incorrect region-size setting in\n optrom SYSFS routines (bnc#1012382).\n\n - scsi: qla4xxx: fix a potential NULL pointer dereference\n (bnc#1012382).\n\n - scsi: storvsc: Fix calculation of sub-channel count\n (bnc#1012382).\n\n - scsi: zfcp: reduce flood of fcrscn1 trace records on\n multi-element RSCN (bnc#1012382).\n\n - selftests/net: correct the return value for\n run_netsocktests (bnc#1012382).\n\n - selinux: never allow relabeling on context mounts\n (bnc#1012382).\n\n - signals: avoid random wakeups in sigsuspend()\n (bsc#1137915)\n\n - slip: make slhc_free() silently accept an error pointer\n (bnc#1012382).\n\n - staging: iio: adt7316: allow adt751x to use internal\n vref for all dacs (bnc#1012382).\n\n - staging: iio: adt7316: fix the dac read calculation\n (bnc#1012382).\n\n - staging: iio: adt7316: fix the dac write calculation\n (bnc#1012382).\n\n - tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n\n - tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()\n (bsc#1137586).\n\n - tcp: limit payload size of sacked skbs (bsc#1137586).\n\n - tcp: tcp_fragment() should apply sane memory limits\n (bsc#1137586).\n\n - team: fix possible recursive locking when add slaves\n (bnc#1012382).\n\n - timer/debug: Change /proc/timer_stats from 0644 to 0600\n (bnc#1012382).\n\n - tipc: check bearer name with right length in\n tipc_nl_compat_bearer_enable (bnc#1012382).\n\n - tipc: check link name with right length in\n tipc_nl_compat_link_set (bnc#1012382).\n\n - tipc: handle the err returned from cmd header function\n (bnc#1012382).\n\n - tools lib traceevent: Fix missing equality check for\n strcmp (bsc#1129770).\n\n - trace: Fix preempt_enable_no_resched() abuse\n (bnc#1012382).\n\n - tracing: Fix partial reading of trace event's id file\n (bsc#1136573).\n\n - treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n\n - UAS: fix alignment of scatter/gather segments\n (bnc#1012382 bsc#1129770).\n\n - ufs: fix braino in ufs_get_inode_gid() for solaris UFS\n flavour (bsc#1136455).\n\n - Update config files: disable IDE on ppc64le\n\n - usb: cdc-acm: fix race during wakeup blocking TX traffic\n (bsc#1129770).\n\n - usb: cdc-acm: fix unthrottle races (bsc#1135642).\n\n - usb: core: Fix bug caused by duplicate interface PM\n usage counter (bnc#1012382).\n\n - usb: core: Fix unterminated string returned by\n usb_string() (bnc#1012382).\n\n - usb: dwc3: Fix default lpm_nyet_threshold value\n (bnc#1012382).\n\n - usb: gadget: net2272: Fix net2272_dequeue()\n (bnc#1012382).\n\n - usb: gadget: net2280: Fix net2280_dequeue()\n (bnc#1012382).\n\n - usb: gadget: net2280: Fix overrun of OUT messages\n (bnc#1012382).\n\n - usbnet: ipheth: fix potential NULL pointer dereference\n in ipheth_carrier_set (bnc#1012382).\n\n - usbnet: ipheth: prevent TX queue timeouts when device\n not ready (bnc#1012382).\n\n - usb: serial: fix unthrottle races (bnc#1012382).\n\n - usb: serial: use variable for status (bnc#1012382).\n\n - usb: u132-hcd: fix resource leak (bnc#1012382).\n\n - usb: usbip: fix isoc packet num validation in get_pipe\n (bnc#1012382).\n\n - usb: w1 ds2490: Fix bug caused by improper use of\n altsetting array (bnc#1012382).\n\n - usb: yurex: Fix protection fault after device removal\n (bnc#1012382).\n\n - vfio/pci: use correct format characters (bnc#1012382).\n\n - vlan: disable SIOCSHWTSTAMP in container (bnc#1012382).\n\n - vrf: sit mtu should not be updated when vrf netdev is\n the link (bnc#1012382).\n\n - x86_64: Add gap to int3 to allow for call emulation\n (bsc#1099658).\n\n - x86_64: Allow breakpoints to emulate call instructions\n (bsc#1099658).\n\n - x86/bugs: Add AMD's SPEC_CTRL MSR usage (bnc#1012382).\n\n - x86/bugs: Change L1TF mitigation string to match\n upstream (bnc#1012382).\n\n - x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR\n (bnc#1012382).\n\n - x86/bugs: Switch the selection of mitigation from CPU\n vendor to CPU features (bnc#1012382).\n\n - x86/cpu/bugs: Use __initconst for 'const' init data\n (bnc#1012382).\n\n - x86/cpufeatures: Hide AMD-specific speculation flags\n (bnc#1012382).\n\n - x86/Kconfig: Select SCHED_SMT if SMP enabled\n (bnc#1012382).\n\n - x86/MCE: Save microcode revision in machine check\n records (bnc#1012382).\n\n - x86/mds: Add MDSUM variant to the MDS documentation\n (bnc#1012382).\n\n - x86/microcode/intel: Add a helper which gives the\n microcode revision (bnc#1012382).\n\n - x86/microcode/intel: Check microcode revision before\n updating sibling threads (bnc#1012382).\n\n - x86/microcode: Make sure boot_cpu_data.microcode is\n up-to-date (bnc#1012382).\n\n - x86/microcode: Update the new microcode revision\n unconditionally (bnc#1012382).\n\n - x86/mm: Use WRITE_ONCE() when setting PTEs\n (bnc#1012382).\n\n - x86/process: Consolidate and simplify switch_to_xtra()\n code (bnc#1012382).\n\n - x86/speculataion: Mark command line parser data\n __initdata (bnc#1012382).\n\n - x86/speculation: Add command line control for indirect\n branch speculation (bnc#1012382).\n\n - x86/speculation: Add prctl() control for indirect branch\n speculation (bnc#1012382).\n\n - x86/speculation: Add seccomp Spectre v2 user space\n protection mode (bnc#1012382).\n\n - x86/speculation: Avoid __switch_to_xtra() calls\n (bnc#1012382).\n\n - x86/speculation: Clean up spectre_v2_parse_cmdline()\n (bnc#1012382).\n\n - x86/speculation: Disable STIBP when enhanced IBRS is in\n use (bnc#1012382).\n\n - x86/speculation: Enable prctl mode for spectre_v2_user\n (bnc#1012382).\n\n - x86/speculation/l1tf: Document l1tf in sysfs\n (bnc#1012382).\n\n - x86/speculation: Mark string arrays const correctly\n (bnc#1012382).\n\n - x86/speculation/mds: Fix comment (bnc#1012382).\n\n - x86/speculation/mds: Fix documentation typo\n (bnc#1012382).\n\n - x86/speculation: Move STIPB/IBPB string conditionals out\n of cpu_show_common() (bnc#1012382).\n\n - x86/speculation: Prepare arch_smt_update() for PRCTL\n mode (bnc#1012382).\n\n - x86/speculation: Prepare for conditional IBPB in\n switch_mm() (bnc#1012382).\n\n - x86/speculation: Prepare for per task indirect branch\n speculation control (bnc#1012382).\n\n - x86/speculation: Prevent stale SPEC_CTRL msr content\n (bnc#1012382).\n\n - x86/speculation: Provide IBPB always command line\n options (bnc#1012382).\n\n - x86/speculation: Remove SPECTRE_V2_IBRS in enum\n spectre_v2_mitigation (bnc#1012382).\n\n - x86/speculation: Remove unnecessary ret variable in\n cpu_show_common() (bnc#1012382).\n\n - x86/speculation: Rename SSBD update functions\n (bnc#1012382).\n\n - x86/speculation: Reorder the spec_v2 code (bnc#1012382).\n\n - x86/speculation: Reorganize speculation control MSRs\n update (bnc#1012382).\n\n - x86/speculation: Split out TIF update (bnc#1012382).\n\n - x86/speculation: Support Enhanced IBRS on future CPUs\n (bnc#1012382).\n\n - x86/speculation: Support 'mitigations=' cmdline option\n (bnc#1012382 bsc#1112178).\n\n - x86/speculation: Unify conditional spectre v2 print\n functions (bnc#1012382).\n\n - x86/speculation: Update the TIF_SSBD comment\n (bnc#1012382).\n\n - xenbus: drop useless LIST_HEAD in xenbus_write_watch()\n and xenbus_file_write() (bsc#1065600).\n\n - xsysace: Fix error handling in ace_setup (bnc#1012382).\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1005778\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1005780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1005781\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1012382\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1019695\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1019696\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1022604\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1053043\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1063638\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1066223\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1085535\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1085539\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1090888\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1099658\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1100132\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106110\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106929\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1108838\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109137\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112178\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1117562\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1119086\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120642\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120843\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120902\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125580\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126356\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127155\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128052\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129770\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1131107\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1131543\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1131565\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1132374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1132472\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133190\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133874\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134338\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134806\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134813\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135120\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135281\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135603\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135642\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135661\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135878\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136424\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136438\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136448\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136449\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136451\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136452\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136455\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136458\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136539\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136573\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136575\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136586\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136590\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136598\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136623\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136810\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136922\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136935\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136990\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136993\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137142\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137162\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137586\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137752\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137915\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138291\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138374\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected the Linux Kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/09/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/06/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/06/19\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-pdf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-base-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-base-debuginfo-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-debuginfo-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-debugsource-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-devel-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-devel-debuginfo-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-default-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-default-base-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-default-base-debuginfo-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-default-debuginfo-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-default-debugsource-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-default-devel-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-devel-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-docs-html-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-docs-pdf-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-macros-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-obs-build-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-obs-build-debugsource-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-obs-qa-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-source-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-source-vanilla-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-syms-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-vanilla-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-vanilla-base-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-vanilla-base-debuginfo-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-vanilla-debuginfo-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-vanilla-debugsource-4.4.180-102.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-vanilla-devel-4.4.180-102.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-devel / kernel-macros / kernel-source / etc\");\n}\n", "cvss": {"score": 8.3, "vector": "AV:A/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T15:17:08", "description": "The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic.\n (bsc#1137586).\n\n - CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)\n\n - CVE-2019-11479: It was possible to send a crafted sequence of SACKs which would fragment the RACK send map. A remote attacker may be able to further exploit the fragmented send map to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. This would have resulted in excess resource consumption due to low mss values.\n (bsc#1137586)\n\n - CVE-2019-12819: The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service (bnc#1138291).\n\n - CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c (bnc#1138293).\n\n - CVE-2019-12456: local users could cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a 'double fetch' vulnerability.\n (bnc#1136922)\n\n - CVE-2019-12380: phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures (bnc#1136598).\n\n - CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424).\n\n - CVE-2019-10124: An attacker could exploit an issue in the hwpoison implementation to cause a denial of service (BUG). (bsc#1130699)\n\n - CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c. There was an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1136586).\n\n - CVE-2019-11487: The Linux kernel before 5.1-rc5 allowed page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists.\n This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bnc#1133190).\n\n - CVE-2019-5489: The mincore() implementation in mm/mincore.c allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server (bnc#1120843).\n\n - CVE-2019-11833: fs/ext4/extents.c did not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem (bnc#1135281).\n\n - CVE-2018-7191: In the tun subsystem dev_get_valid_name is not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343 (bnc#1135603).\n\n - CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics may have allowed an authenticated user to potentially enable escalation of privilege via local access (bnc#1135278).\n\nThe following non-security bugs were fixed :\n\n - 9p locks: add mount option for lock retry interval (bsc#1051510).\n\n - ACPI: Add Hygon Dhyana support ().\n\n - ACPI: button: reinitialize button state upon resume (bsc#1051510).\n\n - ACPICA: AML interpreter: add region addresses in global list during initialization (bsc#1051510).\n\n - ACPICA: Namespace: remove address node from global list after method termination (bsc#1051510).\n\n - ACPI: fix menuconfig presentation of ACPI submenu (bsc#1117158).\n\n - ACPI / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).\n\n - ACPI / utils: Drop reference in test for device presence (bsc#1051510).\n\n - ALSA: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n\n - ALSA: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).\n\n - ALSA: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).\n\n - ALSA: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).\n\n - ALSA: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).\n\n - ALSA: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).\n\n - ALSA: hda/realtek - Set default power save node to 0 (bsc#1051510).\n\n - ALSA: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n\n - ALSA: hda - Use a macro for snd_array iteration loops (bsc#1051510).\n\n - ALSA: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n\n - appletalk: Fix compile regression (bsc#1051510).\n\n - appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).\n\n - arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n\n - arm64: acpi: fix alignment fault in accessing ACPI (bsc#1117158).\n\n - arm64: Export save_stack_trace_tsk() (jsc#SLE-4214).\n\n - arm64: fix ACPI dependencies (bsc#1117158).\n\n - arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n\n - arm64/x86: Update config files. Use CONFIG_ARCH_SUPPORTS_ACPI\n\n - arm: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).\n\n - arm: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).\n\n - arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).\n\n - arm: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).\n\n - arm: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).\n\n - arm: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).\n\n - arm: iop: do not use using 64-bit DMA masks (bsc#1051510).\n\n - arm: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).\n\n - arm: OMAP2+: Variable 'reg' in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).\n\n - arm: orion: do not use using 64-bit DMA masks (bsc#1051510).\n\n - arm: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).\n\n - arm: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).\n\n - arm: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).\n\n - ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).\n\n - ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n\n - ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n\n - ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).\n\n - ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n\n - ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).\n\n - backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).\n\n - batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).\n\n - blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n\n - block: do not leak memory in bio_copy_user_iov() (bsc#1135309).\n\n - block: Do not revalidate bdev of hidden gendisk (bsc#1120091).\n\n - block: fix the return errno for direct IO (bsc#1135320).\n\n - block: fix use-after-free on gendisk (bsc#1135312).\n\n - Bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n\n - bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242).\n\n - bnxt_en: Improve multicast address setup logic (networking-stable-19_05_04).\n\n - bnxt_en: Improve RX consumer index validity check (networking-stable-19_04_10).\n\n - bnxt_en: Reset device on RX buffer errors (networking-stable-19_04_10).\n\n - bonding: fix event handling for stacked bonds (networking-stable-19_04_19).\n\n - bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).\n\n - bpf: Add missed newline in verifier verbose log (bsc#1056787).\n\n - bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).\n\n - brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).\n\n - brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n\n - brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).\n\n - brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).\n\n - brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).\n\n - btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).\n\n - btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).\n\n - btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).\n\n - btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).\n\n - btrfs: fix race updating log root item during fsync (bsc#1137153).\n\n - btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).\n\n - btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).\n\n - btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n\n - btrfs: qgroup: Do not scan leaf if we're modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).\n\n - btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).\n\n - btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).\n\n - chardev: add additional check for minor range overlap (bsc#1051510).\n\n - CIFS: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n\n - configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).\n\n - configfs: Fix use-after-free when accessing sd->s_dentry (bsc#1051510).\n\n - cpufreq: Add Hygon Dhyana support ().\n\n - cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().\n\n - crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).\n\n - crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).\n\n - crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n\n - crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n\n - dccp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n\n - dccp: Fix memleak in __feat_register_sp (bsc#1051510).\n\n - debugfs: fix use-after-free on symlink traversal (bsc#1051510).\n\n - devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).\n\n - docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).\n\n - Documentation: Add MDS vulnerability documentation (bsc#1135642).\n\n - Documentation: Correct the possible MDS sysfs values (bsc#1135642).\n\n - drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n\n - drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n\n - drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n\n - drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n\n - drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n\n - drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).\n\n - drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).\n\n - drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).\n\n - drm/etnaviv: lock MMU while dumping core (bsc#1113722)\n\n - drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).\n\n - drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).\n\n - drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).\n\n - drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).\n\n - drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)\n\n - drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).\n\n - drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n\n - drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n\n - drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)\n\n - drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n\n - drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n\n - drm/imx: do not skip DP channel disable for background plane (bsc#1051510).\n\n - drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n\n - drm/nouveau/i2c: Disable i2c bus access after ->fini() (bsc#1113722)\n\n - drm/radeon: prefer lower reference dividers (bsc#1051510).\n\n - drm/rockchip: fix for mailbox read validation (bsc#1051510).\n\n - drm/vmwgfx: Do not send drm sysfs hotplug events on initial master set (bsc#1051510).\n\n - drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).\n\n - drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)\n\n - drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).\n\n - dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).\n\n - dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).\n\n - dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).\n\n - dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).\n\n - EDAC, amd64: Add Hygon Dhyana support ().\n\n - efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n\n - efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n\n - efi/arm: Do not mark ACPI reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n\n - efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n\n - efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n\n - efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n\n - efi/arm: Revert 'Defer persistent reservations until after paging_init()' (bsc#1117158).\n\n - efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n\n - efi: honour memory reservations passed via a linux specific config table (bsc#1117158).\n\n - efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n\n - efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n\n - efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n\n - efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n\n - ext4: actually request zeroing of inode table after grow (bsc#1135315).\n\n - ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n\n - ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).\n\n - ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).\n\n - ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).\n\n - ext4: make sanity check in mballoc more strict (bsc#1136439).\n\n - ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n\n - extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).\n\n - fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)\n\n - fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)\n\n - firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n\n - fix rtnh_ok() (git-fixes).\n\n - fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).\n\n - fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).\n\n - ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n\n - fuse: fallocate: fix return with locked inode (bsc#1051510).\n\n - fuse: fix writepages on 32bit (bsc#1051510).\n\n - fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).\n\n - genetlink: Fix a memory leak on error path (networking-stable-19_03_28).\n\n - gpio: fix gpio-adp5588 build errors (bsc#1051510).\n\n - gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).\n\n - gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).\n\n - HID: input: add mapping for Expose/Overview key (bsc#1051510).\n\n - HID: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).\n\n - HID: input: add mapping for 'Toggle Display' key (bsc#1051510).\n\n - HID: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n\n - HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).\n\n - HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).\n\n - HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n\n - HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n\n - HID: wacom: Add support for Pro Pen slim (bsc#1051510).\n\n - HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n\n - HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n\n - HID: wacom: Do not report anything prior to the tool entering range (bsc#1051510).\n\n - HID: wacom: Do not set tool type until we're in range (bsc#1051510).\n\n - HID: wacom: fix mistake in printk (bsc#1051510).\n\n - HID: wacom: generic: add the 'Report Valid' usage (bsc#1051510).\n\n - HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n\n - HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n\n - HID: wacom: generic: Refactor generic battery handling (bsc#1051510).\n\n - HID: wacom: generic: Report AES battery information (bsc#1051510).\n\n - HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n\n - HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n\n - HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n\n - HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n\n - HID: wacom: generic: Support multiple tools per report (bsc#1051510).\n\n - HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n\n - HID: wacom: Mark expected switch fall-through (bsc#1051510).\n\n - HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n\n - HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n\n - HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n\n - HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n\n - HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n\n - HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n\n - HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n\n - HID: wacom: Support 'in range' for Intuos/Bamboo tablets where possible (bsc#1051510).\n\n - HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n\n - HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n\n - HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n\n - HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n\n - hwmon: (core) add thermal sensors only if dev->of_node is present (bsc#1051510).\n\n - hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).\n\n - hwrng: omap - Set default quality (bsc#1051510).\n\n - i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).\n\n - i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).\n\n - ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n\n - ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n\n - ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n\n - ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n\n - ibmvnic: remove set but not used variable 'netdev' (bsc#1137739).\n\n - igmp: fix incorrect unsolicit report count when join group (git-fixes).\n\n - iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).\n\n - iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).\n\n - iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).\n\n - iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).\n\n - indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n\n - inetpeer: fix uninit-value in inet_getpeer (git-fixes).\n\n - Input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).\n\n - Input: synaptics-rmi4 - fix possible double free (bsc#1051510).\n\n - iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n\n - iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n\n - ip6_tunnel: collect_md xmit: Use ip_tunnel_key's provided src address (git-fixes).\n\n - ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (networking-stable-19_04_10).\n\n - ipconfig: Correctly initialise ic_nameservers (bsc#1051510).\n\n - ip_gre: fix parsing gre header in ipgre_err (git-fixes).\n\n - ip_tunnel: Fix name string concatenate in\n __ip_tunnel_create() (git-fixes).\n\n - ipv4: add sanity checks in ipv4_link_failure() (git-fixes).\n\n - ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).\n\n - ipv4: ensure rcu_read_lock() in ipv4_link_failure() (networking-stable-19_04_19).\n\n - ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (networking-stable-19_05_04).\n\n - ipv4: recompile ip options in ipv4_link_failure (networking-stable-19_04_19).\n\n - ipv4: set the tcp_min_rtt_wlen range from 0 to one day (networking-stable-19_04_30).\n\n - ipv6: fix cleanup ordering for ip6_mr failure (git-fixes).\n\n - ipv6: fix cleanup ordering for pingv6 registration (git-fixes).\n\n - ipv6/flowlabel: wait rcu grace period before put_pid() (git-fixes).\n\n - ipv6: invert flowlabel sharing check in process and user mode (git-fixes).\n\n - ipv6: mcast: fix unsolicited report interval after receiving querys (git-fixes).\n\n - ipvlan: Add the skb->mark as flow4's member to lookup route (bsc#1051510).\n\n - ipvlan: fix ipv6 outbound device (bsc#1051510).\n\n - ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).\n\n - ipvs: call ip_vs_dst_notifier earlier than ipv6_dev_notf (git-fixes).\n\n - ipvs: fix buffer overflow with sync daemon and service (git-fixes).\n\n - ipvs: fix check on xmit to non-local addresses (git-fixes).\n\n - ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).\n\n - ipvs: fix rtnl_lock lockups caused by start_sync_thread (git-fixes).\n\n - ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).\n\n - ipvs: fix stats update from local clients (git-fixes).\n\n - iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).\n\n - iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).\n\n - iwlwifi: pcie: do not crash on invalid RX interrupt (bsc#1051510).\n\n - jbd2: check superblock mapped prior to committing (bsc#1136430).\n\n - kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n\n - kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).\n\n - kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n\n - kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n\n - kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).\n\n - kernel/sys.c: prctl: fix false positive in validate_prctl_map() (git-fixes).\n\n - keys: safe concurrent user->(session,uid)_keyring access (bsc#1135642).\n\n - kmsg: Update message catalog to latest IBM level (2019/03/08) (bsc#1128904 LTC#176078).\n\n - KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).\n\n - KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).\n\n - KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).\n\n - KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).\n\n - KVM: PPC: Remove redundand permission bits removal (bsc#1061840).\n\n - KVM: PPC: Validate all tces before updating tables (bsc#1061840).\n\n - KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).\n\n - KVM: s390: fix memory overwrites when not using SCA entries (bsc#1136206).\n\n - KVM: s390: provide io interrupt kvm_stat (bsc#1136206).\n\n - KVM: s390: use created_vcpus in more places (bsc#1136206).\n\n - KVM: s390: vsie: fix < 8k check for the itdba (bsc#1136206).\n\n - l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).\n\n - l2tp: filter out non-PPP sessions in pppol2tp_tunnel_ioctl() (git-fixes).\n\n - l2tp: fix missing refcount drop in pppol2tp_tunnel_ioctl() (git-fixes).\n\n - l2tp: only accept PPP sessions in pppol2tp_connect() (git-fixes).\n\n - l2tp: prevent pppol2tp_connect() from creating kernel sockets (git-fixes).\n\n - l2tp: revert 'l2tp: fix missing print session offset info' (bsc#1051510).\n\n - leds: avoid flush_work in atomic context (bsc#1051510).\n\n - leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).\n\n - livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).\n\n - livepatch: Remove custom kobject state handling (bsc#1071995).\n\n - livepatch: Remove duplicated code for early initialization (bsc#1071995).\n\n - mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).\n\n - mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).\n\n - mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).\n\n - mac80211: fix unaligned access in mesh table hash function (bsc#1051510).\n\n - mac8390: Fix mmio access size probe (bsc#1051510).\n\n - MD: fix invalid stored role for a disk (bsc#1051510).\n\n - media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).\n\n - media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).\n\n - media: au0828: stop video streaming only when last user stops (bsc#1051510).\n\n - media: coda: clear error return value before picture run (bsc#1051510).\n\n - media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).\n\n - media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).\n\n - media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).\n\n - media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).\n\n - media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).\n\n - media: ov2659: make S_FMT succeed even if requested format does not match (bsc#1051510).\n\n - media: saa7146: avoid high stack usage with clang (bsc#1051510).\n\n - media: smsusb: better handle optional alignment (bsc#1051510).\n\n - media: usb: siano: Fix false-positive 'uninitialized variable' warning (bsc#1051510).\n\n - media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).\n\n - memcg: make it work on sparse non-0-node systems (bnc#1133616).\n\n - memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).\n\n - mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).\n\n - mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n\n - mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).\n\n - mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n\n - mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n\n - mISDN: Check address length before reading address family (bsc#1051510).\n\n - mlxsw: spectrum: Fix autoneg status in ethtool (networking-stable-19_04_30).\n\n - mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).\n\n - mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n\n - mmc: core: Verify SD bus width (bsc#1051510).\n\n - mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n\n - mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n\n - mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n\n - mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).\n\n - mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).\n\n - mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n\n - mmc_spi: add a status check for spi_sync_locked (bsc#1051510).\n\n - mm-Fix-modifying-of-page-protection-by-insert_pfn.patch:\n Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n\n - mm/huge_memory: fix vmf_insert_pfn_(pmd, pud)() crash, handle unaligned addresses (bsc#1135330).\n\n - mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n\n - mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n\n - mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n\n - mwifiex: Fix possible buffer overflows at parsing bss descriptor\n\n - neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).\n\n - net: aquantia: fix rx checksum offload for UDP/TCP over IPv6 (networking-stable-19_03_28).\n\n - net: atm: Fix potential Spectre v1 vulnerabilities (networking-stable-19_04_19).\n\n - net: do not keep lonely packets forever in the gro hash (git-fixes).\n\n - net: dsa: bcm_sf2: fix buffer overflow doing set_rxnfc (networking-stable-19_05_04).\n\n - net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT (git-fixes).\n\n - net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n\n - net: ethtool: not call vzalloc for zero sized memory request (networking-stable-19_04_10).\n\n - netfilter: bridge: Do not sabotage nf_hook calls from an l3mdev (git-fixes).\n\n - netfilter: ebtables: CONFIG_COMPAT: reject trailing data after last rule (git-fixes).\n\n - netfilter: ebtables: handle string from userspace with care (git-fixes).\n\n - netfilter: ebtables: reject non-bridge targets (git-fixes).\n\n - netfilter: ipset: do not call ipset_nest_end after nla_nest_cancel (git-fixes).\n\n - netfilter: nf_log: do not hold nf_log_mutex during user access (git-fixes).\n\n - netfilter: nf_log: fix uninit read in nf_log_proc_dostring (git-fixes).\n\n - netfilter: nf_tables: can't fail after linking rule into active rule list (git-fixes).\n\n - netfilter: nf_tables: check msg_type before nft_trans_set(trans) (git-fixes).\n\n - netfilter: nf_tables: fix leaking object reference count (git-fixes).\n\n - netfilter: nf_tables: fix NULL pointer dereference on nft_ct_helper_obj_dump() (git-fixes).\n\n - netfilter: nf_tables: release chain in flushing set (git-fixes).\n\n - netfilter: nft_compat: do not dump private area (git-fixes).\n\n - netfilter: x_tables: initialise match/target check parameter struct (git-fixes).\n\n - net: Fix a bug in removing queues from XPS map (git-fixes).\n\n - net: fix uninit-value in __hw_addr_add_ex() (git-fixes).\n\n - net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (networking-stable-19_04_19).\n\n - net-gro: Fix GRO flush when receiving a GSO packet (networking-stable-19_04_10).\n\n - net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).\n\n - net/ibmvnic: Remove tests of member address (bsc#1137739).\n\n - net: initialize skb->peeked when cloning (git-fixes).\n\n - net/ipv4: defensive cipso option parsing (git-fixes).\n\n - net/ipv6: do not reinitialize ndev->cnf.addr_gen_mode on new inet6_dev (git-fixes).\n\n - net/ipv6: fix addrconf_sysctl_addr_gen_mode (git-fixes).\n\n - net/ipv6: propagate net.ipv6.conf.all.addr_gen_mode to devices (git-fixes).\n\n - net/ipv6: reserve room for IFLA_INET6_ADDR_GEN_MODE (git-fixes).\n\n - netlink: fix uninit-value in netlink_sendmsg (git-fixes).\n\n - net: make skb_partial_csum_set() more robust against overflows (git-fixes).\n\n - net/mlx5: Decrease default mr cache size (networking-stable-19_04_10).\n\n - net/mlx5e: Add a lock on tir list (networking-stable-19_04_10).\n\n - net/mlx5e: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_04_30).\n\n - net/mlx5e: Fix error handling when refreshing TIRs (networking-stable-19_04_10).\n\n - net/mlx5e: Fix trailing semicolon (bsc#1075020).\n\n - net/mlx5e: IPoIB, Reset QP after channels are closed (bsc#1075020).\n\n - net: phy: marvell: Fix buffer overrun with stats counters (networking-stable-19_05_04).\n\n - net: rds: exchange of 8K and 1M pool (networking-stable-19_04_30).\n\n - net: rose: fix a possible stack overflow (networking-stable-19_03_28).\n\n - net/rose: fix unbound loop in rose_loopback_timer() (networking-stable-19_04_30).\n\n - net/sched: act_sample: fix divide by zero in the traffic path (networking-stable-19_04_10).\n\n - net/sched: do not dereference a->goto_chain to read the chain index (bsc#1064802 bsc#1066129).\n\n - net/sched: fix ->get helper of the matchall cls (networking-stable-19_04_10).\n\n - net: socket: fix potential spectre v1 gadget in socketcall (git-fixes).\n\n - net: stmmac: fix memory corruption with large MTUs (networking-stable-19_03_28).\n\n - net: stmmac: move stmmac_check_ether_addr() to driver probe (networking-stable-19_04_30).\n\n - net: test tailroom before appending to linear skb (git-fixes).\n\n - net: thunderx: do not allow jumbo frames with XDP (networking-stable-19_04_19).\n\n - net: thunderx: raise XDP MTU to 1508 (networking-stable-19_04_19).\n\n - net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n\n - net: use indirect call wrappers at GRO network layer (bsc#1124503).\n\n - net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n\n - NFS add module option to limit NFSv4 minor version (jsc#PM-231).\n\n - nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).\n\n - nvme: Do not remove namespaces during reset (bsc#1131673).\n\n - nvme: flush scan_work when resetting controller (bsc#1131673).\n\n - nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n\n - nvmem: core: fix read buffer in place (bsc#1051510).\n\n - nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n\n - nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n\n - nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n\n - nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n\n - nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n\n - nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n\n - nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n\n - nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n\n - nvmem: imx-ocotp: Update module description (bsc#1051510).\n\n - nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n\n - nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n\n - nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n\n - objtool: Fix function fallthrough detection (bsc#1058115).\n\n - ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).\n\n - of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n\n - p54: drop device reference count if fails to enable device (bsc#1135642).\n\n - packet: fix reserve calculation (git-fixes).\n\n - packet: in packet_snd start writing at link layer allocation (git-fixes).\n\n - packet: refine ring v3 block size test to hold one frame (git-fixes).\n\n - packet: reset network header if packet shorter than ll reserved space (git-fixes).\n\n - packets: Always register packet sk in the same order (networking-stable-19_03_28).\n\n - parport: Fix mem leak in parport_register_dev_model (bsc#1051510).\n\n - PCI: endpoint: Use EPC's device in dma_alloc_coherent()/dma_free_coherent() (git-fixes).\n\n - PCI: Factor out pcie_retrain_link() function (git-fixes).\n\n - PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).\n\n - PCI: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).\n\n - PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n\n - PCI: Work around Pericom PCIe-to-PCI bridge Retrain Link erratum (git-fixes).\n\n - perf tools: Add Hygon Dhyana support ().\n\n - platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n\n - platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n\n - platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).\n\n - platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).\n\n - PM / core: Propagate dev->power.wakeup_path when no callbacks (bsc#1051510).\n\n - powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n\n - powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n\n - powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n\n - powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n\n - powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n\n - powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n\n - powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n\n - powerpc/process: Fix sparse address space warnings (bsc#1065729).\n\n - powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n\n - powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n\n - powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n\n - power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).\n\n - power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).\n\n - power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n\n - power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n\n - ptrace: take into account saved_sigmask in PTRACE(GET,SET)SIGMASK (git-fixes).\n\n - qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n\n - qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n\n - RDMA/hns: Fix bug that caused srq creation to fail (bsc#1104427 ).\n\n - RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992).\n\n - Revert 'ALSA: hda/realtek - Improve the headset mic for Acer Aspire laptops' (bsc#1051510).\n\n - Revert 'HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range' (bsc#1051510).\n\n - rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).\n\n - rtc: da9063: set uie_unsupported when relevant (bsc#1051510).\n\n - rtc: do not reference bogus function pointer in kdoc (bsc#1051510).\n\n - rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).\n\n - rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).\n\n - rxrpc: Fix error reception on AF_INET6 sockets (git-fixes).\n\n - rxrpc: Fix transport sockopts to get IPv4 errors on an IPv6 socket (git-fixes).\n\n - s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).\n\n - scsi: qedf: fixup bit operations (bsc#1135542).\n\n - scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).\n\n - scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).\n\n - scsi: qla2xxx: Declare local functions 'static' (bsc#1137444).\n\n - scsi: qla2xxx: fix error message on <qla2400 (bsc#1118139).\n\n - scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n\n - scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n\n - scsi: qla2xxx: fix spelling mistake: 'existant' -> 'existent' (bsc#1118139).\n\n - scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n\n - scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n\n - scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n\n - scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n\n - scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n\n - scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes 'res' (bsc#1137444).\n\n - scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n\n - scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n\n - scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n\n - scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n\n - scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n\n - scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n\n - scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n\n - scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n\n - sctp: avoid running the sctp state machine recursively (networking-stable-19_05_04).\n\n - sctp: fix identification of new acks for SFR-CACC (git-fixes).\n\n - sctp: get sctphdr by offset in sctp_compute_cksum (networking-stable-19_03_28).\n\n - sctp: initialize _pad of sockaddr_in before copying to user memory (networking-stable-19_04_10).\n\n - serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n\n - signal: Always notice exiting tasks (git-fixes).\n\n - signal: Better detection of synchronous signals (git-fixes).\n\n - signal: Restore the stop PTRACE_EVENT_EXIT (git-fixes).\n\n - soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).\n\n - spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n\n - spi: Fix zero length xfer bug (bsc#1051510).\n\n - spi: Micrel eth switch: declare missing of table (bsc#1051510).\n\n - spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).\n\n - spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n\n - spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n\n - spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n\n - spi: ST ST95HF NFC: declare missing of table (bsc#1051510).\n\n - spi: tegra114: reset controller on probe (bsc#1051510).\n\n - staging: vc04_services: Fix a couple error codes (bsc#1051510).\n\n - staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).\n\n - staging: wlan-ng: fix adapter initialization failure (bsc#1051510).\n\n - stmmac: pci: Adjust IOT2000 matching (networking-stable-19_04_30).\n\n - switchtec: Fix unintended mask of MRPC event (git-fixes).\n\n - tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n\n - tcp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n\n - tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n\n - tcp: Ensure DCTCP reacts to losses (networking-stable-19_04_10).\n\n - tcp: limit payload size of sacked skbs (bsc#1137586).\n\n - tcp: purge write queue in tcp_connect_init() (git-fixes).\n\n - tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n\n - tcp: tcp_grow_window() needs to respect tcp_space() (networking-stable-19_04_19).\n\n - team: fix possible recursive locking when add slaves (networking-stable-19_04_30).\n\n - team: set slave to promisc if team is already in promisc mode (bsc#1051510).\n\n - test_firmware: Use correct snprintf() limit (bsc#1135642).\n\n - thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).\n\n - thunderbolt: Fix to check for kmemdup failure (bsc#1051510).\n\n - thunderx: eliminate extra calls to put_page() for pages held for recycling (networking-stable-19_03_28).\n\n - thunderx: enable page recycling for non-XDP case (networking-stable-19_03_28).\n\n - tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).\n\n - tipc: missing entries in name table of publications (networking-stable-19_04_19).\n\n - tools/cpupower: Add Hygon Dhyana support ().\n\n - tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n\n - tracing: Fix partial reading of trace event's id file (bsc#1136573).\n\n - treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n\n - tty: ipwireless: fix missing checks for ioremap (bsc#1051510).\n\n - TTY: serial_core, add ->install (bnc#1129693).\n\n - tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n\n - tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).\n\n - tun: add a missing rcu_read_unlock() in error path (networking-stable-19_03_28).\n\n - tun: properly test for IFF_UP (networking-stable-19_03_28).\n\n - udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n\n - ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).\n\n - Update config files: CONFIG_NVMEM_IMX_OCOTP=m for armvh7hl/lpae\n\n - Update config files. Debug kernel is not supported (bsc#1135492).\n\n - Update config files: disable CONFIG_IDE on ppc64le\n\n - Update config files for NFSv4.2 Enable NFSv4.2 support - jsc@PM-231 This requires a module parameter for NFSv4.2 to actually be available on SLE12 and SLE15-SP0\n\n - Update cx2072x patches to follow the upstream development (bsc#1068546)\n\n - Update patch reference for ipmi_ssif fix (bsc#1135120)\n\n - usb: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).\n\n - usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).\n\n - usb: core: Do not unbind interfaces following device reset failure (bsc#1051510).\n\n - usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n\n - usb: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).\n\n - usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).\n\n - usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).\n\n - usbnet: fix kernel crash after disconnect (bsc#1051510).\n\n - usb: rio500: fix memory leak in close after disconnect (bsc#1051510).\n\n - usb: rio500: refuse more than one device at a time (bsc#1051510).\n\n - usb: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).\n\n - userfaultfd: use RCU to free the task struct when fork fails (git-fixes).\n\n - vhost: reject zero size iova range (networking-stable-19_04_19).\n\n - video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n\n - video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n\n - virtio_console: initialize vtermno value for ports (bsc#1051510).\n\n - vrf: check accept_source_route on the original netdevice (networking-stable-19_04_10).\n\n - vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).\n\n - vt: always call notifier with the console lock held (bsc#1051510).\n\n - vxlan: Do not call gro_cells_destroy() before device is unregistered (networking-stable-19_03_28).\n\n - vxlan: trivial indenting fix (bsc#1051510).\n\n - vxlan: use __be32 type for the param vni in\n __vxlan_fdb_delete (bsc#1051510).\n\n - w1: fix the resume command API (bsc#1051510).\n\n - watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n\n - x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n\n - x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n\n - x86/alternative: Init ideal_nops for Hygon Dhyana ().\n\n - x86/amd_nb: Check vendor in AMD-only functions ().\n\n - x86/apic: Add Hygon Dhyana support ().\n\n - x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().\n\n - x86/cpu: Create Hygon Dhyana architecture support file ().\n\n - x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().\n\n - x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().\n\n - x86/events: Add Hygon Dhyana support to PMU infrastructure ().\n\n - x86/kvm: Add Hygon Dhyana support to KVM ().\n\n - x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().\n\n - x86/mce: Do not disable MCA banks when offlining a CPU on AMD ().\n\n - x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge ().\n\n - x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().\n\n - x86/speculation/mds: Fix documentation typo (bsc#1135642).\n\n - x86/xen: Add Hygon Dhyana support to Xen ().\n\n - xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n\n - xen/pciback: Do not disable PCI_COMMAND on PCI device reset (bsc#1065600).\n\n - xfrm6: avoid potential infinite loop in\n _decode_session6() (git-fixes).\n\n - xfrm6: call kfree_skb when skb is toobig (git-fixes).\n\n - xfrm: fix missing dst_release() after policy blocking lbcast and multicast (git-fixes).\n\n - xfrm: fix 'passing zero to ERR_PTR()' warning (git-fixes).\n\n - xfrm: reset crypto_done when iterating over multiple input xfrms (git-fixes).\n\n - xfrm: reset transport header back to network header after all input transforms ahave been applied (git-fixes).\n\n - xfrm_user: prevent leaking 2 bytes of kernel memory (git-fixes).\n\n - xfrm: Validate address prefix lengths in the xfrm selector (git-fixes).\n\n - xfs: add log item pinning error injection tag (bsc#1114427).\n\n - xfs: buffer lru reference count error injection tag (bsc#1114427).\n\n - xfs: check _btree_check_block value (bsc#1123663).\n\n - xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).\n\n - xfs: create block pointer check functions (bsc#1123663).\n\n - xfs: create inode pointer verifiers (bsc#1114427).\n\n - xfs: do not clear imap_valid for a non-uptodate buffers (bsc#1138018).\n\n - xfs: do not look at buffer heads in xfs_add_to_ioend (bsc#1138013).\n\n - xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).\n\n - xfs: do not use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).\n\n - xfs: do not use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).\n\n - xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).\n\n - xfs: export _inobt_btrec_to_irec and\n _ialloc_cluster_alignment for scrub (bsc#1114427).\n\n - xfs: export various function for the online scrubber (bsc#1123663).\n\n - xfs: expose errortag knobs via sysfs (bsc#1114427).\n\n - xfs: fix s_maxbytes overflow problems (bsc#1137996).\n\n - xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).\n\n - xfs: force summary counter recalc at next mount (bsc#1114427).\n\n - xfs: make errortag a per-mountpoint structure (bsc#1123663).\n\n - xfs: make xfs_writepage_map extent map centric (bsc#1138009).\n\n - xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n\n - xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).\n\n - xfs: move error injection tags into their own file (bsc#1114427).\n\n - xfs: refactor btree block header checking functions (bsc#1123663).\n\n - xfs: refactor btree pointer checks (bsc#1123663).\n\n - xfs: refactor the tail of xfs_writepage_map (bsc#1138016).\n\n - xfs: refactor unmount record write (bsc#1114427).\n\n - xfs: remove the imap_valid flag (bsc#1138012).\n\n - xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).\n\n - xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).\n\n - xfs: remove XFS_IO_INVALID (bsc#1138017).\n\n - xfs: remove xfs_map_cow (bsc#1138007).\n\n - xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n\n - xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).\n\n - xfs: remove xfs_start_page_writeback (bsc#1138015).\n\n - xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).\n\n - xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).\n\n - xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).\n\n - xfs: sanity-check the unused space before trying to use it (bsc#1123663).\n\n - xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).\n\n - xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).\n\n - xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).\n\n - xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).\n\n - xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).\n\n - xhci: Use %zu for printing size_t type (bsc#1051510).\n\n - xhci: update bounce buffer with correct sg num (bsc#1051510).", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-06-19T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2019-1579) (SACK Panic) (SACK Slowness)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 6.5, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 8.3, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-4343", "CVE-2018-7191", "CVE-2019-10124", "CVE-2019-11085", "CVE-2019-11477", "CVE-2019-11478", "CVE-2019-11479", "CVE-2019-11487", "CVE-2019-11833", "CVE-2019-12380", "CVE-2019-12382", "CVE-2019-12456", "CVE-2019-12818", "CVE-2019-12819", "CVE-2019-3846", "CVE-2019-5489"], "modified": "2022-12-05T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "cpe:/o:novell:opensuse:15.0"], "id": "OPENSUSE-2019-1579.NASL", "href": "https://www.tenable.com/plugins/nessus/126040", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-1579.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(126040);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2013-4343\",\n \"CVE-2018-7191\",\n \"CVE-2019-10124\",\n \"CVE-2019-11085\",\n \"CVE-2019-11477\",\n \"CVE-2019-11478\",\n \"CVE-2019-11479\",\n \"CVE-2019-11487\",\n \"CVE-2019-11833\",\n \"CVE-2019-12380\",\n \"CVE-2019-12382\",\n \"CVE-2019-12456\",\n \"CVE-2019-12818\",\n \"CVE-2019-12819\",\n \"CVE-2019-3846\",\n \"CVE-2019-5489\"\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2019-0456\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2019-1579) (SACK Panic) (SACK Slowness)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote openSUSE host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The openSUSE Leap 15.0 kernel was updated to receive various security\nand bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-11477: A sequence of SACKs may have been\n crafted by a remote attacker such that one can trigger\n an integer overflow, leading to a kernel panic.\n (bsc#1137586).\n\n - CVE-2019-11478: It was possible to send a crafted\n sequence of SACKs which would fragment the TCP\n retransmission queue. A remote attacker may have been\n able to further exploit the fragmented queue to cause an\n expensive linked-list walk for subsequent SACKs received\n for that same TCP connection. (bsc#1137586)\n\n - CVE-2019-11479: It was possible to send a crafted\n sequence of SACKs which would fragment the RACK send\n map. A remote attacker may be able to further exploit\n the fragmented send map to cause an expensive\n linked-list walk for subsequent SACKs received for that\n same TCP connection. This would have resulted in excess\n resource consumption due to low mss values.\n (bsc#1137586)\n\n - CVE-2019-12819: The function __mdiobus_register() in\n drivers/net/phy/mdio_bus.c calls put_device(), which\n will trigger a fixed_mdio_bus_init use-after-free. This\n will cause a denial of service (bnc#1138291).\n\n - CVE-2019-12818: The nfc_llcp_build_tlv function in\n net/nfc/llcp_commands.c may return NULL. If the caller\n did not check for this, it will trigger a NULL pointer\n dereference. This will cause denial of service. This\n affects nfc_llcp_build_gb in net/nfc/llcp_core.c\n (bnc#1138293).\n\n - CVE-2019-12456: local users could cause a denial of\n service or possibly have unspecified other impact by\n changing the value of ioc_number between two kernel\n reads of that value, aka a 'double fetch' vulnerability.\n (bnc#1136922)\n\n - CVE-2019-12380: phys_efi_set_virtual_address_map in\n arch/x86/platform/efi/efi.c and efi_call_phys_prolog in\n arch/x86/platform/efi/efi_64.c mishandle memory\n allocation failures (bnc#1136598).\n\n - CVE-2019-3846: A flaw that allowed an attacker to\n corrupt memory and possibly escalate privileges was\n found in the mwifiex kernel module while connecting to a\n malicious wireless network (bnc#1136424).\n\n - CVE-2019-10124: An attacker could exploit an issue in\n the hwpoison implementation to cause a denial of service\n (BUG). (bsc#1130699)\n\n - CVE-2019-12382: An issue was discovered in\n drm_load_edid_firmware in\n drivers/gpu/drm/drm_edid_load.c. There was an unchecked\n kstrdup of fwstr, which might allow an attacker to cause\n a denial of service (NULL pointer dereference and system\n crash) (bnc#1136586).\n\n - CVE-2019-11487: The Linux kernel before 5.1-rc5 allowed\n page->_refcount reference count overflow, with resultant\n use-after-free issues, if about 140 GiB of RAM exists.\n This is related to fs/fuse/dev.c, fs/pipe.c,\n fs/splice.c, include/linux/mm.h,\n include/linux/pipe_fs_i.h, kernel/trace/trace.c,\n mm/gup.c, and mm/hugetlb.c. It can occur with FUSE\n requests (bnc#1133190).\n\n - CVE-2019-5489: The mincore() implementation in\n mm/mincore.c allowed local attackers to observe page\n cache access patterns of other processes on the same\n system, potentially allowing sniffing of secret\n information. (Fixing this affects the output of the\n fincore program.) Limited remote exploitation may be\n possible, as demonstrated by latency differences in\n accessing public files from an Apache HTTP Server\n (bnc#1120843).\n\n - CVE-2019-11833: fs/ext4/extents.c did not zero out the\n unused memory region in the extent tree block, which\n might allow local users to obtain sensitive information\n by reading uninitialized data in the filesystem\n (bnc#1135281).\n\n - CVE-2018-7191: In the tun subsystem dev_get_valid_name\n is not called before register_netdevice. This allowed\n local users to cause a denial of service (NULL pointer\n dereference and panic) via an ioctl(TUNSETIFF) call with\n a dev name containing a / character. This is similar to\n CVE-2013-4343 (bnc#1135603).\n\n - CVE-2019-11085: Insufficient input validation in Kernel\n Mode Driver in Intel(R) i915 Graphics may have allowed\n an authenticated user to potentially enable escalation\n of privilege via local access (bnc#1135278).\n\nThe following non-security bugs were fixed :\n\n - 9p locks: add mount option for lock retry interval\n (bsc#1051510).\n\n - ACPI: Add Hygon Dhyana support ().\n\n - ACPI: button: reinitialize button state upon resume\n (bsc#1051510).\n\n - ACPICA: AML interpreter: add region addresses in global\n list during initialization (bsc#1051510).\n\n - ACPICA: Namespace: remove address node from global list\n after method termination (bsc#1051510).\n\n - ACPI: fix menuconfig presentation of ACPI submenu\n (bsc#1117158).\n\n - ACPI / property: fix handling of data_nodes in\n acpi_get_next_subnode() (bsc#1051510).\n\n - ACPI / utils: Drop reference in test for device presence\n (bsc#1051510).\n\n - ALSA: firewire-motu: fix destruction of data for\n isochronous resources (bsc#1051510).\n\n - ALSA: hda/realtek - Avoid superfluous COEF EAPD setups\n (bsc#1051510).\n\n - ALSA: hda/realtek - Corrected fixup for System76 Gazelle\n (gaze14) (bsc#1051510).\n\n - ALSA: hda/realtek - Fix for Lenovo B50-70 inverted\n internal microphone bug (bsc#1051510).\n\n - ALSA: hda/realtek - Fixup headphone noise via runtime\n suspend (bsc#1051510).\n\n - ALSA: hda/realtek - Improve the headset mic for Acer\n Aspire laptops (bsc#1051510).\n\n - ALSA: hda/realtek - Set default power save node to 0\n (bsc#1051510).\n\n - ALSA: hda/realtek - Update headset mode for ALC256\n (bsc#1051510).\n\n - ALSA: hda - Use a macro for snd_array iteration loops\n (bsc#1051510).\n\n - ALSA: oxfw: allow PCM capture for Stanton SCS.1m\n (bsc#1051510).\n\n - appletalk: Fix compile regression (bsc#1051510).\n\n - appletalk: Fix use-after-free in atalk_proc_exit\n (bsc#1051510).\n\n - arch: arm64: acpi: KABI ginore includes (bsc#1117158\n bsc#1134671).\n\n - arm64: acpi: fix alignment fault in accessing ACPI\n (bsc#1117158).\n\n - arm64: Export save_stack_trace_tsk() (jsc#SLE-4214).\n\n - arm64: fix ACPI dependencies (bsc#1117158).\n\n - arm64, mm, efi: Account for GICv3 LPI tables in static\n memblock reserve table (bsc#1117158).\n\n - arm64/x86: Update config files. Use\n CONFIG_ARCH_SUPPORTS_ACPI\n\n - arm: 8824/1: fix a migrating irq bug when hotplug cpu\n (bsc#1051510).\n\n - arm: 8833/1: Ensure that NEON code always compiles with\n Clang (bsc#1051510).\n\n - arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t\n (bsc#1051510).\n\n - arm: 8840/1: use a raw_spinlock_t in unwind\n (bsc#1051510).\n\n - arm: avoid Cortex-A9 livelock on tight dmb loops\n (bsc#1051510).\n\n - arm: imx6q: cpuidle: fix bug that CPU might not wake up\n at expected time (bsc#1051510).\n\n - arm: iop: do not use using 64-bit DMA masks\n (bsc#1051510).\n\n - arm: OMAP2+: fix lack of timer interrupts on CPU1 after\n hotplug (bsc#1051510).\n\n - arm: OMAP2+: Variable 'reg' in function\n omap4_dsi_mux_pads() could be uninitialized\n (bsc#1051510).\n\n - arm: orion: do not use using 64-bit DMA masks\n (bsc#1051510).\n\n - arm: pxa: ssp: unneeded to free devm_ allocated data\n (bsc#1051510).\n\n - arm: s3c24xx: Fix boolean expressions in\n osiris_dvs_notify (bsc#1051510).\n\n - arm: samsung: Limit SAMSUNG_PM_CHECK config option to\n non-Exynos platforms (bsc#1051510).\n\n - ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).\n\n - ASoC: eukrea-tlv320: fix a leaked reference by adding\n missing of_node_put (bsc#1051510).\n\n - ASoC: fsl_asrc: Fix the issue about unsupported rate\n (bsc#1051510).\n\n - ASoC: fsl_sai: Update is_slave_mode with correct value\n (bsc#1051510).\n\n - ASoC: fsl_utils: fix a leaked reference by adding\n missing of_node_put (bsc#1051510).\n\n - ASoC: hdmi-codec: unlock the device on startup errors\n (bsc#1051510).\n\n - backlight: lm3630a: Return 0 on success in update_status\n functions (bsc#1051510).\n\n - batman-adv: allow updating DAT entry timeouts on\n incoming ARP Replies (bsc#1051510).\n\n - blk-mq: fix hang caused by freeze/unfreeze sequence\n (bsc#1128432).\n\n - block: do not leak memory in bio_copy_user_iov()\n (bsc#1135309).\n\n - block: Do not revalidate bdev of hidden gendisk\n (bsc#1120091).\n\n - block: fix the return errno for direct IO (bsc#1135320).\n\n - block: fix use-after-free on gendisk (bsc#1135312).\n\n - Bluetooth: Check key sizes only when Secure Simple\n Pairing is enabled (bsc#1135556).\n\n - bnxt_en: Free short FW command HWRM memory in error path\n in bnxt_init_one() (bsc#1050242).\n\n - bnxt_en: Improve multicast address setup logic\n (networking-stable-19_05_04).\n\n - bnxt_en: Improve RX consumer index validity check\n (networking-stable-19_04_10).\n\n - bnxt_en: Reset device on RX buffer errors\n (networking-stable-19_04_10).\n\n - bonding: fix event handling for stacked bonds\n (networking-stable-19_04_19).\n\n - bpf: add map_lookup_elem_sys_only for lookups from\n syscall side (bsc#1083647).\n\n - bpf: Add missed newline in verifier verbose log\n (bsc#1056787).\n\n - bpf, lru: avoid messing with eviction heuristics upon\n syscall lookup (bsc#1083647).\n\n - brcmfmac: convert dev_init_lock mutex to completion\n (bsc#1051510).\n\n - brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n\n - brcmfmac: fix Oops when bringing up interface during USB\n disconnect (bsc#1051510).\n\n - brcmfmac: fix race during disconnect when USB completion\n is in progress (bsc#1051510).\n\n - brcmfmac: fix WARNING during USB disconnect in case of\n unempty psq (bsc#1051510).\n\n - btrfs: delayed-ref: Use btrfs_ref to refactor\n btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052\n bsc#1108838).\n\n - btrfs: delayed-ref: Use btrfs_ref to refactor\n btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052\n bsc#1108838).\n\n - btrfs: do not allow trimming when a fs is mounted with\n the nologreplay option (bsc#1135758).\n\n - btrfs: do not double unlock on error in btrfs_punch_hole\n (bsc#1136881).\n\n - btrfs: extent-tree: Fix a bug that btrfs is unable to\n add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: extent-tree: Use btrfs_ref to refactor\n add_pinned_bytes() (bsc#1063638 bsc#1128052\n bsc#1108838).\n\n - btrfs: extent-tree: Use btrfs_ref to refactor\n btrfs_free_extent() (bsc#1063638 bsc#1128052\n bsc#1108838).\n\n - btrfs: extent-tree: Use btrfs_ref to refactor\n btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052\n bsc#1108838).\n\n - btrfs: fix fsync not persisting changed attributes of a\n directory (bsc#1137151).\n\n - btrfs: fix race between ranged fsync and writeback of\n adjacent ranges (bsc#1136477).\n\n - btrfs: fix race updating log root item during fsync\n (bsc#1137153).\n\n - btrfs: fix wrong ctime and mtime of a directory after\n log replay (bsc#1137152).\n\n - btrfs: improve performance on fsync of files with\n multiple hardlinks (bsc#1123454).\n\n - btrfs: qgroup: Check bg while resuming relocation to\n avoid NULL pointer dereference (bsc#1134806).\n\n - btrfs: qgroup: Do not scan leaf if we're modifying reloc\n tree (bsc#1063638 bsc#1128052 bsc#1108838).\n\n - btrfs: reloc: Also queue orphan reloc tree for cleanup\n to avoid BUG_ON() (bsc#1133612).\n\n - btrfs: send, flush dellaloc in order to avoid data loss\n (bsc#1133320).\n\n - btrfs: tree-checker: detect file extent items with\n overlapping ranges (bsc#1136478).\n\n - chardev: add additional check for minor range overlap\n (bsc#1051510).\n\n - CIFS: keep FileInfo handle live during oplock break\n (bsc#1106284, bsc#1131565).\n\n - configfs: fix possible use-after-free in\n configfs_register_group (bsc#1051510).\n\n - configfs: Fix use-after-free when accessing sd->s_dentry\n (bsc#1051510).\n\n - cpufreq: Add Hygon Dhyana support ().\n\n - cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ\n ().\n\n - crypto: caam - fix caam_dump_sg that iterates through\n scatterlist (bsc#1051510).\n\n - crypto: vmx - CTR: always increment IV as quadword\n (bsc#1051510).\n\n - crypto: vmx - ghash: do nosimd fallback manually\n (bsc#1135661, bsc#1137162).\n\n - crypto: vmx - return correct error code on failed setkey\n (bsc#1135661, bsc#1137162).\n\n - dccp: do not use ipv6 header for ipv4 flow\n (networking-stable-19_03_28).\n\n - dccp: Fix memleak in __feat_register_sp (bsc#1051510).\n\n - debugfs: fix use-after-free on symlink traversal\n (bsc#1051510).\n\n - devres: Align data[] to ARCH_KMALLOC_MINALIGN\n (bsc#1051510).\n\n - docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).\n\n - Documentation: Add MDS vulnerability documentation\n (bsc#1135642).\n\n - Documentation: Correct the possible MDS sysfs values\n (bsc#1135642).\n\n - drbd: Avoid Clang warning about pointless switch\n statment (bsc#1051510).\n\n - drbd: disconnect, if the wrong UUIDs are attached on a\n connected peer (bsc#1051510).\n\n - drbd: narrow rcu_read_lock in drbd_sync_handshake\n (bsc#1051510).\n\n - drbd: skip spurious timeout (ping-timeo) when failing\n promote (bsc#1051510).\n\n - drivers: acpi: add dependency of EFI for arm64\n (bsc#1117158).\n\n - drm/amdgpu: fix old fence check in amdgpu_fence_emit\n (bsc#1051510).\n\n - drm/bridge: adv7511: Fix low refresh rate selection\n (bsc#1051510).\n\n - drm/drv: Hold ref on parent device during drm_device\n lifetime (bsc#1051510).\n\n - drm/etnaviv: lock MMU while dumping core (bsc#1113722)\n\n - drm/gma500/cdv: Check vbt config bits when detecting\n lvds panels (bsc#1051510).\n\n - drm/i915: Disable LP3 watermarks on all SNB machines\n (bsc#1051510).\n\n - drm/i915: Downgrade Gen9 Plane WM latency error\n (bsc#1051510).\n\n - drm/i915/fbc: disable framebuffer compression on\n GeminiLake (bsc#1051510).\n\n - drm/i915/gvt: add 0x4dfc to gen9 save-restore list\n (bsc#1113722)\n\n - drm/i915/gvt: do not let TRTTE and 0x4dfc write\n passthrough to hardware (bsc#1051510).\n\n - drm/i915/gvt: Fix cmd length of VEB_DI_IECP\n (bsc#1113722)\n\n - drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n\n - drm/i915/gvt: Tiled Resources mmios are in-context mmios\n for gen9+ (bsc#1113722)\n\n - drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n\n - drm/i915/sdvo: Implement proper HDMI audio support for\n SDVO (bsc#1051510).\n\n - drm/imx: do not skip DP channel disable for background\n plane (bsc#1051510).\n\n - drm/nouveau/disp/dp: respect sink limits when selecting\n failsafe link configuration (bsc#1051510).\n\n - drm/nouveau/i2c: Disable i2c bus access after ->fini()\n (bsc#1113722)\n\n - drm/radeon: prefer lower reference dividers\n (bsc#1051510).\n\n - drm/rockchip: fix for mailbox read validation\n (bsc#1051510).\n\n - drm/vmwgfx: Do not send drm sysfs hotplug events on\n initial master set (bsc#1051510).\n\n - drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader()\n leading to an invalid read (bsc#1051510).\n\n - drm/vmwgfx: NULL pointer dereference from\n vmw_cmd_dx_view_define() (bsc#1113722)\n\n - drm: Wake up next in drm_read() chain if we are forced\n to putback the event (bsc#1051510).\n\n - dt-bindings: clock: r8a7795: Remove CSIREF clock\n (bsc#1120902).\n\n - dt-bindings: clock: r8a7796: Remove CSIREF clock\n (bsc#1120902).\n\n - dt-bindings: net: Add binding for the external clock for\n TI WiLink (bsc#1085535).\n\n - dt-bindings: rtc: sun6i-rtc: Fix register range in\n example (bsc#1120902).\n\n - EDAC, amd64: Add Hygon Dhyana support ().\n\n - efi: add API to reserve memory persistently across kexec\n reboot (bsc#1117158).\n\n - efi/arm: Defer persistent reservations until after\n paging_init() (bsc#1117158).\n\n - efi/arm: Do not mark ACPI reclaim memory as\n MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n\n - efi/arm: libstub: add a root memreserve config table\n (bsc#1117158).\n\n - efi/arm: map UEFI memory map even w/o runtime services\n enabled (bsc#1117158).\n\n - efi/arm: preserve early mapping of UEFI memory map\n longer for BGRT (bsc#1117158).\n\n - efi/arm: Revert 'Defer persistent reservations until\n after paging_init()' (bsc#1117158).\n\n - efi/arm: Revert deferred unmap of early memmap mapping\n (bsc#1117158).\n\n - efi: honour memory reservations passed via a linux\n specific config table (bsc#1117158).\n\n - efi: Permit calling efi_mem_reserve_persistent() from\n atomic context (bsc#1117158).\n\n - efi: Permit multiple entries in persistent memreserve\n data structure (bsc#1117158).\n\n - efi: Prevent GICv3 WARN() by mapping the memreserve\n table before first use (bsc#1117158).\n\n - efi: Reduce the amount of memblock reservations for\n persistent allocations (bsc#1117158).\n\n - ext4: actually request zeroing of inode table after grow\n (bsc#1135315).\n\n - ext4: avoid panic during forced reboot due to aborted\n journal (bsc#1126356).\n\n - ext4: fix data corruption caused by overlapping\n unaligned and aligned IO (bsc#1136428).\n\n - ext4: fix ext4_show_options for file systems w/o journal\n (bsc#1135316).\n\n - ext4: fix use-after-free race with\n debug_want_extra_isize (bsc#1135314).\n\n - ext4: make sanity check in mballoc more strict\n (bsc#1136439).\n\n - ext4: wait for outstanding dio during truncate in\n nojournal mode (bsc#1136438).\n\n - extcon: arizona: Disable mic detect if running when\n driver is removed (bsc#1051510).\n\n - fbdev: fix divide error in fb_var_to_videomode\n (bsc#1113722)\n\n - fbdev: fix WARNING in __alloc_pages_nodemask bug\n (bsc#1113722)\n\n - firmware: efi: factor out mem_reserve (bsc#1117158\n bsc#1134671).\n\n - fix rtnh_ok() (git-fixes).\n\n - fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL\n writeback (bsc#1136432).\n\n - fs/writeback.c: use rcu_barrier() to wait for inflight\n wb switches going into workqueue when umount\n (bsc#1136435).\n\n - ftrace/x86_64: Emulate call function while updating in\n breakpoint handler (bsc#1099658).\n\n - fuse: fallocate: fix return with locked inode\n (bsc#1051510).\n\n - fuse: fix writepages on 32bit (bsc#1051510).\n\n - fuse: honor RLIMIT_FSIZE in fuse_file_fallocate\n (bsc#1051510).\n\n - genetlink: Fix a memory leak on error path\n (networking-stable-19_03_28).\n\n - gpio: fix gpio-adp5588 build errors (bsc#1051510).\n\n - gpio: Remove obsolete comment about gpiochip_free_hogs()\n usage (bsc#1051510).\n\n - gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).\n\n - HID: input: add mapping for Expose/Overview key\n (bsc#1051510).\n\n - HID: input: add mapping for keyboard Brightness\n Up/Down/Toggle keys (bsc#1051510).\n\n - HID: input: add mapping for 'Toggle Display' key\n (bsc#1051510).\n\n - HID: input: fix a4tech horizontal wheel custom usage\n (bsc#1137429).\n\n - HID: logitech-hidpp: change low battery level threshold\n from 31 to 30 percent (bsc#1051510).\n\n - HID: logitech-hidpp: use RAP instead of FAP to get the\n protocol version (bsc#1051510).\n\n - HID: wacom: Add ability to provide explicit battery\n status info (bsc#1051510).\n\n - HID: wacom: Add support for 3rd generation Intuos BT\n (bsc#1051510).\n\n - HID: wacom: Add support for Pro Pen slim (bsc#1051510).\n\n - HID: wacom: convert Wacom custom usages to standard HID\n usages (bsc#1051510).\n\n - HID: wacom: Correct button numbering 2nd-gen Intuos Pro\n over Bluetooth (bsc#1051510).\n\n - HID: wacom: Do not report anything prior to the tool\n entering range (bsc#1051510).\n\n - HID: wacom: Do not set tool type until we're in range\n (bsc#1051510).\n\n - HID: wacom: fix mistake in printk (bsc#1051510).\n\n - HID: wacom: generic: add the 'Report Valid' usage\n (bsc#1051510).\n\n - HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0\n (bsc#1051510).\n\n - HID: wacom: generic: Leave tool in prox until it\n completely leaves sense (bsc#1051510).\n\n - HID: wacom: generic: Refactor generic battery handling\n (bsc#1051510).\n\n - HID: wacom: generic: Report AES battery information\n (bsc#1051510).\n\n - HID: wacom: generic: Reset events back to zero when pen\n leaves (bsc#1051510).\n\n - HID: wacom: generic: Scale battery capacity measurements\n to percentages (bsc#1051510).\n\n - HID: wacom: generic: Send BTN_STYLUS3 when both barrel\n switches are set (bsc#1051510).\n\n - HID: wacom: generic: Send BTN_TOOL_PEN in prox once the\n pen enters range (bsc#1051510).\n\n - HID: wacom: generic: Support multiple tools per report\n (bsc#1051510).\n\n - HID: wacom: generic: Use generic codepath terminology in\n wacom_wac_pen_report (bsc#1051510).\n\n - HID: wacom: Mark expected switch fall-through\n (bsc#1051510).\n\n - HID: wacom: Move handling of HID quirks into a dedicated\n function (bsc#1051510).\n\n - HID: wacom: Move HID fix for AES serial number into\n wacom_hid_usage_quirk (bsc#1051510).\n\n - HID: wacom: Properly handle AES serial number and tool\n type (bsc#1051510).\n\n - HID: wacom: Queue events with missing type/serial data\n for later processing (bsc#1051510).\n\n - HID: wacom: Remove comparison of u8 mode with zero and\n simplify (bsc#1051510).\n\n - HID: wacom: Replace touch_max fixup code with static\n touch_max definitions (bsc#1051510).\n\n - HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT\n eraser contact (bsc#1051510).\n\n - HID: wacom: Support 'in range' for Intuos/Bamboo tablets\n where possible (bsc#1051510).\n\n - HID: Wacom: switch Dell canvas into highres mode\n (bsc#1051510).\n\n - HID: wacom: Sync INTUOSP2_BT touch state after each\n frame if necessary (bsc#1051510).\n\n - HID: wacom: wacom_wac_collection() is local to\n wacom_wac.c (bsc#1051510).\n\n - HID: wacom: Work around HID descriptor bug in DTK-2451\n and DTH-2452 (bsc#1051510).\n\n - hwmon: (core) add thermal sensors only if dev->of_node\n is present (bsc#1051510).\n\n - hwmon: (pmbus/core) Treat parameters as paged if on\n multiple pages (bsc#1051510).\n\n - hwrng: omap - Set default quality (bsc#1051510).\n\n - i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr\n (bsc#1051510).\n\n - i2c: i801: Add support for Intel Comet Lake\n (jsc#SLE-5331).\n\n - ibmvnic: Add device identification to requested IRQs\n (bsc#1137739).\n\n - ibmvnic: Do not close unopened driver during reset\n (bsc#1137752).\n\n - ibmvnic: Fix unchecked return codes of memory\n allocations (bsc#1137752).\n\n - ibmvnic: Refresh device multicast list after reset\n (bsc#1137752).\n\n - ibmvnic: remove set but not used variable 'netdev'\n (bsc#1137739).\n\n - igmp: fix incorrect unsolicit report count when join\n group (git-fixes).\n\n - iio: adc: xilinx: fix potential use-after-free on remove\n (bsc#1051510).\n\n - iio: ad_sigma_delta: Properly handle SPI bus locking vs\n CS assertion (bsc#1051510).\n\n - iio: common: ssp_sensors: Initialize calculated_time in\n ssp_common_process_data (bsc#1051510).\n\n - iio: hmc5843: fix potential NULL pointer dereferences\n (bsc#1051510).\n\n - indirect call wrappers: helpers to speed-up indirect\n calls of builtin (bsc#1124503).\n\n - inetpeer: fix uninit-value in inet_getpeer (git-fixes).\n\n - Input: elan_i2c - add hardware ID for multiple Lenovo\n laptops (bsc#1051510).\n\n - Input: synaptics-rmi4 - fix possible double free\n (bsc#1051510).\n\n - iommu/arm-smmu-v3: Abort all transactions if SMMU is\n enabled in kdump kernel (bsc#1117158).\n\n - iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel\n (bsc#1117158 bsc#1134671).\n\n - ip6_tunnel: collect_md xmit: Use ip_tunnel_key's\n provided src address (git-fixes).\n\n - ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type\n (networking-stable-19_04_10).\n\n - ipconfig: Correctly initialise ic_nameservers\n (bsc#1051510).\n\n - ip_gre: fix parsing gre header in ipgre_err (git-fixes).\n\n - ip_tunnel: Fix name string concatenate in\n __ip_tunnel_create() (git-fixes).\n\n - ipv4: add sanity checks in ipv4_link_failure()\n (git-fixes).\n\n - ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET\n is disabled (git-fixes).\n\n - ipv4: ensure rcu_read_lock() in ipv4_link_failure()\n (networking-stable-19_04_19).\n\n - ipv4: ip_do_fragment: Preserve skb_iif during\n fragmentation (networking-stable-19_05_04).\n\n - ipv4: recompile ip options in ipv4_link_failure\n (networking-stable-19_04_19).\n\n - ipv4: set the tcp_min_rtt_wlen range from 0 to one day\n (networking-stable-19_04_30).\n\n - ipv6: fix cleanup ordering for ip6_mr failure\n (git-fixes).\n\n - ipv6: fix cleanup ordering for pingv6 registration\n (git-fixes).\n\n - ipv6/flowlabel: wait rcu grace period before put_pid()\n (git-fixes).\n\n - ipv6: invert flowlabel sharing check in process and user\n mode (git-fixes).\n\n - ipv6: mcast: fix unsolicited report interval after\n receiving querys (git-fixes).\n\n - ipvlan: Add the skb->mark as flow4's member to lookup\n route (bsc#1051510).\n\n - ipvlan: fix ipv6 outbound device (bsc#1051510).\n\n - ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).\n\n - ipvs: call ip_vs_dst_notifier earlier than ipv6_dev_notf\n (git-fixes).\n\n - ipvs: fix buffer overflow with sync daemon and service\n (git-fixes).\n\n - ipvs: fix check on xmit to non-local addresses\n (git-fixes).\n\n - ipvs: fix race between ip_vs_conn_new() and\n ip_vs_del_dest() (bsc#1051510).\n\n - ipvs: fix rtnl_lock lockups caused by start_sync_thread\n (git-fixes).\n\n - ipvs: Fix signed integer overflow when setsockopt\n timeout (bsc#1051510).\n\n - ipvs: fix stats update from local clients (git-fixes).\n\n - iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).\n\n - iwlwifi: mvm: check for length correctness in\n iwl_mvm_create_skb() (bsc#1051510).\n\n - iwlwifi: pcie: do not crash on invalid RX interrupt\n (bsc#1051510).\n\n - jbd2: check superblock mapped prior to committing\n (bsc#1136430).\n\n - kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter\n (bsc#1137586).\n\n - kabi: implement map_lookup_elem_sys_only in another way\n (bsc#1083647).\n\n - kabi: move sysctl_tcp_min_snd_mss to preserve struct net\n layout (bsc#1137586).\n\n - kABI workaround for the new pci_dev.skip_bus_pm field\n addition (bsc#1051510).\n\n - kernel/signal.c: trace_signal_deliver when\n signal_group_exit (git-fixes).\n\n - kernel/sys.c: prctl: fix false positive in\n validate_prctl_map() (git-fixes).\n\n - keys: safe concurrent user->(session,uid)_keyring access\n (bsc#1135642).\n\n - kmsg: Update message catalog to latest IBM level\n (2019/03/08) (bsc#1128904 LTC#176078).\n\n - KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE\n realmode handlers (bsc#1061840).\n\n - KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of\n passthrough interrupts (bsc#1061840).\n\n - KVM: PPC: Book3S: Protect memslots while validating user\n address (bsc#1061840).\n\n - KVM: PPC: Release all hardware TCE tables attached to a\n group (bsc#1061840).\n\n - KVM: PPC: Remove redundand permission bits removal\n (bsc#1061840).\n\n - KVM: PPC: Validate all tces before updating tables\n (bsc#1061840).\n\n - KVM: PPC: Validate TCEs against preregistered memory\n page sizes (bsc#1061840).\n\n - KVM: s390: fix memory overwrites when not using SCA\n entries (bsc#1136206).\n\n - KVM: s390: provide io interrupt kvm_stat (bsc#1136206).\n\n - KVM: s390: use created_vcpus in more places\n (bsc#1136206).\n\n - KVM: s390: vsie: fix < 8k check for the itdba\n (bsc#1136206).\n\n - l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).\n\n - l2tp: filter out non-PPP sessions in\n pppol2tp_tunnel_ioctl() (git-fixes).\n\n - l2tp: fix missing refcount drop in\n pppol2tp_tunnel_ioctl() (git-fixes).\n\n - l2tp: only accept PPP sessions in pppol2tp_connect()\n (git-fixes).\n\n - l2tp: prevent pppol2tp_connect() from creating kernel\n sockets (git-fixes).\n\n - l2tp: revert 'l2tp: fix missing print session offset\n info' (bsc#1051510).\n\n - leds: avoid flush_work in atomic context (bsc#1051510).\n\n - leds: pwm: silently error out on EPROBE_DEFER\n (bsc#1051510).\n\n - livepatch: Convert error about unsupported reliable\n stacktrace into a warning (bsc#1071995).\n\n - livepatch: Remove custom kobject state handling\n (bsc#1071995).\n\n - livepatch: Remove duplicated code for early\n initialization (bsc#1071995).\n\n - mac80211/cfg80211: update bss channel on channel switch\n (bsc#1051510).\n\n - mac80211: Fix kernel panic due to use of txq after free\n (bsc#1051510).\n\n - mac80211: fix memory accounting with A-MSDU aggregation\n (bsc#1051510).\n\n - mac80211: fix unaligned access in mesh table hash\n function (bsc#1051510).\n\n - mac8390: Fix mmio access size probe (bsc#1051510).\n\n - MD: fix invalid stored role for a disk (bsc#1051510).\n\n - media: atmel: atmel-isc: fix INIT_WORK misplacement\n (bsc#1051510).\n\n - media: au0828: Fix NULL pointer dereference in\n au0828_analog_stream_enable() (bsc#1051510).\n\n - media: au0828: stop video streaming only when last user\n stops (bsc#1051510).\n\n - media: coda: clear error return value before picture run\n (bsc#1051510).\n\n - media: cpia2: Fix use-after-free in cpia2_exit\n (bsc#1051510).\n\n - media: davinci/vpbe: array underflow in\n vpbe_enum_outputs() (bsc#1051510).\n\n - media: go7007: avoid clang frame overflow warning with\n KASAN (bsc#1051510).\n\n - media: m88ds3103: serialize reset messages in\n m88ds3103_set_frontend (bsc#1051510).\n\n - media: omap_vout: potential buffer overflow in\n vidioc_dqbuf() (bsc#1051510).\n\n - media: ov2659: make S_FMT succeed even if requested\n format does not match (bsc#1051510).\n\n - media: saa7146: avoid high stack usage with clang\n (bsc#1051510).\n\n - media: smsusb: better handle optional alignment\n (bsc#1051510).\n\n - media: usb: siano: Fix false-positive 'uninitialized\n variable' warning (bsc#1051510).\n\n - media: usb: siano: Fix general protection fault in\n smsusb (bsc#1051510).\n\n - memcg: make it work on sparse non-0-node systems\n (bnc#1133616).\n\n - memcg: make it work on sparse non-0-node systems kabi\n (bnc#1133616).\n\n - mfd: da9063: Fix OTP control register names to match\n datasheets for DA9063/63L (bsc#1051510).\n\n - mfd: intel-lpss: Set the device in reset state when init\n (bsc#1051510).\n\n - mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values\n (bsc#1051510).\n\n - mfd: tps65912-spi: Add missing of table registration\n (bsc#1051510).\n\n - mfd: twl6040: Fix device init errors for ACCCTL register\n (bsc#1051510).\n\n - mISDN: Check address length before reading address\n family (bsc#1051510).\n\n - mlxsw: spectrum: Fix autoneg status in ethtool\n (networking-stable-19_04_30).\n\n - mmc: block: Delete gendisk before cleaning up the\n request queue (bsc#1127616).\n\n - mmc: core: make pwrseq_emmc (partially) support sleepy\n GPIO controllers (bsc#1051510).\n\n - mmc: core: Verify SD bus width (bsc#1051510).\n\n - mmc: mmci: Prevent polling for busy detection in IRQ\n context (bsc#1051510).\n\n - mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50\n data hold time problem (bsc#1051510).\n\n - mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold\n time problem (bsc#1051510).\n\n - mmc: sdhci-of-esdhc: add erratum A-009204 support\n (bsc#1051510).\n\n - mmc: sdhci-of-esdhc: add erratum eSDHC5 support\n (bsc#1051510).\n\n - mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358\n support (bsc#1051510).\n\n - mmc_spi: add a status check for spi_sync_locked\n (bsc#1051510).\n\n - mm-Fix-modifying-of-page-protection-by-insert_pfn.patch:\n Fix buggy backport leading to MAP_SYNC failures\n (bsc#1137372)\n\n - mm/huge_memory: fix vmf_insert_pfn_(pmd, pud)() crash,\n handle unaligned addresses (bsc#1135330).\n\n - mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings\n (bnc#1012382).\n\n - mount: copy the port field into the cloned nfs_server\n structure (bsc#1136990).\n\n - mwifiex: Fix heap overflow in\n mwifiex_uap_parse_tail_ies() (bsc#1136935).\n\n - mwifiex: Fix possible buffer overflows at parsing bss\n descriptor\n\n - neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit\n (git-fixes).\n\n - net: aquantia: fix rx checksum offload for UDP/TCP over\n IPv6 (networking-stable-19_03_28).\n\n - net: atm: Fix potential Spectre v1 vulnerabilities\n (networking-stable-19_04_19).\n\n - net: do not keep lonely packets forever in the gro hash\n (git-fixes).\n\n - net: dsa: bcm_sf2: fix buffer overflow doing set_rxnfc\n (networking-stable-19_05_04).\n\n - net: dsa: mv88e6xxx: fix handling of upper half of\n STATS_TYPE_PORT (git-fixes).\n\n - net: ena: fix return value of ena_com_config_llq_info()\n (bsc#1111696 bsc#1117561).\n\n - net: ethtool: not call vzalloc for zero sized memory\n request (networking-stable-19_04_10).\n\n - netfilter: bridge: Do not sabotage nf_hook calls from an\n l3mdev (git-fixes).\n\n - netfilter: ebtables: CONFIG_COMPAT: reject trailing data\n after last rule (git-fixes).\n\n - netfilter: ebtables: handle string from userspace with\n care (git-fixes).\n\n - netfilter: ebtables: reject non-bridge targets\n (git-fixes).\n\n - netfilter: ipset: do not call ipset_nest_end after\n nla_nest_cancel (git-fixes).\n\n - netfilter: nf_log: do not hold nf_log_mutex during user\n access (git-fixes).\n\n - netfilter: nf_log: fix uninit read in\n nf_log_proc_dostring (git-fixes).\n\n - netfilter: nf_tables: can't fail after linking rule into\n active rule list (git-fixes).\n\n - netfilter: nf_tables: check msg_type before\n nft_trans_set(trans) (git-fixes).\n\n - netfilter: nf_tables: fix leaking object reference count\n (git-fixes).\n\n - netfilter: nf_tables: fix NULL pointer dereference on\n nft_ct_helper_obj_dump() (git-fixes).\n\n - netfilter: nf_tables: release chain in flushing set\n (git-fixes).\n\n - netfilter: nft_compat: do not dump private area\n (git-fixes).\n\n - netfilter: x_tables: initialise match/target check\n parameter struct (git-fixes).\n\n - net: Fix a bug in removing queues from XPS map\n (git-fixes).\n\n - net: fix uninit-value in __hw_addr_add_ex() (git-fixes).\n\n - net: fou: do not use guehdr after iptunnel_pull_offloads\n in gue_udp_recv (networking-stable-19_04_19).\n\n - net-gro: Fix GRO flush when receiving a GSO packet\n (networking-stable-19_04_10).\n\n - net: hns3: remove resetting check in\n hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).\n\n - net/ibmvnic: Remove tests of member address\n (bsc#1137739).\n\n - net: initialize skb->peeked when cloning (git-fixes).\n\n - net/ipv4: defensive cipso option parsing (git-fixes).\n\n - net/ipv6: do not reinitialize ndev->cnf.addr_gen_mode on\n new inet6_dev (git-fixes).\n\n - net/ipv6: fix addrconf_sysctl_addr_gen_mode (git-fixes).\n\n - net/ipv6: propagate net.ipv6.conf.all.addr_gen_mode to\n devices (git-fixes).\n\n - net/ipv6: reserve room for IFLA_INET6_ADDR_GEN_MODE\n (git-fixes).\n\n - netlink: fix uninit-value in netlink_sendmsg\n (git-fixes).\n\n - net: make skb_partial_csum_set() more robust against\n overflows (git-fixes).\n\n - net/mlx5: Decrease default mr cache size\n (networking-stable-19_04_10).\n\n - net/mlx5e: Add a lock on tir list\n (networking-stable-19_04_10).\n\n - net/mlx5e: ethtool, Remove unsupported SFP EEPROM high\n pages query (networking-stable-19_04_30).\n\n - net/mlx5e: Fix error handling when refreshing TIRs\n (networking-stable-19_04_10).\n\n - net/mlx5e: Fix trailing semicolon (bsc#1075020).\n\n - net/mlx5e: IPoIB, Reset QP after channels are closed\n (bsc#1075020).\n\n - net: phy: marvell: Fix buffer overrun with stats\n counters (networking-stable-19_05_04).\n\n - net: rds: exchange of 8K and 1M pool\n (networking-stable-19_04_30).\n\n - net: rose: fix a possible stack overflow\n (networking-stable-19_03_28).\n\n - net/rose: fix unbound loop in rose_loopback_timer()\n (networking-stable-19_04_30).\n\n - net/sched: act_sample: fix divide by zero in the traffic\n path (networking-stable-19_04_10).\n\n - net/sched: do not dereference a->goto_chain to read the\n chain index (bsc#1064802 bsc#1066129).\n\n - net/sched: fix ->get helper of the matchall cls\n (networking-stable-19_04_10).\n\n - net: socket: fix potential spectre v1 gadget in\n socketcall (git-fixes).\n\n - net: stmmac: fix memory corruption with large MTUs\n (networking-stable-19_03_28).\n\n - net: stmmac: move stmmac_check_ether_addr() to driver\n probe (networking-stable-19_04_30).\n\n - net: test tailroom before appending to linear skb\n (git-fixes).\n\n - net: thunderx: do not allow jumbo frames with XDP\n (networking-stable-19_04_19).\n\n - net: thunderx: raise XDP MTU to 1508\n (networking-stable-19_04_19).\n\n - net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n\n - net: use indirect call wrappers at GRO network layer\n (bsc#1124503).\n\n - net: use indirect call wrappers at GRO transport layer\n (bsc#1124503).\n\n - NFS add module option to limit NFSv4 minor version\n (jsc#PM-231).\n\n - nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL\n commands (bsc#1051510).\n\n - nvme: Do not remove namespaces during reset\n (bsc#1131673).\n\n - nvme: flush scan_work when resetting controller\n (bsc#1131673).\n\n - nvmem: allow to select i.MX nvmem driver for i.MX 7D\n (bsc#1051510).\n\n - nvmem: core: fix read buffer in place (bsc#1051510).\n\n - nvmem: correct Broadcom OTP controller driver writes\n (bsc#1051510).\n\n - nvmem: Do not let a NULL cell_id for nvmem_cell_get()\n crash us (bsc#1051510).\n\n - nvmem: imx-ocotp: Add i.MX7D timing write clock setup\n support (bsc#1051510).\n\n - nvmem: imx-ocotp: Add support for banked OTP addressing\n (bsc#1051510).\n\n - nvmem: imx-ocotp: Enable i.MX7D OTP write support\n (bsc#1051510).\n\n - nvmem: imx-ocotp: Move i.MX6 write clock setup to\n dedicated function (bsc#1051510).\n\n - nvmem: imx-ocotp: Pass parameters via a struct\n (bsc#1051510).\n\n - nvmem: imx-ocotp: Restrict OTP write to IMX6 processors\n (bsc#1051510).\n\n - nvmem: imx-ocotp: Update module description\n (bsc#1051510).\n\n - nvmem: properly handle returned value nvmem_reg_read\n (bsc#1051510).\n\n - nvme-rdma: fix possible free of a non-allocated async\n event buffer (bsc#1120423).\n\n - nvme: skip nvme_update_disk_info() if the controller is\n not live (bsc#1128432).\n\n - objtool: Fix function fallthrough detection\n (bsc#1058115).\n\n - ocfs2: fix ocfs2 read inode data panic in ocfs2_iget\n (bsc#1136434).\n\n - of: fix clang -Wunsequenced for be32_to_cpu()\n (bsc#1135642).\n\n - p54: drop device reference count if fails to enable\n device (bsc#1135642).\n\n - packet: fix reserve calculation (git-fixes).\n\n - packet: in packet_snd start writing at link layer\n allocation (git-fixes).\n\n - packet: refine ring v3 block size test to hold one frame\n (git-fixes).\n\n - packet: reset network header if packet shorter than ll\n reserved space (git-fixes).\n\n - packets: Always register packet sk in the same order\n (networking-stable-19_03_28).\n\n - parport: Fix mem leak in parport_register_dev_model\n (bsc#1051510).\n\n - PCI: endpoint: Use EPC's device in\n dma_alloc_coherent()/dma_free_coherent() (git-fixes).\n\n - PCI: Factor out pcie_retrain_link() function\n (git-fixes).\n\n - PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken\n (bsc#1051510).\n\n - PCI: Mark Atheros AR9462 to avoid bus reset\n (bsc#1051510).\n\n - PCI: PM: Avoid possible suspend-to-idle issue\n (bsc#1051510).\n\n - PCI: Work around Pericom PCIe-to-PCI bridge Retrain Link\n erratum (git-fixes).\n\n - perf tools: Add Hygon Dhyana support ().\n\n - platform/chrome: cros_ec_proto: check for NULL transfer\n function (bsc#1051510).\n\n - platform/x86: mlx-platform: Fix parent device in\n i2c-mux-reg device registration (bsc#1051510).\n\n - platform/x86: pmc_atom: Add Lex 3I380D industrial PC to\n critclk_systems DMI table (bsc#1051510).\n\n - platform/x86: pmc_atom: Add several Beckhoff Automation\n boards to critclk_systems DMI table (bsc#1051510).\n\n - PM / core: Propagate dev->power.wakeup_path when no\n callbacks (bsc#1051510).\n\n - powerpc: Always initialize input array when calling\n epapr_hypercall() (bsc#1065729).\n\n - powerpc/cacheinfo: add cacheinfo_teardown,\n cacheinfo_rebuild (bsc#1138374, LTC#178199).\n\n - powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n\n - powerpc: Fix HMIs on big-endian with\n CONFIG_RELOCATABLE=y (bsc#1065729).\n\n - powerpc/msi: Fix NULL pointer access in teardown code\n (bsc#1065729).\n\n - powerpc/perf: Fix MMCRA corruption by bhrb_filter\n (bsc#1053043).\n\n - powerpc/powernv/idle: Restore IAMR after idle\n (bsc#1065729).\n\n - powerpc/process: Fix sparse address space warnings\n (bsc#1065729).\n\n - powerpc/pseries: Fix oops in hotplug memory notifier\n (bsc#1138375, LTC#178204).\n\n - powerpc/pseries/mobility: prevent cpu hotplug during DT\n update (bsc#1138374, LTC#178199).\n\n - powerpc/pseries/mobility: rebuild cacheinfo hierarchy\n post-migration (bsc#1138374, LTC#178199).\n\n - power: supply: axp20x_usb_power: Fix typo in VBUS\n current limit macros (bsc#1051510).\n\n - power: supply: axp288_charger: Fix unchecked return\n value (bsc#1051510).\n\n - power: supply: max14656: fix potential use-before-alloc\n (bsc#1051510).\n\n - power: supply: sysfs: prevent endless uevent loop with\n CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n\n - ptrace: take into account saved_sigmask in\n PTRACE(GET,SET)SIGMASK (git-fixes).\n\n - qlcnic: Avoid potential NULL pointer dereference\n (bsc#1051510).\n\n - qmi_wwan: Add quirk for Quectel dynamic config\n (bsc#1051510).\n\n - RDMA/hns: Fix bug that caused srq creation to fail\n (bsc#1104427 ).\n\n - RDMA/rxe: Consider skb reserve space based on netdev of\n GID (bsc#1082387, bsc#1103992).\n\n - Revert 'ALSA: hda/realtek - Improve the headset mic for\n Acer Aspire laptops' (bsc#1051510).\n\n - Revert 'HID: wacom: generic: Send BTN_TOOL_PEN in prox\n once the pen enters range' (bsc#1051510).\n\n - rtc: 88pm860x: prevent use-after-free on device remove\n (bsc#1051510).\n\n - rtc: da9063: set uie_unsupported when relevant\n (bsc#1051510).\n\n - rtc: do not reference bogus function pointer in kdoc\n (bsc#1051510).\n\n - rtc: sh: Fix invalid alarm warning for non-enabled alarm\n (bsc#1051510).\n\n - rtlwifi: fix a potential NULL pointer dereference\n (bsc#1051510).\n\n - rxrpc: Fix error reception on AF_INET6 sockets\n (git-fixes).\n\n - rxrpc: Fix transport sockopts to get IPv4 errors on an\n IPv6 socket (git-fixes).\n\n - s390/qdio: clear intparm during shutdown (bsc#1134597\n LTC#177516).\n\n - scsi: qedf: fixup bit operations (bsc#1135542).\n\n - scsi: qedf: fixup locking in qedf_restart_rport()\n (bsc#1135542).\n\n - scsi: qedf: missing kref_put in qedf_xmit()\n (bsc#1135542).\n\n - scsi: qla2xxx: Declare local functions 'static'\n (bsc#1137444).\n\n - scsi: qla2xxx: fix error message on <qla2400\n (bsc#1118139).\n\n - scsi: qla2xxx: Fix function argument descriptions\n (bsc#1118139).\n\n - scsi: qla2xxx: Fix memory corruption during hba reset\n test (bsc#1118139).\n\n - scsi: qla2xxx: fix spelling mistake: 'existant' ->\n 'existent' (bsc#1118139).\n\n - scsi: qla2xxx: fully convert to the generic DMA API\n (bsc#1137444).\n\n - scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n\n - scsi: qla2xxx: Improve several kernel-doc headers\n (bsc#1137444).\n\n - scsi: qla2xxx: Introduce a switch/case statement in\n qlt_xmit_tm_rsp() (bsc#1137444).\n\n - scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier\n to analyze (bsc#1137444).\n\n - scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry()\n initializes 'res' (bsc#1137444).\n\n - scsi: qla2xxx: NULL check before some freeing functions\n is not needed (bsc#1137444).\n\n - scsi: qla2xxx: Remove a set-but-not-used variable\n (bsc#1137444).\n\n - scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq\n (bsc#1118139).\n\n - scsi: qla2xxx: Remove two arguments from\n qlafx00_error_entry() (bsc#1137444).\n\n - scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n\n - scsi: qla2xxx: Split the __qla2x00_abort_all_cmds()\n function (bsc#1137444).\n\n - scsi: qla2xxx: use lower_32_bits and upper_32_bits\n instead of reinventing them (bsc#1137444).\n\n - scsi: qla2xxx: Use %p for printing pointers\n (bsc#1118139).\n\n - sctp: avoid running the sctp state machine recursively\n (networking-stable-19_05_04).\n\n - sctp: fix identification of new acks for SFR-CACC\n (git-fixes).\n\n - sctp: get sctphdr by offset in sctp_compute_cksum\n (networking-stable-19_03_28).\n\n - sctp: initialize _pad of sockaddr_in before copying to\n user memory (networking-stable-19_04_10).\n\n - serial: sh-sci: disable DMA for uart_console\n (bsc#1051510).\n\n - signal: Always notice exiting tasks (git-fixes).\n\n - signal: Better detection of synchronous signals\n (git-fixes).\n\n - signal: Restore the stop PTRACE_EVENT_EXIT (git-fixes).\n\n - soc/fsl/qe: Fix an error code in qe_pin_request()\n (bsc#1051510).\n\n - spi: bitbang: Fix NULL pointer dereference in\n spi_unregister_master (bsc#1051510).\n\n - spi: Fix zero length xfer bug (bsc#1051510).\n\n - spi: Micrel eth switch: declare missing of table\n (bsc#1051510).\n\n - spi: pxa2xx: Add support for Intel Comet Lake\n (jsc#SLE-5331).\n\n - spi: pxa2xx: fix SCR (divisor) calculation\n (bsc#1051510).\n\n - spi: spi-fsl-spi: call spi_finalize_current_message() at\n the end (bsc#1051510).\n\n - spi : spi-topcliff-pch: Fix to handle empty DMA buffers\n (bsc#1051510).\n\n - spi: ST ST95HF NFC: declare missing of table\n (bsc#1051510).\n\n - spi: tegra114: reset controller on probe (bsc#1051510).\n\n - staging: vc04_services: Fix a couple error codes\n (bsc#1051510).\n\n - staging: vc04_services: prevent integer overflow in\n create_pagelist() (bsc#1051510).\n\n - staging: wlan-ng: fix adapter initialization failure\n (bsc#1051510).\n\n - stmmac: pci: Adjust IOT2000 matching\n (networking-stable-19_04_30).\n\n - switchtec: Fix unintended mask of MRPC event\n (git-fixes).\n\n - tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n\n - tcp: do not use ipv6 header for ipv4 flow\n (networking-stable-19_03_28).\n\n - tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()\n (bsc#1137586).\n\n - tcp: Ensure DCTCP reacts to losses\n (networking-stable-19_04_10).\n\n - tcp: limit payload size of sacked skbs (bsc#1137586).\n\n - tcp: purge write queue in tcp_connect_init()\n (git-fixes).\n\n - tcp: tcp_fragment() should apply sane memory limits\n (bsc#1137586).\n\n - tcp: tcp_grow_window() needs to respect tcp_space()\n (networking-stable-19_04_19).\n\n - team: fix possible recursive locking when add slaves\n (networking-stable-19_04_30).\n\n - team: set slave to promisc if team is already in promisc\n mode (bsc#1051510).\n\n - test_firmware: Use correct snprintf() limit\n (bsc#1135642).\n\n - thermal: cpu_cooling: Actually trace CPU load in\n thermal_power_cpu_get_power (bsc#1051510).\n\n - thunderbolt: Fix to check for kmemdup failure\n (bsc#1051510).\n\n - thunderx: eliminate extra calls to put_page() for pages\n held for recycling (networking-stable-19_03_28).\n\n - thunderx: enable page recycling for non-XDP case\n (networking-stable-19_03_28).\n\n - tipc: fix hanging clients using poll with EPOLLOUT flag\n (git-fixes).\n\n - tipc: missing entries in name table of publications\n (networking-stable-19_04_19).\n\n - tools/cpupower: Add Hygon Dhyana support ().\n\n - tools lib traceevent: Fix missing equality check for\n strcmp (bsc#1129770).\n\n - tracing: Fix partial reading of trace event's id file\n (bsc#1136573).\n\n - treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n\n - tty: ipwireless: fix missing checks for ioremap\n (bsc#1051510).\n\n - TTY: serial_core, add ->install (bnc#1129693).\n\n - tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n\n - tty/vt: fix write/write race in ioctl(KDSKBSENT) handler\n (bsc#1051510).\n\n - tun: add a missing rcu_read_unlock() in error path\n (networking-stable-19_03_28).\n\n - tun: properly test for IFF_UP\n (networking-stable-19_03_28).\n\n - udp: use indirect call wrappers for GRO socket lookup\n (bsc#1124503).\n\n - ufs: fix braino in ufs_get_inode_gid() for solaris UFS\n flavour (bsc#1135323).\n\n - Update config files: CONFIG_NVMEM_IMX_OCOTP=m for\n armvh7hl/lpae\n\n - Update config files. Debug kernel is not supported\n (bsc#1135492).\n\n - Update config files: disable CONFIG_IDE on ppc64le\n\n - Update config files for NFSv4.2 Enable NFSv4.2 support -\n jsc@PM-231 This requires a module parameter for NFSv4.2\n to actually be available on SLE12 and SLE15-SP0\n\n - Update cx2072x patches to follow the upstream\n development (bsc#1068546)\n\n - Update patch reference for ipmi_ssif fix (bsc#1135120)\n\n - usb: Add LPM quirk for Surface Dock GigE adapter\n (bsc#1051510).\n\n - usb: core: Add PM runtime calls to\n usb_hcd_platform_shutdown (bsc#1051510).\n\n - usb: core: Do not unbind interfaces following device\n reset failure (bsc#1051510).\n\n - usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n\n - usb: Fix slab-out-of-bounds write in\n usb_get_bos_descriptor (bsc#1051510).\n\n - usbip: usbip_host: fix BUG: sleeping function called\n from invalid context (bsc#1051510).\n\n - usbip: usbip_host: fix stub_dev lock context imbalance\n regression (bsc#1051510).\n\n - usbnet: fix kernel crash after disconnect (bsc#1051510).\n\n - usb: rio500: fix memory leak in close after disconnect\n (bsc#1051510).\n\n - usb: rio500: refuse more than one device at a time\n (bsc#1051510).\n\n - usb: sisusbvga: fix oops in error path of sisusb_probe\n (bsc#1051510).\n\n - userfaultfd: use RCU to free the task struct when fork\n fails (git-fixes).\n\n - vhost: reject zero size iova range\n (networking-stable-19_04_19).\n\n - video: hgafb: fix potential NULL pointer dereference\n (bsc#1051510).\n\n - video: imsttfb: fix potential NULL pointer dereferences\n (bsc#1051510).\n\n - virtio_console: initialize vtermno value for ports\n (bsc#1051510).\n\n - vrf: check accept_source_route on the original netdevice\n (networking-stable-19_04_10).\n\n - vsock/virtio: Initialize core virtio vsock before\n registering the driver (bsc#1051510).\n\n - vt: always call notifier with the console lock held\n (bsc#1051510).\n\n - vxlan: Do not call gro_cells_destroy() before device is\n unregistered (networking-stable-19_03_28).\n\n - vxlan: trivial indenting fix (bsc#1051510).\n\n - vxlan: use __be32 type for the param vni in\n __vxlan_fdb_delete (bsc#1051510).\n\n - w1: fix the resume command API (bsc#1051510).\n\n - watchdog: imx2_wdt: Fix set_timeout for big timeout\n values (bsc#1051510).\n\n - x86_64: Add gap to int3 to allow for call emulation\n (bsc#1099658).\n\n - x86_64: Allow breakpoints to emulate call instructions\n (bsc#1099658).\n\n - x86/alternative: Init ideal_nops for Hygon Dhyana ().\n\n - x86/amd_nb: Check vendor in AMD-only functions ().\n\n - x86/apic: Add Hygon Dhyana support ().\n\n - x86/bugs: Add Hygon Dhyana to the respective mitigation\n machinery ().\n\n - x86/cpu: Create Hygon Dhyana architecture support file\n ().\n\n - x86/cpu: Get cache info and setup cache cpumap for Hygon\n Dhyana ().\n\n - x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().\n\n - x86/events: Add Hygon Dhyana support to PMU\n infrastructure ().\n\n - x86/kvm: Add Hygon Dhyana support to KVM ().\n\n - x86/mce: Add Hygon Dhyana support to the MCA\n infrastructure ().\n\n - x86/mce: Do not disable MCA banks when offlining a CPU\n on AMD ().\n\n - x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and\n northbridge ().\n\n - x86/smpboot: Do not use BSP INIT delay and MWAIT to idle\n on Dhyana ().\n\n - x86/speculation/mds: Fix documentation typo\n (bsc#1135642).\n\n - x86/xen: Add Hygon Dhyana support to Xen ().\n\n - xenbus: drop useless LIST_HEAD in xenbus_write_watch()\n and xenbus_file_write() (bsc#1065600).\n\n - xen/pciback: Do not disable PCI_COMMAND on PCI device\n reset (bsc#1065600).\n\n - xfrm6: avoid potential infinite loop in\n _decode_session6() (git-fixes).\n\n - xfrm6: call kfree_skb when skb is toobig (git-fixes).\n\n - xfrm: fix missing dst_release() after policy blocking\n lbcast and multicast (git-fixes).\n\n - xfrm: fix 'passing zero to ERR_PTR()' warning\n (git-fixes).\n\n - xfrm: reset crypto_done when iterating over multiple\n input xfrms (git-fixes).\n\n - xfrm: reset transport header back to network header\n after all input transforms ahave been applied\n (git-fixes).\n\n - xfrm_user: prevent leaking 2 bytes of kernel memory\n (git-fixes).\n\n - xfrm: Validate address prefix lengths in the xfrm\n selector (git-fixes).\n\n - xfs: add log item pinning error injection tag\n (bsc#1114427).\n\n - xfs: buffer lru reference count error injection tag\n (bsc#1114427).\n\n - xfs: check _btree_check_block value (bsc#1123663).\n\n - xfs: convert drop_writes to use the errortag mechanism\n (bsc#1114427).\n\n - xfs: create block pointer check functions (bsc#1123663).\n\n - xfs: create inode pointer verifiers (bsc#1114427).\n\n - xfs: do not clear imap_valid for a non-uptodate buffers\n (bsc#1138018).\n\n - xfs: do not look at buffer heads in xfs_add_to_ioend\n (bsc#1138013).\n\n - xfs: do not set the page uptodate in xfs_writepage_map\n (bsc#1138003).\n\n - xfs: do not use XFS_BMAPI_ENTRIRE in xfs_get_blocks\n (bsc#1137999).\n\n - xfs: do not use XFS_BMAPI_IGSTATE in xfs_map_blocks\n (bsc#1138005).\n\n - xfs: eof trim writeback mapping as soon as it is cached\n (bsc#1138019).\n\n - xfs: export _inobt_btrec_to_irec and\n _ialloc_cluster_alignment for scrub (bsc#1114427).\n\n - xfs: export various function for the online scrubber\n (bsc#1123663).\n\n - xfs: expose errortag knobs via sysfs (bsc#1114427).\n\n - xfs: fix s_maxbytes overflow problems (bsc#1137996).\n\n - xfs: fix unused variable warning in xfs_buf_set_ref()\n (bsc#1114427).\n\n - xfs: force summary counter recalc at next mount\n (bsc#1114427).\n\n - xfs: make errortag a per-mountpoint structure\n (bsc#1123663).\n\n - xfs: make xfs_writepage_map extent map centric\n (bsc#1138009).\n\n - xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n\n - xfs: move all writeback buffer_head manipulation into\n xfs_map_at_offset (bsc#1138014).\n\n - xfs: move error injection tags into their own file\n (bsc#1114427).\n\n - xfs: refactor btree block header checking functions\n (bsc#1123663).\n\n - xfs: refactor btree pointer checks (bsc#1123663).\n\n - xfs: refactor the tail of xfs_writepage_map\n (bsc#1138016).\n\n - xfs: refactor unmount record write (bsc#1114427).\n\n - xfs: remove the imap_valid flag (bsc#1138012).\n\n - xfs: remove unneeded parameter from XFS_TEST_ERROR\n (bsc#1123663).\n\n - xfs: remove unused parameter from xfs_writepage_map\n (bsc#1137995).\n\n - xfs: remove XFS_IO_INVALID (bsc#1138017).\n\n - xfs: remove xfs_map_cow (bsc#1138007).\n\n - xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n\n - xfs: remove xfs_reflink_trim_irec_to_next_cow\n (bsc#1138006).\n\n - xfs: remove xfs_start_page_writeback (bsc#1138015).\n\n - xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN\n (bsc#1123663).\n\n - xfs: rename the offset variable in xfs_writepage_map\n (bsc#1138008).\n\n - xfs: replace log_badcrc_factor knob with error injection\n tag (bsc#1114427).\n\n - xfs: sanity-check the unused space before trying to use\n it (bsc#1123663).\n\n - xfs: serialize unaligned dio writes against all other\n dio writes (bsc#1134936).\n\n - xfs: simplify xfs_map_blocks by using\n xfs_iext_lookup_extent directly (bsc#1138011).\n\n - xfs: skip CoW writes past EOF when writeback races with\n truncate (bsc#1137998).\n\n - xfs: xfs_reflink_convert_cow() memory allocation\n deadlock (bsc#1138002).\n\n - xhci: Convert xhci_handshake() to use\n readl_poll_timeout_atomic() (bsc#1051510).\n\n - xhci: Use %zu for printing size_t type (bsc#1051510).\n\n - xhci: update bounce buffer with correct sg num\n (bsc#1051510).\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1012382\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1050242\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051510\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1053043\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1056787\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1058115\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1061840\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1063638\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1064802\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065729\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1066129\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1068546\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1075020\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1082387\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083647\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1085535\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1099658\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103992\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1104353\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1104427\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1108838\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111696\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113722\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114427\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1115688\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1117158\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1117561\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1118139\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120091\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120423\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120566\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120843\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120902\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1123454\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1123663\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1124503\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1126356\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1127616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128052\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128432\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1128904\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129693\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1129770\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1130699\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1131565\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1131673\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133190\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133320\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133612\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134597\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134671\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134806\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1134936\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135056\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135120\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135278\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135281\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135309\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135312\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135314\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135315\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135316\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135320\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135323\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135330\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135492\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135542\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135556\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135603\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135642\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135661\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135758\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136206\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136424\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136430\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136432\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136434\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136435\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136438\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136439\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136477\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136478\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136573\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136586\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136598\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136881\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136922\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136935\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1136990\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137151\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137152\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137153\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137162\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137372\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137429\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137444\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137586\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137752\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137996\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137998\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1137999\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138000\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138002\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138003\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138005\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138006\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138007\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138008\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138009\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138010\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138011\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138012\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138013\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138014\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138015\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138016\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138018\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138019\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138291\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1138375\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected the Linux Kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/09/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/06/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/06/19\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-base-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-base-debuginfo-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-debuginfo-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-debugsource-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-devel-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-devel-debuginfo-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-base-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-base-debuginfo-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-debuginfo-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-debugsource-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-devel-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-devel-debuginfo-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-devel-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-docs-html-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-base-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-debugsource-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-devel-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-macros-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-build-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-build-debugsource-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-qa-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-source-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-source-vanilla-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-syms-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-base-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-debuginfo-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-debugsource-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-devel-4.12.14-lp150.12.64.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-lp150.12.64.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc\");\n}\n", "cvss": {"score": 8.3, "vector": "AV:A/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-13T14:55:41", "description": "Eli Biham and Lior Neumann discovered that the Bluetooth implementation in the Linux kernel did not properly validate elliptic curve parameters during Diffie-Hellman key exchange in some situations. An attacker could use this to expose sensitive information. (CVE-2018-5383)\n\nIt was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-10126)\n\nAndrei Vlad Lutas and Dan Lutas discovered that some x86 processors incorrectly handle SWAPGS instructions during speculative execution. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-1125)\n\nJann Horn discovered that a race condition existed in the Linux kernel when performing core dumps. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information.\n(CVE-2019-11599)\n\nIt was discovered that the PowerPC dlpar implementation in the Linux kernel did not properly check for allocation errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-12614)\n\nJann Horn discovered that the ptrace implementation in the Linux kernel did not properly record credentials in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2019-13272)\n\nIt was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-3846).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-08-14T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-4095-1)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 6.5, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 8.3, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-5383", "CVE-2019-10126", "CVE-2019-1125", "CVE-2019-11599", "CVE-2019-12614", "CVE-2019-13272", "CVE-2019-3846", "CVE-2019-9503"], "modified": "2023-01-12T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-snapdragon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual", "cpe:/o:canonical:ubuntu_linux:16.04"], "id": "UBUNTU_USN-4095-1.NASL", "href": "https://www.tenable.com/plugins/nessus/127890", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4095-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(127890);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/12\");\n\n script_cve_id(\"CVE-2018-5383\", \"CVE-2019-10126\", \"CVE-2019-1125\", \"CVE-2019-11599\", \"CVE-2019-12614\", \"CVE-2019-13272\", \"CVE-2019-3846\", \"CVE-2019-9503\");\n script_xref(name:\"USN\", value:\"4095-1\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/06/10\");\n\n script_name(english:\"Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-4095-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Eli Biham and Lior Neumann discovered that the Bluetooth\nimplementation in the Linux kernel did not properly validate elliptic\ncurve parameters during Diffie-Hellman key exchange in some\nsituations. An attacker could use this to expose sensitive\ninformation. (CVE-2018-5383)\n\nIt was discovered that a heap buffer overflow existed in the Marvell\nWireless LAN device driver for the Linux kernel. An attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-10126)\n\nAndrei Vlad Lutas and Dan Lutas discovered that some x86 processors\nincorrectly handle SWAPGS instructions during speculative execution. A\nlocal attacker could use this to expose sensitive information (kernel\nmemory). (CVE-2019-1125)\n\nJann Horn discovered that a race condition existed in the Linux kernel\nwhen performing core dumps. A local attacker could use this to cause a\ndenial of service (system crash) or expose sensitive information.\n(CVE-2019-11599)\n\nIt was discovered that the PowerPC dlpar implementation in the Linux\nkernel did not properly check for allocation errors in some\nsituations. A local attacker could possibly use this to cause a denial\nof service (system crash). (CVE-2019-12614)\n\nJann Horn discovered that the ptrace implementation in the Linux\nkernel did not properly record credentials in some situations. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly gain administrative privileges. (CVE-2019-13272)\n\nIt was discovered that the Marvell Wireless LAN device driver in the\nLinux kernel did not properly validate the BSS descriptor. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or possibly execute arbitrary code. (CVE-2019-3846).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/4095-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-3846\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Linux Polkit pkexec helper PTRACE_TRACEME local root exploit');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-snapdragon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/08/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/08/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2019-2023 Canonical, Inc. / NASL script (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nvar release = chomp(release);\nif (! preg(pattern:\"^(16\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 16.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2018-5383\", \"CVE-2019-10126\", \"CVE-2019-1125\", \"CVE-2019-11599\", \"CVE-2019-12614\", \"CVE-2019-13272\", \"CVE-2019-3846\", \"CVE-2019-9503\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-4095-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nvar flag = 0;\n\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-1054-kvm\", pkgver:\"4.4.0-1054.61\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-1090-aws\", pkgver:\"4.4.0-1090.101\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-1118-raspi2\", pkgver:\"4.4.0-1118.127\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-1122-snapdragon\", pkgver:\"4.4.0-1122.128\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-159-generic\", pkgver:\"4.4.0-159.187\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-159-generic-lpae\", pkgver:\"4.4.0-159.187\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-159-lowlatency\", pkgver:\"4.4.0-159.187\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-aws\", pkgver:\"4.4.0.1090.94\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-generic\", pkgver:\"4.4.0.159.167\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-generic-lpae\", pkgver:\"4.4.0.159.167\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-kvm\", pkgver:\"4.4.0.1054.54\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-lowlatency\", pkgver:\"4.4.0.159.167\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-raspi2\", pkgver:\"4.4.0.1118.118\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-snapdragon\", pkgver:\"4.4.0.1122.114\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-virtual\", pkgver:\"4.4.0.159.167\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-4.4-aws / linux-image-4.4-generic / etc\");\n}\n", "cvss": {"score": 8.3, "vector": "AV:A/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-02-25T14:42:37", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an\n __blk_drain_queue() use-after-free because a certain error case is mishandled.(CVE-2018-20856)\n\n - In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.(CVE-2019-10638)\n\n - The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass.\n Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses.(CVE-2019-10639)\n\n - The Linux kernel was found vulnerable to an integer overflow in the drivers/video/fbdev/uvesafb.c:uvesafb_setcmap() function. The vulnerability could result in local attackers being able to crash the kernel or potentially elevate privileges.(CVE-2018-13406)\n\n - The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack.(CVE-2019-3874)\n\n - The Linux kernel before 5.1-rc5 allows page-i1/4z_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.(CVE-2019-11487)\n\n - A flaw was found in the Linux kernel's implementation of ext4 extent management. The kernel doesn't correctly initialize memory regions in the extent tree block which may be exported to a local user to obtain sensitive information by reading empty/uninitialized data from the filesystem.(CVE-2019-11833)\n\n - A flaw was found in the Linux kernel's implementation of the Bluetooth Human Interface Device Protocol (HIDP). A local attacker with access permissions to the Bluetooth device can issue an IOCTL which will trigger the do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c.c. This function can leak potentially sensitive information from the kernel stack memory via a HIDPCONNADD command because a name field may not be correctly NULL terminated.(CVE-2019-11884)\n\n - The Linux kernel is vulnerable to an out-of-bounds read in ext4/balloc.c:ext4_valid_block_bitmap() function. An attacker could trick a legitimate user or a privileged attacker could exploit this by mounting a crafted ext4 image to cause a crash.(CVE-2018-1093)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-09-24T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-2068)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-1093", "CVE-2018-13406", "CVE-2018-20856", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11487", "CVE-2019-11833", "CVE-2019-11884", "CVE-2019-3874"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-debuginfo", "p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-2068.NASL", "href": "https://www.tenable.com/plugins/nessus/129261", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(129261);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-1093\",\n \"CVE-2018-13406\",\n \"CVE-2018-20856\",\n \"CVE-2019-10638\",\n \"CVE-2019-10639\",\n \"CVE-2019-11487\",\n \"CVE-2019-11833\",\n \"CVE-2019-11884\",\n \"CVE-2019-3874\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-2068)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - An issue was discovered in the Linux kernel before\n 4.18.7. In block/blk-core.c, there is an\n __blk_drain_queue() use-after-free because a certain\n error case is mishandled.(CVE-2018-20856)\n\n - In the Linux kernel before 5.1.7, a device can be\n tracked by an attacker using the IP ID values the\n kernel produces for connection-less protocols (e.g.,\n UDP and ICMP). When such traffic is sent to multiple\n destination IP addresses, it is possible to obtain hash\n collisions (of indices to the counter array) and\n thereby obtain the hashing key (via enumeration). An\n attack may be conducted by hosting a crafted web page\n that uses WebRTC or gQUIC to force UDP traffic to\n attacker-controlled IP addresses.(CVE-2019-10638)\n\n - The Linux kernel 4.x (starting from 4.1) and 5.x before\n 5.0.8 allows Information Exposure (partial kernel\n address disclosure), leading to a KASLR bypass.\n Specifically, it is possible to extract the KASLR\n kernel image offset using the IP ID values the kernel\n produces for connection-less protocols (e.g., UDP and\n ICMP). When such traffic is sent to multiple\n destination IP addresses, it is possible to obtain hash\n collisions (of indices to the counter array) and\n thereby obtain the hashing key (via enumeration). This\n key contains enough bits from a kernel address (of a\n static variable) so when the key is extracted (via\n enumeration), the offset of the kernel image is\n exposed. This attack can be carried out remotely, by\n the attacker forcing the target device to send UDP or\n ICMP (or certain other) traffic to attacker-controlled\n IP addresses. Forcing a server to send UDP traffic is\n trivial if the server is a DNS server. ICMP traffic is\n trivial if the server answers ICMP Echo requests\n (ping). For client targets, if the target visits the\n attacker's web page, then WebRTC or gQUIC can be used\n to force UDP traffic to attacker-controlled IP\n addresses.(CVE-2019-10639)\n\n - The Linux kernel was found vulnerable to an integer\n overflow in the\n drivers/video/fbdev/uvesafb.c:uvesafb_setcmap()\n function. The vulnerability could result in local\n attackers being able to crash the kernel or potentially\n elevate privileges.(CVE-2018-13406)\n\n - The SCTP socket buffer used by a userspace application\n is not accounted by the cgroups subsystem. An attacker\n can use this flaw to cause a denial of service\n attack.(CVE-2019-3874)\n\n - The Linux kernel before 5.1-rc5 allows\n page-i1/4z_refcount reference count overflow, with\n resultant use-after-free issues, if about 140 GiB of\n RAM exists. This is related to fs/fuse/dev.c,\n fs/pipe.c, fs/splice.c, include/linux/mm.h,\n include/linux/pipe_fs_i.h, kernel/trace/trace.c,\n mm/gup.c, and mm/hugetlb.c. It can occur with FUSE\n requests.(CVE-2019-11487)\n\n - A flaw was found in the Linux kernel's implementation\n of ext4 extent management. The kernel doesn't correctly\n initialize memory regions in the extent tree block\n which may be exported to a local user to obtain\n sensitive information by reading empty/uninitialized\n data from the filesystem.(CVE-2019-11833)\n\n - A flaw was found in the Linux kernel's implementation\n of the Bluetooth Human Interface Device Protocol\n (HIDP). A local attacker with access permissions to the\n Bluetooth device can issue an IOCTL which will trigger\n the do_hidp_sock_ioctl function in\n net/bluetooth/hidp/sock.c.c. This function can leak\n potentially sensitive information from the kernel stack\n memory via a HIDPCONNADD command because a name field\n may not be correctly NULL terminated.(CVE-2019-11884)\n\n - The Linux kernel is vulnerable to an out-of-bounds read\n in ext4/balloc.c:ext4_valid_block_bitmap() function. An\n attacker could trick a legitimate user or a privileged\n attacker could exploit this by mounting a crafted ext4\n image to cause a crash.(CVE-2018-1093)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2068\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1059e72a\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/09/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/09/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-514.44.5.10.h221\",\n \"kernel-debuginfo-3.10.0-514.44.5.10.h221\",\n \"kernel-debuginfo-common-x86_64-3.10.0-514.44.5.10.h221\",\n \"kernel-devel-3.10.0-514.44.5.10.h221\",\n \"kernel-headers-3.10.0-514.44.5.10.h221\",\n \"kernel-tools-3.10.0-514.44.5.10.h221\",\n \"kernel-tools-libs-3.10.0-514.44.5.10.h221\",\n \"perf-3.10.0-514.44.5.10.h221\",\n \"python-perf-3.10.0-514.44.5.10.h221\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-03-23T15:25:35", "description": "According to the version of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerability :\n\n - The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass.\n Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.(CVE-2019-10639)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2019-08-23T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP5 : kernel (EulerOS-SA-2019-1813)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-10639"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-debuginfo", "p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-1813.NASL", "href": "https://www.tenable.com/plugins/nessus/128105", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(128105);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2019-10639\"\n );\n\n script_name(english:\"EulerOS 2.0 SP5 : kernel (EulerOS-SA-2019-1813)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerability :\n\n - The Linux kernel 4.x (starting from 4.1) and 5.x before\n 5.0.8 allows Information Exposure (partial kernel\n address disclosure), leading to a KASLR bypass.\n Specifically, it is possible to extract the KASLR\n kernel image offset using the IP ID values the kernel\n produces for connection-less protocols (e.g., UDP and\n ICMP). When such traffic is sent to multiple\n destination IP addresses, it is possible to obtain hash\n collisions (of indices to the counter array) and\n thereby obtain the hashing key (via enumeration). This\n key contains enough bits from a kernel address (of a\n static variable) so when the key is extracted (via\n enumeration), the offset of the kernel image is\n exposed. This attack can be carried out remotely, by\n the attacker forcing the target device to send UDP or\n ICMP (or certain other) traffic to attacker-controlled\n IP addresses. Forcing a server to send UDP traffic is\n trivial if the server is a DNS server. ICMP traffic is\n trivial if the server answers ICMP Echo requests\n (ping). For client targets, if the target visits the\n attacker's web page, then WebRTC or gQUIC can be used\n to force UDP traffic to attacker-controlled IP\n addresses. NOTE: this attack against KASLR became\n viable in 4.1 because IP ID generation was changed to\n have a dependency on an address associated with a\n network namespace.(CVE-2019-10639)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1813\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f684e935\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/08/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/08/23\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-862.14.1.1.h224.eulerosv2r7\",\n \"kernel-debuginfo-3.10.0-862.14.1.1.h224.eulerosv2r7\",\n \"kernel-debuginfo-common-x86_64-3.10.0-862.14.1.1.h224.eulerosv2r7\",\n \"kernel-devel-3.10.0-862.14.1.1.h224.eulerosv2r7\",\n \"kernel-headers-3.10.0-862.14.1.1.h224.eulerosv2r7\",\n \"kernel-tools-3.10.0-862.14.1.1.h224.eulerosv2r7\",\n \"kernel-tools-libs-3.10.0-862.14.1.1.h224.eulerosv2r7\",\n \"perf-3.10.0-862.14.1.1.h224.eulerosv2r7\",\n \"python-perf-3.10.0-862.14.1.1.h224.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2023-02-10T14:52:22", "description": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target